최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.22 no.2, 2012년, pp.295 - 316
In the recent field, cybersecuriyt has become one of the critical areas in the information technology field, and demands for cyberseucirty professionals have been increasing tremendously. However, there is In the recent past, cybersecurity has become one of the critical areas in the Information Tech...
A.-M. Chang, and P. K. Kannan, Preparing for Wireless and Mobile Technologies in Government, IBM Endowment for The Business of Government, Oct. 2002.
E. Chabrow, "Homeland Security Tries To Get Its Cybersecurity House In Order "Information Week, [10/2/2006,2006].
P. Duchessi, and I. Chengalur-Smith, "Client/server benefits, problems, best practices," Communications of the ACM, vol. 41, no. 5, pp.87, May 1998.
L. M. Liebrock, "Scholarship For Service," IEEE Distributed Systems Online, vol. 7, pp. 9, art.no.0609-o9002, Sep. 2006.
J. Bailey, and G. Stefaniak, "Preparing the information technology workforce for the new millennium." ACM SIGCPR Computer Personnel, vol. 20, no. 4, pp.4-15. Oct. 1999.
S. Nielsen, L. V. Hellens, and S. Wong, "The male IT domain: You've got to be in it to win IT." Proceedings from the 12th Australasian Conference on Information System, pp.1-12, Dec. 2001.
L.V. Hellens, S. Nielsen, R. Doyleetal., "Bridging the IT Skills Gap: .A Strategy to Improve the Recruitment and Success of IT Students." Proceedings from the 10th Australasian Conference on Information Systems, pp.1129-1144, Dec. 1999.
M. Igbaria, and J. Greenhaus, "Determinants of MIS employees' turnover intentions: a structural equation model," Communications of the ACM, vol. 35, no. 2, pp.34-49, Feb. 1992.
M. K. Ahuja, " Women in the information technology profession: A literature review, synthesis and research agenda," European Journal of Information Systems, vol. 11, no. 1, pp.20-34, Mar. 2002.
E. M. Trauth, "Mapping informationsector work to the work force," Communications of the ACM, vol. 44, no.7, pp.74-75, Jul. 2001.
D. Clyton, and T. Lynch, "Ten years of strategies to increase participation of women in computing programs: The central queensland university experience 1999-2001," SIGCSE Bulletin,.vol. 34, no.2, pp.89-93, Jun. 2002.
I. Ajzen, From intentions to actions: A theory of planned behavior, Springer, Mar. 1985.
I. Ajzen, "The theory of planned behavior," Organizational Behavior and Human Decision Processes, vol. 50, no. 2. pp.179- 211, Dec. 1991.
S. A. Brown, and V. Venkatesh, "Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle.," MIS Quarterly, vol. 29, no. 3, pp.399-426, Sep. 2005.
J. F. George, "The theory of planned behavior and internet purchasing," Internet Research, vol. 14, no. 3, pp.198- 212, 2004
A. H. Eagly, and S. Chaiken, The psychology of attitudes, Harcourt Brace Jovanovich College, Nov. 1993.
A. Bandura, Social Foundations of Thought and Action, Prentice Hall, Oct. 1986.
D. R. Compeau, and C. A. Higgins, "Computer Self-Efficacy - Development of a Measure and Initial Test," MIS Quarterly, vol. 19, no. 2, pp.189-211, Jun. 1995.
A. Bandura, "Human Agency in Social Cognitive Theory," American Psychologist, vol. 44, no.9, pp.1175-1184, Sep. 1989.
A. Bandura, C. Barbaranelli, G. Caprara and C. Pastorelli, "Multifaceted impact of self-efficacy beliefs on academic functioning," Child Development. vol. 67, no. 3, pp.1206-1222, Jun. 1996.
D. Compeau, C. A. Higgins, and S. Huff, "Social cognitive theory and individual reactions to computing technology: A longitudinal study," MIS Quarterly, vol. 23, no. 2, pp.145-158, Jun. 1999.
D. R. Compeau, and C. A. Higgins, "Application of Social Cognitive Theory to Training for Computer Skills," Information Systems Research, vol. 6, no. 2, pp.118-143, Jun. 1995.
R. W. Lent, F. G. Lopez, and K. J. Bieschke, "Mathematics Self-Efficacy: Sources and Relation to Science-Based Career Choice," Journal of Counseling Psychology, vol. 38, no. 4, pp.424-430, Oct. 1991.
G. Hackett, and N. E. Betz, "A selfefficacy approach to the career development of women," Journal of Vocational Behavior, vol. 18, pp.326-339, Jun. 1981.
