1 |
Abawajy, J., "User preference of cybersecurity awareness deliverymethods", Behavior &Information Technology, Vol. 33, No. 3, 2014, pp. 237-248.
DOI
|
2 |
Albrechtse, E. and J. Hovden, "Improving information security awareness and behavior through dialogue, participation and collective reflection", An Intervention Study, Computers and Security, Vol. 29, No. 4, 2010, pp. 432-445.
DOI
|
3 |
An, J. S., "Biometric authentication for banknotes ...Will it settled as a newtrend?". Available at http://www.segye.com/news-View/20160202004025 (Downloaded 03 Feb. 2016).
|
4 |
Anderson, C. L. and R. Agarwal, "Practicing Safe Computing: AMultimedia Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 613-643.
DOI
|
5 |
Bhattacherjee, A., "Understanding Information Systems Continuance: An Expectation-Confirmation Model", MIS Quarterly, Vol. 25, 2001, pp. 351-371.
DOI
|
6 |
Bulgurcu, B., H. Cavusoglu, and I. Benbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information security Awareness", MIS Quarterly, Vol. 34, No. 3. 2010, pp. 523-548.
DOI
|
7 |
Chae, S. I., Social Science Investigation Methodology, Hakhyeonsa, Seoul, Korea. 2001.
|
8 |
Chang, H. S. and D. H. Jung, "A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance", Journal of The Korea Society of Computer and Information, Vol. 20, No. 9, 2015, pp. 73-80.
DOI
|
9 |
Chang, M. H. and D. Y. Kang, "Factors Affecting the Information Security Awareness and Perceived Information Security Risk of Employees of Port Companies", Journal of Navigation and Port Research, Vol. 36, No. 3, 2012, pp. 261-271.
DOI
|
10 |
Chen, X., L. Chen, and D. Wu, "Factors That Influence Employees' Security Policy Compliance: An Awareness-Motivation- Capability Perspective", Journal of Computer Information Systems, Vol. 58, No. 4, 2018, pp. 312-324
DOI
|
11 |
Coventry, L., A. De Angeli, and G. Johnson, "Usability and Biometric Verification at the ATM Interface", SIGCHI Conference on Human Factors in Computing Systems, 2003, pp. 153-160.
|
12 |
Das, T. K. and B. Teng, "Between Trust and Control: Developing Confidence in Partner Cooperation in Alliance", Academy of Management Review, Vol. 23, No. 3, 1998, pp. 491-512.
DOI
|
13 |
Davis, D., "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 319-340.
DOI
|
14 |
Dinev, T. and P. Hart, "Internet Privacy Concern and their Antecedents-Measurement Validity and a Regression Model", Behavior and Information Technology, Vol. 23, No. 6, 2004, pp. 413-422.
DOI
|
15 |
Furnell, S. and I. Vasileiou, "Security education and awareness: Just let themburn?", Network Security, Dec. 2017, pp. 5-9.
|
16 |
Eminagaoglu, M., E. Ucar, and S. Eren, "The positive outcomes of information security awareness training in companies: A case study", Information Security Technical Report, Vol. 4, 2010, pp. 1-7.
DOI
|
17 |
Flavian, C. and M. Guinaliu, "Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site", Industrial Management and Data Systems, Vol. 106, No. 4, 2006, pp. 601-620.
DOI
|
18 |
Fornell, C. and D. F. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50.
DOI
|
19 |
Heo, J. and S. J. Ahn, "Effects of Biased Awareness of Security Policies on Security Compliance Behavior", The Journal of Korean Association of Computer Education, Vol. 23, No. 1, 2020, pp. 63-75.
DOI
|
20 |
Ifinedo, P., "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory", Computers and Security, Vol. 31, No. 1, 2012, pp. 83-95.
DOI
|
21 |
James, T., T. Pirim, K., Boswell, B. Reithel, and R. Barkhi, "Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model", Journal of Organizational and End User Computing, Vol. 18, No. 3, 2006, pp. 1-24.
DOI
|
22 |
Jarvenpaa, S. L. and P. Todd, "Consumer Reactions to Electronic Shopping on the World Wide Web", International Journal of Electronic Commerce, Vol. 1, No. 2, 1996, pp. 59-88.
