References
- 남기화, 여정성, "모바일 광고의 단계별 수용과정에 관한 연구", 소비자학연구, 제22권, 제4호, 2011, pp. 1-28.
- 박세정, "세계 스마트폰 보급률 70% 육박...세계1위 한국은 몇%?", 디지털타임스, 2016.7. 2, Available at http://www.dt.co.kr/contents.html?article_no=2016070102100151780001.
- 이중배, "2015 라이프 스타일과 소비 성향: 10대부터 50대까지", 슬로우뉴스, 2015.9.3, Available at http://slownews.kr/45332.
- 정기석, "국내 모바일 간편결제 활성화 방안에 관한 연구", 융합보안논문지, 제15권, 제4호, 2013, pp. 79-88.
- 정용준, 김예진, "상관분석 및 의사결정나무분석을 통한 하수처리시설의 에너지 소비량과 운영인자의 관계 분석", Journal of Korean Society on Water Environment, 제32권, 제3호, 2016, pp. 253-260. https://doi.org/10.15681/KSWE.2016.32.3.253
- 최양서, 서동일, "사회공학적 공격방법을 통한 개인정보 유출기술 및 대응방안 분석", 정보보호학회지, 제16권, 제1호, 2006, pp. 40-48.
- 허경옥, "소비자의 구매의사결정 행동유형이 TV 광고에 대한 소비자신뢰도 및 수용도에 미치는 영향", 소비자문제연구, 제26권, 제2호, 2015, pp. 1-22.
- 홍종선, "'토종 1호' 소셜커머스 창업 신현성 티몬 이사회 의장 "알면 알수록 도전하는 게 힘들다, 나도 두렵다", 주간동아, 2017.8.2, Available at http://weekly.donga.com/3/all/11/1012634/1.
- Abu-Nimeh, S., D. Nappa, X. Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection", In Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, 2007, pp. 60-69.
- Bamba, F. and S. J. Barnes, "SMS advertising, permission and the consumer: A study", Business Process Management Journal, Vol.13, 2007, pp. 815-829. https://doi.org/10.1108/14637150710834578
- Castaneda, J. A. and F. J. Montoro, "The effect of Internet general privacy concern on customer behavior", Electronic Commerce Research, Vol.7, No.2, 2007, pp. 117-141. https://doi.org/10.1007/s10660-007-9000-y
- Cheung, C. M. Y., C. L. Sia, and K. K. Kuan, "Is this review believable? A study of factors affecting the credibility of online consumer reviews from an ELM perspective", Journal of the Association for Information Systems, Vol.13, 2012, pp. 618-635. https://doi.org/10.17705/1jais.00305
- Chutijirawong, N. and P. Kanawattanachai, "The role and impact of context-driven personalisation technology on customer acceptance of advertising via short message service (SMS)", International Journal of Mobile Communications, Vol.12, No.6, 2014, pp. 578-602. https://doi.org/10.1504/IJMC.2014.064914
- Cialdini, R. B., Influence: Science and Practice, Pearson Education, Boston, 2009.
- Dharmadasa, P. and T. Alahakoon, "An empirical study of factors influencing consumer attitudes towards SMS advertising", International Journal of Online Marketing (IJOM), Vol.4, No.3, 2014, pp. 1-13. https://doi.org/10.4018/ijom.2014070101
- Dinev, T., A. R. McConnell, and H. Jeff Smith, "Research commentary-informing privacy research through information systems, psychology, and behavioral economics: Thinking outside the "APCO" Box", Information Systems Research, Vol.26 No.4, 2015, pp. 639-655. https://doi.org/10.1287/isre.2015.0600
- Drossos, D., G. M. Giaglis, G. Lekakos, F. Kokkinaki, and M. G. Stavraki, "Determinants of effective SMS advertising: An experimental study", Journal of Interactive Advertising, Vol.7, No.2, 2007, pp. 16-27. https://doi.org/10.1080/15252019.2007.10722128
- Drossos, D., G. M. Glaglis, G. Lekakos, F. Kokkinaki, and M. G. Stavraki, "Determinants of effective SMS advertising: An experimental study", Journal of Interactive Advertising, Vol.7, No.2, 2007, pp. 16-27. https://doi.org/10.1080/15252019.2007.10722128
- Dutta-Bergman, M. J., "The impact of completeness and Web use motivation on the credibility of e-health information", Journal of Communication, Vol.54, No.2, 2004, pp. 253-269. https://doi.org/10.1111/j.1460-2466.2004.tb02627.x
- Eveland, W. P., D. V. Shah, and N. Kwak, "Assessing causality in the cognitive mediation model: A panel study of motivations, information processing, and learning during campaign", Communication Research, Vol.30, 2003, pp. 359-386. https://doi.org/10.1177/0093650203253369
- EY.com, "Creating trust in the digital world", EY's Global Information Security Survey 2015, 2015.
