1 |
박용재, 임명환, "RFID 기술의 인식, 채택, 실행별 영향요인 분석," 한국경영과학회지, 제26권, 제3호(2009), pp.205-221.
|
2 |
이수열, "협력적 공급사슬관리가 참여기업 성과에 미치는 영향에 대한 연구," 한국경영과학회지, 제34권, 제3호(2009), pp.85-104.
|
3 |
이웅규, 권정일, "기술수용 모형과 전환비용의 관계 분석," 한국경영과학회지, 제37권, 제1호(2012), pp.89-104.
|
4 |
Anderson, D.L. and R. Agarwal, "Practicing Safe Computing:A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly, Vol.34, No.3(2010), pp.613-643.
DOI
|
5 |
Babatunde, D.A. and M.H. Selamat, "Investigating Information Security Management and Its Influencing Factors in the Nigerian Banking Industry:A Conceptual Model," International Journal on Social Science, Economics and Art, Vol.2, No.2(2012), pp.55-59.
|
6 |
Bassellier, G. and I. Benbasat, "Business Competence of Information Technology Professionals: Conceptual Development and Influence on IT-Business Partnerships," MIS Quarterly, Vol.28, No.4(2004), pp.673-694.
DOI
|
7 |
Baker, W.H. and L. Wallace, "Is Information Security Under Control?," IEEE Security and Privacy, Vol.5, No.1(2007), pp.36-44.
DOI
ScienceOn
|
8 |
Boss, S.R., L.J. Kirsch, I. Angermmeier, R.A. Shingler, and R.W. Boss, "If Someone is Watching, I'll Do What I'm Asked:Mandatoriness, Control, and Information Security," European Journal of Information Systems, Vol.18, No.2(2009), pp.151-164.
|
9 |
Brandon, D.P. and A.B. Hollingshead, "Transactive Memory Systems in Organizations: Matching Tasks, Expertise, and People," Organization Science, Vol.15, No.6(2004), pp.633-644.
DOI
ScienceOn
|
10 |
Cavusoglu, H., B. Mishra, and S. Raghunathan, "A Model for Evaluating IT Security Investments," Communications of the ACM, Vol.47, No.7(2004), pp.87-92.
DOI
ScienceOn
|
11 |
Chang, S.E. and C.B. Ho, "Organizational Factors to the Effectiveness of Implementing Information Security Management," Industrial Management and Data Systems, Vol.106, No.3(2006), pp.345-361.
DOI
ScienceOn
|
12 |
Chatterjee, D., R. Grewal, and V. Sambamurthy, "Shaping Up for E-Commerce:Institutional Enablers of the Organizational Assimilation of Web Technologies," MIS Quarterly, Vol.26, No.2(2002), pp.65-89.
DOI
ScienceOn
|
13 |
Chau, P.Y.K. and K.Y. Tam, "Organizational Adoption of Open Systems:A 'Technology-Push, Need-Pull' Perspective," Information and Management, Vol.37, No.5(2000), pp.229-239.
DOI
ScienceOn
|
14 |
Cooper, R. and R. Zmud, "Information Technology Implementation Research:A Technological Diffusion Approach," Management Science, Vol.36, No.2(1990), pp.123-139.
DOI
ScienceOn
|
15 |
Damanpour, F. and M. Schneider, "Phases of the Adoption of Innovation in Organizations :Effects of Environment, Organization and Top Managers," British Journal of Management, Vol.17, No.3(2006), pp.215-236.
DOI
ScienceOn
|
16 |
Dhillon, G. and J. Backhouse, "Information System Security Management in the New Millennium," Communications of the ACM, Vol.43(2000), pp.125-128.
DOI
ScienceOn
|
17 |
Doz, Y.L., P.M. Olk, and P.S. Ring, "Formation Processes of R&D Consortia:Which Path to Take? Where Does it Lead?," Strategic Management Journal, Vol.21, No.3(2000), pp.239-266.
DOI
ScienceOn
|
18 |
Flanagin, A.J., "Social Pressures on Organizational Website Adoption," Human Communication Research, Vol.26, No.4(2000), pp.618-646.
DOI
ScienceOn
|
19 |
Goodhue, D.L. and E.W. Straub, "Security Concerns of System Users:A Study of Perceptions of the Adequacy of Security," Information and Management, Vol.20, No.1(1991), pp.13-27.
DOI
ScienceOn
|
20 |
Fornell, C. and D. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol.18, No.1(1981), pp. 39-50.
DOI
ScienceOn
|
21 |
Grover, V. and K.A. Saeed, "The Impact of Product, Market, and Relationship Characteristics on Interorganizational System Integration in Manufacturer-Supplier Dyads," Journal of Management Information Systems, Vol.23, No.4(2007), pp.185-216.
DOI
ScienceOn
|
22 |
Guo, K.H., Y. Yuan, N.P. Archer, and C.E. Connelly, "Understanding Nomnalicious Security Violations in the Workplace:A Composite Behavior Model," Journal of Management Information Systems, Vol.28, No.2(2011), pp.203-236.
DOI
ScienceOn
|
23 |
Gupta, A. and R. Hammond, "Information Systems Security Issues and Decisions for Small Business:An Empirical Examination," Information Management and Computer Security, Vol.13, No.4(2005), pp.297-310.
DOI
ScienceOn
|
24 |
Ho, C.R., Y.P. Chi, and Y.M. Tai, "A Structural Approach to Measuring Uncertainty in Supply Chains," International Journal of Electronic Commerce, Vol.9, No.3(2005), pp.91-114.
|
25 |
Hsu, C., J.N. Lee, and D.W. Straub, "Institutional Influences on Information Systems Security Innovations," Information Systems Research, Vol.23, No.1(2012), pp.1-22.
