1 |
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., Multivariate Data Analysis, 7th Edition., Prentice Hall International., 2010.
|
2 |
Harris, P. L., Children and Emotion: The Development of Psychological Understanding, Oxford: Basil Blackwell, 1989.
|
3 |
Hovland, C. I., Janis, I. L., and Kelly, H. H., Communication and Persuasion: Psychological Studies of Opinion Change, New Haven, CT: Yale University Press, 1953.
|
4 |
Hu, L. and Bentler, P. M., "Cutoff Criteria Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives," Structural Equation Modeling, Vol. 6, No. 1, 1999, pp. 1-55.
DOI
|
5 |
Janis, I. L., "Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research," In Advances in Experimental Social Psychology, Vol. 3, 1967, pp. 166-244.
|
6 |
Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.
|
7 |
Lazarus, R. S. and Folkman, S., Stress, Appraisal, and Coping, New York: McGraw-Hill, 1984.
|
8 |
Leventhal, H., "Findings and Theory in the Study of Fear Communications," Advances in Experimental Social Psychology, Vol. 5, 1970, pp.119-186.
DOI
|
9 |
Leventhal, H., "Fear Appeals and Persuasion: The Differentiation of Motivational Construct," American Journal of Public Health, Vol. 61, No. 6, 1971, pp. 1208-1224.
DOI
|
10 |
Liang, H., Saraf, N., Hu, Qing., and Xue, Y., "Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management," MIS Quarterly, Vol. 31, No. 1, 2007, pp. 59-87.
|
11 |
Liang, H. and Xue, Y., "Avoidance of Information Technology Threats: A Theoretical Perspective," MIS Quarterly, Vol. 33, No. 1, 2009, pp. 71-90.
|
12 |
Lindell, M. K. and Whitney, D. J., "Accounting for Common Method Variance in Cross-sectional Research Designs," Journal of Applied Psychology, Vol. 86, No. 1, 2001, pp. 114-121.
DOI
|
13 |
Pajares, F. and Urdan, T., Self-efficacy Beliefs of Adolescents, Information Age Publishing, 2006.
|
14 |
Pavlov, I., Conditioned Reflexes: An Investigation into the Physiological Activity of the Cortex, New York: Dover, 1927.
|
15 |
Petter, S., Straub, D., and Rai, A., "Specifying Formative Constructs in Information systems Research," MIS Quarterly, Vol. 31, No. 4, 2007, pp. 623-656.
|
16 |
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P., "Common Method biases in Behavioral Research: A Critical Review of the Literature and Recommende Remedies," Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903.
DOI
|
17 |
Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology, Vol. 91, No. 1, 1975, pp. 93-114.
DOI
|
18 |
Segars, A. H. and Grover, V., "Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis," MIS Quarterly, Vol. 17, No. 4, 1993, pp. 517-525.
DOI
|
19 |
Siponen, M. and Vance, A., "Neutralization: New Insights into Problem of Employee Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 487-502.
|
20 |
Skinner, B. F., Science and Human Behavior, New York: Macmillan, 1953.
|
21 |
Stober, J., "The Social Desirability Scale-17," European Journal of Psychological Assessment, Vol. 17, No. 3, 2001, pp. 222-232.
DOI
ScienceOn
|
22 |
Sutton, S. K. and Davidson, R., "Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems," Psychological Science, Vol. 8, No. 3, 1997, pp. 204-210.
DOI
|
23 |
Turel, O., Serenko, A., and Giles, P., "Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users," MIS Quarterly, Vol. 35, No. 4, 2011, pp. 1043-1061.
|
24 |
Tversky, A. and Kahneman, D., "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Vol. 5, No. 4, 1992, pp. 297-323.
DOI
|
25 |
Williams, L., Edwards, J. R., and Vandenberg, R. J., "Recent Advances in Causal Modeling Methods for Organizational and Management Research," Journal of Management, Vol. 29, No. 6, 2003, pp. 903-936.
DOI
|
26 |
Witte, K., "Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model," Communication Monographs, Vol. 59, No. 4, 1992, pp. 329-349.
DOI
|
27 |
Witte, K., "Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)," Communication Monographs, Vol. 61, No. 2, 1994, pp. 113-134.
DOI
|
28 |
김종기, 전진환, 임호섭, "정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로," 정보시스템연구, 제15권, 제1호, 2006, pp. 145-168.
|
29 |
김종기, 강다연, 전진환, "패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인," 정보시스템연구, 제17권, 제1호, 2008, pp. 23-43.
|
30 |
김종기, 강다연, 전진환, "인터넷뱅킹 사용자의 보안의도에 영향을 미치는 요인에 관한 연구," 정보시스템연구, 제18권, 제2호, 2009, pp. 1-18.
|
31 |
Bandura, A., Self-efficacy: The Exercise of Control, Worth Publishers, 1997.
|
32 |
Browne, M. W. and Cudeck, R., Alternate Ways of Assessing Model Fit, In Bollen, Sage Publications; Newbury Park(CA), 1993.
|
33 |
Compeau, D. R. and Higgins, C. A., "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly, Vol. 19, No. 2, 1995, pp. 189-211.
DOI
|
34 |
Carver, C. S. and Scheier, M. F., On the Self-regulation of Behavior, New York: Cambridge University Press, 2001.
|
35 |
Carver, C. S. and Scheier, M. F., "Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology," Psychological Bullentin, Vol. 92, No. 1, 1982, pp. 111-135.
DOI
|
36 |
Carver, C. S., "Approach, Avoidance, And the Self-regulation of Affect and Action," Motivation and Emotion, Vol. 30, No. 2, 2006, pp. 105-110.
DOI
|
37 |
Crowne, D. and Marlowe, D., The Approval Motive: Studies in Evaluative Dependence, New York: Wiley, 1964.
|
38 |
Diamantopoulos, A., "Incorporating Formative Measures into Covariance-Based Structural Equation Models," MIS Quarterly, Vol. 35, No. 2, 2011, pp. 335-358.
|
39 |
Etezadi-Amoli, J. and Farhoomand, A. R., "A Structural Model of end User Computing Satisfaction and User Performance," Information & Management, Vol. 30, No. 2, 1996, pp. 65-73.
DOI
|
40 |
Fishbein, M. and Ajzen, I., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley Publishing, 1975.
|
41 |
Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50.
DOI
|
42 |
Furnell, S., "Why Users Cannot Use Security," Computers & Security, Vol. 24, No. 4, 2005, pp. 274-279.
DOI
|