References
- W.S. Kang, and H.J. Pang, "Researching technology trends and suggesting future developments for software supply chain security management", Journal of The Korea Institute of Information Security and Cryptology (JKIISC), Vol. 32, No. 5, pp. 21-25, October 2022
- H. Cavusoglu, S. Raghunathan, and H. Cavusoglu, "Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems", Information Systems Research, Vol. 20, No. 2, pp. 198-217, February 2009. DOI:10.1287/isre.1080.0180
- J.M. Kim, D.H. Kwon, S.H. Joo, and S.H. Joo, "A Study on the Improvement of the National Cyber Security Policy Against the Spread of Ransomware Damage", The Journal Of Korean Institute Of Communications And Information Sciences (J-Kics), Vol. 47, No. 11, pp. 1932-1948, November 2022. DOI:10.7840/kics.2022.47.11.1932
- S. Ahmad, and R.G. Schroeder, "The impact of electronic data interchange on delivery performance", Production and operations management, Vol. 10, No. 1, pp. 16-30, January 2001. DOI:10.1111/j.1937-5956.2001.tb00065.x
- R. Croson, and K. Donohue, "Impact of POS data sharing on supply chain management: An experimental study", Production and Operations Management, Vol. 12, No. 1, pp. 1-11, January 2003. DOI:10.1111/j.1937-5956.2003.tb00194.x
- D. Delen, and B.C. Hardgrave, "RFID for better supplychain management through enhanced information visibility", Production and Operations Management, Vol. 16, No. 5, pp. 613-624, January 2007. DOI:10.1111/j.1937-5956.2007.tb00284.x
- J. Whitaker, S. Mithas, and M.S. Krishnan, "A field study of RFID deployment and return expectations", Production and Operations Management, Vol. 16, No. 5, pp. 599-612, January 2007. DOI:10.1111/j.1937-5956.2007.tb00283.x
- G.P. Cachon, and M. Fisher, "Supply chain inventory management and the value of shared information", Management science, Vol. 46, No. 8, pp. 1032-1048, August 2000. DOI:10.1287/mnsc.46.8.1032.12029
- S. Gavirneni, R. Kapuscinski, and S. Tayur, "Value of information in capacitated supply chains", Management Science, Vol. 45, No. 1, pp. 16-24, January 1999. DOI:10.1287/mnsc.45.1.16
- L.H. Newman, Apple's ransomware mess is the future of online extortion, Available fromhttps://www.wired.com/story/apple-mac-lockbit-ransomware-samples/ (accessed May 1, 2023)
- S. Kumar, and R.R. Mallipeddi, "Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions", Production and Operations Management, Vol. 31, No. 12, pp. 4488-4500, September 2022. DOI:10.1111/poms.13859
- Y. Sheffi, "Supply chain management under the threat of international terrorism", The International Journal of Logistics Management, Vol. 12, No. 2, pp. 1-11, July 2001. DOI:10.1108/09574090110806262
- N.R. Joglekar, J. Davies, and E.G. Anderson, "The role of industry studies and public policies in production and operations management", Production and Operations Management, Vol. 25, No. 12, pp. 1977-2001, September 2016. DOI:10.1111/poms.12640
- M.J. Baek, and S.H. Sohn , "A Study on the Effect of Information Ethics on the Information Security Awareness and Behavior in Organization", Koreanische Zeitschrift fuer Wirtschaftswissenschaften, Vol. 28, No. 4, pp. 119-145, December 2010
- S.J. Lee, and M.J. Lee, "An Exploratory Study on the Information Security Culture Indicator", Informatization Policy, Vol. 15, No. 3, pp. 100-119, October 2008
- J.T. Kim, "Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things", The journal of Convergence on Culture Technology (JCCT), Vol. 9, No. 4, pp. 699-706, July 2023. DOI:10.17703/JCCT.2023.9.4.639
- S.H. Kim, and S.Y. Park, "Influencing Factors for Compliance Intention of Information Security Policy", The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 33-51, November 2011. DOI:10.7838/jsebs.2011.16.4.033
