References
- 고미현, 권순동, "인터넷 커뮤니티에서 사용자 참여가 밀착도와 지속적 이용의도에 미치는 영향", Asia Pacific Journal of Information Systems, 제18권 제2호, 2008, pp. 41-72.
- 구승환, 김동우, 박창묵, 김광호, "LTE 특성과 개인의 혁신성이 LTE 스마트폰 수용에 미치는영향", 한국디지털콘텐츠학회논문지, 제14권 제3호, 2013, pp. 291-301.
- 국가정보원, 미래창조과학부, 방송통신위원회, 안전행정부, 2014 국가정보보호백서, 2014.
- 권순동, "SEM에서 위계모형을 이용한 다중 공선성 문제 극복방안 연구 : 소셜커머스의 재구매의도 영향요인을 중심으로", Journal of Information Technology Applications and Management, 제22권 제2호, 2015, pp. 149-169. https://doi.org/10.21219/JITAM.2015.22.2.149
- 김범수, 이정, 김경규, "인지된 신뢰, 위험, 유용성 및 편의성이 전자정부 민원서비스사용의도에 미치는 영향", 정보화정책, 제13권 제4호, 2006, pp. 186-202.
- 김상현, 송영미, "정부포털 사이트 이용의도에 미치는 요인 : 모호성과 정부지원의 조절 효과", 정보시스템연구, 제18권 제1호, 2009, pp. 117-144.
- 김세윤, 김태성, "공인인증서의 신뢰 및 지속사용 의도에 관한 연구", 한국경영정보학회학술대회, 2014, pp. 1101-1105.
- 김영홍, "유출 피해 사례로 보는 주민등록번호 제도 개선의 필요성", '주민등록번호 어떻게 개편할 것인가' 토론회, 2014.
- 미래창조과학부, 2014년도 국가정보화에 관한 연차보고서, 2014.
- 박지형, 신건권, "스마트폰의 지각된 기능적 속성과 개인 혁신성이 사용자의 채택의도와 실제사용의도에 미치는 영향", 경영교육논총, 제26권 제5호, 2011, pp. 191-214.
- 배재권, "모바일 클라우드 이용자의 인지된 프라이버시, 인지된 보안성, 인지된 즐거움이 지속사용의도에 미치는 영향에 관한 연구", e-비즈니스연구, 제15권 제3호, 2013, pp. 3-27.
- 송영미, 김상현, "정보시스템 서비스품질이 정부 포탈사이트 이용의도에 미치는 영향에 관한 연구", 한국경영정보학회 학술대회, 2007, pp. 875-882.
- 신영진, "인터넷 본인확인수단(I-PIN)의 보급 및 적용에 따른 개선방안 연구-개인정보보호법 제정 전, 후 이용자의 인식변화를 중심으로", 한국정책학회보, 제22권 제3호, 2013, pp. 171-199.
- 염흥열, 이석래, "인터넷 상에서 주민등록번호 대체수단 발전방향", 전자공학회지, 제32권 제11호, 2005, pp. 1381-1393.
- 유재연, "아이핀, 가입.인증 절차 복잡해 사용 꺼려", 중앙선데이, 2014.
- 윤혜정, 장재빈, 이중정, "OTP에 대한 신뢰 및 재사용의도의 결정요인," 한국컴퓨터정책학회논문지, 제15권 제12호, 2010, pp. 163-173.
- 이병용, 김민용, "생체인식기술의 지속사용의도에 영향을 미치는 요인에 관한 연구", 한국전자거래학회지, 제16권, 제3호, 2011, pp. 1-22. https://doi.org/10.7838/jsebs.2011.16.3.001
- 임동범, 제갈돈, 박동진, "지방정부의 전자적 정책참여를 위한 정보기술수용에 관한 연구 : 인터넷 전자투표를 중심으로", 한국행정논집, 제21권 제2호, 2009, pp. 375-406.
- 장인용, 염흥열, "인터넷상의 본인확인수단인 아이핀의 활성화 방안 연구", 정보보호학회논문지, 제19권 제5호, 2009, pp. 81-94.
