1 |
Adams, D. A., Nelson, R. R. and Todd, P. A., "Perceived Usefulness, Ease of Use, and Usage of Information Technology : a Replication," MIS Quarterly, Vol. 16, No. 2, pp. 227-247, 1992.
DOI
ScienceOn
|
2 |
Agarwal, R. and Karahanna, E., "Time Flies when youʼre having Fun : Cognitive Absorption and Beliefs about Information Technology Usage," MIS Quarterly, Vol. 24, No. 4, pp. 665-694, 2000.
DOI
ScienceOn
|
3 |
Agrifoglio, R., Black, S. and Metallo, C., "Twitter acceptance : The role of intrinsic motivation," Working Papers on Information Systems, Vol. 10, No. 9, 2010.
|
4 |
Ariss, S. S., "Computer Monitoring : Benefits and Pitfalls Facing Management," Information and Management, Vol. 39, No. 7, pp. 553-558, 2001.
|
5 |
Bae, B. R., "Understanding and utilizing of structural equation model," Daekyung Publishing Company, 2002.
|
6 |
Bagozzi, R. P. and Yi, Y., "On the evaluation of structural equation models," Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74-94, 1988.
DOI
ScienceOn
|
7 |
Baron, R. M. and Kenny, D. A., "The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations," Journal of Personality and Social Psychology, Vol. 51, No. 6, pp. 1173-1182, 1986.
DOI
|
8 |
Beatty, R. C., Shim, J. P., and Jones, M. C., "Factors Influencing Corporate Web Site Adoption : A Time-Based Assessment," Information and Management, Vol. 38 No. 6, pp. 337-354, 2001.
DOI
ScienceOn
|
9 |
Bentler, P. M. and Bonett, D. G., "Significance Tests and Goodness of Fit in the Analysis of Covariance Structures," Psychological Bulletin, Vol. 88, pp. 588-606, 1980.
DOI
|
10 |
Bentler, P. M., "On the Fit of Models Covariance and Methodology to the Bulletin," Psychological Bulletin, Vol. 112, pp. 400-404, 1992.
DOI
ScienceOn
|
11 |
Brancheau, J. C. and Wetherbe, J. C., "The adoption of spreadsheet software testing innovation diffusion theory in the context of end-user computing," Information System Research, Vol. 1, No. 2, pp. 115-143, 1990.
DOI
|
12 |
Browne, M. W. and Cudeck, R., Alternative Ways of Assessing Model Fit, In K. A. Bollenand J. S. Long (Eds.), Testing Structural Equation Models, Newbury Park, CA : Sage, pp. 133-162, 1993.
|
13 |
Choi, C. H., "A Study of the Relationship of Organizational Structure and Innovation : An Application of LISREL," KAPA, Vol. 28, No. 2, pp. 469-480, 1994.
|
14 |
Choi, E. H., "Smart Work Security Issues and Responses," KT AIT, 2011.
|
15 |
Cooper, R. B. and Zmud, R. W., "Information Technology Implementation Research : A Technological Diffusion Approach," Management Science, Vol. 36 No. 2, pp. 123-139, 1990.
DOI
ScienceOn
|
16 |
Damanpour, F. and Evan, W. M. "Organizational Innovation and Performance : The Problem of Organizational Lag," Administrative Science Quarterly, Vol. 29, No. 3, pp. 392-409. 1984.
DOI
ScienceOn
|
17 |
Damanpour, F., "Organizational Innovation : A Meta‐Analysis of Effects of Determinants and Moderators," Academy of Management Journal, Vol. 34, No. 3, pp. 555-590, 1991.
DOI
ScienceOn
|
18 |
Davis, F. D., "Perceived usefulness, perceived ease of use, and user acceptance of information technology," Management Information Systems Quarterly, Vol. 13, No. 3, pp. 319-340, 1989.
