참고문헌
- 김정덕, 홍기향, "정보보호 거버넌스 이슈 및 연구 과제," 정보보호학회지, 제17권 제4호, pp. 18-25, 2007.
- 최훈, 김진우, "불확실성 회피성향이 수용 후 행동에 미치는 영향: 모바일 인터넷 서비스를 중심으로," 경영정보학연구, 제6권 제3호, pp. 95-116, 2006.
- Baggett, W.O., "Creating a culture of security", The Infernal Auditor, Vol. 60, No.3, pp. 37-41, 2001
- Chau, P.Y.K. and Hu, P.J.H,; "Information Technology Acceptance by Individual Professionals: A Model Comparison Approach," Decision Sciences, Vol. 32, No. 4, pp. 699-719, 2001. https://doi.org/10.1111/j.1540-5915.2001.tb00978.x
- COBIT security baseline- An information security survival kit. (2004). Rolling Meadows, USA: IT Governance Institute.
- Da Veiga, A. and Eloff J. H. P., "An Information Security Governance framework," Information Systems Management, Vol. 24, pp. 361-372, 2007. https://doi.org/10.1080/10580530701586136
- Da Veiga, A., Martins, N., and Eloff J. H. P., "Information security culture-validation of an assessment instrument," Southern African Business Review, Vol. 11, No. 1, pp. 147-66, 2007.
- Davis, F.D., "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly. Vol. 13. No.3, pp. 319-340, 1989. https://doi.org/10.2307/249008
- Davis, F.D., Bagoui. R.P., and Warshaw, P.R., "Extrinsic and Intrinsic Motivation to Use Computers in the Workplace," Journal of Applied Social Psychology. Vol. 11, No. 14, pp. 1111-1132, 1992.
- Deci, E.L, Intrinsic Motivation, Plenum Press, New York. 1975.
- Donaldson, W. H., U.S. capital markets in the post-Sarbanes-Oxley world: Why our markets should matter to foreign issuers. U.S. Securities and Exchange Commission. London School of Economics and Political Science, 2005.
- Duffy, J., IT Governance and business value part I: IT Governance- An issue of critical importance. IDC document #27291, 2002.
- Fishbein M. and Ajzen, I., Belief, Altitude, Intentions and Behavior: An Introduction to Theory and Research. Addison-Wesley. 1975.
- Guldentops, E., IT Governance: Pan and parcel of corporate governance, CIO Summit. European Financial Management & Marketing(EFMA) Conference, Brussels, 2003.
- Hellriegel, D., Slocum, J. W. (Jr), & Woodman, R. W., Organizational Behavior, (8th ed.). Cincinnati, OH: South-Western College. 1998.
- ISO/IEC 17799 (BS 7799-1), Information technology. Security techniques. Code of practice for information security management. Britain. 2005.
- IT Governance Institute, Board briefing on IT Governance (www.itgi.org). 2001.
- IT Governance Institute, CobiT Mapping: Overview of Internationanal Guidance. 2004.
- Johnston, Allen C. and Hale, Ron, "Improved Security through Information Security Governance," Communications of the ACM, Vol. 51 Issue 1, pp. 126-129, Jan. 2009.
- King Report. (2001). The King Report of corporate governance for South Africa, 2001 (Retrieved 12 January 2006 from http://www.iodsaco.za/downloads/King_Report_CORom_Brochure.pdf)
- Lee, I., Kim, J.S., and Kim, J.W., "Use Contexts for the Mobile Data: A Longitudinal Study Monitoring Actual Use of Mobile Data Services," International Journal of Human Computer Interaction, Vol. 18, No.3, pp. 269-292, 2005. https://doi.org/10.1207/s15327590ijhc1803_2
- Lufiman, J. and T. Brier, "Achieving and Sustaining Busiess - IT Alignment," California Management Review. Vol. 42, No. 1, pp. 109-122, 1999. https://doi.org/10.2307/41166021
- Martins, N., "A model for managing trust," International Journal of Manpower. Vol. 23, No.8, pp. 754-69, 2002. https://doi.org/10.1108/01437720210453984
- Mantins, A. & Eloff, J. H. P., Information Security Culture. In Security in the information society, IFIP/SEC2002. Boston: Kluwer Academic Publishers, 2002.
