1 |
Tsai, H. Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J. and Cotten, S. R., "Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective," Computers and Security, Vol. 59, pp. 138-150, 2016.
DOI
|
2 |
Venkatesh, V. and Davis, F. D., "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000.
DOI
|
3 |
Venkatesh, V., Moris, M., Davis, G. B. and Davis, F. D., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003.
DOI
|
4 |
Bandura, A., "Self-efficacy; Toward a Unifying Theory of Behavioral Change," Psychological Review, Vol. 84, pp. 191-215, 1977.
DOI
|
5 |
Vealey, R. S., "Conceptualization of Sport-Confidence and Competitive Orientation; Preliminary Investigation and Instrument Development," Journal of Sport Psychology, Vol. 8, pp. 221-246, 1986.
DOI
|
6 |
Schunk, D. H., "Social Cognitive Theory and Self-Regulated Learning," In Zimmerman, B. J. and Schunk, D. H. (Eds.), Self-Regulated Learning and Academic Achievement, Springer, New York, 1989.
|
7 |
Shi, H. Y., "Empirical Study on Information Security Behavior Intent of Smartphone Users," Doctoral Dissertation, Yeungnam University, 2013.
|
8 |
Dilshodjon Gafurov., Shin, H. Y. and Kim, K. S., "Smartphone Users's Behavior on Information Security In Information Service Usages: Application of Protection Motivation Theory," Journal of Marketing Studies, Vol. 2 No. 3, pp. 53-76, 2014.
|
9 |
Bandura, A., "Social Foundations of Thought and Action: A Social Cognitive Theory," Englewood Cliffs, NJ: Prentice-Hall, 1986.
|
10 |
Bulgurcu, B., Cavusoglu, H. and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, pp. 523-548, 2010.
DOI
|
11 |
Agarwal, R. and Prasad, J., "A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology," Information Systems Research, Vol. 9, No. 2, pp. 204-215, 1998.
DOI
|
12 |
Lee, K. H., Han, K. S. and Jung, J. S., "A Study of Influencing Factors for Compliance Intention of Personal Information Protection Policy of Public Institution Employees," Entrue Journal of Information Technology, Vol. 15, No. 1, pp. 75-94, 2016.
|
13 |
Shin, H. S., "The Effect of User Characteristics of Mobile Media on Recognition and Acceptance," Doctoral Dissertation, Sogang University, 2011.
|
14 |
Rogers, E. M., Diffusion of Innovation, 5th ed. NY, The Free Press, 2003.
|
15 |
Catherine, L. A. and Ritu, A., "Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly, Vol. 34, No. 3, pp. 613-644, 2010.
DOI
|
16 |
Woo, H. J., "Exploring the Relationship Between the Perceived Risk to Cyber Security and the Behavioral Intention to Technology Acceptance and Sustainable Use for Promoting Personal Information Security," Journal of Communication, Science, Vol. 14 No. 2, pp. 220-257, 2013.
|
17 |
Yim, M. S., "The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees," Journal of Digital Convergence, Vol. 11 No. 1, pp. 27-38, 2013.
DOI
|
18 |
Kim, J. K. and Kim, S. H., "Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory," Informatization Policy, Vol. 20, No. 3, pp. 63-85, 2013.
|
19 |
Goldsmith, R. and Hofacker, C., "Measuring Consumer Innovativeness," Journal of the Academy of Marketing Science, Vol. 19, No. 3, pp. 209-221, 1991.
DOI
|
20 |
Rhee, H. S., Kim, C. T. and Young U. R., "Self-Efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior," Computers and Security, Vol. 28, No. 8, pp. 816-826, 2009.
DOI
|
21 |
Davis, F., "Perceived Usefulness, Perceived Ease of Use, and Use Acceptance of Information Technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-340, 1989.
DOI
|
22 |
Yang, J. G., Kang, K. S. and Yu, Y. M., "A Study on Vendor Managed Inventory to Apply Technology Acceptance Model," Journal of the Korea Industrial Information Systems Research, Vol. 21, No. 2, pp. 45-57, 2016.
DOI
|
23 |
Chin, W. W., Marcolin, B. L. and Newsted, P. R., "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, Vol. 14, No. 2, pp. 189-217, 2003.
DOI
|
24 |
Choi, Y. M. and Kwon, H. G., "Effects of Relationship Benefits on Trust, Flow and Customer Loyalty of Social Commerce: Focus of Self-Determination," Journal of the Korea Industrial Information Systems Research, Vol. 24, No. 3, pp. 39-50, 2019.
DOI
|
25 |
Kim, S. H. and Kim, J. K., "Impact of Privacy Concern and Institutional Trust on Privacy Decision Making: A Comparison of E-Commerce and Location-Based Service," Journal of the Korea Industrial Information Systems Research, Vol. 22, No. 1, pp. 69-87, 2017.
DOI
|
26 |
Jang, J. H., Mok,, H. J., Kim, Y. S., Choi, J. S. and Choi, C. J., "Analysis of the Recognition Level of Personal Information Protection of Public Institutions in the Local Governments," The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 11, No. 3, pp. 345-350, 2016.
