References
- Adams, D. A., Nelson, R. R. and Todd, P. A., "Perceived Usefulness, Ease of Use, and Usage of Information Technology : a Replication," MIS Quarterly, Vol. 16, No. 2, pp. 227-247, 1992. https://doi.org/10.2307/249577
- Agarwal, R. and Karahanna, E., "Time Flies when youʼre having Fun : Cognitive Absorption and Beliefs about Information Technology Usage," MIS Quarterly, Vol. 24, No. 4, pp. 665-694, 2000. https://doi.org/10.2307/3250951
- Agrifoglio, R., Black, S. and Metallo, C., "Twitter acceptance : The role of intrinsic motivation," Working Papers on Information Systems, Vol. 10, No. 9, 2010.
- Ariss, S. S., "Computer Monitoring : Benefits and Pitfalls Facing Management," Information and Management, Vol. 39, No. 7, pp. 553-558, 2001.
- Bae, B. R., "Understanding and utilizing of structural equation model," Daekyung Publishing Company, 2002.
- Bagozzi, R. P. and Yi, Y., "On the evaluation of structural equation models," Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74-94, 1988. https://doi.org/10.1007/BF02723327
- Baron, R. M. and Kenny, D. A., "The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations," Journal of Personality and Social Psychology, Vol. 51, No. 6, pp. 1173-1182, 1986. https://doi.org/10.1037/0022-3514.51.6.1173
- Beatty, R. C., Shim, J. P., and Jones, M. C., "Factors Influencing Corporate Web Site Adoption : A Time-Based Assessment," Information and Management, Vol. 38 No. 6, pp. 337-354, 2001. https://doi.org/10.1016/S0378-7206(00)00064-1
- Bentler, P. M. and Bonett, D. G., "Significance Tests and Goodness of Fit in the Analysis of Covariance Structures," Psychological Bulletin, Vol. 88, pp. 588-606, 1980. https://doi.org/10.1037/0033-2909.88.3.588
- Bentler, P. M., "On the Fit of Models Covariance and Methodology to the Bulletin," Psychological Bulletin, Vol. 112, pp. 400-404, 1992. https://doi.org/10.1037/0033-2909.112.3.400
- Brancheau, J. C. and Wetherbe, J. C., "The adoption of spreadsheet software testing innovation diffusion theory in the context of end-user computing," Information System Research, Vol. 1, No. 2, pp. 115-143, 1990. https://doi.org/10.1287/isre.1.2.115
- Browne, M. W. and Cudeck, R., Alternative Ways of Assessing Model Fit, In K. A. Bollenand J. S. Long (Eds.), Testing Structural Equation Models, Newbury Park, CA : Sage, pp. 133-162, 1993.
- Choi, C. H., "A Study of the Relationship of Organizational Structure and Innovation : An Application of LISREL," KAPA, Vol. 28, No. 2, pp. 469-480, 1994.
- Choi, E. H., "Smart Work Security Issues and Responses," KT AIT, 2011.
- Cooper, R. B. and Zmud, R. W., "Information Technology Implementation Research : A Technological Diffusion Approach," Management Science, Vol. 36 No. 2, pp. 123-139, 1990. https://doi.org/10.1287/mnsc.36.2.123
- Damanpour, F. and Evan, W. M. "Organizational Innovation and Performance : The Problem of Organizational Lag," Administrative Science Quarterly, Vol. 29, No. 3, pp. 392-409. 1984. https://doi.org/10.2307/2393031
- Damanpour, F., "Organizational Innovation : A Meta‐Analysis of Effects of Determinants and Moderators," Academy of Management Journal, Vol. 34, No. 3, pp. 555-590, 1991. https://doi.org/10.2307/256406
- Davis, F. D., "Perceived usefulness, perceived ease of use, and user acceptance of information technology," Management Information Systems Quarterly, Vol. 13, No. 3, pp. 319-340, 1989. https://doi.org/10.2307/249008
- Delone, W. H. and McLean, E. R., "Measuring e-Commerce Success : Applying the DeLone and McLean Information Systems Success Model," International Journal of Electronic Commerce, Vol. 9, No. 1, pp. 31-47, 2004.
- Eder, L. B. and Igbaria, M., "Determinants of Internet Diffusion and Infusion," Omega, Vol. 21, No. 3, pp. 233-242, 2001.
- ETRI, "Smartphone Threats and Security Technology," Electronics and Telecommunications Trends, Vol. 25, No. 3, pp. 72-80, 2010.
- Fornell, C. and Larcker, D. F., "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981. https://doi.org/10.2307/3151312
- Ghosh, A. K. and Swaminatha, T. M., "Software security and privacy risks in mobile e-commerce," Communications of the ACM, Vol. 44, No. 2, pp. 51-57, 2001.
