과제정보
This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2019S1A5A8034695).
참고문헌
- Bae, J. K. (2017). The structural relationships among information security threat factors and information protection behavior of the FinTech services: Focus on theoretical perspectives of technology threat avoidance and health protective behaviors. Journal of Information Systems, 26(3), 313-337. https://doi.org/10.5859/KAIS.2017.26.3.313
- Kim, S., & Kim, J. (2016). A study on factors influencing privacy decision making on the internet: Focus on dual-calculus model. Journal of Information Systems, 25(3), 197-215. https://doi.org/10.5859/KAIS.2016.25.3.197
- Act on the protection of children and youth against sex offenses, Article 25-2(1).
- Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A Phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312. https://doi.org/10.1016/j.chb.2014.05.046
- Asante-Offei, K. O., & Yaokumah, W. (2021). Cyber-identity theft and Fintech services: Technology threat avoidance perspective. Journal of Information Technology Research, 14(3), 1-19. https://doi.org/10.4018/JITR.2021070101
- Benavides-Espinoza, C., & Cunningham, G. B. (2010). Bystanders' reactions to sexual harassment. Sex Roles, 63(3-4), 201-213. https://doi.org/10.1007/s11199-010-9781-7
- Berson, I. R. (2003). Grooming cybervictims: The psychosocial effects of online exploitation for youth. Journal of School Violence, 2(1), 5-18. https://doi.org/10.1300/J202v02n01_02
- Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44.
- Chan, T. K., Cheung, C. M., & Wong, R. Y. (2019). Cyberbullying on social networking sites: The crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574-609. https://doi.org/10.1080/07421222.2019.1599500
- Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567. https://doi.org/10.1109/tem.2018.2835461
- Choi, D., & DeLong, M. (2019). Defining female self sexualization for the twenty-first century. Sexuality & Culture, 23(4), 1350-1371. https://doi.org/10.1007/s12119-019-09617-3
- Couraud, J. R. (2014). Risk perception in online communities. Doctoral dissertation, Utah State University. Retrieved from http://digitalcommons.usu.edu/etd/3898/
- Davern, M., Shaft, T., & Te'eni, D. (2012). Cognition matters: Enduring questions in cognitive IS research. Journal of the Association for Information Systems, 13(4), 273-314. https://doi.org/10.17705/1jais.00290
- Fitzgerald, L. F., & Shullman, S. L. (1993). Sexual harassment: A research analysis and agenda for the 1990s. Journal of Vocational Behavior, 42(1), 5-27. https://doi.org/10.1006/jvbe.1993.1002
- Fitzgerald, L. F., Hulin, C. L., & Drasgow, F. (1994). The antecedents and consequences of sexual harassment in organizations: An integrated model. In G. P. Keita & J. J. Hurrell, Jr. (Eds.), Job stress in a changing workforce: Investigating gender, diversity, and family issues (pp. 55-73). American Psychological Association.
- Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382-388. https://doi.org/10.2307/3150980
- Gadlin, H. (1991). Careful maneuvers: Mediating sexual harassment. Negotiation Journal, 7, 139. https://doi.org/10.1111/j.1571-9979.1991.tb00610.x
- Gibson, J. J. (1977). The theory of affordances. Hilldale, USA, 1(2), 67-82.
- Gillam, A. R., & Waite, A. M. (2021). Gender differences in predictors of technology threat avoidance. Information & Computer Security, 29(3), 393-412. https://doi.org/10.1108/ICS-01-2020-0008
- Gruber, J. E. (1989). How women handle sexual harassment: A literature review. Sociology and Social Research, 74(1), 3-9.
- Gruber, J. E., & Bjorn, L. (1986). Women's responses to sexual harassment: An analysis of sociocultural, organizational, and personal resource models. Social Science Quarterly, 67(4), 814.
- Gumbus, A., & Meglich, P. (2013). Abusive online conduct: Discrimination and harassment in cyberspace. Journal of Management Policy and Practice, 14(5), 47-56.
- Gutek, B. A., & Koss, M. P. (1993). Changed women and changed organizations: Consequences of and coping with sexual harassment. Journal of Vocational Behavior, 42(1), 28-48. https://doi.org/10.1006/jvbe.1993.1003
- Gwartney-Gibbs, P. A., & Lach, D. H. (1992). Sociological explanations for failure to seek sexual harassment remedies. Mediation Quarterly, 9(4), 365-374. https://doi.org/10.1002/crq.3900090408
- Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24. https://doi.org/10.1108/ebr-11-2018-0203
- Herring, S. C. (2003). Gender and power in on-line communication. The Handbook of Language and Gender, 202-228.