- Mathieson, K., "Predicting User Intention: Comparing the Technology Acceptance Model with Theory, of Planned Behavior," Information Systems Research, Vol. 1, No.3, pp. 173-191, 1991. https://doi.org/10.1111/j.1365-2575.1991.tb00035.x
- McCarthy, M. P. & Campbell, S., Security Transformation, McGraw-Hill: New York, 2001.
- Peterson, R. R., Information stratgeies and tactics for Information Technology governance, Hershey. PA: Idea Group Publishing, 2003.
- Posthumus, S. & von Solms, R., "A framework for the governance of information security," Computers and Security, Vol. 13, pp. 638-646, 2004.
- Posthumus, S. & Von Solms, R., "IT Governance," Computer Fraud and Security, Vol. 6, pp. 11-17, 2005.
- Price WaterhouseCoopers. Information Security Breaches Survey, 2004. (Retrieved 12 March 2005 from http://www.dti.gov.uk/industry_files/pdf/isbs_2004v3.pdf)
- Richards, N., "The critical importance of information security to financial institutions," Business Credit, Vol. 104. NO.9. pp. 35-36. 2002.
- Robbins. S., Organizational Behaviour, (9th ed.), New, Jersey: Prentice Hall, 2001.
- Ross. B., "New directives beef lip trust in e-commerce," Computer Weekly News. Vol. 172, 2000.
- Ryan R.M. and Deci, E.L., "Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions." Contemporary Educational Psychology, Vol. 25, pp. 54-67, 2000. https://doi.org/10.1006/ceps.1999.1020
- Sambamurthy, V. and R.W. Zmud, "Arrangements for Information Technology Governance: A Theory of Multiple Contingencies," MIS Quarterly. Vol. 23, No.2, pp. 261-290, 1999. https://doi.org/10.2307/249754
- Taylor. S. and Todd, P., "Understanding Information Technology Use: A Test of Competing Models," Information System Research, Vol. 6, NO. 2, pp. 144-176, 1995. https://doi.org/10.1287/isre.6.2.144
- Trelic, S., "Can you keep a secret?" Intelligent Enterprise. Vol. 4, No. 1. Jan. 2001.
- Tudor, J. K., Information Security Architecture-An integrated approach to security in an organization. Boca Raton. FL: Auerbach, 2000.
- Van Grembergen, W., "Introduction to the Minitrack: IT governance and the mechanisms," Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS). IEEE., 2002.
- Venkatesh, V. and Brown, S.A., "A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges," MIS Quarterly, Vol. 25, No. 1, pp. 71-102, 2001. https://doi.org/10.2307/3250959
- Venkatesh, V. and Davis, F.D., "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, Vol. 46, No.2. pp. 186-204, 2000. https://doi.org/10.1287/mnsc.46.2.186.11926
- Venkatesh, V. Moms, M.G., Davis, G.B, and Davis, F.D., "'User Acceptance of Information Technology toward a Unified View," MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003. https://doi.org/10.2307/30036540
- Von Solms, B., "Information security"'1he third wave?'" Computers and Security, Vol. 19, No.7, pp. 615-620, Nov. 2000. https://doi.org/10.1016/S0167-4048(00)07021-8
- Von Solms, S. H.. "Information Security Governance-compliance management vs. operational Management." Computers and Security, Vol. 24, No.6, pp. 443-447, 2005. https://doi.org/10.1016/j.cose.2005.07.003
- Vroom, C., & Von Solms, R., "Towards information security behavioural compliance." Computers and Security, Vol. 23, No. 33, pp. 191-198, 2004. https://doi.org/10.1016/j.cose.2004.01.012
- Weill, P. and M. Vitale, "What IT infrastructure capabilities arc needed to implement e-business models." MIS Quarterly Executive, Vol. 1, No. 1, pp. 17-34, 2002.
- Witty, R.J. & Hallawell, A., Client issues for security policies and architecture. Gartner. ID number: K-20-7780, 2003.