1 |
Lee, Y. and K. Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communications of the ACM, Vol.48, No.8(2005), pp.72-77.
|
2 |
Lee, Y. and K. R. Larsen, "Threat or coping appraisal : determinants of SMB executives' decision to adopt anti-malware software", European Journal of Information Systems, Vol.18, No.2(2009), pp.177-187.
DOI
ScienceOn
|
3 |
Loch, K. D., H. H. Carr, and M. E. Warkentin, "Threats to Information Systems : Today's Reality, Yesterday's Understanding", MIS Quarterly, Vol.16, No.2(1992), pp.173-186.
DOI
ScienceOn
|
4 |
Milne, S. E., S. Orbell, and P. Sheeran, "Combining motivational and volitional interventions to promote exercise participation : Protection motivation theory and implementation intentions", British Journal of Health Psychology, Vol.7(2002), pp.163-184.
DOI
ScienceOn
|
5 |
Axelrod, L. J. and J. W. Newton, "Preventing Nuclear War : Beliefs and attitude of Disarmist and Deterrentist Behavior", Journal of Applied Psychology, Vol.21, No.1(1991), pp.29-40.
|
6 |
Bandura, A., "Self efficacy : toward a unifying theory of behavioral change", Psychological Review, Vol.84(1977), pp.191-215.
DOI
ScienceOn
|
7 |
Barden-O'Fallon, J. L., J. deGraft-Johnson, T. Bisika, S. Sulzbach, A. Benson, and A. O. Tsui, "Factors Associated with HIV/AIDS Knowledge and Risk Perception in Rural Malaw", AIDS and Behavior, Vol.8, No.2(2009), pp.131-140.
|
8 |
Campbell, K., L. A. Gordon, M. P. Loeb, and L. Zhou, "The Economic Cost of Publicly Announced Information Security Breaches : Empirical Evidence from the Stock Market", Journal of Computer Security, No.11(2003), pp.431-448.
|
9 |
Walker, E. A., A. Caba, C. B. Schechter, C. E. Basch, E. Blanco, T. DeWitt, M. R. Kalten, M. S. Mera, and G. Mojica, "Measuring Comparative Risk Perceptions in an Urban Minority Population : The Risk Perception Survey for Diabetes", The Diabetes Educator, Vol.33(2007), pp.103-110.
DOI
|
10 |
Chau, P. Y. K. and P. J. H. Hu, "Investigating healthcare professionals' decisions to accept telemedicine technology : an empirical test of competing theories", Information and Management, Vol.39(2002), pp.297-311.
DOI
ScienceOn
|
11 |
Croog, S. H. and N. P. Richards, "Health Beliefs and Smoking Patterns in Heart Patients and Their Wives : A Longitudinal Study", American Journal of Public Health, Vol.67, No.10(1977), pp.921-930.
DOI
ScienceOn
|
12 |
Crossler, R. E., "Protection Motivation Theroy : Understanding Determinants to Backing Up Personal Data", Proceedings of the 43rd hawaii International conference on System Sciences, (2010), pp.1-10.
|
13 |
Doria, M. F., N. Pidgeon, and P. Hunter, "Perceptions of Drinking Water Quality and Risk and Its Effects on Behaviour : A Crossnational Study", Science of the Total Environment, Vol.407(2009), pp.5455-5464.
DOI
ScienceOn
|
14 |
Floyed D. L., S. Prentice-Dunn, and R. W. Rogers, "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, Vol.30(2000), pp. 407-429.
DOI
ScienceOn
|
15 |
Johnston, A. C. and M. Warkentin, "Fear appeals and information security behaviors : An empirical study", MIS Quarterly, Vol. 34, No.3(2010), pp.549-566.
DOI
|
16 |
노성호, 김지선, "범죄의 두려움에 대한 경험적 연구", 피해자학연구, 제6권(1998), pp. 169-205.
|
17 |
박철현, "범죄피해경험, 이웃통합 그리고 범죄의 두려움 : 대학생에 대한 심층면접결과를 중심으로", 피해자학연구, 제13권, 제1호(2005), pp.51-77.
|
18 |
양호일, 환경디자인 행태학, 유림문화사, (1990), p.39.
|
19 |
우형진, "텔레비전 뉴스 시청이 시청자의 건강증진의지에 미치는 영향에 관한 연구", 한국언론학보, 제51권, 제2호(2007), pp.308-320.
|
20 |
Weinstein, N. D., "Testing four competing theories of health-protective behavior", Health Psychology, Vol.12(1993), pp.324-333.
DOI
ScienceOn
|
21 |
Woon, M. Y., G. W. Tan, and R. T. Low, "A protection motivation theory approach to home wireless security", Proceedings of the Twenty-Sixth International Conference on Information Systems, 2005.
|
22 |
Zajonc, R. B., "Attitudinal effects of mere exposure", Journal of Personality and Social Psychology, Vol.9(1968), pp.1-27.
|
23 |
Zhang, L. and W. C. McDowell, "Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords", Journal of Internet Commerce, Vol.8, No.3/4(2009), pp.180-197.
DOI
ScienceOn
|
24 |
Mohamed, N. and I. H. Ahmad, "Information privacy concerns, antecedents and privacy measure use in social networking sites : Evidence from Malaysia", Computer in Human Behavior, Vol.28. No.6(2012), pp.2366-2375.