- 정찬주, 김윤정, 김진원, 박광진, "주민번호 대체수단(i-PIN) 개발을 위한 기술표준과 서비스 프레임워크", 정보보호학회논문지, 제18권, 제6호, 2008, pp. 20-27.
- 최광희, 안종찬, 이강신, 안승호, "인터넷상 주민번호 이용을 대체하기 위한 아이핀 2.0 서비스 프레임워크", 정보보호학회논문지, 제20권 제6호, 2010, pp. 88-95.
- 최광희, 정승욱, 이강신, 안승호, "국가 IDM을 위한 아이핀 발전 전략", 정보보호학회논문지, 제21권 제4호, 2011, pp. 40-46.
- 최윤성, 이윤호, 김승주, 원동호, "주민등록번호 대체수단에 대한 구현 취약점 분석", 정보보호학회논문지, 제17권 제2호, 2007, pp. 145-185.
- 한문정, 장규현, 홍석희, 임종인, "국가 개인식별번호체계 개선에 관한 연구", 정보보호학회논문지, 제24권 제4호, 2014, pp. 721-737. https://doi.org/10.13089/JKIISC.2014.24.4.721
- Aime, M. D., Carandriello, G., and Lioy, A., "Dependability in Wireless Network : Can We Rely on WiFi?", IEEE Security and Privacy, Vol. 5, No. 1, 2007, pp. 23-29. https://doi.org/10.1109/MSP.2007.4
- Arbore, A., Soscia, I., and Bagozzi, R. P., "The Role of Signaling Identity in the Adoption of Personal Technologies", Journal of the Association for Information Systems, Vol. 15, No. 2, 2014, pp. 86-110. https://doi.org/10.17705/1jais.00352
- Aubert, B. A. and Hamel, G., "Adoption of Smart Cards on the Medical Sector : The Canadian Experience", Social Science and Medicine, Vol. 53, No. 7, 2001, pp. 879-894. https://doi.org/10.1016/S0277-9536(00)00388-9
- Calantone, R. J., Griffith, D. A., and Yalcinkaya, G., "An Empirical Examination of a Technology Adoption Model for the Context of China", Journal of Internet Marketing, Vol. 14, No. 4, 2006, pp. 1-27.
- Carter, L., "E-Government Diffusion : A Comparison of Adoption Constructs", Transforming Government : People, Process and Policy, Vol. 2, No. 3, 2008, pp. 147-161. https://doi.org/10.1108/17506160810902167
- Carter, L. and Belanger, F., "The Utilization of E-Government Services : Citizen Trust, Innovation and Acceptance Factors", Information Systems Journal, Vol. 15, No. 1, 2005, pp. 5-25. https://doi.org/10.1111/j.1365-2575.2005.00183.x
- Chan, F. K. Y., Thong, J. Y. L., Venkatesh, V., Brown, S. A., Hu, P. J. H., and Tam, K. Y., "Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology", Journal of the Association for Information Systems, Vol. 11, No. 10, 2010, pp. 519-549. https://doi.org/10.17705/1jais.00239
- Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling", Modern Methods for Business Research, 1998, pp. 295-336.
- Chin, W. W. and Gopal, A., "Adoption Intention in GSS : Importance of Beliefs", ACM SIGMIS Database, Vol. 26, No. 2-3, 1995, pp. 42-64. https://doi.org/10.1145/217278.217285
- Colesca, S. E. and Dobrica, L., "Adoption and Use of E-Government Services : The Case of Romania", Journal of Applied Research and Technology, Vol. 6, No. 3, 2008, pp. 204-217.
- Davis, F. D., "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 319-340. https://doi.org/10.2307/249008
- Davis, F. D., Bagozzi, R. P., and Warshaw, P. R., "User Acceptance of Computer Technology : A Comparison of Two Theoretical Models", Management Science, Vol. 35, No. 8, 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
- DeLone, W. H. and McLean, E. R., "Information Systems Success : The Quest for the Dependent Variable", Information Systems Research, Vol. 3, No. 1, 1992, pp. 60-95. https://doi.org/10.1287/isre.3.1.60
- Dimitrova, D. V., Chen, Y. C., "Profiling the Adopters of E-Government Information and Services, The Influence of Psychological Characteristics, Civic Mindedness, and Information Channels", Social Science Computer Review, Vol. 24, No. 2, 2006, pp. 172-188. https://doi.org/10.1177/0894439305281517
- Elgarah, W. and Falaleeva, N., "Adoption of Biometric Technology : Information Privacy and TAM", Proceeings of the Eleventh Americas Conference on Information Systems, 2005, pp. 1208-1212.