DOI
ScienceOn
|
19 |
Eder, L. B. and Igbaria, M., "Determinants of Internet Diffusion and Infusion," Omega, Vol. 21, No. 3, pp. 233-242, 2001.
|
20 |
Delone, W. H. and McLean, E. R., "Measuring e-Commerce Success : Applying the DeLone and McLean Information Systems Success Model," International Journal of Electronic Commerce, Vol. 9, No. 1, pp. 31-47, 2004.
|
21 |
ETRI, "Smartphone Threats and Security Technology," Electronics and Telecommunications Trends, Vol. 25, No. 3, pp. 72-80, 2010.
|
22 |
Fornell, C. and Larcker, D. F., "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.
DOI
ScienceOn
|
23 |
Ghosh, A. K. and Swaminatha, T. M., "Software security and privacy risks in mobile e-commerce," Communications of the ACM, Vol. 44, No. 2, pp. 51-57, 2001.
|
24 |
Hair, J. F., Jr., Black, W. C., Babin, B. J. and Anderson, R. E., "Multivariate data analysis(7th ed.), Upper Saddle River," NJ : Prentice-Hall, 2010.
|
25 |
Hayduck, L., "Structural Equation Modeling with LISREL : Essentials and Advances," Johns Hopkins University Press, Baltimore, 1987.
|
26 |
Hong, K. H., "A Study on the Effect of Information Security Controls and Processes on the Performance of Information Security," Dept. of Management Information Systems Graduate School, Kookmin University, 2003.
|
27 |
Hong, S. I., Choi, H. J., and Lee, J. K., "Social Motivational Factors Influencing the Intention to Use of Blog," Korea Contents Association, Vol. 10 No. 1, pp. 122-137, 2010.
|
28 |
Hsu, C. L. and Lin, J. C. C., "Acceptance of blog usage : The roles of technology acceptance, social influence and knowledge sharing motivation," Information and Management, Vol. 45, No. 1, pp. 65-74, 2008.
DOI
ScienceOn
|
29 |
Jaccard, J. and Wan, C. K., "LISREL Approaches to Interration Effects in Mulitple Regresstion," Thousand Oaks, Galif, 1996.
|
30 |
Hu, F. and Liu, Y., "An empirical examination on mobile services adoption in rural China," International Journal of Digital Content Technology and its Application, Vol. 5, No. 1, pp. 328-334, 2011.
DOI
|
31 |
Jarvenpaa, S. L. and Lang, L. R., "Managing the Paradoxes of Mobile Technology," Information Systems Management, Vol. 22, No. 4, pp. 7-23, 2005.
|
32 |
James, L. R., Mulaik, S. A. and Brett, J. M., "Casual Analysis : Assumptions, Models, and Data," Beverly Hills : Sage, 1982.
|
33 |
Jeong, G. H., Yoon, H. S. and Park, J. C., "An Empirical Study on Predicting User Acceptance of Blog," KIECA, Vol. 9, No. 4, pp. 505-521, 2009.
|
34 |
Ji, S. G., Lee, G. D., "The Relationship of Individual Disposition, Innovation Resistance and Innovation Performance," The Korean Academic Association of Business Administration, Vol. 52, No. 1, 2005.
|
35 |
Joreskong, K. G. and Sorbom, D., "LISREL 7; A Guide to the Program and Application," SPSS Publication, 1989.
|
36 |
Jung, Y., Perez-Mira, B. and Wiley- Patton, S., "Consumer adoption of mobile TV : Examining psychological flow and media content," Computers in Human Behavior, Vol. 25, No. 1, pp. 123-129, 2009.
DOI
ScienceOn
|
37 |
Kang, D. H., Kim, J. N. and Jo, H. S., "Trends of Mobile Threats and Security Service Technology," Journal of KIISE, Vol. 28, No. 6, pp. 51-56, 2010.
과학기술학회마을
|
38 |
Karahanna, E., Straub, D. and Chervany, N., "Information Technology Adoption Across Time : A Cross- Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs," MIS Quarterly, Vol. 23, No. 2, pp. 183-213, 1999.