DOI
ScienceOn
|
25 |
Obermiller, C., "The Baby Is Sick/The Baby Is Well : A Test of the Environmental Communication Appeals", Journal of Advertising, Vol.24, No.2(1995), pp.55-71.
|
26 |
Prentice-Dunn, S. and R. W. Rogers, "Protection motivation theory and preventive health : Beyond the health belief model, Health Education Research", Theory and Practice, Vol.1(1986), pp.153-161.
|
27 |
Richardson, R., 2011 CSI Computer Crime and Security Survey, Computer Security Institute, 2012.
|
28 |
Rippetoe, P. A. and R. W. Rogers, "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping With a Health Threat", Journal of Personality and Social Psychology, Vol.52(1987), pp.596-604.
DOI
|
29 |
이정모 외, 인지심리학, 학지사, (1999), pp. 24-32.
|
30 |
이민규, 김영은, "질병 관련 인터넷 정보 이용 효과 연구", 언론과학연구, 제9권(2009), pp. 506-539.
|
31 |
김익수, 정진혁, 이형찬, 이정현, "모바일 악성 코드 분석방법과 대응방안", 한국통신학회논문지, 제35권, 제4호(2010), pp.599-609.
|
32 |
김준홍, "범죄피해 위협과 보호행동을 예측하는 요인들의 성차", 한국공안행정학회보, 제40호(2010), pp.72-113.
|
33 |
김지훈, 조시행, "사이버 환경에서의 보안위협", 한국정보보호학회논문지, 제20권, 제4호(2010), pp.11-20.
과학기술학회마을
|
34 |
정만경, 서희석, "과거 및 현재의 모바일 악성 코드 증상에 따른 향후 전망 모바일 악성코드 연구", 2011년 한국컴퓨터교육학회 하계 학술발표논문지, 제15 권, 제2호(2011), pp.179-184.
|
35 |
정훈영, 서희석, "스마트폰 통신환경 변화에 따른 모바일 악성코드 감염경로 연구", 한국컴퓨터교육학회 하계 학술발표논문지, 제15권, 제2호(2011), pp.173-176.
|
36 |
장상근, "모바일 악성코드의 전략과 사례 분석을 통한 모바일 악성코드 진단법", 정보보호학회지, 제23권, 제2호(2013), pp.14-20.
|
37 |
한국인터넷진흥원, 모바일 접속환경을 위한 웹사이트 침해예방 연구, 2010.
|
38 |
한국인터넷진흥원, 2012년도 정보보호실태 조사, 2012.
|
39 |
Ahnlab, "악성코드 분석 특집, 2012 Vol.26", ASEC REPORT, 2012.
|
40 |
김예진, 이규백, "시지각적 특성에 따른 경계의 모호성에 관한 연구", 기초조형학연구, 제13권, 제5호(2012), pp.57-67.
|
41 |
김여라, "신종플루 뉴스 이용 정도가 개인 및 공중에 대한 건강보호 행위의도에 미치는 영향에 관한 연구 : 보호동기이론을 중심으로", 한국언론정보학회, 통권51호(2010), pp.5-25
과학기술학회마을
|
42 |
Ajzen, I. and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, 1980.
|
43 |
Symantec, Internet Security Threat Report, Vol.18(2013).
|
44 |
Rogers, R., "Protection motivation theory of fear appeal and attitude change", Journal of Psychology, Vol.91, No.1(1975), pp.93-114.
DOI
ScienceOn
|
45 |
Rogers, R. W., "Cognitive and Physiological Processes in Fear Appeals and Attitude Change : A Revised Theory of Protected Motivation", Social Psychophysiology : A Sourcebook, The Guilford Press, 1983.
|
46 |
Schafer, R. B., E. Schaefer, G. Bultena, E. Hoiberg, "Coping with a health threat : a study of food safety", Journal of Applied Social Psychology, Vol.23(1993), pp.386-394.
DOI
ScienceOn
|
47 |
Symantec, Norton Report, 2013.
|
48 |
Tanner, J. F., J. B. Hunt, and D. R. Eppright, "The protection motivation model : A normative model of fear appeal", Journal of Marketing, Vol.55(1991), pp.36-45.
DOI
ScienceOn
|
49 |
Vance, A., M. Siponen, and S. Pahnila, "Motivation IS security compliance : Insights from Habit and Protection Motivation Theory", Information and Management, Vol.49 (2012), pp.190-198.
DOI
ScienceOn
|
50 |
Krebs, B., "Hacking Home PCs Fueling Rapid Growth in Online Fraud", Washington Post, Technology Section, Special Reports, Cyber-Security, 2005.
|
51 |
LaRose, R. and N. Rifon, "You Privacy Is Assured of Being Invaded", New Media and Society, Vol.8, No.4(2006), pp.1009-1030.
DOI
|
52 |
Lee, Y., "Understanding anti-plagiarism software adoption : An extended protection motivation theory perspective", Decision Support Systems, Vol.50(2011), pp.361-369.
DOI
ScienceOn
|
53 |
Hair, J. F., B. Black, B. Babin, R. E. Anderson, and R. L. Tatham, Maltivariate data analysis(6th ed.), Pearson Prentice Hall, 2006.
|
54 |
Anderson, C. L. and R. Agarwal, "Practicing Safe Computing : A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol.34, No.3(2010), pp.613-643.
DOI
|
55 |
Boer, H. and E. R. Seydel, "Protection motivation theory. In Predicting health behavior : Research and practice with social cognition models (ed)", Open University Press, (1996), pp.95-120.
|
56 |
Lee, D., R. Larose, and N. Rifon, "Keeping our network safe : a model of online protection behaviour", Behaviour and Information Technology, Vol.27, No.5(2008), pp.445-454.
DOI
ScienceOn
|