References
- B. Khan, K. S. Alghathbar, S. I. Nabi & M. K. Khan. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management, 5(26), 10862-10868. DOI : 10.5897/AJBM11.067
- R. W. Lee, I. H. Hwang & S. H. Hu. (2017). Exploratory research of information security strategy focused on human factors. The Journal of General Education, 6, 103-124. https://doi.org/10.24173/jge.2017.12.6.4
- J. D'Arcy & P. L. Teh. (2019). Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization. Information & Management, 56(7), 103151. DOI : 10.1016/j.im.2019.02.006.
- I. Hwang, R. Wakefield, S. Kim & T. Kim. (2019). Security awareness: The first step in information security compliance behavior. Journal of Computer Information Systems, 1-12. DOI : 10.1080/08874417.2019.1650676
- H. Lee & J. Kim. (2018). A convergence study on the structural relationships among emotional labor and work performance of information security professionals. Journal of the Korea Convergence Society, 9(1), 67-74. DOI : 10.15207/JKCS.2018.9.1.067.
- Verizon. (2020). 2020 data breach investigations report.
- Grandviewresearch. (2019). Cyber security market size, share & trends analysis report by component, by security type, by solution, by service, by deployment, by organization, by application, and segment Forecasts, 2019 - 2025. https://www.globenewswire.com.
- L. Tredinnick. (2008). Digital information culture: the individual and society in the digital age, Amsterdam : Elsevier.
- M. I. Merhi & P. Ahluwalia. (2019). Examining the impact of deterrence factors and norms on resistance to information systems security. Computers in Human Behavior, 92, 37-46. DOI : 10.1016/j.chb.2018.10.031
- P. Van Schaik, K. Renaud, C. Wilson, J. Jansen, & J. Onibokun. (2020). Risk as affect: The affect heuristic in cybersecurity. Computers & Security, 90, 101651. https://doi.org/10.1016/j.cose.2019.101651
- S. Aurigemma & T. Mattson, (2017). Deterrence and punishment experience impacts on ISP compliance attitudes. Information and Computer Security, 25(4), 421-436. DOI : 10.1108/ICS-11-2016-0089.
- J. Cho, J. Yoo & J. I. Lim. (2019). An Impact Analysis of Information Security Professional's Job Stress and Job Satisfaction to Turnover Intention: Moderation of Organizational Justice. The Journal of Society for e-Business Studies, 24(3), 143-161.
- A. P. Getman, O. G. Danilyan, A. P. Dzeban, Y. Y. Kalinovsky, & Y. A. Hetman. (2020). Information security in modern society: Sociocultural aspects. Amazonia Investiga, 9(25), 6-14.
- J. G. Paolillo & S. J. Vitell. (2002). An empirical investigation of the influence of selected personal, organizational and moral intensity factors on ethical decision making. Journal of Business Ethics, 35(1), 65-74. https://doi.org/10.1023/A:1012648521593
- M. L. Foulds. (1971). Changes in locus of internal-external control: A growth group experience. Comparative Group Studies, 2(3), 293-300. DOI : 10.1177/104649647100200303
- J. Cameron & W. D. Pierce. (1994). Reinforcement, reward, and intrinsic motivation: A meta-analysis. Review of Educational research, 64(3), 363-423. DOI : 10.3102/00346543064003363
- E. A. Mannix, M. A. Neale & G. B. Northcraft. (1995). Equity, equality, or need? The effects of organizational culture on the allocation of benefits and burdens. Organizational Behavior and Human Decision Processes, 63(3), 276-286. https://doi.org/10.1006/obhd.1995.1079
- M. Siponen, S. Pahnila & M. A. Mahmood. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64-71. DOI : 10.1109/MC.2010.35
- P. Ifinedo. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79. DOI : 10.1016/j.im.2013.10.001
- E. Albrechtsen. (2007). A qualitative study of users' view on information security. Computers & Security, 26(4), 276-289. DOI : 10.1016/j.cose.2006.11.004
- A. E. Howe, I. Ray, M. Roberts, M. Urbanska & Z. Byrne, (2012). The psychology of security for the home computer user. IEEE.
- B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548. https://doi.org/10.2307/25750690
- S. H. Hu. (2020). Analysis of the impact of military organization's safety culture on safety behavior: Focusing on the mediating effect of safety leadership. Journal of Advances in Military Studies, 3(2), 63-81. DOI : 10.37944/jams.v3i2.70
- S. H. Hu. (2020). A comparative study on job orientation between enterprises and job seekers: Focusing on the recruitment process. Journal of Digital Convergence, 18(7), 85-92. https://doi.org/10.14400/JDC.2020.18.7.085
- N. S. Safa, C. Maple, T. Watson & R. Von Solms. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of information security and applications, 40, 247-257. DOI : 10.1016/j.jisa.2017.11.001