DOI
ScienceOn
|
39 |
Kim, J. H. and Shin, Y. S., "The Roles of Mediated to Consumer' Resistance in the Internet Service Acceptance Processing," Korean Industrial Economic Association, pp. 85-98, 2002.
|
40 |
Kim, H. G., "The Impact of User Perception on Usage Intention : Focusing on the Moderating Role of Attitude of Acceptance and Resistance," Journal of Information Technology Applications and Management Vol. 16, No. 2, pp. 65-67, 2009.
|
41 |
Kim, K. K., Shin, H. K., Park, S. S. and Kim, B. S., "A Study on the Effects of the Information Asset Protection Performance on the Organization Performance : Management Activity and Control Activity," Information Management Research, Vol. 40, No. 3, pp. 61-77, 2009.
DOI
ScienceOn
|
42 |
Kim, K. Y. and Kang, D. H., "The SmartPhone Security Technology of open collaborative environment," Korea Institute of Information Security and Cryptology, Vol. 19, No. 5, pp. 10-104, 2009.
|
43 |
Kim, S. H. and Park, S. Y., "Influencing Factors for Compliance Intention of Information Security Policy," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 33-51, 2011.
과학기술학회마을
DOI
ScienceOn
|
44 |
Korea Internet and Security Agency, "Internet and security," 2010.
|
45 |
KPCB, "Internet Trends," http://www. slideshare.net/kleinerperkins/kpcb-internet- trends-2012, 2012.
|
46 |
Kwon, J. S., "The Relationships among the Organizational Justice, Resistance to Innovation and Defensive Behavior of Employee," Korean Academy of Organization and management, Vol. 25, No. 1, pp. 223-244, 2001.
|
47 |
Lai, V. S., "Critical Factors of ISDN Implementation : An Exploratory Study," Information and Management, Vol. 33, No. 2, pp. 97-97, 1997.
|
48 |
Lee, D. M., "Factors Influencing Adoption of Corporate Web Site Over Time : Innovation Diffusion Theory Perspective," Asia Pacific Journal of Information Systems, Vol. 13, No. 4, pp. 257-277, 2003.
|
49 |
Lee, B. K. et al., "A Research on Discovering New Vulnerabilities and Analyzing Methods in Domestic Mobile Environment," KISA, 2010.
|
50 |
Lee, B. K. et al., "A Research on Issues and Developmental Needs of the Future Internet in the Context of Security Technologies and Information Security," KISA, 2010.
|
51 |
LEE, H. S. and LIM, J. H., "SPSS 16.0 manual," Seoul : Bobmunsa, 2009.
|
52 |
Lee, J. T., "An Introduction to Information Security," Seoul : Life and Power press, 2007.
|
53 |
Lee, K. H., "Risk Management and Information Security : Case Study," KERIS, 2006.
|
54 |
Lee, S. G., Kang, M. C. and Kim, B. Y., "An Analytical Study of ICT Adoption based on Diffusion Innovation Theory," The Journal of Information Systems, Vol. 14, No. 2, pp. 257-276, 2005.
|
55 |
Lim, J. U., Oh, J, I., "A Study on the Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use : From the Perspective of the Innovation Diffusion Theory," Asia Pacific Journal of Information Systems Vol. 22, No. 3, pp. 100-124, 2012.
|
56 |
Lindqvist J. and Laura Takkinen, "Privacy Management for Secure Mobility," WPES'06, 2006.
|
57 |
Luarn, P. and Lin, H., "Toward an understanding of the behavioral intention to use mobile banking," Computers in Human Behavior, Vol. 21, No. 6, pp. 873-891, 2005.
DOI
ScienceOn
|
58 |
Moore, G. and Benbasat, I., "Development of an Instrument to Measure the Perceptions of Adopting and Information Technology," Information Systems Research, Vol. 2, No. 3, pp. 192-222, 1991.