DOI
|
23 |
Jemal, A., "User preference of cyber security awareness delivery methods", Behaviour & Information Technology, Vol. 33, No. 3, 2014, pp. 237-248.
DOI
|
24 |
Vijayasarathy, L. R., "Predicting Consumer Intentions to Use On-line Shopping: The Case for an Augmented Technology Acceptance Model", Information and Management, Vol. 41, No. 6, 2004, pp. 747-762.
DOI
|
25 |
Jin, S. H., D. G. Lee, and S. J. Lee. "The Influence of Technostress and Antismart on Smartphones", Journal of Digital Convergence, Vol. 10, No. 10, 2012, pp. 187-195.
DOI
|
26 |
Johnston, A. C. and M. Warkentin, "Fear Appeals and Information Security Behaviors: An Empirical Study", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.
DOI
|
27 |
Tamjidyamcholo, A., M. S. B. Baba, H. Tamjid, and R. Gholipour, "Information security: Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity and shared-language", Computers & Education, Vol. 68, 2013, pp. 223-232.
DOI
|
28 |
Vance, A., M. Siponen, and S. Pahnila, "Motivation IS Security Compliance: Insights From Habit and Protection Motivation Theory", Information and Management, Vol. 49, 2012, pp. 190-198.
DOI
|
29 |
Vatanasombut, B. M., A. C. Igbaria, and W. Stylianou, "Information Systems Continuance Intention of Web-based Applications Customers: The Case of Online Banking", Information andManagement, Vol. 45, No. 7, 2008, pp. 419-428.
|
30 |
Yim, M. S., "Why Security Awareness Education is not Effective?", Journal of Digital Convergence, Vol. 12, No. 2, 2014, pp. 27-37.
DOI
|
31 |
Yu, J. W., Replace your secret number... Is there any problemwith the introduction of biometric authentication in the financial sector?. Available at http://www.enewstoday.co.kr/news/articleView.html?idxno=690695 (Download 03 Feb. 2017).
|
32 |
Yun, J. B., "A Study on the Short Term Curriculumfor Strengthening Information Security Capability in Public Sector", Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 3, 2016, pp. 769-776.
DOI
|
33 |
Kim, J. K. and J. H. Kim, "An Empirical Study on Security Behavioral Intention of Individual Users: Comparison between Personal Computers and Smartphones", The Journal of Internet Electronic Commerce Research, Vol. 14, No. 6, 2014, pp. 45-69.
|
34 |
Kang, D. Y. andM. H. Chang, "An Analysis of Compliance with Information Security Policy Effects on Information Security Ability and Behavior: Focused on Workers of Shipping and Port Organization", Journal of Korea Port Economic Association, Vol. 30, No. 1, 2014, pp. 97-118.
|
35 |
Kim, B. R., J.W. Lee, and B. S. Kim, "Effect of Information Security Training and Services on Employees' Compliance to Security Policies", Informatization Policy, Vol. 25, No. 1, 2018, pp. 99-114.
DOI
|
36 |
Kim, J. K. and D. Y. Kang, "A Study on the Factors Affecting the Information Systems Security Effectiveness of Password", Asia Pacific Journal of Information System, Vol. 18, No. 4, 2008, pp. 1-26.
DOI
|
37 |
Kim, J. K., J. Y. Kim, and Q. Li, "A Study on Factors Affecting Smartphone User's Security Behavior Intention", The Journal of Internet Electronic Commerce Research, Vol. 16, No. 6, 2016, pp. 115-136.
|
38 |
Korea Consumer Agency, Mobile Payment Service Status Survey, 2016.
|
39 |
Kim, J. S. and B. Bernhard, "Factors influencing hotel customers' intention to use a fingerprint system", Journal of Hospitality and Tourism Technology, Vol. 5, No. 2, 2014, pp. 98-125.
DOI
|
40 |
Kim, S. H. and Y. M. Song, "An Empirical Study onMotivational Factors Influencing Information Security Policy Compliance and Security Behavior of End-Users (Employees) in Organizations", The e-Business Studies, Vol. 12, No. 3, 2011, pp. 327-349.
DOI
|
41 |
Lee, B. Y. andM. Y. Kim, "Factors affecting the Continuance Usage Intention of Biometric Technology: Comparing Dark Scenario with Bright Scenario", The Journal of Society for e-Business Studies, Vol. 16, No. 3, 2011, pp. 1-22.
