References
- 김상현, 김근아, "정보보안관리에 영향을 미치는 기업환경요소와 규제자 영향의 조절효과", 한국경영과학회지, 제37권, 제3호(2012), pp.79-94. https://doi.org/10.7737/JKORMS.2012.37.3.079
- 천성용, "금융 소비자 만족도에 영향을 미치는 요인", 한국경영과학회지, 제38권, 제1호(2013), pp.89-101. https://doi.org/10.7737/JKORMS.2013.38.1.089
- 하홍열, "은행서비스 산업에서 범주형 회귀분석을 이용한 지속적 거래의도 평가", 한국경영과학회지, 제37권, 제3호(2012), pp.1-12. https://doi.org/10.7737/JKORMS.2012.37.3.001
- Bass, B.M., Leadership and Performance Beyond Expectations, New York : Free Press, 1985.
- Bovens, M., "Two Concepts of Accountability : Accountability as a Virtue and as a Mechanism," West European Politics, Vol.33, No.5(2010), pp.946-967. https://doi.org/10.1080/01402382.2010.486119
- Carmines, E.G. and R.A., Zeller, Reliability and Validity Assessment, Newbury Park, CA : Sage Publications, 1979.
- Carte, T.A. and C.J. Russell, "In Pursuit of Moderation : Nine Common Errors and Their Solutions," MIS Quarterly, Vol.27, No.3(2003), pp.479-501. https://doi.org/10.2307/30036541
- Chin, W.W. and J. Dibbern, A Permutation Based Procedure for Multi-Group PLS Analysis : Results of Tests of Differences on Simulated Data and a Cross of Information System Services between Germany and the USA, in Handbook of Partial Least Squares : Concepts, Methods and Applications in Marketing and Related Fields, V.E. Vinzi, W.W. Chin, J. Henseler, and H. Wang(eds), Berlin : Springer, 2009.
- Cho, J., I. Park, and J.W. Michel, "How Does Leadership Affect Information Systems Success? The Role of Transformational Leadership," Information and Management, Vol.48, No.7(2011), pp.270-277. https://doi.org/10.1016/j.im.2011.07.003
- D'Arcy, J., A. Hovav, and D. Galletta, "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse : A Deterrence Approach," Information Systems Research, Vol.20, No.1(2009), pp.79-98. https://doi.org/10.1287/isre.1070.0160
- Deng, X., W.J. Doll, S.S. Al-Gahtani, T.J. Larsen, J.M. Pearson, and T.S. Raghunathan, "A Cross-Cultural Analysis of the End-User Computing Satisfaction Instrument : A Multi- Group Invariance Analysis," Information and Management, Vol.45, No.4(2008), pp.211-220. https://doi.org/10.1016/j.im.2008.02.002
- Fornell, C. and D.F. Larcker, "Evaluating Structural Equation Models with Unobserva ble Variables and Measurement Error," Journal of Marketing Research, Vol.18, No.1(1981), pp.39-50. https://doi.org/10.2307/3151312
- Gallagher, S.E. and T. Savage, "Cross-Cultural Analysis in Online Community Research : A Literature Review," Computers in Human Behavior, Vol.29, No.3(2013), pp.1028-1038. https://doi.org/10.1016/j.chb.2012.09.011
- Gefen, D. and D. Straub, "A Practical Guide to Factorial Validity Using PLS Graph : Tutorial and Annotated Example," Communications of the Association for Information Systems, Vol.16, No.5(2005), pp.91-109.
- Gefen, D., E. Karahanna, and D. Straub, "Inexperience and Experience with Online Stores : The Importance of TAM and Trust," IEEE Transactions on Engineering Management, Vol.50, No.3(2003), pp.307-321. https://doi.org/10.1109/TEM.2003.817277
- Gewald, H. and J. Dibbern, "Risks and Benefits of Business Process Outsourcing : A Study of Transaction Services in the German Banking Industry," Information and Management, Vol.46, No.4(2009), pp.249-257. https://doi.org/10.1016/j.im.2009.03.002
- Hovav, A. and J. D'Arcy, "Applying and Extended Model of Deterrence Across Cultures : An Investigation of Information Systems Misuse in the U.S. and South Korea," Information and Management, Vol.49, No.2(2012), pp.99-110. https://doi.org/10.1016/j.im.2011.12.005
- Jacobs, B.A., "Deterrence and Deterrability," Criminology, Vol.8, No.2(2010), pp.417-441.
