최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.33 no.5, 2023년, pp.813 - 826
오현우 (금융결제원) , 김범수 (연세대학교) , 박재영 (NH농협금융지주 NH금융연구소)
Organization members often use the Internet for non-work purposes during work hours, which is called cyberloafing. Certain types of cyberloafing (e.g., webhard, adult, and gambling sites access) can be a major cause of malware infection, which can ultimately generate significant damages to organizat...
V. K. Lim, "The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice," Journal of organizational behavior, vol. 23, no. 5, pp. 675-694, June 2002.?
B. Liberman, G. Seidman, K. Y. Mckenna and L. E. Buffardi, "Employee job attitudes and organizational characteristics as predictors of cyberloafing," Computers in Human behavior, vol. 27, no. 6, pp. 2192-2199, Nov. 2011.?
G. W. Bock and S. L. Ho, "Non-work related computing (NWRC)," Communications of the ACM, vol. 52, no. 4, pp. 124-128, April 2009.?
A. M. Bossler and T. J. Holt, "On-line activities, guardianship, and malware infection: An examination of routine activities theory," International Journal of Cyber Criminology, vol. 3, no. 1, pp. 400-420, January-June 2009.?
K. S. Choi, "Computer crime victimization and integrated theory: An empirical assessment," International Journal of Cyber Criminology, vol. 2, no. 1, pp. 308-333, January-June 2008.?
C. D. Marcum, "Identifying potential factors of adolescent online victimization for high school seniors," International Journal of Cyber Criminology, vol. 2, no. 2, pp. 346-367, July - December 2008.?
T. J. Holt, J. van Wilsem, S. van de Weijer and R. Leukfeldt, "Testing an integrated self-control and routine activities framework to examine malware infection victimization," Social Science Computer Review, vol. 38, no. 2, pp. 187-206, April 2020.?
E. R. Leukfeldt, "Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization," Cyberpsychology, Behavior, and Social Networking, vol. 17, no. 8, pp. 551-555, July 2014.?
E. R. Leukfeldt, E. R. Kleemans and W. P. Stol, "A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists," Crime, Law and Social Change, vol. 67, no.1, pp. 21-37, Feb. 2017.?
L. Hadlington and K. Parsons, "Can cyberloafing and Internet addiction affect organizational information security?," Cyberpsychology, Behavior, and Social Networking, vol. 20, no. 9, pp. 567-571, Sep. 2017.?
K. M. Eisenhardt, "Agency theory: An assessment and review," Academy of management review, vol. 14, no. 1, pp. 57-74, Jan. 1989.?
J. Glassman, M. Prosch and B. B.Shao. "To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure," Information & Management, vol. 52, no. 2, pp. 170-182, March 2015.?
J. Chalykoff and T. A. Kochan, "Computer-aided monitoring: Its influence on employee job satisfaction and turnover," Personnel Psychology, vol. 42, no. 4, pp. 807-834, Dec. 1989.?
A. Urbaczewski and L. M. Jessup, "Does electronic monitoring of employee internet usage work?," Communications of the ACM, vol. 45, no. 1, pp. 80-83, Jan. 2002.?
G. S. Alder and M. L. Ambrose, "Towards understanding fairness judgments associated with computer performance monitoring: An integration of the feedback, justice, and monitoring research," Human Resource Management Review, vol. 15, no. 1, pp. 43-67, March 2005.?
J. Vitak, J. Crouse and R. LaRose, "Personal Internet use at work: Understanding cyberslacking," Computers in Human Behavior, vol. 27, no. 5, pp. 1751-1759, Sep. 2011.?
R. K. Garrett and J. N. Danziger, "On cyberslacking: Workplace status and personal Internet use at work," CyberPsychology & Behavior, vol. 11, no. 3, pp. 287-292, June 2008.?
P. Z. M. De Lara, D. V. Tacoronte, and J. M. T. Ding, "Do current anti- cyberloafing disciplinary practices have a replica in research findings?," Internet Research, vol. 16, no. 4, pp. 450-467, Aug. 2006.?
J. Wang, J. Tian and Z. Shen, "The effects and moderators of cyber-loafing controls: an empirical study of Chinese public servants," Information Technology and Management, vol. 14, no. 4, pp. 269-282, June 2013.?
D. Malachowski, "Wasted time at work costing companies billions," San Francisco Chronicle, vol. 11, no. 3, Nov. 2005.?
A. L. Blanchard and C. A. Henle, "Correlates of different forms of cyberloafing: The role of norms and external locus of control," Computers in human behavior, vol. 24, no. 3, pp. 1067-1084, May 2008.?
K. Askew, J. E. Buckner, M. U. Taing, A. Ilie, J. A. Bauer and M. D. Coovert, "Explaining cyberloafing: The role of the theory of planned behavior," Computers in Human Behavior, vol. 36, pp. 510-519, July 2014.?
L. Cheng, W. Li, Q. Zhai and R. Smyth, "Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory," Computers in Human Behavior, vol. 38, pp. 220-228, Sep. 2014.?