- J.E. YOO, "A Study on the Application of Cybersecurity by Design of Critical Infrastructure", The journal of Convergence on Culture Technology (JCCT), Vol. 7, No. 1, pp. 674-681, February 2021. DOI:10.17703/JCCT.2021.7.1.397
- N. Choi, D. Kim, J. Goo, and J. Goo, "Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action", Information Management & Computer Security, Vol. 16, No. 5, pp. 484-501, November 2008. DOI:10.1108/09685220810920558
- T. Dinev, and Q. Hu, "The centrality of awareness in the formation of user behavioral intention toward protective information technologies", Journal of the Association for Information Systems, Vol. 8, No. 7, pp. 23, July 2007. DOI:10.17705/1jais.00133
- A. Arora, V. Wright, and C. Garman, "Strengthening the Security of Operational Technology: Understanding Contemporary Bill of Materials", JCIP The Journal of Critical Infrastructure Policy, Vol. 3, No. 1, pp. 111, Spring/Summer 2022. DOI:10.18278/jcip.3.1.8
- R. Anderson, Why information security is hard - an economic perspective, Seventeenth Annual Computer Security Applications Conference, New Orleans, LA, USA, pp. 358-365, December 2001. DOI:10.1109/ACSAC.2001.991552
- R. Schmidt and T. Duffy, Non-interfering software distribution, Paris: Data Systems in Aerospace-DASIA, Vol. 97, No. 409, PP. 351-358, May 1997.
- P.M. Fangman, L.H. Gerhardstein and B.J. Homer, Federal Emergency Management Information System (FEMIS): Bill of Materials (BOM) for FEMIS (version 1.4.5. No. PNL10689-Ver. 1.4.5.), Richland, WA: Pacific Northwest National Laboratory, June 1998. DOI:10.2172/663230
- N. Zahan, E. Lin, M. Tamanna, and M. Tamanna, "Software Bills of Materials Are Required. Are We There Yet?", IEEE Security & Privacy, Vol. 21, No. 2, pp. 81-88, April 2023. DOI:10.1109/MSEC.2023.3237100
- M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley, May 1975.
- S.H. Yoo, Y.J. Park, H.M. Kang, and H.M. Kang, "The Effect of Motivation for Emoticon Use on Behavior of Purchasing Paid Emoticon: Focused on Theory of Planned Behavior", The journal of Convergence on Culture Technology (JCCT), Vol. 7, No. 2, pp. 395-404, May 2021. DOI:10.17703/JCCT.2021.7.2.39
- J.J. Chun, "A Study on Manufacturing Innovation in the Jewelry Industry through Automated Systems", The journal of Convergence on Culture Technology (JCCT), Vol. 6, No. 4, pp. 123-130, November 2020. DOI:10.17703/JCCT.2020.6.4.12
- B. Sparks, "Planning a wine tourism vacation? Factors that help to predict tourist behavioural intentions", Tourism management, Vol. 28, No. 5, pp. 1180-1192, October 2007. DOI:10.1016/j.tourman.2006.11.003
- I. Ajzen, and M. Fishbein, "Attitudes and the attitude-behavior relation: Reasoned and automatic processes", European review of social psychology, Vol. 11, No. 1, pp. 1-33, April 2001. DOI:10.1080/14792779943000116
- J.C. Oh, "A Study on the Impulsive Buying of Digital Contents Using Theory of Planned Behavior :Focused on Sensation Seeking Tendency", Journal of The Korean Academic Association of Business Administration Presentation Conference, pp. 477-504, November 2007
- I. Ajzen, "The theory of planned behavior", Organizational behavior and human decision processes, Vol. 50, No. 2, pp. 179-211, December 1991. DOI:10.1016/0749-5978(91)90020-T
- A. Bandura, "Self-efficacy: toward a unifying theory of behavioral change", Psychological review, Vol. 84, No. 2, pp. 191, 1977. DOI:10.1037/0033-295X.84.2.191
- D.W. Hahn, and M.K. Rhee, "Explaining Drinking and Driving : An Application of Theory of Planned Behavior", Korean Journal of Social and Personality Psychology, Vol. 15, No. 2, pp. 141-158, August 2001
