최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털융복합연구 = Journal of digital convergence, v.19 no.1, 2021년, pp.89 - 97
황인호 (국민대학교 교양대학) , 허성호 (중앙대학교 심리학과)
The purpose of this study is to verify the influence of the cognitive process related to the organizational citizenship behavior. The research method consisted of the cross-design of the prospect dimension and goal orientation dimension, and information security factors consisted of distributive jus...
Grand View Research. (2020). Cyber Security Market Size, Share & Trends Analysis Report By Component, By Security Type, By Solution, By Service, By Deployment, By Organization, By Application, By Region, And Segment Forecasts, 2020 - 2027.
Verizon. (2019). 2019 data breach investigations report.
B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness, MIS Quarterly, 34(3), 523-548.
A. C. Johnston & M. Warkentin (2010). Fear Appeals and Information Security Behaviors: An Empirical Study", MIS Quarterly, 34(3), 549-566, 2010. DOI : 10.2307/25750691
M. L. Merhi & P. Ahluwalia, P. (2019). Examining the Impact of Deterrence Factors and Norms on Resistance to Information Systems Security. Computers in Human Behavior, 92, 37-46. DOI : 10.1016/j.chb.2018.10.031.
H. C. Pham, L. Brennan & S. Furnell. (2019). Information Security Burnout: Identification of Sources and Mitigating Factors from Security Demands and Resources. Journal of Information Security and Applications, 46, 96-107. DOI :10.1016/j.jisa.2019.03.012.
R. West. (2008). The Psychology of Security. Communications of the ACM, 51(4), 34-40. DOI : 10.1145/1330311.1330320.
D. Kahneman & A. Tversky. (2013). Prospect Theory: An Analysis of Decision under Risk. In Handbook of the fundamentals of financial decision making: Part I (pp. 99-127).
I. Hwang, D. Kim, T. Kim & S. Kim. (2017). Why not Comply with Information Security? An Empirical Approach for the Causes of Non-Compliance. Online Information Review, 41(1), 1-17. DOI : 10.1108/OIR-11-2015-0358
D. VandeWalle. (1997). Development and Validation of a Work Domain Goal Orientation Instrument. Educational and Psychological Measurement, 57(6), 995-1015. DOI : 10.1177/0013164497057006009.
B. M. Dykman. (1998). Integrating Cognitive and Motivational Factors in Depression: Initial Tests of a Goal-Orientation Approach. Journal of Personality and Social Psychology, 74(1), 139-158. DOI : 10.1037/0022-3514.74.1.139
Van Muijen, J. J. (1999). Organizational culture: The focus questionnaire. European Journal of work and organizational psychology, 8(4), 551-568. https://doi.org/10.1080/135943299398168
M. A. Abernethy & J. U. Stoelwinder. (1991). Budget Use, Task Uncertainty, System Goal Orientation and Subunit Performance: A Test of the 'Fit' Hypothesis in Not-for-Profit Hospitals. Accounting, Organizations and Society, 16(2), 105-120. DOI ; 10.1016/0361-3682(91)90008-3.
Q. Hu, T. Dinev, P. Hart & D. Cooke. (2012). Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture. Decision Sciences, 43(4), 615-660. DOI : 10.1111/j.1540-5915.2012.00361.x.
P. M. Muchinsky. (2006). Psychology Applied to Work: An Introduction to Industrial and Organizational Psychology. Cengage Learning.
T. A. Judge & J. A. Colquitt. (2004). Organizational Justice and Stress: The Mediating Role of Work-Family Conflict. Journal of Applied Psychology, 89(3), 395-404. DOI : 10.1037/0021-9010.89.3.395.
J. W. Thibaut & L. Walker. (1975). Procedural Justice: A Psychological Analysis. Hillsdale, NJ: Lawrence Erlbaum Associates.
J. A. Colquitt. (2001). On the Dimensionality of Organizational Justice: A Construct Validation of a Measure. Journal of Applied Psychology, 86(3), 386-400.
Y. Xue, H. Liang & L. Wu. (2011). Punishment, Justice, and Compliance in Mandatory IT Settings. Information Systems Research, 22(2), 400-414. DOI : 10.1287/isre.1090.0266.
P. Ifinedo. (2012). Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007.
T. Sommestad, H. Karlzen & J. Hallberg. (2015). The Sufficiency of the Theory of Planned Behavior for Explaining Information Security Policy Compliance. Information & Computer Security. 23(2), 200-217. DOI : 10.1108/ICS-04-2014-0025.
M. Siponen, M. A. Mahmood & S. Pahnila. (2014). Employees' Adherence to Information Security Policies: An Exploratory Field Study. Information & management, 51(2), 217-224. DOI : 10.1016/j.im.2013.08.006.
L. J. Williams & S. E. Anderson. (1991). Job Satisfaction and Organizational Commitment as Predictors of Organizational Citizenship and In-role Behaviors. Journal of Management, 17(3), 601-617. DOI : 10.1177/014920639101700305
B. B. Vilela, J. A. V. Gonzalez & P. F. Ferrin. (2008). Person-Organization Fit, OCB and Performance Appraisal: Evidence from Matched Supervisor- Salesperson Data Set in a Spanish Context. Industrial Marketing Management, 37(8), 1005-1019. DOI : 10.1016/j.indmarman.2007.11.004.
K. Hwang & M. Choi. (2017). Effects of InnovationSupportive Culture and Organizational Citizenship Behavior on E-government Information System Security Stemming from Mimetic Isomorphism. Government Information Quarterly, 34(2), 183-198. DOI : 10.1016/j.giq.2017.02.001.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.