1 |
교육과학기술부, 교육과학기술부 및 각급기관 웹사이트 개인정보 노출방지 가이드라인(개정판), 2008.
|
2 |
김동원, "개인정보수집에서 프라이버시와 경쟁 가치들의 경합과 균형," 정보화정책, 제 10권, 제4호, 2003, pp.73-91.
|
3 |
김용재, "정보보안을 위한 내부통제 진단 모델연구," 금오공과대학교 석사학위논문, 2009.
|
4 |
김종기, "패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구," 경영정보학연구, 제18권, 제4호, 2008, pp.1-26.
|
5 |
김진완, 홍태호, "지식검색 서비스에서 집단지성 품질이 지속사용 의도에 미치는 영향: 기대일치이론과 신뢰를 중심으로," 정보시스템연구, 제20권, 제4호, 2011, pp.1-22.
|
6 |
김효준, 곽기영, "조직 내 중심성이 IT활용능력에 미치는 영향: 소셜 네트워크 관점," 정보시스템연구," 제20권, 제1호, 2011, pp.147-169.
|
7 |
Ajzen, I., and Fishbein, M., Understanding Attitudes and Pprediction Social Behavior, Englewood Cliffs, NJ: Prentice Hall, 1980.
|
8 |
Albrechtsen, E., "A Qualitative Study of Users' View on Information Security," Computers & Security, Vol.26, No.4, 2007, pp.276-289.
DOI
ScienceOn
|
9 |
Angel I., "Computer Security in these Uncertain Times: The Nneed for a New Approach," In: Proceedings of the 10th International Conferences on Computer Security, Audit and Control (CompSec), London, 1993.
|
10 |
Armitage, C. J., and Conner, M., "Efficacy of the Theory of Planned Behavior: A Meta-Analytic Review," British Journal of Social Psychology, Vol.40, No.4, 2001, pp.471-499.
DOI
ScienceOn
|
11 |
Baldwin, N. S., and Rice, R. E., "Information- Seeking Behavior of Securities Analysis: Individual Institutional Influences, Information Sources and Channels and Outcomes," Journal of The American Society for Information Science, Vol.48, No.8. 1997, pp.674-693.
DOI
ScienceOn
|
12 |
Bansal, H. S., Service Switching Model(SSM): A Model of Customer Switching Behavior in the Service Industry, Queen's University, in Canada, Dissertation paper, 1997.
|
13 |
Brown, S. A., and Venkatesh, V., "Model of Adoption of Technology in Households: A Baseline Model Test and Extension Incorporating Household Life Cycle," MIS Quarterly, Vol.29, No.3, 2005, pp.399-426.
DOI
|
14 |
Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol.34, No.3, 2010, pp.523-548.
DOI
|
15 |
Catherine, L., A., and Ritu, A., "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly, Vol.34, No.3, 2010, pp.613-644.
DOI
|
16 |
Johnston, A. C., and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol.34, No.3, 2010, pp.548-566.
|
17 |
Harison, E., and Boonstra, A., "Essential Competencies for Technochange Management: Towards an Assessment Model," International Journal of Information Management, Vol. 29, No.4, 2009, pp.283-294.
DOI
ScienceOn
|
18 |
Jaime T., William J., and Benjamin B. B., "Personal Information Management," Communications of the ACM , Vol.49, No.1, January 2006, pp.412-425.
|
19 |
Janine, L., "User Participation in Information System Security Risk Management," MIS Quarterly, Vol.34, No.3, 2010, pp.503-522.
DOI
|
20 |
Ina o'merchu, Jahn, G. B., and Stefan, D., Online Social and Business Networking Communities, Digital Enterprise Research Institute Technical Report, 2004.
|
21 |
King, R. C., and Xia, W., "Media Appropriateness: Effects of Experience on Communication Media Choice," Decision Sciences, Vol. 28, No.4. 1997, pp.877-910.
DOI
ScienceOn
|
22 |
Lee, C., and Green, R. T., "Cross-Cultural Examination of the Fishbein Behavioral Intention Model," Journal of International Business Studies, Vol.22, No.2, 1991, pp.289-305.
DOI
ScienceOn
|
23 |
Lee, S. M., and Kim, Y. R., and Lee, J., "An Empirical Study of the Relationships among End-User Information Systems Acceptance, Training and Effectiveness," Journal of Management Information Systems, Vol.12, No.2. 1995, pp.189-202.
DOI
|
24 |
Lee, Y., and Kozar, K. A., "Investigating Factors Affecting the Adoption of Anti-Spyware Systems," Communications of the ACM , Vol.48, No.8, 2005, pp.72-77.
DOI
ScienceOn
|
25 |
Liang. H., and Xue. Y., "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems, Vol.11, No.7, 2010, pp.394-413.
