Acknowledgement
이 논문은 2022년 대한민국 교육부와 한국연구재단의 지원에 의해 연구되었음(NRF-2022S1A5C2A03093690). 이 논문은 인하대학교의 지원에 의하여 연구되었음.
References
- Ahn, H. J., Kim, S. J. and Kwon, D. S. (2016). A Study on Security Independent Behavior in Social Game Using Expanded Health Belief Model, Management & Information Systems Review, 35(2), 99-118.
- Boannews. (2023). Insiders: The Other Culprits Behind Security Breaches and Data Leaks... The Threat is Within, https://m.boannews.com/html/detail.html?idx=115440 (Accessed on July. 21th, 2024).
- Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010). Information Security Policy Compliance: an Empirical Study of Rationality-Based Beliefs and Information Security Awareness, M IS Quarterly, 34(3), 523-548.
- Cho, S. B., Kwon, D. S. and Lee, M. Y. (2014). A Study on the Information Security Behavior of Corporations Using Health Belief Model, Asia Pacific Journal of Small Business, 36(2), 241-263.
- Chung, W. (2017). A Study of Policy Acceptance-Based on the Case of the Korea-China Free Trade Agreement (FTA), The Korean Journal of Advertising and Public Relations, 19(3), 99-135.
- Douglass, R. B. (1977). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Philosophy & Rhetoric, 10(2), 130-132.
- Etnews. (2023). 25 Trillion Won Lost to Industrial Technology Leaks Over 5 Years... Only 9 Prison Sentences, https://www.etnews.com/20230930000014 (Accessed on July. 21th, 2024).
- Fornell, C. and Larcker, D. F. (1981). Evaluation Structural Equation Models with Unobservable Variables and Measurement Error, Journal of Marketing Research, 18(1), 39-50.
- GTT Korea. (2024). 56% of Insider Security Incidents Due to 'Negligence', https://www.gttkorea.com/news/articleView.html?idxno=9139 (Accessed on July. 21th, 2024).
- Guo, K. H. (2013). Security-Related Behavior in Using Information Systems in the Workplace: A Review and Synthesis, Computers & Security, 32, 242-251.
- Hair, J. F., Hult, G. T. M., Ringle, C. M. and Sarstedt, M. (2022). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM ) (3rd ed.), Thousand Oaks, CA: Sage Publication Inc.
- Hair, J. F., Ringle, C. M. and Sarstedt, M. (2011). PLS-SEM: Indeed a Silver Bullet, Journal of Marketing Theory and Practice, 19, 139-151.
- Hair, J. F., Ringle, C. M. and Sarstedt, M. (2015). A New Criterion for Assessing Discriminant Validity in Variance-Based Structural Equation Modeling, Journal of the Academy of Marketing Science, 43(1), 115-135.
- Hair, J. F., Sarstedt, M., Hopkins, L. and Kuppelwieser, V. G. (2014). Partial Least Squares Structural Equation Modeling (PLS-SEM): An Emerging Tool in Business Research, European Business Review, 26(2), 106-121.
- Hair, J. F., Sarstedt, M., Ringle, C. M. and Gudergan, S. P. (2018). Advanced Issues in Partial Least Squares Structural Equation Modeling, Thousand Oaks, CA: Sage Publication Inc.
- Hankyung. (2023). Semiconductor Secrets Leaked to China: Samsung Employee Under Investigation for Hundreds of Billions in Bribes, https://www.hankyung.com/article/202312157871i (Accessed on July. 21th, 2024).
- Heo, J. and Ahn, S. (2020). Effects of Biased Awareness of Security Policies on Security Compliance Behavior, The Journal of Korean Association of Computer Education, 23(1), 63-75.
- Hong, M. J., Lee, Y. J., Lee, K. M., Heo, J. and Yoon, N. (2022). Factors Influencing COVID-19 Vaccination Intention among Korean College Students, Korean Journal of Health Education and Promotion, 39(1), 1-10.
- Hwang, I. (2021). A Study on the Effects of Organization Justice and Organization Trust on Mitigation of Techno-stress Related to Information Security, Journal of the Korea Academia-Industrial Cooperation Society, 22(7), 435-448.
- Hwang, I. and Hu, S. (2021). The Influence of Security Motivation and Organization Trust on Information Security Compliance: Focusing on Moderation Effects of Work Promotion Focus, Journal of Korea Society of Industrial Information Systems, 26(3), 23-39.
- ITBizNews. (2023). Considerations When Establishing Cybersecurity Operations Policies: 'Both Security Enhancements and Human Factors are Crucial', https://www.itbiznews.com/news/articleView.html?idxno=94563#google_vignette (Accessed on July. 21th, 2024).
- Jang, C. and Sung, W. (2022). A Study on Policy Acceptance Intention to Use Artificial Intelligence-Based Public Services: Focusing on the Influence of Individual Perception & Digital Literacy Level, Informatization Policy, 29(1), 60-83.
- Janz, N. K. and Becker, M. H. (1984). The Health Belief Model A Decade Later, Health Education Quarterly, 11(1), 1-47.
- Jee, B. S., Fan, L., Lee, S. C. and Suh, Y. H. (2011). Personal Information Protection Behavior for Information Quality: Health Psychology Theory Perspectives, Journal of the Korean Society for Quality Management, 39(3), 432-443.