DOI
|
42 |
Lee, C. S. and Y. H. Kim, "An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage", The Journal of Society for e-Business Studies, Vol. 20, No. 2, 2015, pp. 27-36.
DOI
|
43 |
Lee, K. E., J. Y. Kim, J. S. Hyun, and C. J. Park, "The Effects of Information Security Vaccine User's Construal Level and Message Type on the Information Security Behavior", The Journal of Korean Association of Computer Education, Vol. 18, No. 6, 2015, pp. 33-42.
DOI
|
44 |
Lee, S. K. and M. S. Chae, "An Study on the Factors that Motivate The Compliance of the Organizational Security Policy", Korean Journal of Business Administration, Vol. 27, No. 6, 2014, pp. 927-953.
|
45 |
Lee, Y. and K. R. Larsen, "Threat or coping appraisal: determinants of SMB executives' decision to adopt antimalware software", European Journal of Information Systems, Vol. 18, No. 2, 2009, pp. 177-187.
DOI
|
46 |
Moody, J., "Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use", Journal of Issues in Informing Science and Information Technology, Vol. 1, 2004, pp. 753-761.
DOI
|
47 |
Liang, H. and Y. Xue, "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective", Journal of the Association for Information Systems, Vol. 11, No. 7, 2009, pp. 394-413.
DOI
|
48 |
Limayem, M., M. Khalifa, andW. W. Chin, "Factors Motivating Software Privacy: A Longitudinal Study", IEEE Transactions on Engineering Management, Vol. 51, No. 4, 2004, pp. 414-425.
DOI
|
49 |
Lin, C. S., S.Wu, and R. J. Tsai, "Integrating Perceived Playfulness into Expectation-ConfirmationModel for Web Portal", Information and Management, Vol. 43, No. 5, 2005, pp. 683-693.
|
50 |
Ngugi, B., A. Kamis, and M. Tremaine, "Intention to Use Biometric Systems", e-Service Journal, Vol. 7, No. 3, 2011, pp. 20-46.
DOI
|
51 |
Peyravian, M. and N. Zunic, "Methods for Protecting Password Transmission", Computers & Security, Vol. 19, No. 5, 2000, pp. 466-469.
DOI
|
52 |
Ring, P. S. and A. H. Van De Ven, "Developing Processes of Cooperative Inter-organizational Relationships", Academy of Management Review, Vol. 19, 1994, pp. 90-118.
DOI
|
53 |
Roca, J. C., C. M. Chiu, and F. J.Martinez. "Understanding E-learning Continuance Intention: An Extension of the Technology AcceptanceModel", Human-Computer Studies, Vol. 64, No. 8, 2006, pp. 683-696.
DOI
|
54 |
Rogers, R. W., In Social Psychophysiology: A Sourcebook. Cacioppo, J. T. &Petty, R. E. (Eds.). Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protected Motivation. New York: The Guilford Press, 1983.
|
55 |
Smith, H., S. Milberg, and S. Berke, "Information Privacy: Measuring Individuals' Concerns about Organizational Practices", MIS Quarterly, Vol. 20, 1996, pp. 167-196.
DOI
|
56 |
Rosa, R. H., A. S. Patrick, and A. Ozok, "Perception and Acceptance of Fingerprint Biometric Technology", Symposium On Usable Privacy Security(SOUPS), 2007.
|
57 |
Rousseau, D. M., S. G. Sitkin, R. S. Butt, and C. Camerer, "Not So Different After All: A Cross-Discipline View of Trust", Academy ofManagement Review, Vol. 23, No. 3, 1998, pp. 393-404.
|
58 |
Shaw, R. S., C. C. Chen, A. Harris, and H. J. Huang, "The impact of information richness on information security awareness training effectiveness", Computers & Education, Vol. 52, 2009, pp. 92-100.
DOI
|
59 |
Soh, K. L.,W. P.Wongand, and K. L. Chan, "Adoption of Biometric Technology in Online Applications", International Journal of Business and Management Science, Vol. 3, No. 2, 2010, pp. 121-146.
|
60 |
Park, K. A., D. Y. Lee, and C. M. Koo, "An Empirical Study about Internet and Social Network Security Behavior of End User", Journal of Information Systems, Vol. 21, No. 4, 2012, pp. 1-29.
DOI
|