DOI
|
59 |
Mayers, B. L., Kappelman, L. A. and Pry butok, V. R., "A Comprehensive Model for Assessing the Quality and Productivity of the Information System Function : Toward a Theory for Information Systems Assessment," Information Resource Management Journal, Vol. 10, No. 1, pp. 6-25, 1997.
DOI
ScienceOn
|
60 |
Mick, D. G. and Fournier, S., "Paradoxes of Technology : Consumer Cognizance, Emotions and Coping Strategies," Journal of Consumer Research, Vol. 25, pp. 123-143, 1998.
DOI
ScienceOn
|
61 |
Moulton, R. T. and Moulton, M. E., "Electronic Communications Risk Management : A Checklist for Business Managers," Computers and Security, Vol. 15, No. 5, pp. 377-386, 1996.
DOI
ScienceOn
|
62 |
NIST, "SP 800-64, Security Considerations in the Information System Development Life Cycle," 2005.
|
63 |
Nunnally, J. C., "Psychometric Theory," McGraw-Hill, New York, NY, 1994.
|
64 |
O'Callaghan, R., Kaufmann, P. J. and Konsynski, B. R., "Adoption Correlates and Share Effects of Electronic Data Interchange Systems in Marketing Channels," Journal of Marketing, Vol. 56, pp. 45-56, 1992.
DOI
ScienceOn
|
65 |
Osborne, K., "Cost-Effective IT Security," Datapro, pp. 1-8, 1996.
|
66 |
Park, J. G., "Integrative Adoption Model of New Media," Korean Society for Journalism and Communication Studies, Vol. 55, No. 5, pp. 448-497, 2011.
|
67 |
Park, J. G., "Twitter Adoption Model : Integrative Approach to Innovation Diffusion Theory, Technology Acceptance Model, and Model of Innovation Resistance," Internet and Information Security, Vol. 3, No. 1, pp. 35-63, 2012.
|
68 |
Ram, S., "A model of innovation resistance, Advances in Consumer Research," Vol. 14, No. 1, pp. 208-212, 1987.
|
69 |
Plouffe, C. R., Hulland, J. S. and Vandenbosch, M., "Research report : Richness versus parsimony in modeling technology adoption decisions : Understanding merchant adoption of a smart card-based payment system," Information Systems Research, Vol. 12, No. 2, 2001.
|
70 |
Post, G. and Karan, A., "Management Tradeoffs in Anti-virus Strategies," Information and Management, Vol. 37, No. 1, pp. 13-24, 2000.
DOI
ScienceOn
|
71 |
Ram, S. and Sheth, R., "Consumer Resistance To Innovation : The Marketing Problem and Its Solution," Journal of Consumer Marketing, Vol. 6, No. 2, pp. 5-14, 1989.
|
72 |
Robertson, J., Sorbello, T. and Unsworth, K., "Innovation implementation : The role of technology diffusion agencies," Journal of Technology Management and Innovation, Vol. 3, pp. 1-10, 2008.
|
73 |
Robertson, Thomas S. and Hubert Gatignon, "Competitive Effects on technology Diffusion," Journal of Marketing, Vol. 50, No. 3, pp. 1-12, 1986.
DOI
ScienceOn
|
74 |
Rogers, E. M. and Shoemaker, F., "Communication of Innovations : A Cross-Cultural Approach," NewYork : Free Press, 1971.
|
75 |
Rogers, E. M., "Diffusion of Innovations( Third Edition)," The Free Press, New York, 1983.
|
76 |
Rogers, E. M., "Diffusion of Innovations( Forth Edition)," The Free Press, New York, 1995.
|
77 |
Rogers, E. M., "Diffusion of Innovations( Fifth Edition)," The Free Press, New York, 2003.
|
78 |
Samuel, W. and Zeckhasuer, R., "Status Quo Bias in Decision Making," Journal of Risk and Uncertainty, Vol. 1, pp. 7-59, 1988.
