1 |
Mayer, R., J. Davis. and F. Schoorman, 'An Integrative Model of Organizational Trust,' Academy of Mahagement Review, Vol. 20, No.3, pp. 709-734, 1995
DOI
ScienceOn
|
2 |
Salam. F., R. Rao. and C. Pegels, 'An Investigation of Consumer-perceived Risk on Electronic Commerce Transactions: The Role of Institutional Trustand Economic Incentive in a Social Exchange Framework,' Proceedings of Americas Conference on Information Systems, pp. 335-337, 1998
|
3 |
Pavlou, P., 'Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation,' Strategic Information Systems, Vol. 11. No.3, pp. 215-243, 2002
DOI
ScienceOn
|
4 |
이성만, 이필중, '해외의 보안위험분석 방법론 현황 및 분석,' 한국통신정보보호학회지, 4권 1호, pp. 316-323. 1994
과학기술학회마을
|
5 |
KPMG Peat Marwick LLP, Vulnerability Assessment Framework 1.1, Critical Infrastructure Assurance Office, October 1998
|
6 |
Gerbing. D.. and J. Anderson. 'An Updated Paradigm for Scale Development Incorporating Unidimensionality and Its Assessment.' Journal of Marketing Research. Vol. 25. pp. 186-192. 1988
DOI
ScienceOn
|
7 |
Fornell. C.. and D. Larcker, 'Evaluating Structural Equation Models with Unobservable Variables and Measurement Error.' Journal of Marketing Research. Vol. 18. pp. 39-50, 1981
DOI
ScienceOn
|
8 |
Gefen. D., 'Assessing Unidimensionality through LISREL: An Explanation and Example,' Communications of the Association for Information Systems. Vol. 12. pp. 23-47. 2003
|
9 |
Jarvenpaa, S.. N. Tractinsky, and M. Vitale, 'Consumer trust in an Internet store.' Information Technology and Management. Vol. 1. No. 1. pp. 45-71, 2000
DOI
ScienceOn
|
10 |
BSI, BS7799: Code of Practices for information Security Management, United Kingdom, 1999
|
11 |
CSI, IPAK : Information Protection Assessment Kit, Computer Security Institute, 1997
|
12 |
채서일, 사회과학 조사방법론, 2판, 학현사 1995
|
13 |
CSE, Guide to Security Risk Management for IT Systems. Government of Canada, Communications Security Establishment, 1996
|
14 |
ISO/IEC 17799: 2000. Information technology- Code of practice for information security management. 2000
|
15 |
GAO, Information Security Risk Assessment- Practices of Leading Organizations, Exposure Draft, U.S. General Accounting Office. August 1999
|
16 |
Peltier, T., Information Security Risk Analysis, Auerbach, 2001
|
17 |
Torkzadeh, G., and G. Dhillon, 'Measuring Factors the Influence the Sucess of Internet Commerce,' Information System Research, Vol. 13. No. 2, pp. 187-204. 2002
DOI
ScienceOn
|
18 |
Chau. P.. 'On the use of construct reliability in MIS research: a meta analysis.' Information and Management. Vol. 35. No.4. pp. 217-228. 1999
DOI
ScienceOn
|
19 |
ISO/IEC JTC1 SC27. Guidelines for the management of IT security(GMITS) -Part 1: Concepts and models of IT security. TR 13335-1. 2000
|
20 |
Garver. M., and J .. Mentzer. 'Logistics Research Methods : Employing Structural Equation Modeling to Test for Construct Validity.' Journal of Business Logistics. Vol. 20. No. 1. pp. 33-57. 1999
|
21 |
CMU/SEI Operationally Critical Threat. Asset, Vulnerability Evaluation(OCTAVE) Framework, Version 1.0. CMU/SEI-99-TR -017, June 1999
|
22 |
Peter. J.. 'Reliability: A Review of Psychometric Basics and Recent Marketing Practices.' Journal of Marketing Research. Vol. 16 No. 1. pp. 6-17. 1979
DOI
ScienceOn
|
23 |
CCTA, United Kingdom Government CRAMM User Guide, 2001
|
24 |
Gefen. D.. 'E-Commerce: The Role of Familiarity and Trust.' Omega, Vol. 28. No.6. pp. 725-737. 2000
DOI
ScienceOn
|
25 |
김영걸, 이종만, 이재남, '정보시스템의 위험도 분석에 대한 연구: 통합적 분석 틀을 중심으로.' 경영정보학연구, 8권 2호, pp. 37-53, 1998
|
26 |
Otwell. K.. and B. Aldridge, 'The Role of Vulnerability in Risk Management.' IEEE Proceedings of the Fifth Annual Computer Security Application Conference, pp. 32-38, 1989
|
27 |
Kim, D., Y. Song. S. Braynov, and R. Rao, 'A B-To-C Trust Model for On-Line Exchange,' Proceedings of Seventh Americas Conference on Information Systems, pp. 784-787. 2001
|
28 |
Bagozzi. R., and L. Phillips, 'Representing and Testing Organizational Theories : A Holistic Construct,' Administrative Science Quarterly. Vol. 23. No.3, pp. 459-489. 1982
|
29 |
Anderson. J., 'An Approach for Confirmatory Measurement and Structural Equation Modeling of Organizational Properties,' Management Science. Vol. 33. No.4. pp. 525-541, 1987
DOI
ScienceOn
|
30 |
Burt. S.. 'Interpretational Confounding of Unobserved Variables in Structural Equation Models,' Sociological Methods and Research. Vol. 5. pp. 3-52. 1976
DOI
|
31 |
Loch, K., H. Carr, and M. Warkentin. 'Threats to Information Systems: Today's Reality, Yesterday's Understanding,' MIS Quarterly, Vol. 16, No. 2, Pp. 173-186, 1992
DOI
ScienceOn
|
32 |
NIST, Risk Management Guide for Information Technology Systems- Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-30, October 1998
|
33 |
Gefen. D.. E. Karahanna. and D. Straub. 'Trust and TAM in Online Shopping: An Integrated Model.' MIS Quarterly. Vol. 27. No. 1. pp. 51-90. 2003
|
34 |
Kim, K., and B. Prabhakar, 'Initial Trust, Perceived Risk, and the Adoption of Internet Banking,' Proceedings of International Conference on Information Systems. pp. 537-543, 2000
|