1 |
Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J. "Analysis of end user security behaviors," Computers & Security, vol. 24 no. 2 pp. 124-133, 2005.
DOI
|
2 |
Guo, K. H.. "Security-related behavior in using information systems in the workplace: A review and synthesis," Computers & Security, vol. 32, no.1, pp. 242-251, 2013.
DOI
|
3 |
Zviran, M., and Haga, W. J. "Password security: an empirical study," Journal of Management Information Systems, vol. 15, no. 4, 161-185, 1999.
DOI
|
4 |
Vu, K. P. L., Proctor, R. W., Bhargav-Spantzel, A., Tai, B. L. B., Cook, J., and Schultz, E. E. "Improving password security and memorability to protect personal and organizational information," International Journal of Human-Computer Studies, vol. 65, no. 8, pp. 744-757, 2007.
DOI
|
5 |
Ives, B., Walsh, K. R., and Schneider, H. "The domino effect of password reuse," Communications of the ACM, vol. 47, no. 4, pp. 75-78, 2004.
DOI
|
6 |
Adams, A., and Sasse, M. A. "Users are not the enemy," Communications of the ACM, vol. 42, no. 12, pp. 40-46, 1999.
|
7 |
Yan, J., Blackwell, A., Anderson, R., and Grant, A. "Password memorability and security: Empirical results," IEEE Security & Privacy, vol. 2, no. 5, pp. 25-31, 2004.
DOI
|
8 |
Workman, M., Bommer, W. H., and Straub, D. "Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in Human Behavior, vol. 24, no. 6, pp. 2799-2816, 2008.
DOI
|
9 |
Ifinedo, P.. "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory," Computers & Security, vol. 31, no. 1, pp. 83-95, 2012.
DOI
|
10 |
Lee Byung-Kwan, Oh Hyun Jung, Shin Kyung Ah, & Ko Chae Young. "The effect of media campaign as a cue to action on influenza prevention behavior: extending health belief model," The Korean Journal of Advertising and Public Relations, vol. 10, no. 4, pp. 108-138, 2008.
|
11 |
Nunnally, J. C., Bernstein, I. H., & Berge, J. M. T. Psychometric Theory (Vol. 226). New York: McGraw-Hill, 1967.
|
12 |
Rosenstock, I. M., Strecher, V. J., and Becker, M. H. "The health belief model and HIV risk behavior change," In Preventing AIDS (pp. 5-24). Springer US. 1994.
|
13 |
Janz, N. K., and Becker, M. H.. "The health belief model: A decade later," Health Education & Behavior, vol. 11, no. 1, pp. 1-47, 1984.
DOI
|
14 |
Bagozzi, R. P., & Yi, Y. "On the evaluation of structural equation models," Journal of the Academy of Marketing Science, vol. 16, no. 1, pp. 74-94, 1988.
DOI
|
15 |
Fornell, C., & Larcker, D. F. "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, vol. 18, no. 1, pp. 39-50, 1981,
DOI
|
16 |
Chin, W. W., "The partial least squares approach to structural equation modeling," Modern Methods for Business Research, vol. 295, no. 2, pp. 295-336, 1998.
|
17 |
Bum Suk Jee, Liu Fan, Sang Chul Lee, and Yung Ho Suh, "Personal information protection behavior for information quality: health psychology theory perspectives," Journal of The Korean Society for Quality Management, vol. 39, no. 3, pp. 432-443, 2011.
|
18 |
Falk, R. F., & Miller, N. B. "A Primer for Soft Modeling," University of Akron Press, 1992.
|
19 |
Chin, W. W., Marcolin, B. L., & Newsted, P. R. "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study," Information Systems Research, vol. 14, no. 2, pp. 189-217, 2003.
DOI
|
20 |
Cohen, J., "A power primer," Psychological Bulletin, vol. 112, no. 1, pp. 155, 1992.
DOI
|
21 |
Ng, B. Y., Kankanhalli, A., and Xu, Y. C. "Studying users' computer security behavior: A health belief perspective," Decision Support Systems, vol. 46 no.4, pp. 815-825, 2009.
DOI
|
22 |
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R., "Future directions for behavioral information security research," Computers & Security, vol. 32, pp. 90-101, 2013.
DOI
|
23 |
Korea internet and Security Agency. "Survey on Internet Utilization in 2015," 2015.
|
24 |
Korea internet and Security Agency, "A Survey on Internet Economic Activities in 2015," 2015.
|
25 |
Korea Communications Commission & Korea internet and Security Agency. "Password Selection and Use Guide," 2010.
|
26 |
Weirich, D., and Sasse, M. A. "Pretty good persuasion: a first step towards effective password security in the real world," Proceedings of the 2001 Workshop on New Security Paradigms pp. 137-143. ACM, Sep. 2001.
|
27 |
Liang, H., & Xue, Y. "Understanding security behaviors in personal computer usage: A threat avoidance perspective," Journal of the Association for Information Systems, vol. 11, no. 7, pp. 394, 2010.
DOI
|