References
- Grand View Research. (2020). Cyber Security Market Size, Share & Trends Analysis Report By Component, By Security Type, By Solution, By Service, By Deployment, By Organization, By Application, By Region, And Segment Forecasts, 2020 - 2027.
- Verizon. (2019). 2019 data breach investigations report.
- B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness, MIS Quarterly, 34(3), 523-548. https://doi.org/10.2307/25750690
- A. C. Johnston & M. Warkentin (2010). Fear Appeals and Information Security Behaviors: An Empirical Study", MIS Quarterly, 34(3), 549-566, 2010. DOI : 10.2307/25750691
- M. L. Merhi & P. Ahluwalia, P. (2019). Examining the Impact of Deterrence Factors and Norms on Resistance to Information Systems Security. Computers in Human Behavior, 92, 37-46. DOI : 10.1016/j.chb.2018.10.031.
- H. C. Pham, L. Brennan & S. Furnell. (2019). Information Security Burnout: Identification of Sources and Mitigating Factors from Security Demands and Resources. Journal of Information Security and Applications, 46, 96-107. DOI :10.1016/j.jisa.2019.03.012.
- R. West. (2008). The Psychology of Security. Communications of the ACM, 51(4), 34-40. DOI : 10.1145/1330311.1330320.
- D. Kahneman & A. Tversky. (2013). Prospect Theory: An Analysis of Decision under Risk. In Handbook of the fundamentals of financial decision making: Part I (pp. 99-127).
- I. Hwang, D. Kim, T. Kim & S. Kim. (2017). Why not Comply with Information Security? An Empirical Approach for the Causes of Non-Compliance. Online Information Review, 41(1), 1-17. DOI : 10.1108/OIR-11-2015-0358
- D. VandeWalle. (1997). Development and Validation of a Work Domain Goal Orientation Instrument. Educational and Psychological Measurement, 57(6), 995-1015. DOI : 10.1177/0013164497057006009.
- B. M. Dykman. (1998). Integrating Cognitive and Motivational Factors in Depression: Initial Tests of a Goal-Orientation Approach. Journal of Personality and Social Psychology, 74(1), 139-158. DOI : 10.1037/0022-3514.74.1.139
- Van Muijen, J. J. (1999). Organizational culture: The focus questionnaire. European Journal of work and organizational psychology, 8(4), 551-568. https://doi.org/10.1080/135943299398168
- M. A. Abernethy & J. U. Stoelwinder. (1991). Budget Use, Task Uncertainty, System Goal Orientation and Subunit Performance: A Test of the 'Fit' Hypothesis in Not-for-Profit Hospitals. Accounting, Organizations and Society, 16(2), 105-120. DOI ; 10.1016/0361-3682(91)90008-3.
- Q. Hu, T. Dinev, P. Hart & D. Cooke. (2012). Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture. Decision Sciences, 43(4), 615-660. DOI : 10.1111/j.1540-5915.2012.00361.x.
- P. M. Muchinsky. (2006). Psychology Applied to Work: An Introduction to Industrial and Organizational Psychology. Cengage Learning.
- T. A. Judge & J. A. Colquitt. (2004). Organizational Justice and Stress: The Mediating Role of Work-Family Conflict. Journal of Applied Psychology, 89(3), 395-404. DOI : 10.1037/0021-9010.89.3.395.
- J. W. Thibaut & L. Walker. (1975). Procedural Justice: A Psychological Analysis. Hillsdale, NJ: Lawrence Erlbaum Associates.
- J. A. Colquitt. (2001). On the Dimensionality of Organizational Justice: A Construct Validation of a Measure. Journal of Applied Psychology, 86(3), 386-400. https://doi.org/10.1037/0021-9010.86.3.386
- I. Hwang & S. Kim. (2018). A Study on the Influence of Organizational Information Security Goal Setting and Justice on Security Policy Compliance Intention. Journal of Digital Convergence. 16(2), 117-126. DOI : 10.14400/JDC.2018.16.2.117.
- Y. Xue, H. Liang & L. Wu. (2011). Punishment, Justice, and Compliance in Mandatory IT Settings. Information Systems Research, 22(2), 400-414. DOI : 10.1287/isre.1090.0266.
- I. Hwang & S. Hu. (2018). A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied. Journal of Digital Convergence, 16(3), 225-236. DOI : 10.14400/JDC.2018.16.3.225.
- P. Ifinedo. (2012). Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007.
- T. Sommestad, H. Karlzen & J. Hallberg. (2015). The Sufficiency of the Theory of Planned Behavior for Explaining Information Security Policy Compliance. Information & Computer Security. 23(2), 200-217. DOI : 10.1108/ICS-04-2014-0025.
- M. Siponen, M. A. Mahmood & S. Pahnila. (2014). Employees' Adherence to Information Security Policies: An Exploratory Field Study. Information & management, 51(2), 217-224. DOI : 10.1016/j.im.2013.08.006.
- I. Hwang & H. Lee. (2016). The Employee's Information Security Policy Compliance Intention: Theory of Planned Behavior, Goal Setting Theory, and Deterrence theory Applied. Journal of Digital Convergence, 14(7), 155-166, DOI : 10.14400/JDC.2016.14.7.155.
- L. J. Williams & S. E. Anderson. (1991). Job Satisfaction and Organizational Commitment as Predictors of Organizational Citizenship and In-role Behaviors. Journal of Management, 17(3), 601-617. DOI : 10.1177/014920639101700305
- B. B. Vilela, J. A. V. Gonzalez & P. F. Ferrin. (2008). Person-Organization Fit, OCB and Performance Appraisal: Evidence from Matched Supervisor- Salesperson Data Set in a Spanish Context. Industrial Marketing Management, 37(8), 1005-1019. DOI : 10.1016/j.indmarman.2007.11.004.
- K. Hwang & M. Choi. (2017). Effects of InnovationSupportive Culture and Organizational Citizenship Behavior on E-government Information System Security Stemming from Mimetic Isomorphism. Government Information Quarterly, 34(2), 183-198. DOI : 10.1016/j.giq.2017.02.001.
- S. Choi & J. Lee. (2020) The Effect of Work-Life Balance on Organizational Commitment and Organizational Citizenship Behavior: The Mediating Role of Psychological Safety, Journal of Digital Convergence, 18(3), 83-92. DOI : 10.14400/JDC.2020.18.3.083.