참고문헌
- ISACA, 'State of Cybersecurity:Implications for 2015', 보도자료, 2015.
- ITRC, 'Data Breaches Reports 2015', 2015.
- 한국인터넷진흥원, '2016 인터넷 및 정보보호 10대 이슈 전망', 2015.
- Hill, L. B. and Pemberton, J. M, "Information security: An overview and resource guide for inf.", Information Management, Vol.29, No.1, pp.14-24, 1995.
- Kesar, S. and S. Rogerson. "Developing ethical practices to minimize computer misuse", Social science computer review, Vol.16, No.3, pp.240-251, 1998. https://doi.org/10.1177/089443939801600302
- Wasik, M. 'Crime and the Computer', Oxford: Clarendon Press, 1991.
- Fafinski, S. 'Computer Misuse: Response, regulation and the law', Routledge, 2013.
- Straub, D. W. 'Deterring computer abuse: The effectiveness of deterrent countermeasures in the computer security environment', Diss, 1989.
- Ajzen, I. "The theory of planned behavior", Organizational behavior and human decision processes, Vol.50, No.2 pp.179-211, 1991. https://doi.org/10.1016/0749-5978(91)90020-T
- Nagin, D. "Crime rates, sanction levels, and constraints on prison population", Law and Society Review, pp.341-366, 1978.
- Tittle, C. R. 'Sanctions and social deviance: The question of deterrence', Praeger, 1980.
- Hollinger, R. C., and John P. C. "Deterrence in the workplace: Perceived certainty, perceived severity, and employee theft", Social forces, Vol.62 No.2 pp.398-418, 1983. https://doi.org/10.2307/2578314
- Dhillon, G. "Managing and controlling computer misuse", Information Management & Computer Security, Vol.7 No.4 pp.171-175, 1999. https://doi.org/10.1108/09685229910292664
- Lee, J. and Y. Lee. "A holistic model of computer abuse within organizations", Information management&computer security, Vol.10 No.2 pp.57-63, 2002. https://doi.org/10.1108/09685220210424104
- Wybo, M. D. and D. W. Straub Jr. "Protecting organizational information resources", Information Resources Management Journal, Vol.2 No.4 pp.1-16, 1989. https://doi.org/10.4018/irmj.1989100101
- Kankanhalli, A. et al. "An integrative study of information systems security effectiveness", International journal of information management, Vol.23 No.2 pp.139-154, 2003. https://doi.org/10.1016/S0268-4012(02)00105-6
- Irakleous, I. et al. "An experimental comparison of secret-based user authentication technologies", Information Management&Computer Security, Vol.10 No.3 pp.100-108, 2002. https://doi.org/10.1108/09685220210431854
- Skinner, W. F. and A. M. Fream, "A social learning theory analysis of computer crime among college students". Journal of research in crime and delinquency, Vol.34 No.4 pp.495-518, 1997. https://doi.org/10.1177/0022427897034004005
- Stanton, J. et al. "Behavioral information security: two end user survey studies of motivation and security practices", AMCIS 2004 Proceedings, 2004.
- Chin, W. W. "The partial least squares approach to structural equation modeling", Modern methods for business research, Vol.295 No.2 pp.295-336, 1998.
- Gefen, D, D. Straub, and Marie-Claude B. "Structural equation modeling and regression: Guidelines for research practice", Communications of the association for information systems, Vol.4 No.1, 2000.