참고문헌
- AlHogail, A. (2015). Design and validation of information security culture framework. Computers in Human Behavior, 49, 567-575. https://doi.org/10.1016/j.chb.2015.03.054
- AlHogail, A., & Mirza, A. (2014, January). Information security culture: a definition and a literature review. In 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (pp. 1-7). IEEE.
- Alnatheer, M. A. (2015, April). Information security culture critical success factors. In 2015 12th International Conference on Information Technology-New Generations (pp. 731-735). IEEE.
- Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 523-548. https://doi.org/10.2307/25750690
- Chen, Y. A. N., Ramamurthy, K. R. A. M., & Wen, K. W. (2015). Impacts of comprehensive information security programs on information security culture. Journal of Computer Information Systems, 55(3), 11-19. https://doi.org/10.1080/08874417.2015.11645767
- Da Veiga, A. (2016). Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. Information & Computer Security.
- Da Veiga, A., & Eloff, J. H. (2010). A framework and assessment instrument for information security culture. Computers & Security, 29(2), 196-207. https://doi.org/10.1016/j.cose.2009.09.002
- Da Veiga, A., & Martins, N. (2015). Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security, 49, 162-176. https://doi.org/10.1016/j.cose.2014.12.006
- El-kenawy, E. S. M. T., Saber, M., & Arnous, R. (2019). An Integrated Framework to Ensure Information Security Over the Internet. International Journal of Computer Applications, 975, 8887.
- Eurostat (2021a). Individuals' level of digital skills. https://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_sk_dskl_i&lang=en
- Eurostat (2021b). Way of obtaining ICT skills. https://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_sk_how_i&lang=en
- Eurostat (2021c). Cross-classification of fixed assets by industry and by asset (stocks). https://ec.europa.eu/eurostat/web/main/data/database?p_p_id=NavTreeportletprod_WAR_NavTreeportletprod_INSTANCE_nPqeVbPXRmWQ&p_p_lifecycle=0&p_p_state=normal&p_p_mode=view
- Eurostat (2021d). Identification procedures used for online services (2020 onwards). https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
- Eurostat (2021e). Privacy and protection of personal data (2020 onwards). https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
- Eurostat (2021f). Security related problems experienced when using the internet. https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
- Eurostat (2021g). Activities via internet not done because of security concerns. https://appsso.eurostat.ec.europa.eu/nui/setupDownloads.do
- Hanus, B., & Wu, Y. A. (2016). Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management, 33(1), 2-16. https://doi.org/10.1080/10580530.2015.1117842
- Karlsson, F., Astrom, J., & Karlsson, M. (2015). Information security culture-state-of-the-art review between 2000 and 2013. Information & Computer Security.
- Lebek, B., Uffen, J., Neumann, M., Hohler, B., & Breitner, M. H. (2014). Information security awareness and behavior: a theory-based literature review. Management Research Review. 37 (12), 1049-1092. https://doi.org/10.1108/MRR04-2013-0085
- Mahfuth, A., Yussof, S., Baker, A. A., & Ali, N. A. (2017, July). A systematic literature review: Information security culture. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE.
- Nasir, A., Arshah, R. A., Ab Hamid, M. R., & Fahmy, S. (2019). An analysis on the dimensions of information security culture concept: A review. Journal of Information Security and Applications, 44, 12-22. https://doi.org/10.1016/j.jisa.2018.11.003
- Okere, I., Van Niekerk, J., & Carroll, M. (2012, August). Assessing information security culture: A critical analysis of current approaches. In 2012 Information Security for South Africa (pp. 1-8). IEEE.
- Parsons, K. M., Young, E., Butavicius, M. A., McCormac, A., Pattinson, M. R., & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9(2), 117-129. https://doi.org/10.1177/1555343415575152
- Tang, M., & Zhang, T. (2016). The impacts of organizational culture on information security culture: a case study. Information Technology and Management, 17(2), 179-186. https://doi.org/10.1007/s10799-015-0252-2
- Van Niekerk, J. F., & Von Solms, R. (2010). Information security culture: A management perspective. Computers & security, 29(4), 476-486. https://doi.org/10.1016/j.cose.2009.10.005
- Varenia N., Avramenko S. (2020) Virtual reality as a new global factor for analyzing the level of terrorist threat. Ukrainian Journal of International Law, 2, 46-60. https://doi.org/10.36952/uail.2020.2.46-60