- Hair, J. F., Jr., Black, W. C., Babin, B. J. and Anderson, R. E., "Multivariate data analysis(7th ed.), Upper Saddle River," NJ : Prentice-Hall, 2010.
- Hayduck, L., "Structural Equation Modeling with LISREL : Essentials and Advances," Johns Hopkins University Press, Baltimore, 1987.
- Hong, K. H., "A Study on the Effect of Information Security Controls and Processes on the Performance of Information Security," Dept. of Management Information Systems Graduate School, Kookmin University, 2003.
- Hong, S. I., Choi, H. J., and Lee, J. K., "Social Motivational Factors Influencing the Intention to Use of Blog," Korea Contents Association, Vol. 10 No. 1, pp. 122-137, 2010.
- Hsu, C. L. and Lin, J. C. C., "Acceptance of blog usage : The roles of technology acceptance, social influence and knowledge sharing motivation," Information and Management, Vol. 45, No. 1, pp. 65-74, 2008. https://doi.org/10.1016/j.im.2007.11.001
- Hu, F. and Liu, Y., "An empirical examination on mobile services adoption in rural China," International Journal of Digital Content Technology and its Application, Vol. 5, No. 1, pp. 328-334, 2011. https://doi.org/10.4156/jdcta.vol5.issue1.35
- Jaccard, J. and Wan, C. K., "LISREL Approaches to Interration Effects in Mulitple Regresstion," Thousand Oaks, Galif, 1996.
- Jarvenpaa, S. L. and Lang, L. R., "Managing the Paradoxes of Mobile Technology," Information Systems Management, Vol. 22, No. 4, pp. 7-23, 2005.
- James, L. R., Mulaik, S. A. and Brett, J. M., "Casual Analysis : Assumptions, Models, and Data," Beverly Hills : Sage, 1982.
- Jeong, G. H., Yoon, H. S. and Park, J. C., "An Empirical Study on Predicting User Acceptance of Blog," KIECA, Vol. 9, No. 4, pp. 505-521, 2009.
- Ji, S. G., Lee, G. D., "The Relationship of Individual Disposition, Innovation Resistance and Innovation Performance," The Korean Academic Association of Business Administration, Vol. 52, No. 1, 2005.
- Joreskong, K. G. and Sorbom, D., "LISREL 7; A Guide to the Program and Application," SPSS Publication, 1989.
- Jung, Y., Perez-Mira, B. and Wiley- Patton, S., "Consumer adoption of mobile TV : Examining psychological flow and media content," Computers in Human Behavior, Vol. 25, No. 1, pp. 123-129, 2009. https://doi.org/10.1016/j.chb.2008.07.011
- Kang, D. H., Kim, J. N. and Jo, H. S., "Trends of Mobile Threats and Security Service Technology," Journal of KIISE, Vol. 28, No. 6, pp. 51-56, 2010.
- Karahanna, E., Straub, D. and Chervany, N., "Information Technology Adoption Across Time : A Cross- Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs," MIS Quarterly, Vol. 23, No. 2, pp. 183-213, 1999. https://doi.org/10.2307/249751
- Kim, H. G., "The Impact of User Perception on Usage Intention : Focusing on the Moderating Role of Attitude of Acceptance and Resistance," Journal of Information Technology Applications and Management Vol. 16, No. 2, pp. 65-67, 2009.
- Kim, J. H. and Shin, Y. S., "The Roles of Mediated to Consumer' Resistance in the Internet Service Acceptance Processing," Korean Industrial Economic Association, pp. 85-98, 2002.
- Kim, K. K., Shin, H. K., Park, S. S. and Kim, B. S., "A Study on the Effects of the Information Asset Protection Performance on the Organization Performance : Management Activity and Control Activity," Information Management Research, Vol. 40, No. 3, pp. 61-77, 2009. https://doi.org/10.1633/JIM.2009.40.3.061
- Kim, K. Y. and Kang, D. H., "The SmartPhone Security Technology of open collaborative environment," Korea Institute of Information Security and Cryptology, Vol. 19, No. 5, pp. 10-104, 2009.
- Kim, S. H. and Park, S. Y., "Influencing Factors for Compliance Intention of Information Security Policy," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 33-51, 2011. https://doi.org/10.7838/jsebs.2011.16.4.033
- Korea Internet and Security Agency, "Internet and security," 2010.
- KPCB, "Internet Trends," http://www. slideshare.net/kleinerperkins/kpcb-internet- trends-2012, 2012.
- Kwon, J. S., "The Relationships among the Organizational Justice, Resistance to Innovation and Defensive Behavior of Employee," Korean Academy of Organization and management, Vol. 25, No. 1, pp. 223-244, 2001.
- Lai, V. S., "Critical Factors of ISDN Implementation : An Exploratory Study," Information and Management, Vol. 33, No. 2, pp. 97-97, 1997.