DOI
ScienceOn
|
79 |
Schein, E. H., "Organizational Culture and Leadership," San Francisco : Jossey -Bass, 1985.
|
80 |
Scott, J., "The Measurement of Information Systems Effectiveness : Evaluating a Measuring Instrument," Proceedings of the 15th International Conference on Information Systems, Vancouver, pp. 111-128, 1994.
|
81 |
Seo, B. M., "The Impact of Perceived Security Control on the Acceptance of Internet Banking," The Journal of Society for e-Business Studies, Vol. 11, No. 1, pp. 25-52, 2006.
과학기술학회마을
|
82 |
Seo, M. S., Ahn, J. W., Lee E. K. and Oh. D. Y., "Purchasing Avoidance of Digital Convergence Products : Focusing on the Customer's Psychological Factors and the Innovation Resistance," Journal of Korean Contents, pp. 270-284, 2009.
|
83 |
Seo, S. W., "THE ECONOMICS OF INFORMATION SECURITY," Seoul National University Press, 2008.
|
84 |
Shang, S. and Seddon, P. B., "Assessing and Managing the Benefits of Enterprise Systems : The Business Manager's Perspective," Information Systems Journal, Vol. 12, No. 4, pp. 271-299, 2002.
DOI
ScienceOn
|
85 |
Smith, S., Stephen, G. and Malampy, W., "A financial Management Approach for Selecting Optimal, Cost- Effective Safeguards Upgrades for Computer and Information Security Risk Management," Computer and Security, Vol. 14, No. 1, pp. 28-29, 1995.
|
86 |
Solms, R., Eloff, J. J. P. and Solms, S. H., "Computer Security Management : A Framework for Effective Management Involvement," Security, Vol. 12, No. 4, pp. 217-222, 1990.
|
87 |
Straub, E., "Understanding Technology Adoption : Theory and Future Directions for Informal learning," Review of Educational Research, Vol. 79, No. 2, pp. 625-649, 2009.
DOI
|
88 |
Tomarken, A. J. and Waller N. G., "Po- tential problems with 'well fitting' models," Journal of Abnormal Psychology, Vol. 112, No. 4, pp. 578- 598. r Studies, Vol. 45, No. 1, pp. 19- 45, 2003.
DOI
ScienceOn
|
89 |
Venkatesh, V. and Davis, F. D., "A theoretical extension of the technology acceptance model : Four longitudinal field studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000.
DOI
ScienceOn
|
90 |
Tornatzky, L. G. and Klein, K. J., "Innovation characteristics and innovation adoption implementation : A meta-analysis of findings," IEEE Transactions on Engineering Management, Vol. 29, No. 1, pp. 28-45, 1982.
|
91 |
Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D., "User acceptance of information technology : Toward a unified view," Information Management, Vol. 27, No. 3, pp. 425- 478, 2003.
|
92 |
Verkasalo, H., C. Lopez-Nicolas, Molina- Castillo, F. J. and Bouwman, H., "Analysis of users and non-users of smart phone applications," MIS Quarterly, Vol. 27, No. 3, pp. 242-255, 2003.
|
93 |
Wenbo, S., Jang I. J. and Yoo, H. S., "A improved authentication protocol for the forward security," The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 17-27, 2007.
과학기술학회마을
|
94 |
Whetten, D. A., "What constitutes a theoretical contribution?," The Academy of Management Review, Vol. 14, No. 4, 1989.
|
95 |
Yoon, S. U., "A study on the innovation resistance on social network service : Focusing on facebook non-users on their 20's university students," KRCRA, Vol. 13, No. 3, pp. 331-360, 2013.
|
96 |
Zaltman, G. and Wallendorf, M., "Consumer Behavior : Basic Findings and Management Implications," New York, NY : John Wiley and Sons, 1983.
|