최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국IT서비스학회지 = Journal of Information Technology Services, v.10 no.2, 2011년, pp.141 - 162
이상재 (세종대학교 경영학과) , 임규건 (한양대학교 기술경영전문대학원)
The controls of Information Systems (IS) have been an more critical issue controls as the sophistication and integration of IS is more proceeded. ITGI (The Information Technology Governance Institute) of ISACA (Information Systems Audit and Control Association) has suggested COBIT (Control Objective...
중국 SI 시장 현황보고서, 한국소프트웨어진흥원, 마켓리서치팀, 2003.
Anderson, J. and Gerbing, "Structural equation modeling in practice:A review and recommended two-step approach", Psychological Bulletin, Vol.1033(1988), pp.411-423.
Choudhury, V. and Sabherwal, "Portfolios of control in outsourced software development projects", Information Systems Research, Vol.14, No.3(2003), pp.291-314.
Cook, T. D. and Campbell, Boston, MA: Houghton Mifflin, 1979.
Hair, J. F., T. Anderson, and T. Grablowsky, OK; PPC Books, 1979.
Henderson, J. C. and Lee, "Managing I/S design teams:a control theories perspective", Management Science, Vol.38(1992), pp.757-777.
ITGI(IT Governance Institute), Information Systems Audit and Control Association, 2007.
Jaworski, B. J., "Toward a theory of marketing control:Environmental context, control types, and consequences", Journal of Marketing, Vol.52(1988), pp.23-39.
Jiang, J. J., Klein, and Carr, "Measuring Information Systems Quality:SERVQUAL from the Other Side", MIS Quarterly, Vol. 262(2002), pp.145-166.
Joreskog, K. G. and Sorbom, 2nd ed., SPSS Inc., 1989.
Kettinger, W. J. and Lee, "Zones of tolerance: Alternative scales for measuring information systems service quality", MIS Quarterly, Vol.29, No.4(2005), pp.607-623.
Kirsch, L. J., "Deploying common systems globally:The dynamics of control", Information Systems Research, Vol.154(2004), pp.374-395.
Kirsch, L. J., "Portfolios of control modes and IS project management", Information Systems Research, Vol.83(1997), pp.215-239.
Lee, S., Han, and Kym, "The impact of EDI controls on EDI implementation", International Journal of Electronic Commerce, Vol. 24(1998), pp.71-98.
Lee, S. M., Lee, and Yoo, "An integrative model of computer abuse based on social control and general deterrence theories", Information and Management, Vol.41(2004), pp.707-718.
Lee, Y. and Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communication of the ACM, Vol.488 (2005), pp.72-78.
Markus, M. L. and J. Pfeffer, "Power and the design and implementation of accounting and control systems", Accounting, Organizations and Society, Vol.82, No.3(1983), pp.205-218.
Merchant, K. A., "The design of the corporate budgeting system:Influences on managerial behavior and performance", Accounting Review, Vol.56(1981), pp.813-829.
Nidumolu, S. R. and Subramni, "The matrix of control:Combining process and structure approaches to managing software development", Journal of Management Information Systems, Vol.203(2003), pp.159-196.
Nunnally, J. C., Psychometric Theory, New York:McGraw-Hill, 1978.
Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Alternative scales for measuring service quality:A comparative assessment based on psychometric and diagnostic criteria", Journal of Retailing, Vol.70, No.3(1994), pp.201-230.
Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Refinement and reassessment of the SERVQUAL scale", Journal of Retailing Vol.67(1991), pp.420-450.
Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "A conceptual model of service quality and its implications for future research", Journal of Marketing, Vol.49(1985), pp.41-50.
Piccoli, G. and B. Ives, "Trust and the unintended effects of behavior control in virtual teams", MIS Quarterly, Vol.27, No.3 (2003), pp.365-395.
Simons, R., "The role of management control systems in creating competitive advantage: New perspectives", Accounting, Organizations and Society, Vol.15, No.1/2(1990), pp.127-143.
Siponen, T. M., "On the role of human mortality in information system security:From the problems of descriptivism to nondescriptive foundations", Information Resources Management Journal, Vol.14, No.4 (2001), pp.15-23.
Suh, B. and I. Han, "The impact of customer trust and perception of security control on the acceptance of electronic commerce", International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.135-161.
Weber, R., Information Systems Control and Audit, Prentice Hall Inc., Upper Saddle River, New Jersey, 1999.
Werts, C. E., R. L. Linn, and K. G. Joreskog, "Interclass reliability estimates:Testing structural assumptions", Educational and Psychological Measurement, Vol.34(1974), pp. 25-33.
Whitman, M. E., "In defense of the realm:Understanding the threats to information security", International Journal of Information Management, Vol.24(2004), pp.43-57.
Yeh, Q.-J. and A. J.-T. Chang, "Threats and countermeasures for information system security:A cross-industry study", Information and Management, Vol.44, No.5 (2007), p.491.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.