- Falk, R. F. and Miller, N. B., A Primer for Soft Modeling, Ohio : University of Akron Press, 1992.
- Fornell, C. and Larcker, D., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
- Fu, J. R., Fam, C. K., and Chao, W. P., "Acceptance of Electronic Fax Filing : A Study of Taxpayer Intentions", Information and Management, Vol. 43, No. 1, 2006, pp. 109-126. https://doi.org/10.1016/j.im.2005.04.001
- Furnell, S. M., Dowland, A. S., Illingworth, H. M., and Reynolds, P. L., "Authentication and Supervision : A Survey of User Attitudes", Computer and Security, Vol. 19, No. 6, 2000, pp. 529-539. https://doi.org/10.1016/S0167-4048(00)06027-2
- Gefen, D., Karahanna, E., and Straub, D. W., "Trust and TAM in Online Shopping : An Integrated Model", MIS Quarterly, Vol. 27, No. 1, 2003, pp. 51-90. https://doi.org/10.2307/30036519
- Harbach, M., Fahl, S., Rieger, M., and Smith, M., "On the Acceptance of Privacy-Preserving Authentication Technology : The Curious Case of National Identity Cards", Privacy Enhancing Technologies, Vol. 7981, 2013, pp. 245-264. https://doi.org/10.1007/978-3-642-39077-7_13
- Herath, T., Chen, R., Wang, J., Banjara, K., and Rao, J. W. H. R., "Security Services as Coping Mechanisms : An Investigation into user intention to adopt an Email Authentication Service", Information Systems Journal, Vol. 24, No. 1, 2014, pp. 61-84. https://doi.org/10.1111/j.1365-2575.2012.00420.x
- Hu, P. J. H., Brown, S. A., Thong, J. Y. L., Chan, F. K. Y., and Tam, K. Y., "Determinants of Service Quality and Continuance Intention of Online Services : The Case of eTax", Journal of the American Society for Information Science and Technology, Vol. 60, No. 2, 2009, pp. 292-306. https://doi.org/10.1002/asi.20956
- Kim, H. W. and Kankanhalli, A., "Investigating User Resistance to Information Systems Implementation : A Status Quo Bias Perspective", MIS Quarterly, Vol. 33, No. 3, 2009, pp. 567-582. https://doi.org/10.2307/20650309
- Laudon, K. C. and Laudon, J. P., Management Information Systems, Managing the Digital Firm, Boston : Pearson, 2012.
- Liu, Y. and Zhou, C., "A Citizen Trust Model for E-government", 2010 IEEE International Conference on Software Engineering and Service Sciences, 2010, pp. 751-754.
- Loo, W. H., Yeow, P. H. P., and Chong, S. C., "User Acceptance of Malaysian Government Multipurpose Smartcard Applications", Government Information Quarterly, Vol. 26, No. 2, 2009, pp. 358-367. https://doi.org/10.1016/j.giq.2008.07.004
- Looi, H. C., "E-Commerce Adoption in Brunei Darussalam : A Quantitative Analysis of Factors Influencing Its Adoption", Communications of the Association for Information Systems, Vol. 15, No. 1, 2005, pp. 61-81.
- Ma, W. W. K., Andersson, R., and Streith, K. O., "Examining User Acceptance of Computer Technology : An Empirical Study of Student Teachers", Journal of Computer Assisted Learning, Vol. 21, No. 6, 2005, pp. 387-395. https://doi.org/10.1111/j.1365-2729.2005.00145.x
- Nam, C. S., Bahn, S. W., and Lee, R., "Acceptance of Assistive Technology by Special Education Teachers : A Structural Equation Model Approach", International Journal of Human-Computer Interaction, Vol. 29, No. 5, 2013, pp. 365-377. https://doi.org/10.1080/10447318.2012.711990
- Nunnally, J. C., Psychometric Theory, NY : McGrow-Hill, 1987.
