참고문헌
- IDC. (2016). Worldwide semiannual security spending guide.
- K. D. Loch, H. H. Carr & M. E. Warkentin. (1992). Threats to information systems: today's reality, yesterday's understanding, MIS Quarterly, 16(2), 173-186. https://doi.org/10.2307/249574
- Verizon. (2017). 2017 data breach investigations report.
- I. Hwang & D. Kim. (2016). The effect of organizational information security environment on the compliance intention of employee, The Journal of Information Systems, 25(2), 51-77. https://doi.org/10.5859/KAIS.2016.25.2.51
- D. Kim, I. Hwang & J. Kim. (2016). A study on employee's compliance behavior towards information security policy: A modified triandis model, Journal of Digital Convergence, 14(4), 209-220. https://doi.org/10.14400/JDC.2016.14.4.209
- I. Hwang, D. Kim, T. Kim & S. Kim. (2017). Why not comply with information security? An empirical approach for the causes of non-compliance, Online Information Review, 41(1), 1-17.
- J. D'Arcy, A. Hovav & D. Galletta. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, 20(1), 79-98. https://doi.org/10.1287/isre.1070.0160
- T. Herath & H. R. Rao. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems, 47(2), 154-165. https://doi.org/10.1016/j.dss.2009.02.005
- B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, 34(3), 523-548. https://doi.org/10.2307/25750690
- M. Siponen, S. Pahnila & M. A. Mahmood. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64-71. https://doi.org/10.1109/MC.2010.35
- Q. Hu, Z. Xu, T. Dinev & H. Ling. (2011). Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, 54(6), 54-60. https://doi.org/10.1145/1953122.1953142
- Y. Chen, K. Ramamurthy & K. W. Wen. (2012). Organizations' information security policy compliance: Stick or carrot approach?, Journal of Management Information Systems, 29(3), 157-188. https://doi.org/10.2753/MIS0742-1222290305
- C. Park & M. Yim. (2012). An understanding of impact of security countermeasures on persistent policy compliance. Journal of Digital Convergence, 10(4), 23-35. https://doi.org/10.14400/JDPM.2012.10.4.023
- A. Vance, M. Siponen & S. Pahnila. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, 49(3), 190-198. https://doi.org/10.1016/j.im.2012.04.002
- I. Hwang & Y. Lee. (2016). The employee's information security policy compliance intention: Theory of planned behavior, goal setting theory, and deterrence theory applied, Journal of Digital Convergence, 14(7), 155-166. https://doi.org/10.14400/JDC.2016.14.7.155
- R. H. Moorman. (1991). Relationship between organizational justice and organizational citizenship behaviors: Do fairness perceptions influence employee citizenship?, Journal of Applied Psychology, 76(6), 845-855. https://doi.org/10.1037/0021-9010.76.6.845
- J. A. Colquitt. (2001). On the dimensionality of organizational justice: a construct validation of a measure. Journal of Applied Psychology, 86(3), 386-400. https://doi.org/10.1037/0021-9010.86.3.386
- M. T. Tsai & N. C. Cheng. (2012). Understanding knowledge sharing between IT professionals-an integration of social cognitive and social exchange theory. Behaviour & Information Technology, 31(11), 1069-1080. https://doi.org/10.1080/0144929X.2010.550320
- Y. Zhang, J. A. LePine, B. R. Buckman & F. Wei. (2014). It's not fair… or is it? The role of justice and leadership in explaining work stressor-job performance relationships. Academy of Management Journal, 57(3), 675-697. https://doi.org/10.5465/amj.2011.1110
- R. West. (2008). The psychology of security. Communications of the ACM, 51(4), 34-40. https://doi.org/10.1145/1330311.1330320
- M. S. Yim. (2012). A path way to increase the intention to comply with information security policy of employees. Journal of Digital Convergence, 10(10), 119-128. https://doi.org/10.14400/JDPM.2012.10.10.119
- A. Vance, M. Siponen & S. Pahnila. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, 49(3), 190-198. https://doi.org/10.1016/j.im.2012.04.002
- P. M. Muchinsky. (2006). Psychology applied to work: An introduction to industrial and organizational psychology. Cengage Learning.
- P. E. Spector. (2009). Industrial and organizational psychology. Research and. Practice.