- Jain, S., & Agrawal, S. (2020). Perceived vulnerability of cyberbullying on social networking sites: Effects of security measures, addiction and self-disclosure. Indian Growth and Development Review.
- Karahanna, E., Xu, S. X., Xu, Y., & Zhang, N. A. (2018). The needs-affordances-features perspective for the use of social media. MIS Quarterly, 42(3), 737-756. https://doi.org/10.25300/misq/2018/11492
- Knapp, D. E., Faley, R. H., Ekeberg, S. E., & Dubois, C. L. (1997). Determinants of target responses to sexual harassment: A conceptual framework. Academy of Management Review, 22(3), 687-729. https://doi.org/10.5465/AMR.1997.9708210723
- Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 18(2), 177-187. https://doi.org/10.1057/ejis.2009.11
- Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90. https://doi.org/10.2307/20650279
- Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1. https://doi.org/10.17705/1jais.00219
- Liss, M., Erchull, M. J., & Ramsey, L. R. (2011). Empowering or oppressing? Development and exploration of the enjoyment of sexualization scale. Personality and Social Psychology Bulletin, 37(1), 55-68. https://doi.org/10.1177/0146167210386119
- Lynch, A. (2007). Expanding the definition of provocative dress: An examination of female flashing behavior on a college campus. Clothing and Textiles Research Journal, 25(2), 184-201. https://doi.org/10.1177/0887302X06298699
- Majchrzak, A., Faraj, S., Kane, G. C., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer-Mediated Communication, 19(1), 38-55. https://doi.org/10.1111/jcc4.12030
- Nova, F. F., Rifat, M. R., Saha, P., Ahmed, S. I., & Guha, S. (2019, January). Online sexual harassment over anonymous social media In Bangladesh. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 1-12.
- Nowatzki, J., & Morry, M. M. (2009). Women's intentions regarding, and acceptance of, self-sexualizing behavior. Psychology of Women Quarterly, 33(1), 95-107. https://doi.org/10.1111/j.1471-6402.2008.01477.x
- O'Hare, E., & O'Donohue, W. (1998). Sexual harassment: Identifying risk factors. Archives of Sexual Behavior, 27, 561-580. https://doi.org/10.1023/A:1018769016832
- Pearce, K. E., & Vitak, J. (2016). Performing honor online: The affordances of social media for surveillance and impression management in an honor culture. New Media & Society, 18(11), 2595-2612. https://doi.org/10.1177/1461444815600279
- Rhoa, H., & Yub, I. (2011). The impact of information technology threat avoidance factors on avoidance behavior of user. Retrieved from https://pdfs.semanticscholar.org/a9e9/31b792c403f49a91a1dbdfdfbc34b92f1d8c.pdf
- Rosenstock, I. M., Strecher, V. J., & Becker, M. H. (1994). The health behavior model and HIV risk behavior change. In R. J. DiClemente & J. L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press.
- Scarduzio, J. A., Sheff, S. E., & Smith, M. (2018). Coping and sexual harassment: How victims cope across multiple settings. Archives of Sexual Behavior, 47(2), 327-340. https://doi.org/10.1007/s10508-017-1065-7
- Thacker, R. A., & Ferris, G. R. (1991). Understanding sexual harassment in the workplace: The influence of power and politics within the dyadic interaction of harasser and target. Human Resource Management Review, 1(1), 23-37. https://doi.org/10.1016/1053-4822(91)90009-2
- Van Royen, K., Poels, K., & Vandebosch, H. (2016). Harmonizing freedom and protection: Adolescents' voices on automatic monitoring of social networking sites. Children and Youth Services Review, 64, 35-41. https://doi.org/10.1016/j.childyouth.2016.02.024
- Van Royen, K., Poels, K., Daelemans, W., & Vandebosch, H. (2015). Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics, 32(1), 89-97. https://doi.org/10.1016/j.tele.2014.04.002
- Vitak, J., & Kim, J. (2014, February). "You Can't Block People Offline" examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 461-474).
- Ward, L. M., Seabrook, R. C., Grower, P., Giaccardi, S., & Lippman, J. R. (2018). Sexual object or sexual subject? Media use, self-sexualization, and sexual agency among undergraduate women. Psychology of Women Quarterly, 42(1), 29-43. https://doi.org/10.1177/0361684317737940
- Xue, Y., Liang, H., Mbarika, V., Hauser, R., Schwager, P., & Getahun, M. K. (2015). Investigating the resistance to telemedicine in Ethiopia. International Journal of Medical Informatics, 84(8), 537-547 https://doi.org/10.1016/j.ijmedinf.2015.04.005