DOI
|
27 |
Bulgurcu, B., Cavusoglu, H. and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, pp. 523-548, 2010.
DOI
|
28 |
Shin, I. S., "Effects and Causality of Measures for Personal Information: Empirical Studies on Firm and Individual Behaviors and Their Implications," Korea Institute of Information Security and Cryptology, Vol. 26, No. 2, pp. 523-531, 2016.
DOI
|
29 |
Trustwave, Global Security Report, 2012.
|
30 |
Park, C. O. and Lee, S. W., "A Study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory," Journal of Internet Computing and Services, Vol. 15, No. 2, pp. 59-71, 2014.
DOI
|
31 |
Kim, H. J. and Ahn, H. S., "A Study on the Effect on Flow and Smartphone Addiction by Smartphone User's Self-determination," The Journal of Korean Association of Computer Education, Vol. 18, No. 2, pp. 35-45, 2015.
DOI
|
32 |
Bae, J. K., "An Empirical Study on the Effect of Leakage Threat of Personal Information on Protective Behavior Intention in Big Data Analysis," Proceedings of KIIT Summer Conference, Vol. 17, No. 3, pp. 90-93, 2016.
|
33 |
Kim, Y. R., "Measuring Individuals' Privacy Concerns and Survey of Privacy Recognition," Journal of the Korea Industrial Information Systems Society, Vol. 15, No. 5, pp. 259-271, 2010.
|
34 |
Park, G. J., Statistics on the Number of Domestic Internet Users and Users Worldwide in 2015, https://ceolink.tistory.com/250 (Accessed on July 21th, 2016)
|
35 |
Kim, S. W. and Kim, T. H., "Relationship Between Family, School, Internet Use Environmental Factors and Middle School Students' Internet Dependence: Inspecting Mediation Effect of Depression," Journal of Family Relations, Vol. 15, No. 4, pp. 25-49, 2011.
|
36 |
Kwon, D. S., Kim, J. H., Yu, C. H. and Kim, S. J., "An Empirical Study Applying the Self-Determination Factors to Flow and Satisfaction of SmartPhone," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 197-220, 2011.
DOI
|
37 |
National Information Society Agency, "2018 Smartphone and Dependence Survey," Ministry of Science and ICT, 2019.
|
38 |
Siponen, M. and Vance, A., "Neutralization: New Insights into the Problem of Employe Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, pp. 487-502, 2010.
DOI
|
39 |
Fishbein, M. and Ajzen, I., "Belief, Attitude, Intention, and Behavior. An Introduction to Theory and Research, Reading," MA: Addison-Wesley, 1975.
|
40 |
Lee, G. O. and Song, Y. M., "The Study on Visit Behavior of Customer an Application of the Theory of Reasoned Action," Korea Journal of Tourism and Hospitality Research, Vol. 27, No. 5, pp. 397-411, 2013.
|
41 |
Lee, I. S., "A Study on the Effect of Food Service Employees' Job Related Information Technology on Perceived Ease of Use, Usefulness, System Use Activity and Performance," Doctoral Dissertation, Kyunghee University, 2012.
|
42 |
Ajzen, I. and Fishbein, M., "Understanding Attitudes and Predicting Social Behavior," Englewood-Cliffs, NJ: Prentice Hall, 1980.
|
43 |
Bandura, A., "Self-Efficacy in Changing Societies," Cambridge University Press, 1995.
|
44 |
Safa, N., Sokhak, M., Von Solms, R., Furnel, S., Ghani, N. A. and Herawan, T., "Information Security Conscious Care Behavior Formation in Organizations," Computer and Security, Vol. 53, pp. 65-78, 2015.
DOI
|
45 |
Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology, Vol. 91, pp. 93-114, 1975.
DOI
|
46 |
Kim, Witte., "Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)," Communications Monographs, Vol. 61, No. 2, pp. 113-134, 1994.
DOI
|
47 |
Rogers, R., "Protection Motivation Theory of Fear Appeal and Attitude Change," Journal of Psychology, Vol. 91, No. 1, pp. 93-114, 1975.
DOI
|
48 |
Park, J. Y., Kim, J. D. and Kim, B. S., "Online Users' Password Security Behavior: the Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior," Journal of Information Technology Services, Vol. 16, No. 3, pp. 147-165, 2017.
DOI
|
49 |
Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, pp. 549-566, 2010.
DOI
|
50 |
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D. and Polak, P., "What Do Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors," MIS Quarterly, Vol. 39, No. 4, pp. 837-864, 2015.
DOI
|
51 |
Mwagwabi, F., McGill, T. and Dixon, M., "Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines," The 47th Hawaii International Conference on System Sciences(HICSS), pp. 3188-3197, 2014.
|
52 |
Chen, Y. and Zahedi, F. M., "Individuals' Internet Security Perceptions and Behaviors: PolyContextual Contrasts Between the United States and China," MIS Quarterly, Vol. 40, No. 1, pp. 205-222, 2016.
DOI
|