- Petter, S., Straub, D., and Rai, A., "Specifying Formative Constructs in Information Systems Research", MIS Quarterly, Vol. 31, No. 4, 2007, pp. 623-656. https://doi.org/10.2307/25148814
- Phang, C. W., Sutanto, J., Kankanhalli, A., Yan, L., Tan, B. C. Y., and Teo, H. H., "Senior Citizens' Acceptance of Information Systems : A Study in the Context of e-Government Services", IEEE Transactions on Engineering Management, Vol. 53, No. 4, 2006, pp. 555-569. https://doi.org/10.1109/TEM.2006.883710
- Ringle, C. M., Wende, S., and Will, A., SmartPLS 2.0., www.smartpls.de, 2005.
- Shareef, M. A., Archer, N., and Dwivedi, Y. K., "Examining Adoption Behavior of Mobile Government", Journal of Computer Information Systems, Vol. 53, No. 2, 2012, pp. 39-49.
- Silvey, S. D., "Multicollinearity and Imprecise Estimation", Journal of the Royal Statistical Society, Vol. 31, No. 3, 1969, pp. 539-552.
- Smith, K. W., Sasaki, M. S., "Decreasing Multicollinearity : A Method for Models with Multiplicative Functions", Sociological Methods and Research, Vol. 8, No. 1, 1979, pp. 35-56. https://doi.org/10.1177/004912417900800102
- Srivastava, S. C. and Teo, T. S., "Citizen Trust Development for E-Government Adoption and Usage : Insights from Young Adults in Singapore", Communications of the Association for Information Systems, Vol. 25, No. 1, 2009, pp. 359-378.
- Taherdoost, H., Sahibuddin, S., and Jalaliyoon, N., "Smart Card Security; Technology and Adoption", International Journal of Security, Vol. 5, No. 2, 2011, pp. 74-84.
- Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C., "PLS Modeling", Computational Statistics and Data Analysis, Vol. 48, No. 1, 2005, pp. 159-205. https://doi.org/10.1016/j.csda.2004.03.005
- Thompson, R., Barclay, D. W., and Higgins, C. A., "The Partial Least Squares(PLS) Approach to Causal Modeling : Personal Computer Adoption and Use as an Illustration", Technology Studies : Special Issue on Research Methodology, Vol. 2, No. 2, 1995, pp. 284-324.
- Vatanasombut, B., Igbaria, M., Stylianou, A. C., and Rodgers, W., "Information Systems Continuance Intention of Web-based Applications Customers : The Case of Online Banking", Information and Management, Vol. 45, No. 7, 2008, pp. 419-428. https://doi.org/10.1016/j.im.2008.03.005
- Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User Acceptance of Information Technology : Toward a Unified View", MIS Quarterly, Vol. 27, No. 3, 2003, pp. 425-478. https://doi.org/10.2307/30036540
- Wang, B. R., Park, J. Y., Chung, K. Y., and Choi, I. Y., "Influential Factors of Smart Health Users According to Usage Experience and Intention to Use", Wireless Personal Communications, Vol. 76, No. 4, 2014, pp. 2671-2683.
- Wang, Y. S., "The Adoption of Electronic Tax Filing Systems : An Empirical Study", Government Information Quarterly, Vol. 20, No. 4, 2003, pp. 333-352. https://doi.org/10.1016/j.giq.2003.08.005
- Wetzels, M., Odekerken-Schroder, G., and Oppen, C. V., "Using PLS Path Modeling for Assessing Hierarchical Construct Models : Guidelines and Empirical Illustration", MIS Quarterly, Vol. 33, No. 1, 2009, pp. 177-195. https://doi.org/10.2307/20650284
- Yoon, H. S. and OccenA, L., "Impacts of Customers' Perceptions on Internet Banking Use with a Smart Phone", Journal of Computer Information Systems, Vol. 53, No. 3, 2014, pp. 1-9.
- Zviran, M. and Erlich, Z., "Identification and Authentication : Technology and Implementation", Communication of the Association for Information Systems, Vol. 17, No. 4, 2006, pp. 90-105.