References
- 강다연, 장명희, "해운항만조직 구성원들의 정보보안정책 준수에 영향을 미치는 요인", 한국항만경제학회지, 제28권 제1호, 2012, pp. 1-23.
- 강다연, 장명희, "정보보안정책 준수가 정보보안능력 및 행동에 미치는 영향 분석 : 해운항만조직 구성원을 대상으로", 한국항만경제학회지, 제30권 제1호, 2014, pp. 97-118.
- 강욱, 전용태, "산업보안 담당자의 보안정책 준수에 영향을 미치는 요인 : 억제이론과 합리적 선택이론을 중심으로", 한국경찰연구, 제13권 제3호, 2014, pp. 273-298.
- 김상현, 송영미, "조직 구성원들의 정보보안정책 준수 동기요인에 관한 연구", e-비즈니스연구, 제12권 제3호, 2011, pp. 327-349.
- 김상훈, 박선영, "정보보안정책 준수 의도에 대한 영향요인", 한국전자거래학회지, 제16권 제4호, 2011, pp. 33-51. https://doi.org/10.7838/JSEBS.2011.16.4.033
- 김중인, "반영지표 vs. 조형지표", 마케팅연구, 제27권 제4호, 2012, pp. 199-226.
- 박철주, 임명성, "기술스트레스가 정보보안에 미치는 영향에 관한 연구", 디지털융복합연구, 제10권 제5호, 2012a, pp. 37-51. https://doi.org/10.14400/JDPM.2012.10.5.037
- 박철주, 임명성, "보안 대책이 지속적 보안 정책 준수에 미치는 영향", 디지털정책연구, 제10권 제4호, 2012b, pp. 23-35.
- 안중호, 박준형, 성기문, 이재홍, "처벌과 윤리교육이 정보보안준수에 미치는 영향 : 조직유형의 조절효과를 중심으로", Information Systems Review, 제12권 제1호, 2010, pp. 23-42.
- 윤일한, 권순동, "정보보안 컴플라이언스와 위기대응이 정보보안 신뢰에 미치는 영향에 관한 연구", Information Systems Review, 제17권 제1호, 2015, pp. 141-169. https://doi.org/10.14329/isr.2015.17.1.141
- 이강신, "전자금융거래 시 보안 통제 사항의 개선 연구", 정보보호학회논문지, 제25권 제4호, 2015, pp. 881-888. https://doi.org/10.13089/JKIISC.2015.25.4.881
- 이성규, 채명신, "산업보안정책 준수의지에 영향을 미치는 요인분석", 대한경영학회지, 제27권 제6호, 2014, pp. 927-953.
- 임명성, "조직 구성원들의 정보보안정책 준수행위 의도에 관한 연구", 디지털정책연구, 제10권 제10호, 2012a, pp. 119-128.
- 임명성, "조직의 보안 분위기가 개인의 기회주의 행동에 미치는 영향에 관한 실증 연구", 디지털융복합연구, 제10권 제10호, 2012b, pp. 31-46. https://doi.org/10.14400/JDPM.2012.10.10.031
- 임명성, "정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구", 디지털정책연구, 제11권 제1호, 2013a, pp. 27-38.
- 임명성, "조직 구성원들의 정보보안정책 위반에 영향을 미치는 요인", 디지털융복합연구, 제11권 제2호, 2013b, pp. 19-32. https://doi.org/10.14400/JDPM.2013.11.2.019
- 임명성, "조직 구성원들의 정보보안정책 준수에 영향을 미치는 요인에 관한 연구 : 금융서비스업을 중심으로", 서비스경영학회지, 제14권 제1호, 2013c, pp. 143-171.
- 임명성, 한군희, "정보보안정책 준수에 영향을 미치는 요인 : 위험보상이론 관점에서", 디지털융복합연구, 제11권 제10호, 2013, pp. 153-168. https://doi.org/10.14400/JDPM.2013.11.10.153
- 장상수, 조태희, 신승호, 신대철, 정보보호관리체계의 구축과 활용, 제1판, 생능출판사, 2013.