DOI
ScienceOn
|
26 |
Hu, Q., P. Hart, and D. Cooke, "The Role of External and Internal Influences on Information Systems Security-A Neo-Institutional Perspective," The Journal of Strategic Information Systems, Vol.16, No.2(2007), pp.153-172.
DOI
ScienceOn
|
27 |
Kankanhalli, A., H.H. Teo, B.C.Y. Tan, and K.K. Wei, "An Integrative Study of Information Systems Security Effectiveness," International Journal of Information Management, Vol.23, No.2(2003), pp.139-154.
DOI
ScienceOn
|
28 |
Kuan, K.K.Y. and P.Y.K. Chau, "A Perception-Based Model for EDI Adoption in Small Businesses Using a Technology-Organization-Environment Framework," Information and Management, Vol.38, No.8(2001), pp.507-521.
DOI
ScienceOn
|
29 |
Kearns, G.S. and A.L. Lederer, "The Impact of Industry Contextual Factors on IT Focus and the Use of IT for Competitive Advantage," Information and Management, Vol.41, No.7(2004), pp.899-919.
DOI
ScienceOn
|
30 |
Keller, S., A. Powell, B. Horstmann, C. Predmore, and M. Crawford, "Information Security Threats and Practices in Small Business," Information System Management, Vol.22, No.2(2005), pp.7-19.
DOI
ScienceOn
|
31 |
Lee, Y. and K.A. Kozar, "An Empirical Investigation of Anti-Spyware Software Adoption: A Multitheoretical Perspective," Information and Management, Vol.45, No.2(2008), pp.109-119.
DOI
ScienceOn
|
32 |
Lee, Y. and K.R. Larsen, "Threat of Coping Appraisal:Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems, Vol.18, No.2(2009), pp.177-187.
DOI
ScienceOn
|
33 |
Ma, Q. and P. Ratnasingam, "Factors Affecting the Objectives of Information Security Management," International Conference on Information Resources Management 2008 Proceedings, 2008.
|
34 |
Nunnally, J.C., Psychometric theory, 2nd ed., New York:McGraw Hill, 1978.
|
35 |
Pee, L.G., I.M.Y. Woon, and A. Kankanhalli, "Explaining Non-Work-Related Computing in the Workplace:A Comparison of Alternative Models," Information and Management, Vol.45, No.2(2008), pp.120-130.
DOI
ScienceOn
|
36 |
Rogers, E.M., Diffusion of Innovations, 5th ed., The Free Press, New York, 2003.
|
37 |
Sharma, R. and P. Yetton, "The Contigent Effects of Management Support and Task Interdependence on Successful Information Systems Implementation," MIS Quarterly, Vol.27, No.4(2003), pp.533-556.
DOI
|
38 |
Spears, J.L. and H. Barki, "User Participation in Information Systems Security Risk Management," MIS Quarterly, Vol.34, No.3(2010), pp.503-522.
DOI
|
39 |
Sharma, R. and P. Yetton, "The Contingent Effects of Training, Technical Complexity, and Task Interdependence on Successful Information Systems Implementation," MIS Quarterly, Vol.31, No.2(2007), pp.219-238.
DOI
|
40 |
Shih, H.P., "Technology-Push and Communication- Pull Forces Driving Message-Based Coordination Performance," Journal of Strategic Information Systems, Vol.15, No.2(2006), pp.105-123.
DOI
ScienceOn
|
41 |
Straub, D.W., "Effective IS Security:An Empirical Study," Information Systems Research, Vol.1, No.3(1990), pp.255-276.
DOI
|
42 |
Straub, D.W. and R.J. Welke, "Coping with Systems Risk:Security Planning Models for Management Decision Making," MIS Quarterly, Vol.22, No.4(1998), pp.441-469.
DOI
ScienceOn
|
43 |
Teo, H.H., K.K. Wei, and I. Benbasat, "Predicting Intention to Adopt Interorganizational Linkages:An Institutional Perspective," MIS Quarterly, Vol.27, No.1(2003), pp.19-49.
DOI
|
44 |
von Solms, B. and R. von Solms, "The 10 Deadly Sins of Information Security Management," Computers and Security, Vol.23, No.5(2004), pp.371-376.
DOI
ScienceOn
|
45 |
Yeh, Q.J. and A.J.T. Chang, "Threats and Countermeasures for Information System Security: A Cross-Industry Study," Information and Management, Vol.44, No.5(2007), pp. 480-491.
DOI
ScienceOn
|
46 |
Yildirim, E.Y., G. Akalp, S. Aytac, and N. Bayram, "Factors Influencing Information Security Management in Small-and Medium-Sized Enterprises:A Case Study From Turkey," International Journal of Information Management, Vol.31, No.4(2011), pp.360-365.
DOI
ScienceOn
|
47 |
Yoo, Y. and M. Alavi, "Media and group cohesion: Relative influences on social presence, task participation, and group consensus," MIS Quarterly, Vol.25, No.3(2001), pp. 371-390.
DOI
ScienceOn
|
48 |
Zumd, R.W., "Diffusion of Modern Software Practices:Influence of Centralization and Formalization," Management Science, Vol.28, No.12(1982), pp.1421-1431.
DOI
ScienceOn
|
49 |
Zhang, J., B.J. Reithel, and H. Li, "Impact of Perceived Technical Protection on Security Behaviors," Information Management and Computer Security, Vol.17, No.4(2009), pp. 330-340.
DOI
ScienceOn
|