참고문헌
- 방송통신위원회, 행정안전부, 지식경제부(2011), 2011 국가정보 보호백서
- 한국인터넷진흥원(2010), 정보보호 관련 대국민 홍보 방안 연구
- Ajzen, I. (1991), "The theory of Planned behavior," Organizational Behavior & Decision Processes, Vol. 50, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Anderson, C.L. and R. Agarwal (2006), "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions," in International Conference on Information Systems, pp. 1543-1561. Milwaukee, WI.
- Bagchi, K. and G. Udo (2003), "An analysis of the growth of computer and internet security breaches," Communications of the AIS, Vol. 12, pp. 684-700.
- Bagozzi, R.P. and Y. Yi (1998), "On the Evaluation of Structural Equation Models," Journal of the Academy of Marketing Science, Vol. 16 No. 2, pp. 74-94.
- Bandura, A. (1977), "Self-efficacy: Toward a unifying theory of behavior change," Psychological Review, Vol. 84, pp. 191-215.
- Carver, C.S. and T.L., White (1994), "Behavioral inhibition, behavioral activation, and affective responses to impending reward and punishment: the bis/bas scales," Journal of Personality and Social Psychology, Vol. 67, pp. 319-333.
- Chin, W.W., B.L. Marcolin and P.R. Newsted (2003), "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study," Information Systems Research, Vol. 14 No. 2, pp. 189-217. https://doi.org/10.1287/isre.14.2.189.16018
- Chung, W., H. Chen, W. Chang and S. Chou (2006), "Fighting cybercrime: a review and the taiwan experience," decision support systems, Vol. 41, pp. 669-682. https://doi.org/10.1016/j.dss.2004.06.006
- Claar, C.L. (2011), "The adoption of computer security: An analysis of home personal computer user behavior using the health belief model," All graduate theses and dissertations, utah state university, Logan, Utah.
- Compeau, D.R., C.A. Higgins, and S. Huff (1999), "Social cognitive theory and individual reactions to computing technology: a longitudinal study," MIS Quarterly, Vol. 23 No. 2, pp. 145-158. https://doi.org/10.2307/249749
- Davis, F.D. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, Vol. 13 No. 3, pp. 319-338. https://doi.org/10.2307/249008
- Dinev, T. and Q. Hu (2007), "The centrality of awareness in the formation of user behavioral intention toward protective information technologies," Journal of the Association for Information Systems, Vol. 8 No. 7, pp. 386-408.
- Elliot, A.J. (2006), "The hierarchical model of approach-avoidance motivation," Motivation and Emotion Vol. 30, pp. 111-116. https://doi.org/10.1007/s11031-006-9028-7
- Elliot, A.J. and M.V., Covington (2001). "APPROACH AND AVOIDANCE MOTIVATION," Educational Psychology Review, Vol. 13(2), pp. 73-92. https://doi.org/10.1023/A:1009009018235
- Fishbein, M. and I., Ajzen (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
- Jayanti, R.K. and A.C., Burns (1998), "The antecedents of preventive health care behavior: an empirical study," Academy of Marketing Science Journal, Vol. 26 No. 1, pp.6-15. https://doi.org/10.1177/0092070398261002
- Kankanhalli, A., H.H., Teo, B.C.Y. Tan and K.K., Wei (2003), "An integrative study of information systems security effectiveness," International Journal of Information Management, Vol.23, pp. 139-154. https://doi.org/10.1016/S0268-4012(02)00105-6
- LaRose, R., N., Rifon, S., Liu and D., Lee (2005), "Online safety strategies: a content analysis and theoretical assessment," The 55th Annual Conference of the International Communication Association, New York City.
- Lee, Y. (2011), "Understanding anti-plagiarism software adoption : An extended protection motivation theory perspective," Decision Support Systems, Vol.50, pp.361-369. https://doi.org/10.1016/j.dss.2010.07.009
- Liang, H. and Y. Xue (2009), "Avoidance of information technology threats: A theoretical perspective," MIS Quarterly, Vol.33 No. 1, pp.71-90.
- Liang, H. and Y. Xue (2010), "Understanding Security Behaviors in Personal Computer Usage: A threat Avoidance Perspective," Journal of the Associaton for Information Systems, Vol. 7 No. 2, pp. 393-413.
- Maddus, J.E. and R.W., Rogers (1983), "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change," Journal of Experimental Social Psychology, Vol. 19, pp. 469-479. https://doi.org/10.1016/0022-1031(83)90023-9
- Ng, B.Y., A., Kankanhalli and Y.C., Xu (2009), "Studing users' omputer security behavior; A health belief perspective," Decision Support System, Vol. 46 No. 4, pp. 815-825. https://doi.org/10.1016/j.dss.2008.11.010
- Oliver, R.L. and P.K., Berger (1979), "A path analysis of preventive health care decision models," Journal of Consumer Research, Vol.6 No. 2, pp. 113-122. https://doi.org/10.1086/208755
- Rhodes, K. (2001), "Operations security awareness: the mind has no firewall," Computer Security Journal, Vol. 16 No. 2, pp. 27-36.
- Rippetoe, P.A. and R.W., Rogers (1987), "Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat," Journal of Personality and Social Psychology, Vol. 52 No. 3, pp. 596-604.
- Rogers, R.W. (1975), "A protection motivation theory of fear appeals and attitude change," Journal of Psychology, Vol. 91, pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
- Rogers, R.W. (1983), "Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation," in Social Psychophysiology: A Source Book, R. Petty (ed.), New York : Guilford Press, pp. 153-176.
- Rosenstock, I.M. (1974), "The health belief model and preventive health behavior," Health education Monographs, Vol. 2, pp. 354-386.
- Rosenstock I., V., Strecher, and M., Becker (1994), "The Health Belief Model and HIV risk behavior change", In R.J. DiClemente & J.L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press.
- Stanton, J.M., P.R., Mastrangelo, K.R., Stam and J., Jolton (2004), "Behavioral information security: two end user survey studies of motivation and security practices," Proceedings of the Tenth America' Conference on Information Systems, New York, 2004.
- Steers, R.M., R.T., Mowday and D.L., Shapiro (2004), "The future of work motivation theory," Academy of Management Review, Vol.29(3), pp. 379-387.
- Venkatesh, V. (2000), "Determinants of perceived ease of use : Integrating control, intrinsic motivation, and emotion into the technology acceptance model", Information System Research, Vol.11 No. 4, pp.342-365. https://doi.org/10.1287/isre.11.4.342.11872
- Weinstein, N.D. (2000), "Perceived probability, perceived severity, and health-protective behavior," Health Psychology, Vol. 19 No. 1, pp. 65-74.
- Woon, I., G.W., Tan, and R., Low (2005), "A protection motivation theory approach to home wireless security," International Conference on Information Systems, pp. 367-390.
- Workman, M., W.H., Bommer and D., Straub (2008), "Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in Human Behavior, Vol. 24 No. 6, pp. 2799-2816. https://doi.org/10.1016/j.chb.2008.04.005