References
- Turban, Efraim, et al. Electronic Commerce 2018: A Managerial and Social Networks Perspective. Springer, 2017.
- Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson Education India, 2016.
- 정병호․김병초, "중소기업의 IT 투자에 따른 정보 품질과 프로세스 개선에 관한 연구," 중소기업연구, 제36권, 제4호, 2014, pp.47-71.
- 최재영, "IT 투자 정당화 요인에 관한 연구," 디지털정보산업학회지, 제11권, 제4호, 2015, pp.177-187.
- Hartman, Laura Pincus, Joseph R. DesJardins, and Chris MacDonald. Business ethics: Decision making for personal integrity and social responsibility. New York: McGraw-Hill, 2014.
- NIST, Information Security Handbook: A Guide for Managers, 2006.
- Conger, Sue, Karen D. Loch, and B. Loerine Helft. "Ethics and information technology use: a factor analysis of attitudes to computer use," Information Systems Journal, Vol.5, No.3, 1995, pp. 161-183. https://doi.org/10.1111/j.1365-2575.1995.tb00106.x
- Ferrell, Odies C., and John Fraedrich. Business ethics: Ethical decision making & cases. Nelson Education, 2015.
- Heller, Frank., "Socio-technology and the environment," Human Relations, Vol.50, No.5, pp. 605-624, 1997. https://doi.org/10.1177/001872679705000507
- Elster, Jon. Rational choice history: A case of excessive ambition. 2000.
- Elster, Jon, ed. Rational choice. NYU Press, 1986.
- Elster, Jon. "The nature and scope of rational-choice explanation," Science in reflection. Springer, Vol. 110, 1988, pp.51-65.
- Tenbrunsel, Ann E. "Misrepresentation and expectations of misrepresentation in an ethical dilemma: The role of incentives and temptation." Academy of Management Journal, Vol.41, No.3, 1998, pp.330-339. https://doi.org/10.2307/256911
- De Dreu, Carsten KW, Bernard A. Nijstad, and Daan van Knippenberg. "Motivated information processing in group judgment and decision making," Personality and social psychology review, Vol.12, No.1, 2008, pp.22-49. https://doi.org/10.1177/1088868307304092
- 정병호, "기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구," 디지털정보산업학회지, 제12권, 제2호, 2016, pp.73-86.
- 이정환․정병호․김병초, "기업 보안 유형에 따른 보안사고 대응역량: 사회기술시스템 이론 관점에서," 한국IT서비스학회지, 제12권, 제1호, 2013, pp.289-208. https://doi.org/10.9716/KITS.2013.12.1.289
- 정병호․김병초, "윤리 프로그램을 통한 비윤리적 정보공유 행동의 개선 : 사회적 자본과 잔물결 효과," 한국디지털정책학회, 제15권, 제8호, 2017, pp.169-182.
- Anderson, Evan E., and Joobin Choobineh., "Enterprise information security strategies," Computers & Security, Vol.27, No.1, 2008, pp. 22-29. https://doi.org/10.1016/j.cose.2008.03.002
- Guo, Ken H., "Security-related behavior in using information systems in the workplace: A review and synthesis," Computers & Security, Vol. 32, 2013, pp. 242-251. https://doi.org/10.1016/j.cose.2012.10.003
- Schlegelmilch, Bodo B., and Irene Pollach., "The perils and opportunities of communicating corporate ethics," Journal of Marketing Management, Vol.21, No.3-4, 2005, pp.267-290. https://doi.org/10.1362/0267257053779154
- Burt, R. S. "The network structure of social capital., Research in organizational behavior," Vol. 22, 2000, pp. 345-423. https://doi.org/10.1016/S0191-3085(00)22009-1
- Clegg, Chris W., "Sociotechnical principles for system design," Applied ergonomics, Vol. 31, No. 5, 2000, pp.463-477. https://doi.org/10.1016/S0003-6870(00)00009-0
- Seibert, Scott E., Maria L. Kraimer, and Robert C. Liden., "A social capital theory of career success," Academy of management journal, Vol.44, No.2, 2001, pp. 219-237. https://doi.org/10.2307/3069452
- Ifinedo, Princely., "Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition," Information & Management, Vol. 51, No. 1, 2014, pp. 69-79. https://doi.org/10.1016/j.im.2013.10.001
- Merkow, Mark S., and Jim Breithaupt. Information security: Principles and practices, Pearson Education, 2014.
- 정병호․김병초, "IT 프로젝트 모방 투자 유형에 따른 성과 차이 연구," 한국IT서비스학회지, 제11권, 제3호, 2012, pp.205-225. https://doi.org/10.9716/KITS.2012.11.3.205
- 신현조․이경복․박태형, "인적 및 직무특성과 보안 교육 이수율 및 사이버테러 대응과의 연관성 분석," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 97-107.
- Carroll, John M., Confidential information sources: Public and private, Elsevier, 2014.
- Hair, Joseph F., Multivariate data analysis, 2010.