DOI
|
26 |
McClelland, D., "Testing for Competence Rather than for Intelligence," American Psychologist, Vol.28, No.1, 1973, pp.1-14.
DOI
ScienceOn
|
27 |
Marrelli, A., "An Introduction to Competency Analysis and Modeling," Performance Improvement, Vol.37, No.5, 1998, pp.8-16.
DOI
ScienceOn
|
28 |
Mathieson, K., "Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior," Information Systems Research, Vol.2, No.3, 1991. pp.173-191.
DOI
|
29 |
McArthur, L. Z., Kiesler, C. A., and Cook, B. P. "Acting on an Attitudes as a Function of Delf-Percept and Iinequity," Journal of Personality and Social Psychology, Vol.12, No.1, 1969, pp.295-302.
DOI
|
30 |
McLagan, P., Models of HRD Practice, ASTD Press, 1989.
|
31 |
Mikko, S., "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations" MIS Quarterly, Vol.34, No.3, 2010, pp.487-502.
DOI
|
32 |
Munro, M. C., Huff, S. L., and Marcolin, B. L., and Compeau, D. R., "Understanding and Measuring User Competence," Information & Management, Vol.33, No.1, 1997, pp.45-57.
DOI
ScienceOn
|
33 |
Ostrom, E., Private and Common Property Rights, On-line, Available : http://allserv.rug.ac.be/-gdegeest/ 2000book.pdf, 2002.
|
34 |
Parry, S., "The Quest for Competencies," Training, Vol.33, No.7, 1996, pp.48-56.
|
35 |
Ploeg, I. V. D., "Biometrics and Privacy," Information Communication & Society, Vol.6, No.1, 2003, pp.85-104.
DOI
ScienceOn
|
36 |
Regan, P., "Privacy As a Common Good in the Digital World," Information Communication & Society, Vol.5, No.3, 2002, pp.382-405.
DOI
ScienceOn
|
37 |
Sheeran, P., and Taylor, S., "Predicting Intentions to Use Condoms: Meta-Analysis and Comparison of the Theories of Reasoned Action and Planned Behavior," Journal of Applied Social Psychology, Vol.29, No.3, 1997, pp.1624-1675.
|
38 |
Rhee, H. S., and Kim, C. T., and Young U. R., "Self-efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior," Science Direct, Computers & Security, Vol.28, No.8, 2009, pp.816-826.
DOI
ScienceOn
|
39 |
Rholes, W. S., and Bailey, S. "The Effects of Level of Moral Reasoning on Consistency between Moral Attitudes and Related Behaviors," Social Cognition, Vol.2, No.1, 1983, pp.32-48.
DOI
|
40 |
Scott, W., "Consumer Socialization," Journal of Consumer Reserch, Vol.1, No.2, 1974, pp.2-3.
|
41 |
Smith B., Caputi P., and Rawstorne P., "Differentiating Computer Experience and Attitudes toward Computers: An Empirical Investigation," Computers in Human Behavior, Vol.16, No.1, 2000, pp.59-81.
DOI
ScienceOn
|
42 |
Spencer, L., and Spencer, S., Competence at Work: A Model for Superior Performance, New York : Wiley, 1993.
|
43 |
Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C., "PLS Path Modeling," Computational Statistics & Data Analysis, Vol.48, No.1, 2005, pp.159-205.
DOI
ScienceOn
|
44 |
Torkzadeh, G. and Lee, J., "Measures of Perceived End-User's Computing Skills," Information and Management, Vol.40, No.7, 2003, pp.607-615.
DOI
ScienceOn
|
45 |
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, Vol.27, No.3, 2003, pp.425-478.
DOI
|
46 |
Warren, S. D., and Brandeis, L. D., "The Right to Privacy," Harvard Law Review, Vol.4, No.5, 1890, pp.193-220.
DOI
ScienceOn
|
47 |
Williamson, O. E., "Calculativeness, Trust, andEconomic Orhanization," The Jouranl ofLaw & Economics, Vol.34, No.1, 1993,pp.453-502.
|
48 |
Weiss, S., "Online Social Networks and the Need for New Privacy Research in Information and Communication Technology," Third International Summer School Organized by IFIP WG 9.2, 9.6/117, 11.6, 2007.
|
49 |
Westin, A., Privacy and Freedom, NY: Atheneum, 1967.
|
50 |
Whitaker, R., The End of Privacy: How Total Surveillance is Becoming a Reality, New York: New Press, 1999.
|
51 |
Winter, S. J., Chudoba, K. M., and Gutek, B. A., "Attitudes Toward Computers: When Do They Predict Computer Use?," Information & management, Vol.34, No.5, 1998, pp.275-284.