J. A. Conger and R. N. Kanungo, "The empowerment process: Integrating theory and practice," Academy of management review, vol. 13, no. 3, pp. 471-482, July 1988.?
J. C. Ugrin and J. M. Pearson, "Exploring Internet abuse in the workplace: How can we maximize deterrence efforts?," Review of Business, vol. 28, no. 2, pp. 29-41, Winter 2008.?
C. A. Henle, G. Kohut and R. Booth, "Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory," Computers in Human Behavior, vol. 25, no. 4, pp. 902-910, July 2009.?
S. Furnell, "Cybercrime: vandalizing the information society," International conference on web engineering, Berlin, Heidelberg: Springer Berlin Heidelberg, June 2003.?
M. Dodel and G. Mesch, "Cyber-victimization preventive behavior: A health belief model approach," Computers in Human behavior, vol. 68, pp. 359-367, March 2017.?
T. J. Holt and A. M. Bossler, "Examining the relationship between routine activities and malware infection indicators," Journal of Contemporary Criminal Justice, vol. 29, no. 4, pp. 420-436, Nov. 2013.?
T. J. Holt and A. M. Bossler, Cybercrime in progress: Theory and prevention of technology-enabled offenses, 1th Ed., Routledge, Dec. 2015.?
E. Chien, "Malicious threats of peer-to-peer networking," Symantec White Paper, 2003.?
M. Yar, "The Novelty of 'Cybercrime' An Assessment in Light of Routine Activity Theory," European Journal of Criminology, vol. 2, no. 4, pp. 407-427, Oct. 2005.?
T. J. Holt and H. Copes, "Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates," Deviant Behavior, vol. 31, no. 7, 625-654, Aug. 2010.?
J. M. Hagen, E. Albrechtsen and J. Hovden, "Implementation and effectiveness of organizational information security measures," Information Management & Computer Security, vol. 16, no. 4, pp. 377-397, Oct. 2008.?
J. L. Spears and H. Barki, "User participation in information systems security risk management," MIS quarterly, vol. 34, no. 3, pp. 503-522, Sep. 2010.?
M. A. Sasse, Usability and trust in information systems. Edward Elgar, 2005.?
E. R. Leukfeldt and M. Yar, "Applying routine activity theory to cybercrime: A theoretical and empirical analysis," Deviant Behavior, vol. 37, no. 3, pp. 263-280, March 2016.?
S. Hinduja and J. W. Patchin, "Cyberbullying: An exploratory analysis of factors related to offending and victimization," Deviant behavior, vol. 29, no. 2, pp. 129-156, Feb. 2008.?
R. W. Taylor, E. J. Fritsch, J. Liederbach, M. R. Saylor and W. L. Tafoya, Cyber crime and cyber terrorism. New York, NY: Pearson, 2019.?
Bo-ra Kim, Jong-Won Lee and Beom-Soo Kim, "Effect of Information Security Training and Services on Employees' Compliance to Security Policies," Informatization Policy, 25(1), pp. 99-114, March 2018?
L. Cheng, Y. Li, W. Li, E. Holmand Q. Zhai, "Understanding the violation of IS security policy in organizations:An integrated model based on social control and deterrence theory," Computers & Security, vol. 39, pp. 447-459, Nov. 2013.?
T. Gundu and S. V. Flowerday, "Ignorance to awareness: Towards an information security awareness process," SAIEE Africa Research Journal, vol. 104, no. 2, pp. 69-79, June 2013.?
Jeong-Ha Lee and Sang-Yong Tom Lee, "A Study on the Factors for Violation of Information Security Policy in Financial Companies: Moderating Effects of Perceived Customer Information Sensitivity," Journal of Information Technology Applications and Management, 22(4), pp. 225-251, Dec. 2015?
J. D'Arcy, A. Hovav and D. Galletta, "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach," Information systems research, vol. 20, no. 1, pp. 79-98, March 2009.?
O. A. Alnuaimi, L. P. Robert and L. M. Maruping, "Team size, dispersion, and social loafing in technology-supported teams: A perspective on the theory of moral disengagement," Journal of Management Information Systems, vol. 27, no. 1, pp. 203-230, Summer 2010.?
P. M. Muchinsky and M. L. Tuttle, "Employee turnover: An empirical and methodological assessment," Journal of vocational Behavior, vol. 14, no. 1, pp. 43-77, Feb. 1979.?
Hyun Kang, "Effects of Job Satisfaction and Organizational Commitment on Security Policy Compliance Motivation in Relation to Organizational Culture," Korean Journal of Industry Security, 5(2), pp. 167-199, Dec. 2015?
A. C. Johnston, M.. Warkentin and M. Siponen, "An enhanced fear appeal rhetorical framework," MIS quarterly, vol. 39, no. 1, pp. 113-134, March 2015.?
A. Sheikh, M. S. Atashgah and M. Adibzadegan, "The antecedents of cyberloafing: A case study in an Iranian copper industry," Computers in Human Behavior, vol. 51, pp. 172-179, Oct. 2015.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.