- 정우진, 신유형, 이상용, "금융회사의 고객정보보호에 대한 내부직원의 태도 연구", Asia Pacific Journal of Information Systems, 제22권 제1호, 2012, pp. 53-77. https://doi.org/10.1111/j.1365-2575.2011.00369.x
- 정해철, 김현수, "조직구성원의 정보보안 의식과 조직의 정보보안 수준과의 관계 연구", Journal of Information Technology Applications and Management, 제7권 제2호, 2000, pp. 117-134.
- Ajzen, I., "The theory of planned behavior", Organizational behavior and human decision processes, Vol. 50, No. 2, 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Anderson, C. L. and Agarwal, R., "Practicing safe computing : A multimedia empirical examination of home computer user security behavioral intentions", Mis Quarterly, Vol. 34, No. 3, 2010, pp. 613-643. https://doi.org/10.2307/25750694
- Anderson, J. C. and Gerbing, D. W., "Structural equation modeling in practice : A review and recommended two-step approach", Psychological Bulletin, Vol. 103, No. 3, 1988, p. 411. https://doi.org/10.1037/0033-2909.103.3.411
- Aurigemma, S., "A composite framework for behavioral compliance with information security policies", Journal of Organizational and End User Computing, Vol. 25, No. 3, 2013, pp. 32-51. https://doi.org/10.4018/joeuc.2013070103
- Bagozzi, R. P. and Yi, Y., "On the evaluation of structural equation models", Journal of the Academy of Marketing Science, Vol. 16, No. 1, 1988, pp. 74-94. https://doi.org/10.1007/BF02723327
- Bansal, G. and Gefen, D., "The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online", Decision Support Systems, Vol. 49, No. 2, 2010, pp. 138-150. https://doi.org/10.1016/j.dss.2010.01.010
- Barclay, D., Higgins, C., and Thompson, R., "The partial least squares (pls) approach to causal modeling : Personal computer adoption and use as an illustration", Technology Studies, Vol. 2, No. 2, 1995, pp. 285-309.
- Bollen, K. A., Structural equations with latent variables, John Wiley and Sons, 2014.
- Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Effects of individual and organization based beliefs and the moderating role of work experience on insiders' good security behaviors", Computational Science and Engineering, 2009 CSE'09 International Conference on, Vol. 3, 2009a, pp. 476-481.
- Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Roles of information security awareness and perceived fairness in information security policy compliance", Proceedings of the Americas Conference on Information Systems, Vol. 15, No. 5, 2009b, pp. 3269-3277.
- Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information security policy compliance : An empirical study of rationality-based beliefs and information security awareness", MIS quarterly, Vol. 34, No. 3, 2010, pp. 523-548. https://doi.org/10.2307/25750690
- Chin, W. W., "The partial least squares approach to structural equation modeling", Modern Methods for Business Research, Vol. 295, No. 2, 1998, pp. 295-336.
- Chin, W. W. and Gopal, A., "Adoption intention in gss : Relative importance of beliefs", ACM SigMIS Database, Vol. 26, No. 2-3, 1995, pp. 42-64. https://doi.org/10.1145/217278.217285
- Chin, W. W., Marcolin, B. L., and Newsted, P. R., "A partial least squares latent variable modeling approach for measuring interaction effects : Results from a monte carlo simulation study and an electronic-mail emotion/adoption study", Information Systems Research, Vol. 14, No. 2, 2003, pp. 189-217. https://doi.org/10.1287/isre.14.2.189.16018
- Cohen, J., Statistical power analysis for the behavioral sciences, Academic press, 2013.
- D'Arcy, J. and Herath, T., "A review and analysis of deterrence theory in the is security literature : Making sense of the disparate findings", European Journal of Information Systems, Vol. 20, No. 6, 2011, pp. 643-658. https://doi.org/10.1057/ejis.2011.23
- D'Arcy, J. and Hovav, A., "Deterring internal information systems misuse", Communications of the ACM, Vol. 50, No. 10, 2007, pp. 113-117. https://doi.org/10.1145/1290958.1290971
- D'Arcy, J., Hovav, A., and Galletta, D., "User awareness of security countermeasures and its impact on information systems misuse : A deterrence approach", Information Systems Research, Vol. 20, No. 1, 2009, pp. 79-98. https://doi.org/10.1287/isre.1070.0160
- Fishbein, M. and Ajzen, I., Belief, attitude, intention and behavior : An introduction to theory and research, MA : Addison-Wesley, 1975.