- F.D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS quarterly, Vol. 13, No. 3, pp. 319-340, September 1989. DOI:10.2307/249008
- V. Venkatesh, M.G. Morris, G.B. Davis, and G.B. Davis, "User acceptance of information technology: Toward a unified view", MIS quarterly, Vol. 27, No. 3, pp. 425-478, August 2003 https://doi.org/10.2307/30036540
- Y.S. Choi, "US Software Supply Chain Security Policy Trends: Focusing on SBOM Case", ReviewOf Kiisc, Vol. 32, No. 5, pp. 7-14, October 2022
- B.S. Suh, G.H. Hwang, and S.K. Kim, "A Study on the Factors Affecting the Intention to Adapt PMO in Public Sectors", Journal of Digital Convergence, Vol. 12, No. 5, pp. 159-169, May 2014. DOI:10.14400/JDC.2014.12.5.159
- M.H. Ahn, and C.M. Heo, "The Effect of Technical Characteristics of Smart Farm on Acceptance Intention by Mediating Effect of Effort Expectation", Journal of Digital Convergence, Vol. 17, No. 6, pp. 145-157, June 2019. DOI:10.14400/JDC.2019.17.6.145
- K.A. Park, "A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior", Journal of Korea Society of Industrial Information Systems, Vol. 24, No. 4, pp. 79-98, August 2019. DOI:10.9723/jksiis.2019.24.4.079
- D.H. Jun, S.h. Jang, J.J. Lee, and J.J. Lee, "A Study of IT Maintenance Outsourcing Service Factors of Local Governments: Based on AHP Analysis Method", Journal of Information Technology Services (JITS), Vol. 21, No. 3, pp. 43-61, June 2022. DOI:10.9716/KITS.2022.21.3.043
- K.S. Kang, and H.Y. Kwon, "A Study on Influence of Information Security Stress and Behavioral Intention for Characteristic factors of Information Security Policy Perceived by Employee", The Journal of The Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 16, No. 6, pp. 243-253, December 2016. DOI:10.7236/JIIBC.2016.16.6.243
- M.J. Baek, and S.H. Sohn , "A Study on the Effect of Information Security Awareness and Behavior on the Information Security Performance in Small and Medium Sized Organization", The Korea Association of Small Business Studies, Vol. 33, No. 2, pp. 113-132, June 2011
- D.H. Kim, S.D. Park, S.J. Kim, and S.J. Kim, "A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Cases", Journal of convergence security, Vol. 17, No. 2, pp. 53-68, june 2017
- D.Y. Chang, and C.K. Lee, "A Study of Use Intention of Chatbot Using the Extended Theory of Planned Behavior: Focusing on the Role of Interaction", Journal of Tourism and Leisure Research, Vol. 31, No. 8, pp. 433-454, August 2019 https://doi.org/10.31336/JTLR.2019.8.31.8.433
- M.R. Hamid, W. Sami, and M.M. Sidek, "Discriminant Validity Assessment: Use of Fornell & Larcker criterion versus HTMT Criterion", Journal of Physics: Conference Series, Vol. 890, No. 1, pp. 8-10, August 2017. DOI:10.1088/1742-6596/890/1/012163
- J. Hulland, "Use of partial least squares (PLS) in strategic management research: A review of four recent studies", Strategic management journal, Vol. 20, No. 2, pp. 195-204, February 1999. DOI:10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7
- C. Fornell, and D.F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error", Journal of marketing research, Vol. 18, No. 1, pp. 39-50, February 1981. DOI:10.1177/002224378101800104
- M.S. Sodhi, B. Son, and C.S. Tang, "Researchers' perspectives on supply chain risk management", Production and Operations Management, Vol. 21, No. 1, pp. 1-13, June 2012. DOI:10.1111/ j.1937-5956.2011.01251.x
- Z. Liu, Q. Wang, and Y. Tang, "Design of a cosimulation platform with hardware-in-the-loop for cyber-attacks on cyber-physical power systems", IEEE Access, Vol. 8, pp. 95997-96005, May 2020. DOI:10.1109/ACCESS.2020.2995743