- Lee, B. K. et al., "A Research on Discovering New Vulnerabilities and Analyzing Methods in Domestic Mobile Environment," KISA, 2010.
- Lee, B. K. et al., "A Research on Issues and Developmental Needs of the Future Internet in the Context of Security Technologies and Information Security," KISA, 2010.
- Lee, D. M., "Factors Influencing Adoption of Corporate Web Site Over Time : Innovation Diffusion Theory Perspective," Asia Pacific Journal of Information Systems, Vol. 13, No. 4, pp. 257-277, 2003.
- LEE, H. S. and LIM, J. H., "SPSS 16.0 manual," Seoul : Bobmunsa, 2009.
- Lee, J. T., "An Introduction to Information Security," Seoul : Life and Power press, 2007.
- Lee, K. H., "Risk Management and Information Security : Case Study," KERIS, 2006.
- Lee, S. G., Kang, M. C. and Kim, B. Y., "An Analytical Study of ICT Adoption based on Diffusion Innovation Theory," The Journal of Information Systems, Vol. 14, No. 2, pp. 257-276, 2005.
- Lim, J. U., Oh, J, I., "A Study on the Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use : From the Perspective of the Innovation Diffusion Theory," Asia Pacific Journal of Information Systems Vol. 22, No. 3, pp. 100-124, 2012.
- Lindqvist J. and Laura Takkinen, "Privacy Management for Secure Mobility," WPES'06, 2006.
- Luarn, P. and Lin, H., "Toward an understanding of the behavioral intention to use mobile banking," Computers in Human Behavior, Vol. 21, No. 6, pp. 873-891, 2005. https://doi.org/10.1016/j.chb.2004.03.003
- Mayers, B. L., Kappelman, L. A. and Pry butok, V. R., "A Comprehensive Model for Assessing the Quality and Productivity of the Information System Function : Toward a Theory for Information Systems Assessment," Information Resource Management Journal, Vol. 10, No. 1, pp. 6-25, 1997. https://doi.org/10.4018/irmj.1997010101
- Mick, D. G. and Fournier, S., "Paradoxes of Technology : Consumer Cognizance, Emotions and Coping Strategies," Journal of Consumer Research, Vol. 25, pp. 123-143, 1998. https://doi.org/10.1086/209531
- Moore, G. and Benbasat, I., "Development of an Instrument to Measure the Perceptions of Adopting and Information Technology," Information Systems Research, Vol. 2, No. 3, pp. 192-222, 1991. https://doi.org/10.1287/isre.2.3.192
- Moulton, R. T. and Moulton, M. E., "Electronic Communications Risk Management : A Checklist for Business Managers," Computers and Security, Vol. 15, No. 5, pp. 377-386, 1996. https://doi.org/10.1016/0167-4048(96)82560-0
- NIST, "SP 800-64, Security Considerations in the Information System Development Life Cycle," 2005.
- Nunnally, J. C., "Psychometric Theory," McGraw-Hill, New York, NY, 1994.
- O'Callaghan, R., Kaufmann, P. J. and Konsynski, B. R., "Adoption Correlates and Share Effects of Electronic Data Interchange Systems in Marketing Channels," Journal of Marketing, Vol. 56, pp. 45-56, 1992. https://doi.org/10.2307/1252041
- Osborne, K., "Cost-Effective IT Security," Datapro, pp. 1-8, 1996.
- Park, J. G., "Integrative Adoption Model of New Media," Korean Society for Journalism and Communication Studies, Vol. 55, No. 5, pp. 448-497, 2011.
- Park, J. G., "Twitter Adoption Model : Integrative Approach to Innovation Diffusion Theory, Technology Acceptance Model, and Model of Innovation Resistance," Internet and Information Security, Vol. 3, No. 1, pp. 35-63, 2012.
- Plouffe, C. R., Hulland, J. S. and Vandenbosch, M., "Research report : Richness versus parsimony in modeling technology adoption decisions : Understanding merchant adoption of a smart card-based payment system," Information Systems Research, Vol. 12, No. 2, 2001.
- Post, G. and Karan, A., "Management Tradeoffs in Anti-virus Strategies," Information and Management, Vol. 37, No. 1, pp. 13-24, 2000. https://doi.org/10.1016/S0378-7206(99)00028-2
- Ram, S., "A model of innovation resistance, Advances in Consumer Research," Vol. 14, No. 1, pp. 208-212, 1987.
- Ram, S. and Sheth, R., "Consumer Resistance To Innovation : The Marketing Problem and Its Solution," Journal of Consumer Marketing, Vol. 6, No. 2, pp. 5-14, 1989.
- Robertson, J., Sorbello, T. and Unsworth, K., "Innovation implementation : The role of technology diffusion agencies," Journal of Technology Management and Innovation, Vol. 3, pp. 1-10, 2008.
