최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국경영과학회지 = Journal of the Korean Operations Research and Management Science Society, v.32 no.2, 2007년, pp.149 - 162
권순재 (인하대학교 BK21 지능형 유비쿼터스 물류기술 연구사업단) , 이건창 (성균관대학교 경영학부) , 김창현 (성균관대학교 경영학부)
In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, sys...
국가정보원, 정보통신부 2006 국가정보보호백서, 2006
김종기, 이동호, '전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구', 경영정보학연구, 제15권, 제2호(2005), pp.65-96
원동호, 김경국, 이보영, 김승주, '공개키 기반 구조 구축을 위한 디렉토리 서비스 구현', 성균관대학교 정보통신기술연구소, 1998
우석천, 이재우, 홍기융, 이성욱, '정보보호 정책 수립 및 관리지침 개발', 해킹바이러스연구, 제7권(2000)
이덕영, '인터넷 쇼핑몰 신뢰의 결정요인과 구매와의 관계에 대한 연구', 건국대학교 석사학위논문, 2002
장윤희, 권오준, 백민정, '고객 신뢰도와 만족도에 영향을 미치는 전자결제 시스템 성공요인에 관한 연구', 한국경영정보학회 추계학술대회, 2004
정경수, 김용, '인터넷뱅킹 이용자달이 지각하는 신뢰와 위험 요인간의 관계에 대한 실증 연구', 한국경영정보학회 추계학술대회, 2004
한국인터넷진흥원, 2005 하반기 정보화실태조사, 2006
한근회, 박영종, 소우영, '안전한 전자상거래 모델', 한국멀티미디어학회 추계학술발표논문집, 1998
http://www.boho.or.kr, 정보보호실천수칙, 2006
Adams, D.A, R.R. Nelson, and P.A. Todd, 'Perceived usefulness, ease of use, and usage of information technology: a replication,' MIS Quarterly, Vol.16, No.2(1992), pp.227-247
Ajzen, I. and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, Englewood Cliffs, NJ, 1980
Barbara H.W. and PA Todd, 'A Theoretical Integration of User Satisfaction and Technology Acceptance,' Information Systems Research, Vol.16, No.1(2005), pp.85-102
Brynjolfsson, E. and M. Smith, 'Frictionless Commerce? A Comparison of Internet & Conventional Retailers,' Management Science, Vol.46, No.4(2000), pp.563-585
Chin, W.W., 'Issues and Opinion on Structural Equation Modeling,' MIS Quarterly, Vol.22, No.1(1998), pp.7-16
CSI, IPAK : Information Protection Assessment Kit, Computer Security Institute, 1997
Davis, F.D., 'Perceived usefulness, perceived ease of use, and user acceptance of information technology,' MIS Quarterly, Vol.13, No.3(1989), pp.319-340
Delone, W.H. and E.R. McLean, 'Information systems success : The quest for the dependent variable,' Inform. Systems Research. Vol.3, No.1(1992), pp. 60-95
Early, A.H. and S. Chaiken, The Psychology of Attitudes, Thomson Wadsworth, Belmont, CA, 1993
Fazio, R.H. and MA Olson, 'Attitudes: Foundation, function and consequences,' Hogg, MA and J. Cooper, eds. The Sage Handbook of Social Psychology, Sage, London, UK, 2003
Fishbein, M. and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, Reading, MA, 1975
Fornell, C. and D.F. Larcker, 'Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,' Journal of Marketing Research, Vol.18, No.1(1981), pp.39-51
Gefen, D. and D.W. Straub, 'Gender differences in the perception and use of e-mail : an extension to the technology acceptance model,' MIS Quarterly, Vol.21, No.4(1997), pp.389-400
Gefen, D., 'Customer Loyalty in E-Commerce,' Journal of the Association for Information Systems, Vol.3(2002), pp.27-51
Goodhue, D.L., 'IS attitudes: Toward theoretical and definitional clarity,' Database Advertise of Information Systems, Vol.19, No.3/4(1988), pp.6-15
Grazioli, S. and S. Jarvenpaa, 'Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers,' IEEE Transaction on System, Vol.30, No.4(2000), pp.395-410
Hair, J,F., R.E. Anderson, R.L. Tatham, and W.C. Black, Multivariate Data Analysis: With Readings, 5th ed., Prentice Hall, 1998
Hartwick, J. and H. Barki, 'Explaining the role of user participation in information system use,' Management Science, Vol.40, No. 4(1994), pp.440-465
Hoffman, D.L. T.P. Novak, and M. Peralta, 'Building consumer trust online,' Communications of the ACM, Vol.42, No.4(1999), pp.80-85
Howel, J,M. and C.A. Higgins, 'Champion of Technological Innovation,' Administrative Science Quarterly, Vol.35, No.2(1990), pp.317-341
ISO/IEC JTCI CS27, Guidelines for the management of IT security(GMITS)-Part 1 : Concepts and models of IT security, TR 13335-1, 2000
James E. and W. Sammy, 'Development of a Tool for Measuring and Analyzing Computer User Satisfaction,' Management Science, Vol.29, No.5(1983), pp.126-145
Jarvenpaa, S., K. Knoll, and D. Leidner, 'Is Anybody Out There? Antecedents of Trust in Global Virtual Teams,' Journal of Management Information Systems, Vol.14, No.4 (1998), pp.29-64
Lederer, A.L., D.J. Maupin, M.P. Sena, and Y. Zhuang, 'The Technology Acceptance Model and the World Wide Web,' Decision Support Systems, Vol.29(2000), pp.26-282
Matthew K., O. Lee, and E. Turban, 'A Trust Model for Consumer Internet Shopping,' International Journal of Electronic Commerce, Vol.6, No.1(2001), pp.75-91
Melone, N., 'A theoretical assessment of the user-satisfaction construct in information systems research,' Management Science, Vol.36, No.1(1990) pp.76-91
Nunnally, J.C, Psychometric Theory, McGrawHill, 1994
OECD, Guidelines for the Security of Information Systems, 1992
Pavlou, P. and D. Gefen, 'Building Effective Online Marketplaces with Institution-Based Trust,' Twenty-Third International Conference on Information Systems, 2002, pp. 667-675
Reichheld, F. and P. Schefter, 'E-Loyalty : Your Secret Weapon on the Web,' Harvard Business Review, Vol.78, No.4(2000), pp. 105-113
Seddon, P., 'A respecification and extension of the Delone and McLean model of IS success,' Inform. Systems Research, Vol.8, No.3(1997), pp.240-253
Sitkin, S.B. and N.L. Roth, 'Explaining the Limited Effectiveness of Legalistic Remedies for Trust/Distrust,' Organization Science, Vol.4, No.3(1993), pp.367-388
Straub, D., M. Limayem, and E. Karahanna-Evaristo, 'Measuring system usage: implications for IS theory testing,' Management Science, Vol.41, No.8(1995), pp.1328-1342
Suh, B. and I. Han, 'The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce,' International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.135-161
Wilson, S., 'Certificates and trust in electronic commerce,' Information Management and Computer Security, Vol.5, No.5(1997), pp.175-181
Wold, H., Soft Modeling: the Basic Design and Some Extensions, in System Under Indirect Observations: Part 2, Amsterdam North-Holland: K.G. Joreskog and H. Wold (eds), 1982
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.