References
- Security Type, By Solution, By Service, By Deployment, By Organization, By Application, By Region, And Segment Forecasts, 2020 - 2027.
- Verizon. (2012). 2012 data breach investigations report.
- I. Hwang & S. Kim. (2018). A Study on the Influence of Organizational Information Security Goal Setting and Justice on Security Policy Compliance Intention. Journal of Digital Convergence. 16(2), 117-126. DOI : 10.14400/JDC.2018.16.2.117.
- B. Bulgurcu, H. Cavusoglu & I. Benbasat. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523-548. https://doi.org/10.2307/25750690
- A. C. Johnston & M. Warkentin. (2010). Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly, 34(3), 549-566, 2010. DOI : 10.2307/25750691
- P. Ifinedo. (2012). Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007.
- W. R. Flores & M. Ekstedt. (2016). Shaping Intention to Resist Social Engineering through Transformational Leadership, Information Security Culture and Awareness. Computers & Security, 59, 26-44. DOI : 10.1016/j.cose.2016.01.004.
- N. S. Safa, C. Maple, S. Furnell, M. A. Azad, C. Perera, M. Dabbagh & M. Sookhak. (2019). Deterrence and Prevention-based Model to Mitigate Information Security insider Threats in Organisations. Future Generation Computer Systems, 97, 587-597. 10.1016/j.future.2019.03.024
- J. E. Higgins & N. S. Endler. (1995). Coping, Life Stress, and Psychological and Somatic Distress. European Journal of Personality, 9(4), 253-270. DOI : 10.1002/per.2410090403
- H. Jang & S. Kim (2018), The Effects of Maladaptive Perfectionism and Stress Coping on Chronic Fatigue of Adolescent Athletes through Convergence. Journal of Digital Convergence, 16(1), 371-379. https://doi.org/10.14400/JDC.2018.16.1.371
- S. Folkman & R. S. Lazarus. (1985). If It Changes It Must Be a Process: Study of Emotion and Coping during Three Stages of a College Examination. Journal of Personality and Social Psychology, 48(1), 150-170. https://doi.org/10.1037/0022-3514.48.1.150
- J. D'Arcy, T. Herath & M. K. Shoss. (2014). Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems, 31(2), 285-318. DOI : 10.2753/MIS0742-1222310210.
- P. S. Galluch, V. Grover & J. B. Thatcher. (2015). Interrupting the Workplace: Examining Stressors in an Information Technology Context. Journal of the Association for Information Systems, 16(1), 1-47. DOI : 10.17705/1jais.00387.
- Q. Hu, T. Dinev, P. Hart & D. Cooke. (2012). Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture. Decision Sciences, 43(4), 615-660. DOI : 10.1111/j.1540-5915.2012.00361.x.
- K. M. Carley. (1995). Communication Technologies and their Effect on Cultural Homogeneity, Consensus, and the Diffusion of New Ideas. Sociological Perspectives, 38(4), 547-571. DOI: 10.2307/1389272.
- J. Chae & J. Lee. (2004). North Korea-South Korea Cultural Heterogeneity in Psychological Perspective: Focusing on the North Korean Defectors' Adaptation. Korean Journal of Psychological and Social Issues, 19(2), 79-101.
- A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius & M. Pattinson. (2017). Individual differences and Information Security Awareness. Computers in Human Behavior, 69, 151-156. DOI : 10.1016/j.chb.2016.11.065.
- E. H. Park, J. Kim & Y. S. Park. (2017). The Role of Information Security Learning and Individual Factors in Disclosing Patients' Health Information, Computers & Security, 65, 64-76. DOI :10.1016/j.cose.2016.10.011.
- I. Hwang & H. Lee. (2016). The Employee's Information Security Policy Compliance Intention: Theory of Planned Behavior, Goal Setting Theory, and Deterrence theory Applied. Journal of Digital Convergence, 14(7), 155-166, DOI : 10.14400/JDC.2016.14.7.155.
- H. H. Chang & S. S. Chuang. (2011), Social Capital and Individual Motivations on Knowledge Sharing: Participant Involvement as a Moderator, Information & Management, 48(1), 9-18. DOI : 10.1016/j.im.2010.11.001.
- M. Tarafdar, Q. Tu, B. S. Ragu-Nathan & T. S. Ragu-Nathan. (2007). The Impact of Technostress on Role Stress and Productivity. Journal of Management Information Systems, 24(1), 301-328. DOI : 10.2753/MIS0742-1222240109.
- R. West. (2008). The Psychology of Security. Communications of the ACM, 51(4), 34-40. DOI : 10.1145/1330311.1330320.
- I. Hwang & S. Hu. (2018). A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied. Journal of Digital Convergence, 16(3), 225-236. DOI : 10.14400/JDC.2018.16.3.225.
- N. S. Safa, C. Maple, T. Watson & R. Von Solms. (2018). Motivation and Opportunity based Model to Reduce Information Security insider Threats in Organisations. Journal of Information Security and Applications, 40, 247-257. DOI : 10.1016/j.jisa.2017.11.001.
- J. C. Nunnally. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
- P. Podsakoff, S. MacKenzie, J. Lee, and N. Podsakoff. (2003). Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies, Journal of Applied Psychology, 88(5), 879-903. https://doi.org/10.1037/0021-9010.88.5.879