- Robertson, Thomas S. and Hubert Gatignon, "Competitive Effects on technology Diffusion," Journal of Marketing, Vol. 50, No. 3, pp. 1-12, 1986. https://doi.org/10.2307/1251581
- Rogers, E. M. and Shoemaker, F., "Communication of Innovations : A Cross-Cultural Approach," NewYork : Free Press, 1971.
- Rogers, E. M., "Diffusion of Innovations( Third Edition)," The Free Press, New York, 1983.
- Rogers, E. M., "Diffusion of Innovations( Forth Edition)," The Free Press, New York, 1995.
- Rogers, E. M., "Diffusion of Innovations( Fifth Edition)," The Free Press, New York, 2003.
- Samuel, W. and Zeckhasuer, R., "Status Quo Bias in Decision Making," Journal of Risk and Uncertainty, Vol. 1, pp. 7-59, 1988. https://doi.org/10.1007/BF00055564
- Schein, E. H., "Organizational Culture and Leadership," San Francisco : Jossey -Bass, 1985.
- Scott, J., "The Measurement of Information Systems Effectiveness : Evaluating a Measuring Instrument," Proceedings of the 15th International Conference on Information Systems, Vancouver, pp. 111-128, 1994.
- Seo, B. M., "The Impact of Perceived Security Control on the Acceptance of Internet Banking," The Journal of Society for e-Business Studies, Vol. 11, No. 1, pp. 25-52, 2006.
- Seo, M. S., Ahn, J. W., Lee E. K. and Oh. D. Y., "Purchasing Avoidance of Digital Convergence Products : Focusing on the Customer's Psychological Factors and the Innovation Resistance," Journal of Korean Contents, pp. 270-284, 2009.
- Seo, S. W., "THE ECONOMICS OF INFORMATION SECURITY," Seoul National University Press, 2008.
- Shang, S. and Seddon, P. B., "Assessing and Managing the Benefits of Enterprise Systems : The Business Manager's Perspective," Information Systems Journal, Vol. 12, No. 4, pp. 271-299, 2002. https://doi.org/10.1046/j.1365-2575.2002.00132.x
- Smith, S., Stephen, G. and Malampy, W., "A financial Management Approach for Selecting Optimal, Cost- Effective Safeguards Upgrades for Computer and Information Security Risk Management," Computer and Security, Vol. 14, No. 1, pp. 28-29, 1995.
- Solms, R., Eloff, J. J. P. and Solms, S. H., "Computer Security Management : A Framework for Effective Management Involvement," Security, Vol. 12, No. 4, pp. 217-222, 1990.
- Straub, E., "Understanding Technology Adoption : Theory and Future Directions for Informal learning," Review of Educational Research, Vol. 79, No. 2, pp. 625-649, 2009. https://doi.org/10.3102/0034654308325896
- Tomarken, A. J. and Waller N. G., "Po- tential problems with 'well fitting' models," Journal of Abnormal Psychology, Vol. 112, No. 4, pp. 578- 598. r Studies, Vol. 45, No. 1, pp. 19- 45, 2003. https://doi.org/10.1037/0021-843X.112.4.578
- Tornatzky, L. G. and Klein, K. J., "Innovation characteristics and innovation adoption implementation : A meta-analysis of findings," IEEE Transactions on Engineering Management, Vol. 29, No. 1, pp. 28-45, 1982.
- Venkatesh, V. and Davis, F. D., "A theoretical extension of the technology acceptance model : Four longitudinal field studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000. https://doi.org/10.1287/mnsc.46.2.186.11926
- Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D., "User acceptance of information technology : Toward a unified view," Information Management, Vol. 27, No. 3, pp. 425- 478, 2003.
- Verkasalo, H., C. Lopez-Nicolas, Molina- Castillo, F. J. and Bouwman, H., "Analysis of users and non-users of smart phone applications," MIS Quarterly, Vol. 27, No. 3, pp. 242-255, 2003.
- Wenbo, S., Jang I. J. and Yoo, H. S., "A improved authentication protocol for the forward security," The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 17-27, 2007.
- Whetten, D. A., "What constitutes a theoretical contribution?," The Academy of Management Review, Vol. 14, No. 4, 1989.
- Yoon, S. U., "A study on the innovation resistance on social network service : Focusing on facebook non-users on their 20's university students," KRCRA, Vol. 13, No. 3, pp. 331-360, 2013.
- Zaltman, G. and Wallendorf, M., "Consumer Behavior : Basic Findings and Management Implications," New York, NY : John Wiley and Sons, 1983.
Cited by
- The Effect of Individual Motivated Propensity on Perceived Characteristics and Use Intentions for Mobile Medical Service vol.19, pp.4, 2014, https://doi.org/10.7838/jsebs.2014.19.4.169