References
- K. Kim "[Proper Knowledge of the ICT Act] The Crisis of Electronic Financial Transactions: Phishing, Pharming, and Smishing." Accessed Mar. 16, 2013. http://www.ddaily.co.kr/news/news_view.php?uid=102313
- D.B. Parke, "The Strategic Values of Information Security in Business," Comput. Security, vol. 16, no. 7, 1997, pp. 572-582. https://doi.org/10.1016/S0167-4048(97)80793-6
- J.D. Kim and J.E. Park, "A Study on ROSI of TCO-Based Information Protection," Collection Papers Digit. Policy Soc. Inauguration Symp., Seoul, Rep. of Korea, Dec. 12, 2003, pp. 251-261.
- C.C. Wood, "Part of the Foundation for Secure Systems: Separation of Duties Policy," Inf. Manag. Comput. Security, vol. 5, no. 1, 1997, pp. 18-19. https://doi.org/10.1108/09685229710167999
- H. Kong, T.S. Kim, and J.D. Kim, "An Analysis on Effects of Information Security Investments: A BSC Perspective," J. Intell. Manuf., vol. 23, no. 4, Aug. 2012, pp. 941-953. https://doi.org/10.1007/s10845-010-0402-7
- G.L. Urban, F. Sultan, and W.J. Qualls, "Placing Trust at the Center of Your Internet Strategy," Sloan Manag. Rev., vol. 42, no. 1, 2000, pp. 39-48.
- S. Jeong, "A Study on the Effect of Organizational Support and Service Activities on Corporate Performance in the Securities Industry," Service Manag. Soc. J., vol. 13, no. 3, 2012, pp. 275-292.
- F. Herzberg, B. Mauner, and B.B. Snyderman, "The Motivation to Work," New York, NY, USA: John Wiley & Sons, 1959.
- F. Herzberg, "Work and the Nature of Man," New York, NY, USA: World Publishing Co., 1966.
- T.M. Amabile et al, "The Work Preference Inventory: Assessing Intrinsic and Extrinsic Motivational Orientations," J. Pers. Soc. Psychology, vol. 66, no. 5, 1994, pp. 950-967. https://doi.org/10.1037/0022-3514.66.5.950
- M. Tampoe, "Motivating Knowledge Workers - the Challenge for the 1990s," Long Range Planning, vol. 26, no. 3, June 1993, pp. 49-55. https://doi.org/10.1016/0024-6301(93)90006-2
- C. Janssen, "IT Infrastructure," Techopedia TM, Janalta Interactive Inc. Accessed Aug. 14, 2013. http://www.techopedia.com/definition/29199/it-infrastructure
- D.J. Bowersox and P.J. Daugherty, "Logistics Paradigms: The Impact of Information Technology," J. Business Logistics, vol. 16, no. 1, 1995, pp. 65-80.
- R.P. Derocher and J. Kilpatrick, "Six Supply Chain Lessons for the Millennium," Supply Chain Manag. Rev., vol. 3, no. 4, 2000, pp. 34-40.
- J.Y. Son, S. Narasimhan, and F.J. Riggins, "Effects of Relational Factors and Channel Climate on EDI Usage in the Customer-Supplier Relationship," J. Manag. Inf. Syst., vol. 22, no. 1, 2005, pp. 321-353.
- R. Patnayakuni, A. Rai, and N. Seth, "Relational Antecedents of Information Flow Integration for Supply Chain Coordination," J. Manag. Inf. Syst., vol. 23, 2006, pp. 13-49.
- R.M. Monczka et al., "Success Factors in Strategic Supplier Alliances: The Buying Company Perspective," Decision Sci., vol. 29, no. 3, June 2007, pp. 533-577.
- K. Sengupta, D.R. Heiser, and L.S. Cook, "Manufacturing and Service Supply Chain Performance: A Comparative Analysis," J. Supply Chain Manag., vol. 42, no. 4, Oct. 2006, pp. 4-15.
- R.E. Spekman, J.W. Kamauff Jr, and N. Myhr, "An Empirical Investigation into Supply Chain Management: A Perspective on Partnership," Supply Chain Management: Int. J., vol. 3, no. 2, 1998, pp. 53-67. https://doi.org/10.1108/13598549810215379
- J.H. Lee, "The Impact of Security and the Control of Financial Institutions on ERP System Performance," J. Korean Academic Soc. Accounting, vol. 15, no. 1, 2010, pp. 309-329.
- D. Scott, "Best Practice and Trends in Business Continuity Planning," presented at the U.S. Symposium/ITxpo, Gartner, Inc., Orlando, FL, USA, 2002.
- C. Fornell and F.L. Bookstein, "Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory," J. Marketing Res., vol. 19, no. 4, 1982, pp. 440-452. https://doi.org/10.2307/3151718
- W.W. Chin and A. Gopal, "Adoption Intention in GSS: Relative Importance of Beliefs," ACM SIGMIS Database, vol. 26, no. 2, 1995, pp. 42-64. https://doi.org/10.1145/217278.217285
- W.W. Chin, "Issues and Opinion on Structural Equation Modeling," MIS Quarterly, vol. 22, no. 1, Mar. 1998, pp. 7-16.
- R.F. Falk and N.B. Miller, "A Primer on Soft Modeling," Akron, OH, USA: The University of Akron Press, 1992.
- C. Fornell and D.F. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," J. Marketing Res., vol. 18, no. 1, Feb. 1981, pp. 39-50. https://doi.org/10.2307/3151312
- J.C. Nunnally and I.H. Bernstein, "Psychometric Theory," New York, NY, USA: McGraw-Hill, 1987.
- D. Barclay, C. Higgins, and R. Thompson, "The Partial Least Squares Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration," Technol. Studies, vol. 2, no. 2, 1995, pp. 285-309.
- M. Tenenhaus et al., "PLS Path Modeling," Comput. Statistics Data Anal., vol. 48, no. 1, Jan. 2005, pp. 159-205. https://doi.org/10.1016/j.csda.2004.03.005
- M. Wetzels, G. Odekerken-Schroder, and C. Oppen, "Using PLS Path Modeling for Assessing Hierarchical Construct Models: Guidelines and Empirical Illustration," MIS Quarterly, vol. 33, no. 1, Mar. 2009, pp. 177-195. https://doi.org/10.2307/20650284
Cited by
- A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study vol.11, pp.9, 2017, https://doi.org/10.3837/tiis.2017.09.022
- A Structural Model Approach for Assessing Information Security Value in Organizations : vol.9, pp.4, 2018, https://doi.org/10.4018/ijsds.2018100104
- Cybercrime: an emerging threat to the banking sector of Pakistan vol.26, pp.1, 2015, https://doi.org/10.1108/jfc-11-2017-0118
- Determinants of Bank Competitiveness in Digital Era A Case Study of South Korea vol.2019, pp.2, 2015, https://doi.org/10.7172/2353-6845.jbfe.2019.2.3