최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국산학기술학회논문지 = Journal of the Korea Academia-Industrial cooperation Society, v.22 no.1, 2021년, pp.595 - 602
허성호 (중앙대학교 심리학과) , 황인호 (국민대학교 교양대학)
This study evaluates the impact of an information security policy sanction, a perceived threat, and the perception of the information security climate on a compliance behavioral intention. The research method was structured with a cross-sectional study design for the prospect and goal orientation. T...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
L. Tredinnick, Digital information culture: the individual and society in the digital age, p.205, Amsterdam : Elsevier, 2008, pp.57-79.
A. AlHogail, "Design and validation of information security culture framework", Computers in human behavior, Vol.49, pp.567-7575, Aug. 2015. DOI : https://doi.org/10.1016/j.chb.2015.03.054
B. Khan, K. S. Alghathbar, S. I. Nabi & M. K. Khan, "Effectiveness of information security awareness methods based on psychological theories", African Journal of Business Management, Vol.5, No.26, pp.10862-10868, 2011.
R. W. Lee, I. H. Hwang & S. H. Hu, "Exploratory research of information security strategy focused on human factors", The Journal of General Education, Vol.6, No.2, pp.103-124, 2017.
M. L. Foulds, "Changes in locus of internal-external control: A growth group experience", Comparative Group Studies, Vol.2, No.3, pp.293-300, 1971. DOI : https://doi.org/10.1177/104649647100200303
S. A. Stumpf & M. London, "Management promotions: Individual and organizational factors influencing the decision process", Academy of Management Review, Vol.6, No.4, pp.539-549, 1981.
D. Kahneman & A. Tversky, Prospect theory: An analysis of decision under risk, Handbook, World Scientific, Singapore, pp.99-127.
H. Shefrin & M. Statman, "The contributions of Daniel kahneman and Amos tversky", The Journal of Behavioral Finance, Vol.4, No.2, pp.54-58, 2003. DOI : https://doi.org/10.1207/S15427579JPFM0402_01
D. VandeWalle, "Development and validation of a work domain goal orientation instrument", Educational and psychological measurement, Vol.57, No.6, pp.995-1015, 1997. DOI : https://doi.org/10.1177/0013164497057006009
R. R. Blake & J. S. Mouton, "Management by Grid® principles or situationalism: Which?", Group and Organization Studies, Vol.6, No.4, pp.439-455, 1981.
B. Bulgurcu, H. Cavusoglu & I. Benbasat, "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness", MIS quarterly, Vol.34, No.3, pp.523-548, 2010.
M. Chan, I. Woon & A. Kankanhalli, "Perceptions of information security in the workplace: linking information security climate to compliant behavior", Journal of information privacy and security, Vol.1, No.3, pp.18-41, 2005.
M. Siponen, M. A. Mahmood & S. Pahnila, "Employees' adherence to information security policies: An exploratory field study", Information and Management, 51, No.2, pp.217-224, 2014. DOI : https://doi.org/10.1016/j.im.2013.08.006
P. Ifinedo, "Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition", Information and Management, Vol.51, No.1, pp.69-79, 2014. DOI : https://doi.org/10.1016/j.im.2013.10.001
P. Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory", Computers and Security, Vol.31, No.1, pp.83-95, 2012. DOI : https://doi.org/10.1016/j.cose.2011.10.007
Y. Zhao & M. Zhao, "WeChat Users' Information Protection Behavior Based on Prospect Theory", International Journal of Information and Education Technology, Vol.9, No.6, pp.390-395, 2019. DOI : https://doi.org/10.18178/ijiet.2019.9.6.1233
T. Sommestad, H. Karlzen & J. Hallberg, "The theory of planned behavior and information security policy compliance", Journal of Computer Information Systems, Vol.59, No.4, pp.344-353, 2019. DOI : https://doi.org/10.1080/08874417.2017.1368421
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.