- Fishbein, M., Ajzen, I., Albarracin, D., and Hornik, R. C., Prediction and change of health behavior : Applying the reasoned action approach, Psychology Press, 2007.
- Fornell, C. and Larcker, D. F., "Evaluating structural equation models with unobservable variables and measurement error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
- Foltz C. B., Schwager, P. H., and Anderson, J. E., "Why users (fail to) read computer usage policies", Industrial Management and Data Systems, Vol. 108, No. 6, 2008, pp. 701-712. https://doi.org/10.1108/02635570810883969
- Gefen, D. and Straub, D., "A practical guide to factorial validity using pls-graph : Tutorial and annotated example", Communications of the Association for Information Systems, Vol. 16, 2005, p. 1.
- Geisser, S., "The predictive sample reuse method with applications", Journal of the American Statistical Association, Vol. 70, No. 350, 1975, pp. 320-328. https://doi.org/10.1080/01621459.1975.10479865
- Guo, K. H., Yuan, Y., Archer, N. P., and Connelly, C. E., "Understanding nonmalicious security violations in the workplace : A composite behavior model", Journal of Management Information Systems, Vol. 28, No. 2, 2011, pp. 203-236. https://doi.org/10.2753/MIS0742-1222280208
- Hair, J. F., Sarstedt, M., Ringle, C. M., and Mena, J. A., "An assessment of the use of partial least squares structural equation modeling in marketing research", Journal of the Academy of Marketing Science, Vol. 40, No. 3, 2012, pp. 414-433. https://doi.org/10.1007/s11747-011-0261-6
- Henseler, J., Ringle, C. M., and Sinkovics, R. R., "The use of partial least squares path modeling in international marketing", Advances in International Marketing (AIM), Vol. 20, 2009, pp. 277-320.
- Herath, T. and Rao, H. R., "Encouraging information security behaviors in organizations : Role of penalties, pressures and perceived effectiveness", Decision Support Systems, Vol. 47, No. 2, 2009a, pp. 154-165. https://doi.org/10.1016/j.dss.2009.02.005
- Herath, T. and Rao, H. R., "Protection motivation and deterrence : A framework for security policy compliance in organisations", European Journal of Information Systems, Vol. 18, No. 2, 2009b, pp. 106-125. https://doi.org/10.1057/ejis.2009.6
- Herzberg, F., "The motivation-hygiene concept and problems of manpower", Personnel Administration, 1964.
- Hu, Q., Xu, Z., Dinev, T., and Ling, H., "Does deterrence work in reducing information security policy abuse by employees?", Communications of the ACM, Vol. 54, No. 6, 2011, pp. 54-60. https://doi.org/10.1145/1953122.1953142
- Hulland, J., "Use of partial least squares (pls) in strategic management research : A review of four recent studies", Strategic Management Journal, Vol. 20, No. 2, 1999, pp. 195-204. https://doi.org/10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7
- Ifinedo, P., "Understanding information systems security policy compliance : An integration of the theory of planned behavior and the protection motivation theory", Computers and Security, Vol. 31, No. 1, 2012, pp. 83-95. https://doi.org/10.1016/j.cose.2011.10.007
- Joreskog, K. G. and Sorbom, D., Lisrel 7 : A guide to the program and applications, SPSS, 1989.
- Kankanhalli, A., Teo, H. H., Tan, B. C., and Wei, K. K., "An integrative study of information systems security effectiveness", International Journal of Information Management, Vol. 23, No. 2, 2003, pp. 139-154. https://doi.org/10.1016/S0268-4012(02)00105-6
- Keil, M., Rai, A., and Liu, S., "How user risk and requirements risk moderate the effects of formal and informal control on the process performance of it projects", European Journal of Information Systems, Vol. 22, No. 6, 2013, pp. 650-672. https://doi.org/10.1057/ejis.2012.42
- Keil, M., Tan, B. C., Wei, K. K., Saarinen, T., Tuunainen, V., and Wassenaar, A., "A cross-cultural study on escalation of commitment behavior in software projects", MIS Quarterly, Vol. 24, No. 2, 2000, pp. 299-325. https://doi.org/10.2307/3250940
- Kim, S. H., Yang, K. H., and Park, S. Y., "An integrative behavioral model of information security policy compliance", The Scientific World Journal, Vol. 2014, 2014.
