References
- Bandura, A., "Self-efficacy: Toward a unifying theory of behavioral change," Psycho logical Review, Vol. 84, No. 2, pp. 191-215, 1977. https://doi.org/10.1037/0033-295X.84.2.191
- Brinkley, D. L., and Schell, R. R., Concepts and Terminology for Computer Security, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, Calif, 1995.
- Buellingen, F. and Woerter, M., "Development perspectives, firm strategies and applications in mobile commerce," Journal of Business Research, Vol. 57, No. 12, pp. 1402-1408, 2004. https://doi.org/10.1016/S0148-2963(02)00429-0
- Chen, L. and Lee, D. M., "An empirical study on the factors influecing the acceptance of mobile easy payment service," Journal of Korea Contents Association, Vol. 17, No. 8, pp. 1-13, 2017. https://doi.org/10.5392/JKCA.2017.17.08.001
- Chenoweth, T., Minch, R., and Tabor, S., "Expanding views of technology acceptance: Seeking factors explaining security control adoption," AMCIS 2007, Vol. 7, p. 321, 2007.
- Davis, F. D., "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-339, 1989. https://doi.org/10.2307/249008
- Davis, F. D., Bagozzi, R. P., and Warahaw, P. R., "User acceptance of computer technology: A comparison of two theoretical models," Management Science, Vol. 35, No. 8, pp. 982-1003, 1989. https://doi.org/10.1287/mnsc.35.8.982
- Financial Services Commission, Compr ehensive plan for data utilization and information protection in the financial sector, pp. 3-25, Korea's FSC, 2018.
- Hsiao, C. H. and Yang, C., "The intellectual development of the technology acceptance model: A co-citation analysis," International Journal of Information Management, Vol. 31, No. 2, pp. 128-136, 2011. https://doi.org/10.1016/j.ijinfomgt.2010.07.003
- Jung, H. J., "A proposal of software quality measurement model and testcase on the basis of ISO/IEC 25010," The Journal of Korean Institute of Information Technology, Vol. 9, No. 10, pp. 197-205, 2011.
- Kim, D. H., Kim, D. Y., and Oh, J. S., "An empirical study on the factors influencing acceptance of convergence services: Focusing on telematics service," The Journal of Society for e-Business Studies, Vol 18, No 4, pp. 241-255, 2013. https://doi.org/10.7838/JSEBS.2013.18.4.241
- Kim, D. U. and Oh, J. S., "A structure on mobile service quality," Journal of Korea Service Management Society, Vol. 7. No. 3, pp. 51-82, 2006.
- Kim, J. G., Noh, S. C., and Lee, D. H., "A study of web application security quality architecture management process referenced ISO/IEC9000 Model," Journal of Information and Security, Vol. 12, No. 3, pp. 11-17, 2012.
- Lee, H. J., Roh, E. H., and Han, K. S., "A study on factors affecting the investment intention of information security," Journal of Digital Contents Society, Vol. 19, No 8, pp. 1515-1525, 2018. https://doi.org/10.9728/dcs.2018.19.8.1515
- No, K. S., The proper methods of statistical analysis for dissertation, pp. 334-350, Hanbit Academy, inc., Seoul, 2019.
- Pavlou, P., "Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation," AMCIS 2001 Proceedings, No. 159, pp. 816-822 2001.
- Rogers, R. W., "A protection motivation theory of fear appeals and attitude change," The journal of psychology, Vol. 91, No. 1, pp. 93-114, 1975. https://doi.org/10.1080/00223980.1975.9915803
- Rogers, R. W., Cognitive and psycho logical processes in fear appeals and attitude change: A revised theory of protection motivation, pp. 153-176, Guliford Press, NY, 1983.
- Seo, K. K., "Factor Analysis of the Cloud Service Adoption Intension of Korean Firms: Applying the TAM and VAM," The Society of Digital Policy & Management, Vol. 11, No. 12, pp. 155-160, 2013.
- Sharma, S., "Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling," Information Systems Frontiers, Vol. 21, No. 4, pp. 815-827, 2019. https://doi.org/10.1007/s10796-017-9775-x
- Venkatesh, V. and Davis, F. D., "A theoretical extension of the technology acceptance model: Four longitudinal field studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000. https://doi.org/10.1287/mnsc.46.2.186.11926
- Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User acceptance of information technology: Toward a unified view," MIS quarterly, Vol. 27, No. 3, pp. 425-478, 2003. https://doi.org/10.2307/30036540
- Yeo, K. S., Kim, C. J., and Choi, J. h., "An empirical study on security quality evaluation model for portal information system," The Journal of Korean Institute of Information Technology, Vol. 12, No. 7, pp. 67-77, 2014.