- T. A. Judge & J. A. Colquitt. (2004). Organizational justice and stress: the mediating role of work-family conflict. Journal of Applied Psychology, 89(3), 395-404. https://doi.org/10.1037/0021-9010.89.3.395
- H. Li, R. Sarathy, J. Zhang & X. Luo. (2014). Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Information Systems Journal, 24(6), 479-502. https://doi.org/10.1111/isj.12037
- Z. Ouyang, J. Sang, P. Li, P & J. Peng. (2015). Organizational justice and job insecurity as mediators of the effect of emotional intelligence on job satisfaction: A study from China. Personality and Individual Differences, 76, 147-152. https://doi.org/10.1016/j.paid.2014.12.004
- C. B. Meyer. (2001). Allocation processes in mergers and acquisitions: An organizational justice perspective. British Journal of Management, 12(1), 47-66. https://doi.org/10.1111/1467-8551.00185
- S. W. Hystad, K. J. Mearns & J. Eid. (2014). Moral disengagement as a mechanism between perceptions of organisational injustice and deviant work behaviours. Safety Science, 68, 138-145. https://doi.org/10.1016/j.ssci.2014.03.012
- J. Y. Son & J. Park. (2016). Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns. International Journal of Information Management, 36(3), 309-321. https://doi.org/10.1016/j.ijinfomgt.2015.12.005
- H. Zhang & N. C. Agarwal. (2009). The mediating roles of organizational justice on the relationships between HR practices and workplace outcomes: an investigation in China. The International Journal of Human Resource Management, 20(3), 676-693. https://doi.org/10.1080/09585190802707482
- E. A. Locke & G. P. Latham. (2006). New directions in goal-setting theory. Current Directions in Psychological Science, 15(5), 265-268. https://doi.org/10.1111/j.1467-8721.2006.00449.x
- E. A. Locke & G. P. Latham (2002). Building a practically useful theory of goal setting and task motivation: A 35-year odyssey. American Psychologist, 57(9), 705-717. https://doi.org/10.1037/0003-066X.57.9.705
- B. E. Wright & B. S. Davis. (2003). Job satisfaction in the public sector: The role of the work environment. The American Review of Public Administration, 33(1), 70-90. https://doi.org/10.1177/0275074002250254
- B. E. Wright. (2004). The role of work context in work motivation: A public sector application of goal and social cognitive theories. Journal of Public Administration Research and Theory, 14(1), 59-78. https://doi.org/10.1093/jopart/muh004
- J. M. Diefendorff & G. A. Seaton, G. A. (2015). Work motivation. International encyclopedia of the social & behavioral sciences, 2nd edn. Elsevier, Oxford, pp.680-686.
- C. C. Pinder. (1998). Work motivation in organizational behavior, Upper Saddle River, NJ: Prentice Hall.
- E. A. Locke & G. P. Latham. (1990). Work motivation and satisfaction: Light at the end of the tunnel. Psychological Science, 1(4), 240-246. https://doi.org/10.1111/j.1467-9280.1990.tb00207.x
- A. B. Ruighaver, S. B. Maynard & S. Chang. (2007). Organisational security culture: Extending the end-user perspective. Computers & Security, 26(1), 56-62. https://doi.org/10.1016/j.cose.2006.10.008
- I. Koskosas. (2008). Goal setting and trust in a security management context. Information Security Journal: A Global Perspective, 17(3), 151-161. https://doi.org/10.1080/19393550802290337
- A. Li & A. B. Butler. (2004). The effects of participation in goal setting and goal rationales on goal commitment: An exploration of justice mediators. Journal of Business and Psychology, 19(1), 37-51. https://doi.org/10.1023/B:JOBU.0000040271.74443.22
- Y. Chen, K. Ramamurthy, & K. W. Wen. (2012). Organizations' information security policy compliance: Stick or carrot approach?. Journal of Management Information Systems, 29(3), 157-188. https://doi.org/10.2753/MIS0742-1222290305
- J. C. Nunnally. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
- B. H. Wixom & H. J. Watson. (2001). An empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), 17-41. https://doi.org/10.2307/3250957
- C. Fornell & D. F. Larcker. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.2307/3151312
- P. M. Podsakoff, S. B. MacKenzie, J. Y. Lee & N. P. Podsakoff. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903. https://doi.org/10.1037/0021-9010.88.5.879
- L. J. Williams & S. E. Anderson. (1994). An alternative approach to method effects by using latent-variable models: Applications in organizational behavior research. Journal of Applied Psychology, 79(3), 323-331. https://doi.org/10.1037/0021-9010.79.3.323