References
- 김예진, 이규백, "시지각적 특성에 따른 경계의 모호성에 관한 연구", 기초조형학연구, 제13권, 제5호(2012), pp.57-67.
- 김여라, "신종플루 뉴스 이용 정도가 개인 및 공중에 대한 건강보호 행위의도에 미치는 영향에 관한 연구 : 보호동기이론을 중심으로", 한국언론정보학회, 통권51호(2010), pp.5-25
- 김익수, 정진혁, 이형찬, 이정현, "모바일 악성 코드 분석방법과 대응방안", 한국통신학회논문지, 제35권, 제4호(2010), pp.599-609.
- 김준홍, "범죄피해 위협과 보호행동을 예측하는 요인들의 성차", 한국공안행정학회보, 제40호(2010), pp.72-113.
- 김지훈, 조시행, "사이버 환경에서의 보안위협", 한국정보보호학회논문지, 제20권, 제4호(2010), pp.11-20.
- 노성호, 김지선, "범죄의 두려움에 대한 경험적 연구", 피해자학연구, 제6권(1998), pp. 169-205.
- 박철현, "범죄피해경험, 이웃통합 그리고 범죄의 두려움 : 대학생에 대한 심층면접결과를 중심으로", 피해자학연구, 제13권, 제1호(2005), pp.51-77.
- 양호일, 환경디자인 행태학, 유림문화사, (1990), p.39.
- 우형진, "텔레비전 뉴스 시청이 시청자의 건강증진의지에 미치는 영향에 관한 연구", 한국언론학보, 제51권, 제2호(2007), pp.308-320.
- 이민규, 김영은, "질병 관련 인터넷 정보 이용 효과 연구", 언론과학연구, 제9권(2009), pp. 506-539.
- 이정모 외, 인지심리학, 학지사, (1999), pp. 24-32.
- 정만경, 서희석, "과거 및 현재의 모바일 악성 코드 증상에 따른 향후 전망 모바일 악성코드 연구", 2011년 한국컴퓨터교육학회 하계 학술발표논문지, 제15 권, 제2호(2011), pp.179-184.
- 정훈영, 서희석, "스마트폰 통신환경 변화에 따른 모바일 악성코드 감염경로 연구", 한국컴퓨터교육학회 하계 학술발표논문지, 제15권, 제2호(2011), pp.173-176.
- 장상근, "모바일 악성코드의 전략과 사례 분석을 통한 모바일 악성코드 진단법", 정보보호학회지, 제23권, 제2호(2013), pp.14-20.
- 한국인터넷진흥원, 모바일 접속환경을 위한 웹사이트 침해예방 연구, 2010.
- 한국인터넷진흥원, 2012년도 정보보호실태 조사, 2012.
- Ahnlab, "악성코드 분석 특집, 2012 Vol.26", ASEC REPORT, 2012.
- Ajzen, I. and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, 1980.
- Anderson, C. L. and R. Agarwal, "Practicing Safe Computing : A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol.34, No.3(2010), pp.613-643. https://doi.org/10.2307/25750694
- Axelrod, L. J. and J. W. Newton, "Preventing Nuclear War : Beliefs and attitude of Disarmist and Deterrentist Behavior", Journal of Applied Psychology, Vol.21, No.1(1991), pp.29-40.
- Bandura, A., "Self efficacy : toward a unifying theory of behavioral change", Psychological Review, Vol.84(1977), pp.191-215. https://doi.org/10.1037/0033-295X.84.2.191
- Barden-O'Fallon, J. L., J. deGraft-Johnson, T. Bisika, S. Sulzbach, A. Benson, and A. O. Tsui, "Factors Associated with HIV/AIDS Knowledge and Risk Perception in Rural Malaw", AIDS and Behavior, Vol.8, No.2(2009), pp.131-140.
- Boer, H. and E. R. Seydel, "Protection motivation theory. In Predicting health behavior : Research and practice with social cognition models (ed)", Open University Press, (1996), pp.95-120.
- Campbell, K., L. A. Gordon, M. P. Loeb, and L. Zhou, "The Economic Cost of Publicly Announced Information Security Breaches : Empirical Evidence from the Stock Market", Journal of Computer Security, No.11(2003), pp.431-448.
- Chau, P. Y. K. and P. J. H. Hu, "Investigating healthcare professionals' decisions to accept telemedicine technology : an empirical test of competing theories", Information and Management, Vol.39(2002), pp.297-311. https://doi.org/10.1016/S0378-7206(01)00098-2
- Croog, S. H. and N. P. Richards, "Health Beliefs and Smoking Patterns in Heart Patients and Their Wives : A Longitudinal Study", American Journal of Public Health, Vol.67, No.10(1977), pp.921-930. https://doi.org/10.2105/AJPH.67.10.921
- Crossler, R. E., "Protection Motivation Theroy : Understanding Determinants to Backing Up Personal Data", Proceedings of the 43rd hawaii International conference on System Sciences, (2010), pp.1-10.
- Doria, M. F., N. Pidgeon, and P. Hunter, "Perceptions of Drinking Water Quality and Risk and Its Effects on Behaviour : A Crossnational Study", Science of the Total Environment, Vol.407(2009), pp.5455-5464. https://doi.org/10.1016/j.scitotenv.2009.06.031
- Floyed D. L., S. Prentice-Dunn, and R. W. Rogers, "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, Vol.30(2000), pp. 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
- Hair, J. F., B. Black, B. Babin, R. E. Anderson, and R. L. Tatham, Maltivariate data analysis(6th ed.), Pearson Prentice Hall, 2006.