- Jung, D.I., C. Chow, and A. Wu, "The Role of Transformational Leadership in Enhancing Organizational Innovation : Hypotheses and Some Preliminary Findings," The Leadership Quarterly, Vol.14, No.4/5(2003), pp.525-544. https://doi.org/10.1016/S1048-9843(03)00050-X
- Kotulic, A.G. and J.G. Clark, "Why There aren't More Information Security Research Studies," Information and Management, Vol. 41, No.5(2004), pp.597-607. https://doi.org/10.1016/j.im.2003.08.001
- Ku, Y.C., R. Chen, and H. Zhang, "Why Do Users Continue Using Social Networking Sites? An Exploratory Study of Members in the United States and Taiwan," Information and Management, Vol.50, No.7(2013), pp.571-581. https://doi.org/10.1016/j.im.2013.07.011
- Lerner, J.S. and P.E. Tetlock, "Accounting for the Effects of Accountability," Psychological Bulletin, Vol.125, No.2(1999), pp.255-275. https://doi.org/10.1037/0033-2909.125.2.255
- Li, Y., C.H. Tan, and H.H. Teo, "Leadership Characteristics and Developers' Motivation in Open Source Software Development," Information and Management, Vol.49, No.5(2012), pp.257-267. https://doi.org/10.1016/j.im.2012.05.005
- Lowry, P.B., G. Moody, A. Vance, M. Jensen, J.L. Jenkins, and T. Wells, "Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers," Journal of the American Society for Information Science and Technology, Vol.63, No.4(2012), pp.755-766. https://doi.org/10.1002/asi.21705
- Mulgan, R., "'Accountability' : An Ever-Expanding Concept?," Public Administration, Vol.78, No.3(2000), pp.555-573. https://doi.org/10.1111/1467-9299.00218
- Parker, D.B., Fighting Computer Crime : A New Framework for Protecting Information, Hoboken, NJ : Wiley, 1998.
- Scholten, L., D.V. Knippenberg, B. Nijstad, and C.D. Dreu, "Motivated Information Processing and Group Decision-Making : Effects of Process Accountability on Information Processing and Decision Quality," Journal of Experimental Social Psychology, Vol.43, No.4 (2007), pp.539-552. https://doi.org/10.1016/j.jesp.2006.05.010
- Sedikides, C., K.C. Herbst, D.P. Hardin, and G.J. Dardis, "Accountability as a Deterrent to Self-Enhancement : The Search for Mechanisms," Journal of Personality and Social Psychology, Vol.83, No.3(2002), pp.592-605. https://doi.org/10.1037/0022-3514.83.3.592
- Seron, C., J. Pereira, and J. Kovath, "How Citizens Assess just Punishment for Police Misconduct," Criminology, Vol.44, No.4(2006), pp.925-960. https://doi.org/10.1111/j.1745-9125.2006.00068.x
- Shao, Z., Y. Feng, and L. Liu, "The Mediating Effect of Organizational Culture and Knowledge Sharing on Transformational Leadership and Enterprise Resource Planning Systems Success : An Empirical Study in China," Computers in Human Behavior, Vol. 28, No.6(2012), pp.2400-2413. https://doi.org/10.1016/j.chb.2012.07.011
- Tadmor, C. and Tetlock, P.E. Accountability, In D. Matsumoto(ed.), The Cambridge Dictionary of Psychology, Cambridge : Cambridge University Press, 2009.
- Tand, H.T. and A. Kao, "Accountability Effects on Auditors' Performance : The Influence of Knowledge, Problem-Solving Ability, and Task Complexity," Journal of Accounting Research, Vol.37, No.1(1999), pp.209-223. https://doi.org/10.2307/2491404
- Tetlock, P.E. Accountability Theory : Mixing Properties of Human Agents with Properties of Social Systems, In L.L. Thompson, J.M. Levine, and D.M. Messick(eds.), Shared Cognition in Organizations : The Management of Knowledge, Hillsdale, NJ : Lawrence Erlbaum, (1999), pp.117-137.
- Tetlock, P.E., L. Skitka, and R. Boettger, "Social and Cognitive Strategies for Coping with Accountability : Conformity, Complexity, and Bolstering," Journal of Personality and Social Psychology, Vol.57, No.4(1989), pp.632-640. https://doi.org/10.1037/0022-3514.57.4.632
- Vance, A., P.B. Lowry, and D. Eggett, "Using Accountability to Reduce Access Policy Violations in Information Systems," Journal of Management Information Systems, Vol.29, No.4(2013), pp.263-289. https://doi.org/10.2753/MIS0742-1222290410
- Vatanasombut, B., M. Igbaria, A.C. Stylianou, and W. Rodgers, "Information Systems Continuance Intention of Web-Based Applications Customers : The Case of Online Banking," Information and Management, Vol.45, No.7 (2008), pp.419-428. https://doi.org/10.1016/j.im.2008.03.005
- Willison, R. and M. Warkentin, "Beyond Deterrence : An Expanded View of Employee Computer Abuse," MIS Quarterly, Vol.37, No.1(2013), pp.1-20. https://doi.org/10.25300/MISQ/2013/37.1.01
- Zhang, J., B.J. Reithel, and H. Li, "Impact of Perceived Technical Protection on Security Behaviors," Information Management and Computer Security, Vol.17, No.4(2009), pp. 330-340. https://doi.org/10.1108/09685220910993980
- Zhao, X. and M.E. Johnson, "Managing Information Access in Data-Rich Enterprises with Escalation and Incentives," International Journal of Electronic Commerce, Vol.15, No.1 (2010), pp.79-112.