References
- Bae, J. (2016). "An empirical study on the effect of leakage threat of personal information on protective behavior intention in big data environment : Based on health psychology theory and protection motivation theroy." The e-business studies, 17(3), 191-208. https://doi.org/10.20462/TeBS.2016.06.17.3.191
- Bandura, A. (2001). "Social Cognitive theory : An Agentive Perspective" Annual Review of Psychology, 52, 1-26. https://doi.org/10.1146/annurev.psych.52.1.1
- Bulgurcu, Burcu Cavusoglu, Hasan Benbasat & Izak (2010). "Information Security Policy Compliance : An Empirical Study of Rationality-Based Beliefs and Information Security Awareness." MIS Quarterly, 34(3), 523-A7. https://doi.org/10.2307/25750690
- Crossler, R. & Blanger, F. (2014). "An extended perspective on individual security behavior : Protection motivation theory and a unified security practices(USP) instrument." ACM SIGMIS Databases, 45(4), 51-71. https://doi.org/10.1145/2691517.2691521
- Floyd, D. L., Prentice-Dunn,S. & Rogers, R.W. (2000). "A meta analysis of research on protection motivation theory." Journal of Applied Social Psychology, 30, 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
- Gurung, Anil, Xin Luo & Qinyu Liao (2009). "Consumer motivations in taking action against spyware : an empirical investigation." Information Management & Computer Security, 17(3), 276-289. https://doi.org/10.1108/09685220910978112
- Ifinedo, P. (2012). "Understanding information systems security policy compliance : An integration of the theory of planned behavior and the protection motivation theory." Computers & Security, 31(1), 83-95. https://doi.org/10.1016/j.cose.2011.10.007
- Kim, M. & Kim, S. (2014). "A study on Intention to Accept the Right to be Forgotten Associated with Exposure of Personal Data." Korean Journal of Journalism & Communication Studies, 58(2), 307-336.
- Kim, S & Lee, K. (2011). An empirical study on perception factors influencing information security behavior. Paper prsented at the Korea IT service society, Nov.30.
- Kim, S. & Park, H. (2013). "An Analysis of Influence Factor on Privacy Protection Awareness and Protection Behavior and moderating Effect of Privacy Invasion Experience." Internet e-commerce Studies, 13(4), 79-105.
- Kim, J. & Kim, S. (2013). "Privacy Behavioral Intention in Online Environment : Based on Protection Motivation Theory." Informatization policy, 20(3), 63-85.
- Kim, J., Kim, S. & Kwon, D. (2016), "Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory." Journal of information systems, 25(3), 1-30. https://doi.org/10.5859/KAIS.2016.25.3.1
- Lee, H., Roh, E. & Han, K. (2018). "A study on factors affecting the investment intention of information security." Korea digital contents society, 19(8), 1515-1525. https://doi.org/10.9728/dcs.2018.19.8.1515
- Lee, K., Han, K. & Jung, J. (2016). "A study of influencing factors for compliance intention of personal information protection policy of public institution employees." Entrue Journal of Information Technology, 15(1), 75-94.
- Ministry of the Interior and Safety & Personal Information Protection Commission (2020). 2019 Survey on the Personal information Protection. Seoul
- Park, J. (2019). "A study on the influence of the perception of personal information security of youth on security attitude and security behavior." Journal of the Korea industrial information systems society, 24(4), 79-98.
- Park, C. & Lee, S. (2014). "A study of the user privacy protection behavior in online Environment : Based on protection motivation theory." Journal of Internet Computing and Services, 15(2), 57-71. https://doi.org/10.7472/jksii.2014.15.4.57
- Rogers, R. W. (1975). "A protection motivation theory of fear appeals and attitude change." Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
- Rogers, R. W. (1983). "Cognitive and physiological processes in fear appeals and attitude change : A revised theory of protection motivation." Social Psychophysiology : A sourcebook. 153-177. New York : Guilford Press.
- Tian, Y., Park, M. & Chai, S. (2020). "A Study on the Factors of Online Information Security Behavior Failure : Focused on the Elderly." Journal of information systems, 29(1), 51-74. https://doi.org/10.5859/KAIS.2020.29.1.51
- Wooldridge, J. (2010). Econometric analysis of cross section and panel data. MIT press.
- Workman, M. & Bommer, W. H. & Straub, D. (2009). "The Amplification Effects of Procedural Justice on a Threat Control Model of Information Systems Security Behaviours." Behaviour & Information Technology, 28(6), 563-575. https://doi.org/10.1080/01449290802556021
- Youn, Seounmi (2005). "Teenagers' perceptions of online privacy and coping behaviors : a risk-benefit appraisal approach." Journal of Broadcasting & Electronic Media, 49(1), 86-110. https://doi.org/10.1207/s15506878jobem4901_6