- Johnston, A. C. and M. Warkentin, "Fear appeals and information security behaviors : An empirical study", MIS Quarterly, Vol. 34, No.3(2010), pp.549-566. https://doi.org/10.2307/25750691
- Krebs, B., "Hacking Home PCs Fueling Rapid Growth in Online Fraud", Washington Post, Technology Section, Special Reports, Cyber-Security, 2005.
- LaRose, R. and N. Rifon, "You Privacy Is Assured of Being Invaded", New Media and Society, Vol.8, No.4(2006), pp.1009-1030. https://doi.org/10.1177/1461444806069652
- Lee, D., R. Larose, and N. Rifon, "Keeping our network safe : a model of online protection behaviour", Behaviour and Information Technology, Vol.27, No.5(2008), pp.445-454. https://doi.org/10.1080/01449290600879344
- Lee, Y., "Understanding anti-plagiarism software adoption : An extended protection motivation theory perspective", Decision Support Systems, Vol.50(2011), pp.361-369. https://doi.org/10.1016/j.dss.2010.07.009
- Lee, Y. and K. Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communications of the ACM, Vol.48, No.8(2005), pp.72-77.
- Lee, Y. and K. R. Larsen, "Threat or coping appraisal : determinants of SMB executives' decision to adopt anti-malware software", European Journal of Information Systems, Vol.18, No.2(2009), pp.177-187. https://doi.org/10.1057/ejis.2009.11
- Loch, K. D., H. H. Carr, and M. E. Warkentin, "Threats to Information Systems : Today's Reality, Yesterday's Understanding", MIS Quarterly, Vol.16, No.2(1992), pp.173-186. https://doi.org/10.2307/249574
- Milne, S. E., S. Orbell, and P. Sheeran, "Combining motivational and volitional interventions to promote exercise participation : Protection motivation theory and implementation intentions", British Journal of Health Psychology, Vol.7(2002), pp.163-184. https://doi.org/10.1348/135910702169420
- Mohamed, N. and I. H. Ahmad, "Information privacy concerns, antecedents and privacy measure use in social networking sites : Evidence from Malaysia", Computer in Human Behavior, Vol.28. No.6(2012), pp.2366-2375. https://doi.org/10.1016/j.chb.2012.07.008
- Obermiller, C., "The Baby Is Sick/The Baby Is Well : A Test of the Environmental Communication Appeals", Journal of Advertising, Vol.24, No.2(1995), pp.55-71.
- Prentice-Dunn, S. and R. W. Rogers, "Protection motivation theory and preventive health : Beyond the health belief model, Health Education Research", Theory and Practice, Vol.1(1986), pp.153-161.
- Richardson, R., 2011 CSI Computer Crime and Security Survey, Computer Security Institute, 2012.
- Rippetoe, P. A. and R. W. Rogers, "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping With a Health Threat", Journal of Personality and Social Psychology, Vol.52(1987), pp.596-604. https://doi.org/10.1037/0022-3514.52.3.596
- Rogers, R., "Protection motivation theory of fear appeal and attitude change", Journal of Psychology, Vol.91, No.1(1975), pp.93-114. https://doi.org/10.1080/00223980.1975.9915803
- Rogers, R. W., "Cognitive and Physiological Processes in Fear Appeals and Attitude Change : A Revised Theory of Protected Motivation", Social Psychophysiology : A Sourcebook, The Guilford Press, 1983.
- Schafer, R. B., E. Schaefer, G. Bultena, E. Hoiberg, "Coping with a health threat : a study of food safety", Journal of Applied Social Psychology, Vol.23(1993), pp.386-394. https://doi.org/10.1111/j.1559-1816.1993.tb01094.x
- Symantec, Internet Security Threat Report, Vol.18(2013).
- Symantec, Norton Report, 2013.
- Tanner, J. F., J. B. Hunt, and D. R. Eppright, "The protection motivation model : A normative model of fear appeal", Journal of Marketing, Vol.55(1991), pp.36-45. https://doi.org/10.2307/1252146
- Vance, A., M. Siponen, and S. Pahnila, "Motivation IS security compliance : Insights from Habit and Protection Motivation Theory", Information and Management, Vol.49 (2012), pp.190-198. https://doi.org/10.1016/j.im.2012.04.002
- Walker, E. A., A. Caba, C. B. Schechter, C. E. Basch, E. Blanco, T. DeWitt, M. R. Kalten, M. S. Mera, and G. Mojica, "Measuring Comparative Risk Perceptions in an Urban Minority Population : The Risk Perception Survey for Diabetes", The Diabetes Educator, Vol.33(2007), pp.103-110. https://doi.org/10.1177/0145721706298198
- Weinstein, N. D., "Testing four competing theories of health-protective behavior", Health Psychology, Vol.12(1993), pp.324-333. https://doi.org/10.1037/0278-6133.12.4.324
- Woon, M. Y., G. W. Tan, and R. T. Low, "A protection motivation theory approach to home wireless security", Proceedings of the Twenty-Sixth International Conference on Information Systems, 2005.
- Zajonc, R. B., "Attitudinal effects of mere exposure", Journal of Personality and Social Psychology, Vol.9(1968), pp.1-27.
- Zhang, L. and W. C. McDowell, "Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords", Journal of Internet Commerce, Vol.8, No.3/4(2009), pp.180-197. https://doi.org/10.1080/15332860903467508