최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털융복합연구 = Journal of digital convergence, v.19 no.2, 2021년, pp.169 - 174
While the importance of information security policies is heightened, numerous empirical studies have been conducted to investigate the factors that influence employee's willingness to comply organizational security policies. Some of those studies, however, were not consistent and even contradictory ...
Q. Hu, Z. Xu, T. Dinev & H. Ling. (2011). Does deterrence work in reducing information security policy abuse by employees?. Communications of the ACM, 54(6), 54-60. DOI: 10.1145/1953122.1953142
W. A. Cram, J. D'Arcy & J. G. Proudfoot. (2019). Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Quarterly, 43(2), 525-554. DOI: 10.24251/hicss.2017.489
S. Trang & B. Brendel. (2019). A meta-analysis of deterrence theory in information security policy compliance research. Information Systems Frontiers, 21(6), 1265-1284. DOI: 10.1108/ICS-09-2016-0073.
K. M. Kuo, P. C. Talley & C. H. Huang. (2020). A Meta-analysis of the Deterrence Theory in Security-compliant and Security-risk Behaviors. Computers & Security, 101928. DOI: 10.1016/j.cose.2020.101928
M. W. L. Cheung. & W. Chan. (2005). Meta-Analytic Structural Equation Modeling: A Two-Stage Approach. Psychological Methods, 10(1), 40-64. DOI: 10.1037/1082-989x.10.1.40
I. Onwudiwe, J. Odo & E. Onyeozili. (2005). Deterrence Theory. In: Bosworth, M. (Ed.), Encyclopedia of Prisons & Correctional Facilities. Sage Publications, Inc, Thousand Oaks, CA, 234-238. DOI: 10.4135/9781412952514
D. Shin. (2009). The Effect of Punishment: A Critique of Deterrence Theory. Korean Journal of Criminology, 21(2), 191-216. UCI: I410-ECN-0102-2012-320-002372416
J. D'Arcy & T. Herath. (2011). A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems, 20(6), 643-658. DOI: 10.1057/ejis.2011.23
J. Abed & H. R. Weistroffer. (2016). Understanding deterrence theory in security compliance behavior: a quantitative meta-analysis approach. SAIS 2016.
K. H. Guo. (2013). Security-related behavior in using information systems in the workplace: a review and synthesis. Computers & Security, 32, 242-251. DOI: 10.1016/j.cose.2012.10.003
R. Rosenthal. (1979). The File Drawer Problem and Tolerance for Null Results. Psychological Bulletin, 86(3), 638-641. DOI: 10.1037/0033-2909.86.3.638
K. H. Guo & Y. Yuan. (2012). The Effects of Multilevel Sanctions on Information Security Violations. Information & Management, 49(6), 320-326. DOI: 10.1016/j.im.2012.08.001
F. J. Haeussinger & J. J. Kranz. (2013). Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant. 34th International Conference on Information Systems, Milan, Italy.
B. T. Hanus. (2014). The Impact of Information Security Awareness of Compliance with Information Security Policies: A Phishing Perspective. unpublished doctoral dissertation, University of North Texas.
S. J. Harrington. (1996). The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions. MIS Quarterly, 20(3), 257-278. DOI: 10.2307/249656
S. Kinnunen. (2016). Exploring Determinants of Different Information Security Behaviors. unpublished doctoral dissertation, University of Jyvaskyla.
M. Siponen & A. Vance. (2010). Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations. MIS Quarterly, 34(3), 487-502. DOI: 10.2307/25750688
H. Li, J. Zhang, & R. Sarathy. (2010). Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory. Decision Support Systems, 48(4), 635-645. DOI: 10.1016/j.dss.2009.12.005
W. Li & L. Cheng. (2013). Effects of Neutralization Techniques and Rational Choice Theory on Internet Abuse in the Workplace. Pacific Asia Conference on Information Systems, Jeju Island, South Korea.
W. Arunothong. (2014). Three Research Essays on Propensity to Disclose Medical Information through Formal and Social Information Technologies. unpublished doctoral dissertation, University of Wisconsin-Milwaukee.
A. Hovav & J. D'Arcy. (2012). Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the US and South Korea. Information & Management, 49(2), 99-110. DOI: 10.1016/j.im.2011.12.005
X. Chen, D. Wu, L. Chen & J. K. L. Teng. (2018). Sanction severity and employees' information security policy compliance: investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049-1060. DOI: 10.1016/j.im.2018.05.011.
M. I. Merhi & P. Ahluwalia. (2019). Examining the impact of deterrence factors and norms on resistance to Information Systems Security. Computers in Human Behavior. 92, 37-46. DOI: 10.1016/j.chb.2018.10.031
M. Rajab & A. Eydgahi. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security. 80, 211-223. DOI: 10.1016/j.cose.2018.09.016
N. S. Safa, C. Maple, S. Furnell, M. A. Azad, C. Perera, M. Dabbagh & M. Sookhak. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems. 97, 587-597. DOI: 10.1016/j.future.2019.03.024
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.