최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국전자통신학회 논문지 = The Journal of the Korea Institute of Electronic Communication Sciences, v.19 no.1, 2024년, pp.241 - 248
황인호 (국민대학교 교양대학)
Socially, organizations are required to effectively manage their information resources, both in terms of acquiring information from external sources and safeguarding against potential breaches by insiders. While information security policies and technologies implemented by organizations contribute t...
I. Hwang and O. Cha, "Examining technostress?creators and role stress as potential threats to?employees' information security compliance,"?Computers in Human Behavior, vol. 81, 2018, pp.?282-293.
Fortune Business Insights, "The global cyber?security market size is projected to grow from?$172.32$172.32 billion in 2023 to $424.97 billion in 2030,?at a CAGR of 13.8%," Report, Apr. 2023.
Verizon, "2021 data breach investigations report,"?Report, Dec. 2021.
Y. Chen, K. Ramamurthy, and K. W. Wen,?"Organizations' information security policy?compliance: Stick or carrot approach?," J. of?Management Information Systems, vol. 29, no. 3,?2012, pp. 157-188.
Z. Tang, A. S. Miller, Z. Zhou, and M.?Warkentin, "Does government social media?promote users' information security behavior?towards COVID-19 scams? Cultivation effects?and protective motivations," Government?Information Quarterly, vol. 38, no. 2, 2021, pp.?101572.
P. Ifinedo, "Exploring personal and environmental?factors that can reduce nonmalicious information?security violations," Information Systems?Management, vol. 40, no. 4, 2023, pp. 1-21.
M. Tarafdar, Q. Tu, B. S. Ragu-Nathan, and T. S.?Ragu-Nathan, "The impact of technostress on?role stress and productivity," J. of Management Information Systems, vol. 24, no. 1, 2007, pp.?301-328.
Z. Adahman, Z. W. Malik and Z. Anwar, "An?analysis of zero-trust architecture and its?cost-effectiveness for organizational security,"?Computers & Security, vol. 122, 2022, pp. 102911.
Korea Information Security Industry Association,?"2021 survey on information security," Report,?Jan. 2022.
I. Hwang, "The influence of competitive?psychological climate and IS related anxiety: The?role of IS related value dissimilarity," J. of the?Korea Institute of Electronic Communication?Sciences, vol. 18, no. 4, 2023, pp. 649-660.
M. Ma and R. Agarwal, "Through a glass?darkly: Information technology design, identity?verification, and knowledge contribution in?online communities," Information Systems?Research, vol. 18, no. 1, 2007, pp. 42-67.
S. M. Farmer, P. Tierney, and K. Kung-McIntyre,?"Employee creativity in Taiwan: An application?of role identity theory," Academy of Management?J., vol. 46, no. 5, 2003, pp. 618-630.
I. Hwang, "Reinforcement of IS voice behavior?within the organization: A perspective on?mitigating role stress through organization?justice and individual social-identity," J. of the?Korea Institute of Electronic Communication?Sciences, vol. 17, no. 4, 2022, pp. 649-662.
O. Ogbanufe, "Enhancing end-user roles in?information security: Exploring the setting,?situation, and identity," Computers & Security,?vol. 108, 2021, pp. 102340.
P. A. Pavlou, H. Liang, and Y. Xue,?"Understanding and mitigating uncertainty in?online exchange relationships: A principal-agent?perspective," MIS Quarterly, vol. 31, no. 1, 2007,?pp. 105-136.
I. Hwang, "The influence on the information?security techno-stress on security policy?resistance through strain: Focusing on the?moderation of task technology fit," J. of the?Korea Institute of Electronic Communication?Sciences, vol. 16, no. 5, 2021, pp. 931-939.
A. Vedadi, M. Warkentin, and A. Dennis, "Herd?behavior in information security?decision-making," Information & Management, vol.?58, no. 8, 2021, pp. 103526.
H. Chen, M. Liu, and T. Lyu, "Understanding?employees' information security-related stress?and policy compliance intention: The roles of?information security fatigue and psychological?capital," Information and Computer Security, vol.?30, no. 5, 2022, pp. 751-770.
I. Jo and J. Jo, "Differentiation of uncertainty?and ambiguity in communication within the?organization: On Antecedent Variables and?Influences of Uncertainty and Ambiguity," J. of?Communication Research, vol. 49, no. 1, 2012, pp.?220-258.
J. D'Arcy and P. L. Teh, "Predicting employee?information security policy compliance on a?daily basis: The interplay of security-related?stress, emotions, and neutralization," Information?& Management, vol. 56, no. 7, 2019, pp. 103151.
J. D'Arcy, T. Herath, and M. K. Shoss,?"Understanding employee responses to stressful?information security requirements: A coping?perspective," J. of Management Information?Systems, vol. 31, no. 2, 2014, pp. 285-318.
J. C. Nunnally, Psychometric theory (2nd ed.). New?York: McGraw-Hill, 1978.
C. Fornell and D. F. Larcker, "Evaluating?structural equation models with unobservable?variables and measurement error," J. of Marketing?Research, vol. 18, no. 1, 1981, pp. 39-50.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.