- Kutner, M. H., Nachtsheim, C., and Neter, J., Applied linear regression models, McGraw-Hill/Irwin, 2004.
- Leach, J., "Improving user security behaviour", Computers and Security, Vol. 22, No. 8, 2003, pp. 685-692. https://doi.org/10.1016/S0167-4048(03)00007-5
- Lee, J. T. and Lee, Y. H., "A holistic model of computer abuse within organizations", Information Management and Computer Security, Vol. 10, No. 2, 2002, pp. 57-63. https://doi.org/10.1108/09685220210424104
- Li, H., Zhang, J., and Sarathy, R., "Understanding compliance with internet use policy from the perspective of rational choice theory", Decision Support Systems, Vol. 48, No. 4, 2010, pp. 635-645. https://doi.org/10.1016/j.dss.2009.12.005
- Nagin, D. S. and Paternoster, R., "Enduring individual differences and rational choice theories of crime", Law and Society Review, Vol. 27, No. 3, 1993, pp. 467-496. https://doi.org/10.2307/3054102
- Nagin, D. S. and Pogarsky, G., "Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence : Theory and evidence", Criminology, Vol. 39, No. 4, 2001, pp. 865-892. https://doi.org/10.1111/j.1745-9125.2001.tb00943.x
- Ophoff, J., Jensen, A., Sanderson-Smith, J., Porter, M., and Johnston, K., "A descriptive literature review and classification of insider threat research", Proceedings of Informing Science and IT Education Conference (InSITE), 2014.
- Pahnila, S., Siponen, M., and Mahmood, A., "Employees' behavior towards is security policy compliance", System Sciences, 2007 HICSS 2007 40th Annual Hawaii International Conference on, 2007, p. 156b.
- Paternoster, R. and Simpson, S., "Sanction threats and appeals to morality : Testing a rational choice model of corporate crime", Law and Society Review, Vol. 30, No. 3, 1996, pp. 549-583. https://doi.org/10.2307/3054128
- Peltier, T. R., "Implementing an information security awareness program", Information Systems Security, Vol. 14, No. 2, 2005, pp. 37-49. https://doi.org/10.1201/1086/45241.14.2.20050501/88292.6
- Siponen, M., Mahmood, M. A., and Pahnila, S., "Employees'adherence to information security policies : An exploratory field study", Information and Management, Vol. 51, No. 2, 2014, pp. 217-224. https://doi.org/10.1016/j.im.2013.08.006
- Siponen, M., Pahnila, S., and Mahmood, M. A., "Compliance with information security policies : An empirical investigation", Computer, Vol. 43, No. 2, 2010, pp. 64-71. https://doi.org/10.1109/MC.2010.35
- Siponen, M. and Vance, A., "Neutralization : New insights into the problem of employee information systems security policy violations", MIS quarterly, Vol. 34, No. 3, 2010, pp. 487-502. https://doi.org/10.2307/25750688
- Siponen, M., "A conceptual foundation for organizational information security awareness", Information Management and Computer Security, Vol. 8, No. 1, 2000, pp. 31-41. https://doi.org/10.1108/09685220010371394
- Sommestad, T., Hallberg, J., Lundholm, K., and Bengtsson, J., "Variables influencing information security policy compliance", Information Management and Computer Security, Vol. 22, No. 1, 2014, pp. 42-75. https://doi.org/10.1108/IMCS-08-2012-0045
- Son, J. Y., "Out of fear or desire? Toward a better understanding of employees' motivation to follow is security policies", Information and Management, Vol. 48, No. 7, 2011, pp. 296-302. https://doi.org/10.1016/j.im.2011.07.002
- Sosik, J. J., Kahai, S. S., and Piovoso, M. J., "Silver bullet or voodoo statistics? A primer for using the partial least squares data analytic technique in group and organization research", Group and Organization Management, Vol. 34, No. 1, 2009, pp. 5-36. https://doi.org/10.1177/1059601108329198
- Stone, M., "Cross-validatory choice and assessment of statistical predictions", Journal of the Royal Statistical Society Series B (Methodological), 1974, pp. 111-147.
