과제정보
This Study was conducted by research funds from Gwangju University in 2021.
참고문헌
- D. S. Jun & D. W. Kim. (2016). Perceived Severity and Its Effects on Awareness of Personal Information Rights. Journal & Article Management System, 30(1), 345-367. DOI : 10.18398/kjlgas.2016.30.1.345
- M. S. Kim & S. T. Kim. (2014). A Study on Intention to Accept the Right to be Forgotten Associated with Exposure of Personal Data. Korean Journal of Journalism and Communication Studies, (2), 307-336.
- (2021. 10. 13.). http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1366
- A. R. Lee, S. M. Son, H. J. Kim & B. S. Kim(2016). Improving Personal Data Protection in IoT Environments. Journal of The Korea Institute of Information Security & Cryptology, 26(4), 995-1012. DOI: 10.13089/JKIISC.2016.26.4.995
- http://lic.welfare.net/lic/ViewCertRegime.action#tab_01
- B. R. Lee. (2013). Human Rights Decisions on Protection of Personal Information and Case management in the Field of Social-welfare: Based on decisions recommended by National Human Rights Commission of Korea. Korea Public Land Law Association Public Land Law Review, (62), 467-490.
- G. B. Kwon. (2012). Informational Human Rights and the National Human Rights Commission. Constitutional studies, 18(2), 99-142.
- L. Tredinnick. (2008). Digital information culture: the individual and society in the digital age, Amsterdam: Elsevier.
- R. W. Lee, I. H. Hwang & S. H. Hu(2017). Exploratory research of information security strategy-focused on human factors. The Journal of General Education, 6, 103-124. DOI: 10.24173/jge.2017.12.6.4
- H. J. kwon. (2021). A Study on Factors Influencing Job Performance of Information Security Education Service: Cyber Security in Health and Medical Sector. Soongsil University.
- C. L. Anderson & R. Agarwal. (2010). Practicing Safe Computing : A Multi method Empirical Examination of Home Computer User Security Behavioral Intentions, MIS Quarterly, 34(3), 613-643. DOI: 10.2307/25750694
- C. O. Park & S. W. Lee. (2014). A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory. Journal of Internet Computing and Services, 15(2), 59-71. DOI: 10.7472/jksii.2014.15.2.59
- H. Y. Sin. (2013). An empirical study on information security behavior intent of smartphone users. Yeungnam University.
- D. O. Kang & M. H. Chang. (2016). The Influence of Information Security Behaviors on Information Security Performance in Shipping and Port Organization. Journal of Korean Navigation and Port Research, 40(4), 213-222. DOI: 10.5394/KINPR.2016.40.4.213
- J. G. Choi. (2014). An Empirical Study on the Relationship of Personal Optimistic Bias and Information Security Awareness and Behavior and Behavior in the Activity of Information Ethics. Seoul Venture University.
- K. E. Min, S. J. Kim & D. S. Kwon. (2016). The effects on privacy protection behavior through mobile messenger security awareness and security intention: Focus on Theory of Self-Determination. Management Information Systems review, 35(1), 207-233. DOI: 10.29214/damis.2016.35.1.011
- K. H. Lee, K. S. Han & J. S. Jung. (2016). A Study of Influencing Factors for Compliance Intention of Personal Information Protection Policy of Public Institution Employees. Entrue Journal of Information Technology, 15(1), 75-94.
- K. A. Park. (2019). A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior. Journal of the Korea Industrial Information Systems Research, 24(4), 79-98. DOI: 10.9723/jksiis.2019.24.4.079
- N. D. Weinstein. (1980). Unrealistic optimism about future life events, Journal of Personality and Social Psychology, 39(5), 806-820. DOI: 10.1037/0022-3514.39.5.806
- H. J. Woo. (2014). Exploring the Relationship between the Perceived Risk to Cyber Security and the Behavioral Intention to Technology Acceptance and Sustainable Use for Promoting Personal Information Security : focusing on Involvement, Protection Motivation, and Intention to Payment. Journal of Communication Science, 14(2), 220-257. DOI: 10.14696/jcs.2014.06.14.2.220
- J. K. Kim & S. H. Kim. (2013). Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory. Informatization Policy, 20(3), 63-85.
- M. S. Yim. (2013). The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees. Journal of Digital Convergence, 11(1), 27-38. https://doi.org/10.14400/JDPM.2013.11.1.027
- L. A. Catherine & A. Ritu. (2010). Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Quarterly, 34(3), 613-644. DOI: 10.2307/25750694
- Davis, F. (1989). Perceived Usefulness, Perceived Ease of Use, and Use cceptance of Information Technology. MIS Quarterly, 13(3), 319-340. DOI: 10.2307/249008
- S. J. Lee & M. J. Lee. (2008). An Exploratory Study on the Information Security Culture Indicator. Journal of Informatization policy, 15(3), 100-120.
- F. A. Hayes. (2018). Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach(2ed). New York, NY: The Guilford Press.
- H. S. Rhee, Y. Ryu & C. T. Kim. (2005). I Am Fine but You Are Not: Optimistic Bias and Illusion of Control on Information Security. ICIS 2005 Proceedings. DOI: 10.1016/j.cose.2011.12.001
- S. H. Park, S. H. Lee & E. M. Ham. (2008). The Relationship between Optimistic Bias about Health Crisis and Health Behavior. Journal of Korean Academy of Nursing, 38(3), 403-409. DOI: 10.4040/jkan.2008.38.3.403
- N. D. Weinstein, S. E. Marcus & R. P. Moser. (2005). Smokers' unrealistic optimism about their risk. Tobacco Control, 14(1), 55-59. DOI: 10.1136/tc.2004.008375