G. Hackett, and N. K. Campbell, "Task self-efficacy and task interest as a function of performance on a genderneutral task," Journal of Vocational Behavior, vol. 30, pp.203-215, Apr. 1987.
I. Ajzen Attitudes, personality, and behavior, Dorsey Press, Nov. 1988.
I. Ajzen, and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, Mar. 1980.
F. D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, vol. 13, no. 3, pp.319-340, Sep. 1989.
R,W. Lent, S.D. Brown and G, Hackett. "Toward a unifying social cognitive theory of career and academic interest, choice, and performance." Journal of Vocational Behavior, vol. 45, pp.79-122, Aug. 1994.
S. Felton, T. Dimnik, and M. Northey, "A theory of reasoned action model of the chartered accountant career choice," Journal of Accounting Education, vol. 13, no. 1, pp.1-19, Winter 1995.
R. Crepeau, C. Crook, M. Goslar and M. McMurtery, "Career anchors of information systems personnel," Journal of Management Information Systems. vol. 9, no. 2, pp.145-160, Fall 1992.
V. Vroom, Work and motivation, Wiley, Aug. 1964.
N. Betz, E.Voyten, and K. Klein, "Efficacy and Outcome Expectations Influence Career Exploration and Decidedness," Career Development Quarterly, vol. 46, no. 2, pp.179-89, Dec. 1997.
R. W. Lent, G. Hackett, and S. D. Brown, "A Social Cognitive Framework for Studying Career Choice and Transition to Work," Journal of Vocational Education Research, vol. 21, no. 4, pp.2-31, Dec. 1996.
A. Bandura, "Self-Efficacy Mechanism in Human Agency," American Psychologist, vol. 37, no. 2, pp.122-147, Feb. 1982.
A. Bandura, and D. Cervone, "Self- Evaluative and Self-Efficacy Mechanisms Governing the Motivational Effects of Goal Systems," Journal of Personality and Social Psychology, vol. 45, no. 5, pp.1017-1028, Nov. 1983.
J. Konvalina, A. W. Stanley, and L. Stephens, "Math Proficiency: a key to success factor for computer science students," Communications of the ACM, vol. 26, np.5, pp.377-382, May 1983.
D. Havelka, "Predicting Software Self Efficacy among Business Students: A Preliminary Assessment," Journal of Information Systems Education, vol. 14, no. 2, pp.145-152, Summer 2003.
R. Agarwal, V. Sambamurthy, and R. Stair, "The Evolving Relationship between General and Specific Computer Self- Efficacy: An Empirical Investigation," Information Systems Research, vol. 11, no. 4, pp.418-430, Dec. 2000.
A. Yasinsac, and M. Burmester, "Centers of Academic Excellence: A Case Study," IEEE Security & Privacy, vol. 3. no. 1, pp.62-65, Jan.-Feb. 2005.
D. H. Schunk, Self-efficacy and education and instruction, Plenum, Apr. 1995.
D. J. Bagert, and S. A. Mengel, "Developing and using a web-based project process throughout the software engineering curriculum " The Journal of Systems and Software. vol. 74, no. 2, pp.113-120, Jan. 2005.
V. Venkatesh, and F. D. Davis, "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, vol. 46, no. 2, pp.186-204, Feb. 2000.
B. J. Bank, R. L. Slavings, and B. J. Biddle, "Effects of peer, faculty, and parental influences on students' persis tence" Sociology of education, vol. 63, no. 3, pp.208-225, Jul. 1990.
M. London, "Relationships between career motivation, empowerment and support for career development," Journal of occupational and organizational psychology, vol. 66, pp.55-69, Mar. 1993.
F. Guay, C. Senecal, L. Gauthier and C. Fernet, "Predicting Career in decision: A self-determination theory perspective," Journal of counseling psychology, vol. 50, no. 2, pp.165-177, Apr. 2003.
I. Ajzen, and T. J. Madden, "Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control," Journal of Experimental Social Psychology, vol. 22, pp.453-474, Sep. 1986.
J. L. Swanson, and D. M. Tokar, "Development and initial validation of the Career Barriers Inventory," Journal of Vocational Behavior, vol. 39, pp.344-361, Dec. 1991.
D. A. Luzzo, "Ethnic Differences in College Students' Perceptions of Barriers to Career Development," Journal of Multicultural Counseling and Development, vol. 21, no. 4, pp.211-226, Oct. 1993.
J. L. Swanson, and D. M. Tokar, "College stuents' perceptions of barriers to career development," Journal of Vocational Behavior, vol. 38, pp.92-106, Feb. 1991.