- Straub, D., "Effective is security : An empirical study", Information Systems Research, Vol. 1, No. 3, 1990, pp. 255-276. https://doi.org/10.1287/isre.1.3.255
- Tenenhaus, M., Amato, S., and Esposito, Vinzi V., "A global goodness-of-fit index for pls structural equation modelling", Proceedings of the XLII SIS scientific meeting, Vol. 1, 2004, pp. 739-742.
- Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C., "PLS path modeling", Computational Statistics and Data Analysis, Vol. 48, No. 1, 2005, pp. 159-205. https://doi.org/10.1016/j.csda.2004.03.005
- Theoharidou, M., Kokolakis, S., Karyda, M., and Kiountouzis, E., "The insider threat to information systems and the effectiveness of iso17799", Computers and Security, Vol. 24, No. 6, 2005, pp. 472-484. https://doi.org/10.1016/j.cose.2005.05.002
- Vance, A., Siponen, M., and Pahnila, S., "Motivating is security compliance : Insights from habit and protection motivation theory", Information and Management, Vol. 49, No. 3-4, 2012, pp. 190-198. https://doi.org/10.1016/j.im.2012.04.002
- Vance, A. and Siponen, M., "Is security policy violations : A rational choice perspective", Journal of Organizational and End User Computing (JOEUC), Vol. 24, No. 1, 2012, pp. 21-41. https://doi.org/10.4018/joeuc.2012010102
- Wall, J. D., Palvia, P., and Lowry, P. B., "Control- related motivations and information security policy compliance : The role of autonomy and efficacy", Journal of Information Privacy and Security, Vol. 9, No. 4, 2013, pp. 52-79. https://doi.org/10.1080/15536548.2013.10845690
- Whitman, M. E., "In defense of the realm : Understanding the threats to information security", International Journal of Information Management, Vol. 24, No. 1, 2004, pp. 43-57. https://doi.org/10.1016/j.ijinfomgt.2003.12.003
- Whitman, M. E., Townsend, A. M., and Aalberts, R. J., "Information systems security and the need for policy", Information Security Management : Global Challenges in the New Millennium, 2001, pp. 9-18.
- Williams, K. R. and Hawkins, R., "Perceptual research on general deterrence : A critical review", Law and Society Review, Vol. 24, No. 4, 1986, pp. 545-572.
- Willison, R. and Warkentin, M., "Beyond deterrence : An expanded view of employee computer abuse", MIS Quarterly, Vol. 37, No. 1, 2013.
- Yang, Y., Stafford, T. F., and Gillenson, M., "Satisfaction with employee relationship management systems : The impact of usefulness on systems quality perceptions", European Journal of Information Systems, Vol. 20, No. 2, 2011, pp. 221-236. https://doi.org/10.1057/ejis.2010.69
- Yoon, C. H., "Theory of planned behavior and ethics theory in digital piracy : An integrated model", Journal of Business Ethics, Vol. 100, No. 3, 2011, pp. 405-417. https://doi.org/10.1007/s10551-010-0687-7
- Yoon, C. H. and Kim, H. G., "Understanding computer security behavioral intention in the workplace", Information Technology and People, Vol. 26, No. 4, 2013, pp. 401-419. https://doi.org/10.1108/ITP-12-2012-0147
- Zhang, J., Reithel, B. J., and Li, H., "Impact of perceived technical protection on security behaviors", Information Management and Computer Security, Vol. 17, No. 4, 2009, pp. 330-340. https://doi.org/10.1108/09685220910993980
Cited by
- 조직 구성원들의 보안정책 위반에 관한 연구 vol.25, pp.3, 2015, https://doi.org/10.22693/niaip.2018.25.3.095