최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보화 정책 = Informatization policy, v.28 no.1, 2021년, pp.64 - 76
장철호 (Personal Data Strategy Team, Korea Internet & Security Agency) , 차윤호 (Personal Data Strategy Team, Korea Internet & Security Agency)
The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the prote...
Bae, J. (2016). "An empirical study on the effect of leakage threat of personal information on protective behavior intention in big data environment : Based on health psychology theory and protection motivation theroy." The e-business studies, 17(3), 191-208.
Bandura, A. (2001). "Social Cognitive theory : An Agentive Perspective" Annual Review of Psychology, 52, 1-26.
Bulgurcu, Burcu Cavusoglu, Hasan Benbasat & Izak (2010). "Information Security Policy Compliance : An Empirical Study of Rationality-Based Beliefs and Information Security Awareness." MIS Quarterly, 34(3), 523-A7.
Crossler, R. & Blanger, F. (2014). "An extended perspective on individual security behavior : Protection motivation theory and a unified security practices(USP) instrument." ACM SIGMIS Databases, 45(4), 51-71.
Floyd, D. L., Prentice-Dunn,S. & Rogers, R.W. (2000). "A meta analysis of research on protection motivation theory." Journal of Applied Social Psychology, 30, 407-429.
Gurung, Anil, Xin Luo & Qinyu Liao (2009). "Consumer motivations in taking action against spyware : an empirical investigation." Information Management & Computer Security, 17(3), 276-289.
Ifinedo, P. (2012). "Understanding information systems security policy compliance : An integration of the theory of planned behavior and the protection motivation theory." Computers & Security, 31(1), 83-95.
Kim, M. & Kim, S. (2014). "A study on Intention to Accept the Right to be Forgotten Associated with Exposure of Personal Data." Korean Journal of Journalism & Communication Studies, 58(2), 307-336.
Kim, S & Lee, K. (2011). An empirical study on perception factors influencing information security behavior. Paper prsented at the Korea IT service society, Nov.30.
Kim, S. & Park, H. (2013). "An Analysis of Influence Factor on Privacy Protection Awareness and Protection Behavior and moderating Effect of Privacy Invasion Experience." Internet e-commerce Studies, 13(4), 79-105.
Kim, J. & Kim, S. (2013). "Privacy Behavioral Intention in Online Environment : Based on Protection Motivation Theory." Informatization policy, 20(3), 63-85.
Lee, K., Han, K. & Jung, J. (2016). "A study of influencing factors for compliance intention of personal information protection policy of public institution employees." Entrue Journal of Information Technology, 15(1), 75-94.
Ministry of the Interior and Safety & Personal Information Protection Commission (2020). 2019 Survey on the Personal information Protection. Seoul
Park, J. (2019). "A study on the influence of the perception of personal information security of youth on security attitude and security behavior." Journal of the Korea industrial information systems society, 24(4), 79-98.
Rogers, R. W. (1975). "A protection motivation theory of fear appeals and attitude change." Journal of Psychology, 91(1), 93-114.
Rogers, R. W. (1983). "Cognitive and physiological processes in fear appeals and attitude change : A revised theory of protection motivation." Social Psychophysiology : A sourcebook. 153-177. New York : Guilford Press.
Wooldridge, J. (2010). Econometric analysis of cross section and panel data. MIT press.
Workman, M. & Bommer, W. H. & Straub, D. (2009). "The Amplification Effects of Procedural Justice on a Threat Control Model of Information Systems Security Behaviours." Behaviour & Information Technology, 28(6), 563-575.
Youn, Seounmi (2005). "Teenagers' perceptions of online privacy and coping behaviors : a risk-benefit appraisal approach." Journal of Broadcasting & Electronic Media, 49(1), 86-110.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.