1 |
Kim Heewoong, Cheng Xi, Lee Sunyoung, Lee Dongwoo,", Entrue Journal of Information Technology, Vol. 5, No. 2, pp. 7-20, 2006.
DOI
|
2 |
Bagchi, K., & Udo, G., "An analysis of the growth of computer and Internet security breaches." Communications of the Association for Information Systems, Vol. 12, No. 1, Article 46, 2003.
|
3 |
Stafford, T. F., & Urbaczewski, A., "Spyware: The ghost in the machine.", The Communications of the Association for Information Systems, Vol. 14, No. 1, Article 15, 2004.
|
4 |
Liang, H. and Xue, Y., "Avoidance of information technology threats: a theoretical perspective," MIS Quarterly, Vol. 33 No. 1, pp. 71-90, 2009.
|
5 |
Lazarus, R. and Folkman, S., Stress, Coping, and Adaptation, New York: Springer-Verlag, 1984.
|
6 |
Beaudry, A. and Pinsonneault, A., "IT-induced adaptation and individual performance: a coping acts model," Twenty-Second International Conference on Information Systems, pp. 475-480, 2001.
|
7 |
Beaudry, A. and Pinsonneault, A., "Understanding User Responses To Information Technology: A Coping Model Of User Adaptationl," MIS Quarterly Vol. 29 No. 3, pp. 493-524, 2005,
DOI
|
8 |
Beaudry, A., & Pinsonneault, A., "The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use.", MIS quarterly, Vol. 34, No. 4, pp. 689-710, 2010.
DOI
|
9 |
Mehrabian, A., & Russell, J. A., "An approach to environmental psychology.", the MIT Press, 1974.
|
10 |
Elliot, A. J., "Approach and avoidance motivation and achievement goal," Educ. Psychol, Vol. 34, pp. 169-189, 1999,
DOI
|
11 |
Elliot, A. J., "The Hierarchical Model of Approach-Avoidance Motivation," Motivation and Emotion, Vol. 30, pp. 111-116, 2006.
DOI
|
12 |
Elliot, A. J. and Covington, M. V., "Approach and avoidance motivation," Educational Psychology Review, 13, pp. 73-92, 2001.
DOI
|
13 |
Poole, M. S. and DeSanctis, G., Understanding the use of group decision support systems: The theory of adaptive structuration. In J. Fulk & C. Steinfeld (Eds). Organizations and Communication Technology. Newbury Park, Ca: Sage, 1990.
|
14 |
Bong Gyou Lee, Ki Youn Kim, Sung Wan Koo, "Impact of Security, Charge and Quality on the Usage Satisfaction of Mobile Internet", The KIPS Transactions, Vol. 15, No. 15, pp. 721-732, 2008.
|
15 |
Chin, W.W., Gopal, A., and Salisbury, W.D., "Advancing the Theory of Adaptive Structuration: The Development of a Scale to Measure Faithfulness of Appropriation," Information Systems Research, Vol. 8, No. 4, pp. 342-367, 1997.
DOI
|
16 |
Fornell, C. and Larcker, D. F., "Evaluating structural equations models with unobservable variables and measurement error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.
DOI
|
17 |
Gopal, A., Bostrom, R., and Chin, W., "Applying Adaptive Structuration Theory to Investigate the Process of Group Support Systems Use," Journal of Management Information Systems, Vol. 9, No. 3, pp. 45-69, 1993.
|
18 |
Han Bong-Ju, "A Study on the Effects of Organizational Culture and Leadership on Employee Behavior: A comparative analysis on different types of organizations", Korea Institute of Public Administration, Vol. 19, No. 1, 2010.
|
19 |
Etezadi-Amoli, J., & Farhoomand, A. F., "A structural model of end user computing satisfaction and user performance.", Information & management, Vol. 30, No. 2, pp. 65-73, 1996.
DOI
|
20 |
Keun-Ho Lee, "Analysis of Threats Factor in IT Convergence Security", Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 49-55, 2010.
|
21 |
Jun-Young Go, Keun-Ho Lee, "SNS disclosure of personal information in M2M environment threats and countermeasures", Journal of the Korea Convergence Society, Vol. 5, No. 1, pp. 29-34, 2014.
DOI
|
22 |
Kwang-Jae Lee, Keun-Ho Lee, "Authentication Scheme using Biometrics in Intelligent Vehicle Network", Journal of the Korea Convergence Society, Vol. 3, No. 1, pp. 7-11, 2012.
|