- Goel, S., K. Williams, and E. Dincelli, "Got phished? Internet security and human vulnerability", Journal of the Association for Information Systems, Vol.1, No.1, 2017, pp. 22-44. https://doi.org/10.17705/1jais.00447
- Harrison, B., E. Svetieva, and A. Vishwanath, "Individual processing of phishing emails How attention and elaboration protect against phishing", Online Information Review, Vol.40, No.2, 2016, pp. 265-281. https://doi.org/10.1108/OIR-04-2015-0106
- Jagatic, T., N. Johnson, M. Jakobsson, and F. Menczer, Social Phishing, School of Informatics and Department of Computer Science, Indiana University, 2006, Available at http://www.indiana.edu/~phishing/social-network-experience/phishing-preprint.pdf.
- Jakobsson, M. and J. Ratkiewicz, "Designing ethical phishing experiments: A study of (ROT13) rOnl query features", In Proceedings of the 15th International Conference on World Wide Web, 2006, pp. 513-522.
- Jakobsson, M., A. Tsow, A. Shah, E. Blevis, and Y. K. Lim, "What instills trust? A qualitative study of phishing", In Proceedings of the 11th International Conference on Financial Cryptography, 2007, pp. 356-361.
- Jakobsson, M., The human factor in phishing, Privacy and Security of Consumer Information, Indiana University, Bloomington, IN, 2007.
- Johnson, P. E., S. Grazioli, K. Jamal, and I .A. Zualkernan, "Success and failure in expert reasoning", Organizational Behavior and Human Decision Processes, Vol.53, 1992, pp. 173-203. https://doi.org/10.1016/0749-5978(92)90061-B
- Mathieson, K., "Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior", Information Systems Research, Vol.2, 1991, pp. 173-191. https://doi.org/10.1287/isre.2.3.173
- Mitnick, K. and W. L. Simon, The Art of Deception: Controlling the Human Element of Security, New York, John Wiley & Sons, 2011.
- Nov, O. and C. Ye, "Users' personality and perceived ease of use of digital libraries: The case for resistance to change", Journal of the American Society for Information Science and Technology, Vol.53, 2008, pp. 845-851. https://doi.org/10.1002/asi.20800
- Perse, E. M., "Audience selectivity and involvement in the newer media environment", Communication Research, Vol.17, 1990, pp. 675-697. https://doi.org/10.1177/009365090017005005
- Petty, R. E. and D. T. Wegener Attitude Change: Multiple Roles for Persuasion Variables, New York, McGraw-Hill, 1998.
- Petty, R. E. and J. T. Cacioppo, Attitudes and Persuasion: Classic and Contemporary Approaches, William C. Brown, Dubuque, IA, 1981.
- Sutanto, J., E. Palme, C. H. Tan, and C. W. Phang, "Addressing the personalization-privacy paradox: An empirical assessment from a field experiment on smartphone users", Mis Quarterly, Vol.37, No.4, 2013, pp. 1141-1164. https://doi.org/10.25300/MISQ/2013/37.4.07
- Vishwanath, A., T. Herath, R. Chen, J. Wang, and H. R. Rao, "Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model", Decision Support Systems, Vol.51, 2011, pp. 576-586. https://doi.org/10.1016/j.dss.2011.03.002
- Wang, C., P. Zhang, R. Choi, and M. DiEredita, "Understanding consumers attitude toward advertising", Eighth Americas Conference on Information Systems, 2002, Available at http://www.sighci.org/amcis02/RIP/Dishaw.pdf.
- Wirtz, J., M. O. Lwin, and J. D. Williams, "Causes and consequences of consumer online privacy concern", International Journal of Service Industry Management, Vol.18, No.4, 2007, pp. 326-348. https://doi.org/10.1108/09564230710778128
- Zaichkowsky, J. L., "Measuring the involvement construct", The Journal of Consumer Research, Vol.12, 1985, pp. 341-352. https://doi.org/10.1086/208520
- Zhou, T., "The impact of privacy concern on user adoption of location-based services", Industrial Management and Data Systems, Vol.111, No.2, 2011, pp. 212-226. https://doi.org/10.1108/02635571111115146