과제정보
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2018R1D1A1B07050305)
참고문헌
- G. V. Research. (2019). Home Textiles Market Size, Share & Trends Analysis Report by Product (Carpets & Floor Covering, Bathroom Linen, Bedroom Linen), By Region, By Distribution Channel (Retail Outlet, Online), And Segment Forecasts, 2019 - 2025. https://www.globenewswire.com
- R. W. Lee, I. H. Hwang & S. H. Hu. (2017). Exploratory research of information security strategy focused on human factors. The Journal of General Education, 6, 103-124. https://doi.org/10.24173/jge.2017.12.6.4
- J. D'Arcy & P.-L. Teh. (2019). Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization. Information & Management, 56(7), 103151. DOI : 10.1016/j.im.2019.02.006
- Verizon. (2020). 2020 data breach investigations report. Richmod, Texas.
- I. Corradini, (2020). Security: Human Nature and Behaviour. Springer.
- M. L. Foulds. (1971). Changes in locus of internal-external control: A growth group experience. Comparative Group Studies, 2(3), 293-300. DOI : 10.1177/104649647100200303
- S. A. Stumpf & M. London. (1981). Management promotions: Individual and organizational factors influencing the decision process. Academy of Management Review, 6(4), 539-549. https://doi.org/10.5465/AMR.1981.4285668
- S. J. Lee & H. Lina Kim. (2018). Roles of perceived behavioral control and self-efficacy to volunteer tourists' intended participation via theory of planned behavior. International Journal of Tourism Research, 20(2), 182-190. DOI : 10.1002/jtr.2171
- L. Tredinnick. (2008). Digital information culture: the individual and society in the digital age. Amsterdam : Elsevier.
- M. J. Gelfand, L. H. Nishii & J. L. Raver. (2006). On the nature and importance of cultural tightness-looseness. Journal of Applied Psychology, 91(6), 1225-1244. DOI : 10.1037/0021-9010.91.6.1225
- S. H. Schwartz. (1990). Individualism-collectivism: Critique and proposed refinements. Journal of cross-cultural psychology, 21(2), 139-157. https://doi.org/10.1177/0022022190212001
- E. Hartono, C. W. Holsapple, K.-Y. Kim, K.-S. Na & J. T. Simpson. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62, 11-21. https://doi.org/10.1016/j.dss.2014.02.006
- T. Herath & H. R. Rao. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125. https://doi.org/10.1057/ejis.2009.6
- P. Ifinedo. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007
- M. Siponen, M. A. Mahmood & S. Pahnila. (2014). Employees' adherence to information security policies: An exploratory field study. Information & Management, 51(2), 217-224. https://doi.org/10.1016/j.im.2013.08.006
- P. Ifinedo. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79. DOI : 10.1016/j.im.2013.10.001
- N. S. Safa, M. Sookhak, R. Von Solms, S. Furnell, N. A. Ghani & T. Herawan. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78. DOI : 10.1016/j.cose.2015.05.012
- J. Kaur & N. Mustafa, (2013). Examining the effects of knowledge, attitude and behaviour on information security awareness: A case on SME. IEEE.
- I. H. Hwang & S. H. Hu. (2018). A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied. Journal of Digital Convergence, 16(3), 225-236. DOI : 10.14400/JDC.2018.16.3.225
- M. Chan, I. Woon & A. Kankanhalli. (2005). Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18-41. https://doi.org/10.1080/15536548.2005.10855772
- B. Khan, K. S. Alghathbar, S. I. Nabi & M. K. Khan. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management, 5(26), 10862-10868. DOI : 10.5897/AJBM11.067
- I. H. Hwang & S. H. Hu. (2021). A Study on the Information Security Related Organizational Citizenship Behavior : From Prospect Theory and Goal Orientation Theory Perspective. Journal of Digital Convergence, 19(1), 89-97. https://doi.org/10.14400/JDC.2021.19.1.089