S. Chai, S. Bagchi-Sen, R. Goel, H. R. Rao, S. Upadhyaya "A Framework for Understanding Minority Students' cybersecurity Career Interests." Procedings of the Twelfth Americas conference on Information systems, pp.3426-3432, Aug. 2006.
R. W. Lent, S. D. Brown, R. Talleyrand, McPartland, E.B., Davis, T., Chopra, S.B, Alexander M.S., Suthkaran, V.Chai, C.M..,"Career Choice Barriers, Supports, and Coping Strategies: College Students Experience," Journal of Vocational Behavior, vol. 60, pp.61-72, Feb. 2002.
A. Carey, 2006 Global Information Security Workforce Study, IDC, Oct. 2006.
P. Newton, Computing: an ideal occupation for women? In Women at Work: Psychological and Occupational Perspective, Open University Press, Jan. 1991.
B. Ramussen, and T. Hapnes, "Excluding women from the technologies of the future: a case study of the culture of computer science," Futures, vol. 23, pp.1107-1119, Dec. 1991.
E. H. Shinar, "Sexual stereotypes of occupations" Journal of Vocational Behavior, vol. 7, no. 1, pp.99-111, Aug. 1975.
T. Ruble, R. Cohen, and S. Ruble, "Sex stereotypes occupational barriers for women," The American Behavioral, vol. 27, no. 3, pp.339-356, Jan. 1984.
V. W. Mbarika, C. S. Sankar, and P. K. Raju, "Identification of Factors That Lead to Perceived Learning Improvements for Female Students," IEEE Transactions on Education, vol. 46, no. 1, pp.26-37, Feb. 2003.
C. Ogan, M. Ahuja, J. C. Robinson, Herring, S.C., Gender differences among students in computer science and applied information technology. MIT Press, Feb. 2006.
S. Herring, C. Ogan, M. Ahuja, Robinson, J., Gender and the culture of computing in applied IT education, Information Science Publishing, Mar. 2006.
H. Wold, Introduction to the Second Generation of Multivariate Analysis, Paragon House, Sep. 1989.
J. R. Hackamn, and G. R. Oldham, "Motivation through the design of work: Test of a theory," Organizational Behavior and Human Performance, vol. 16, pp.250-279, Aug. 1976.
J. R. Hackman, and L. W. Porter, "Expectancy theory of predictions of work effectiveness," Organizational Behavior and Human Performance, vol. 3, pp, 417-426, Nov. 1968.
W. W. Chin, B. L. Marcolin, and P. R. Newsted, "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, vol. 14, no. 2, pp.189-217, Jun. 2003.
W. W. Chin, The partial least squares approach for structural equation modeling, Lawrence Erlbaum Associates, Sep. 1998.
D. Barclay, C. Higgins, and R. Thompson, "The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration," Technology Studies,.vol. 2, no. 2, pp.285-324, Summer/Fall 1995.
C. Fornell, and D. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, vol. 18 ,pp.39-50, Feb. 1981.
W. W. Chin, "Issues and Opinion on Structural Equation Modeling," MIS Quarterly, vol. 22, no. 1, pp.vii-xvi, Mar. 1998.
T. Carte, and C. Russell, "In pursuit of moderation: nine common errors and their solutions," MIS Quarterly,.vol. 27, no. 3, pp.479-501, Sep. 2003.
W. W. Chin and A. Gopal, "Adoption intention in GSS: Relative importance of belief," SIGMIS Database, vol. 26, no. 2-3, pp.42-64, May/Aug. 1995.
J. Cohen, Statistical Power Analysis for the Behavioral Sciences, Lawrence Erlbaum, Jan. 1998.
A. E. Yasinsac, R.F. Marks, D.G. Pollitt, M.M. Sommer, P.M., "Computer forensics education," IEEE Security & Privacy, vol. 1, no. 4, pp.15-23, Jul./Aug. 2003.
L. Kvasny, F. C. Payton, V. W. Mbarika., "Gendered Perspectives on the Digital Divide, IT Education, and Workforce Participation in Kenya," IEEE Transaction on Education, vol. 51, no. 2, pp. 256-251, May 2008.
R. Agarwal, and T. W. Ferratt, "Enduring Practices for Managing IT Professionals," Communications of the ACM, vol. 45, no. 9, pp.73-79, Sep. 2002.
H. W. Yoo, and T. S. Kim, Information Security Professionals' Turnover Intention and Its Causes. Journal of the Korea Institute of Information Security and Cryptology, vol. 20, no. 1, pp.95-104, Feb. 2010.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.