DOI
ScienceOn
|
52 |
KISA, http://www.kisa.or.kr, 2010.
|
53 |
손동원, 사회 네트워크 분석, 경문사, 2002.
|
54 |
남기효, 박상중, 강형석, 남기환, 김성인, "개인정보보호기술의 최신 동향과 향후 전망," 한국정보보호학회, 제18권, 제6호, 2008, pp.11-19.
과학기술학회마을
|
55 |
박기정, "학생들의 세금회피에 대한 태도, 주관적규범, 의도에 관한 연구," 교육이론과 실천, 경남대학교 교육문제연구소, 1998, pp.249-263.
|
56 |
박혜정, "수입 캐주얼의류 구매에 대한 태도, 주관적 규범 의도에 관한 연구," Journal of the Korean Society of Clothing and Textiles, 제 26권 , 제 12호 , 2002, pp.1791-1803.
과학기술학회마을
|
57 |
이정호, 전자금융 침해사고 예방 및 대응 방안, 정보보호학회지, 제18권, 제5호, 2008, pp.1-20.
과학기술학회마을
|
58 |
이종구, 조형제, 정준영외, 정보사회의 이해, 서울 미래 M&B, 2005.
|
59 |
이준택, 정보보호학 개론, 생능출판사, 2007.
|
60 |
차인환, "정보보안에서의 인원보안 관리지표 개발을 위한 실증적 연구," 광운대학교 박사학위논문," 2009,
|
61 |
이향우, "개인정보 보호와 공유자원 관리," 사이버커뮤니케이션학보, 통권 제17호, 2006, pp.163-192.
|
62 |
행정안전부 "온라인 소셜네트워크 환경에서의 보안위협과 시사점," 기술보고서, 2008.
|
63 |
홍광표, "ERP 사용자의 조직시민행동과 확장이 용의도 간의 관계에 영향을 미치는 요인에 관한 연구," 정보시스템연구, 제20권, 제1호, 2011, pp.75-105.
|
64 |
Adam, M., "Moving Toward Black Hat Research in Information Systems Security: An Editorial Introduction to The Special Issue," MIS Quarterly, Vol.34, No.3, 2010, pp.431-433.
DOI
|
65 |
Ajzen, I., and Fishbein, M., Belief, Attitude, Intention, and Behavior: An Introduction to Theory an Research, Reading, MA: Addison-Wesley, 1975.
|
66 |
Ajzen, I., and Fishbein M., "Attitude-Behavior Relation: A Theoretical Analysis and Review of Empirical Research," Psychological Bulletin, Vol.84, No.5, 1997, pp.888-918.
|
67 |
Davis, F. D, Bagozzi, R. P., and Warshaw, P. R., "User Acceptance of Computer Technology: A Ccomparison of Two Theoretical Models," Management Science, Vol.35, No.8, 1989, pp.982-1003.
DOI
ScienceOn
|
68 |
Chin, W. W., The Partial Least Squares Approach to Structural Equation Modeling, in Marcoulides, G.A.(Eds), Modern Methods for Business Research, Lawrence Eelbaum Associates, Mahwah, NJ, 1998a.
|
69 |
Choi, N. J., Kim, D., Goo, J. Y., and Andrew W., "Knowing Is Doing: An Eempirical Validation of the Rrelationship between Managerial Information Security Awareness and Action," Information Management & Computer Security Vol.16, No.5, 2008, pp.484-501.
DOI
ScienceOn
|
70 |
Davies, S., "Re-Engineering the Right to Privacy: How Privacy Has Been Transformed from a Right to a Commodity," In P. Agre and M. Rotenberg(ed.), Technology and Privacy, 1998.
|
71 |
Dubbeld, L., "The Role of Technology in Shaping CCTV Surveillance Practices," Information Communication & Society, Vol.8, No.1, 2005, pp.84-100.
DOI
ScienceOn
|
72 |
Eagly, A. H., and Caiken, S., The Psychology of Attitudes, Harcourt Brace Jovanvich. TX: Forth Worth, 1993.
|
73 |
Engel, J. F., Blackwell, R. D., and Miniard, P. W., Consumer Behavior: International Edition (8 ed.), Forth Worth: The Dryden Press, 1995.
|
74 |
Fiske, S. T., and Taylor, S. E., Social Cognition, NY: McGraw-Hill, Inc, 1991.
|
75 |
Fornell, C. R., and Larcker, D. F., "Sturctural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol.18, No.3, 1981, pp.312-325.
|
76 |
Gefen, D., Karahanna, E., and Straub, D. W., "Trust and TAM in Online Shopping: An Integrated Model," MIS Quarterly, Vol.27, No.1, 2003, pp.51-90.
DOI
|
77 |
Goodhue D., and Straub, D., "Security Concerns of System Users: A Study of Perception of the Adequacy of Security," Information & Management, Vol.20, No.1, 1991, pp.13-27.
DOI
ScienceOn
|