- Jo, S. C. and Han, Y. J. (2020). A Study on the Effect of Health Belief Factors on the Acceptance of Mobile Healthcare: Focusing on Mediating Effects of Perceived Usefulness, Regional Industry Review, 43(2), 263-280.
- Jung, J., Lee, J. H. and Kim, C. R. (2016). A Study on the Influence of Firm's Information Security Activities on the Information Security Compliance Intention of Employees, Convergence Security Journal, 16(7), 51-59.
- Kang, D. and Chang, M. (2014). An Analysis of Compliance with Information Security Policy Effects on Information Security Ability and Behavior: Focused on Workers of Shipping and Port Organization, Journal of Korea Port Economic Association, 30(1), 97-118.
- Kim, D. J., Hwang, I. H. and Kim, J. S. (2016). A Study on Employee's Compliance Behavior towards Information Security Policy: A Modified Triandis Model, Journal of Digital Convergence, 14(4), 209-220.
- Kim, H. H., Kang, H. and Choi, Y. J. (2017). A Study on The Effects of HRM in Industrial Security on Job Attitude, Korean Journal of Industrial Security, 7(2), 7-31.
- Kim, J. and Lim, S. H. (2016). A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts, Journal of The Korea Institute of Information Security & Cryptology, 26(3), 735-744.
- Kim, J. and Suh, W. (2024). An Empirical Study for Enhancing Security Training Effectiveness: From the Perspective of Transfer of Training Theory, Korean Security Journal, 78, 1-28.
- Kim, J. K. and Jeon J. H. (2006). A Security Behavior Intention Model for Controlling Computer Viruses, Informatization Policy, 13(3), 174-196.
- Kim, J. K. and Kang, D. Y. (2008). The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness, Journal of the Korea Institute of Information Security & Cryptology, 18(4), 123-133.
- Kim, M. J. and Lee, S. B. (2017). The Effect of the Innovativeness of Delivery Application Users on Perceived Traits, Satisfaction, and Continuous Usage Intention: Using the Extended Technology Acceptance Model (ETAM), International Journal of Tourism and Hospitality Research, 31(1), 199-214.
- Kim, S. and Song, Y. (2011). An Empirical Study on Motivational Factors Influencing Information Security Policy Compliance and Security Behavior of End Users (employees) in Organizations, The e-Business Studies, 12(3), 327-349.
- Kim, S. W. and Kim, J. H. (2003). An Exploratory Study for Development of Learning Transfer Model in Corporate Training, Journal of Corporate Education and Talent Research, 5(1), 83-105.
- Kruger, H. A. and Kearney, W. D. (2006). A Prototype for Assessing Information Security Awareness, Computers & Security, 25(4), 289-296.
- Kwon, Y. and Shin, J. H. (2006). A Study on the Effects of Transfer on Training of Hotel Employees, Journal of Hospitality and Tourism Studies, 8(2), 27-43.
- Lee, B. K., Oh, H. J., Shin, K. A. and Ko, J. Y. (2008). The Effect of Media Campaign as a Cue to Action on Influenza Prevention Behavior: Extending Health Belief Model, The Korean Journal of Advertising and Public Relations, 10(4), 108-138.
- Lee, D. H., Kim, T. S. and Jun, H. J. (2018). Factors that Affect the Intention of Password Security Behavior, Journal of the Korea Institute of Information Security & Cryptology, 28(1), 187-198.
- Lee, J. C. (2010). The Effects of Perceived Organizational Support on Affective Commitment, Turnover Intention and Organizational Citizenship Behavior, Korean Journal of Business Administration, 23(2), 893-908.
- Lee, K. H., Han, K. S. and Jung, J. S. (2016). A Study of Influencing Factors for Compliance Intention of Personal Information Protection Policy of Public Institution Employees, Entrue Journal of Information Technology, 15(1), 75-94.
- Lee, M. J., Chung, J. S. and Park, G. S. (2014). The Influence of the Perceived Risk, Perceived Usefulness, and Transparency in the Development of Nuclear Power on Public Acceptability: Using the Trust of Korea Hydro and Nuclear Power (KHNP) Company as a Mediator, Korean Corporation Management Association, 21(4), 253-279.
- Lee, S. C. and Kwon, Y. J. (2011). The Effect of the Organizational and Individual Characteristics on the Acceptance of the Revised Acts on the Industrial Relations in the Public Institutions: Focused on the Multiple Unions System, Korean Public Administration Quarterly, 23(3), 671-692.
- Lim, C. H. (2006). Effective Strategies for Enhancing Information Security Awareness, Korea Institute of Information Security & Cryptology, 16(2), 30-36.
- Malhotra, N. K., Kim, S. S. and Agarwal, J. (2004). Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research, 15(4), 336-355.
- Ng, B. Y., Kankanhalli, A. and Xu, Y. C. (2009). Studying Users' Computer Security Behavior: A Health Belief Perspective, Decision Support Systems, 46(4), 815-825.
- Park, C. J. and Yim, M. S. (2012a). An Investigation into the Role of Technostress in Information Security Context, Journal of Digital Convergence, 10(5), 37-51.
- Park, C. J. and Yim, M. S. (2012b). An Understanding of Impact of Security Countermeasures on Persistent Policy Compliance, Journal of Digital Convergence, 10(4), 23-35.
- Park, K. (2019). A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior, Journal of Korea Society of Industrial Information Systems, 24(4), 79-98.
- Piaw, C. Y. (2023). A Step By Step Guide PLS-SEM Data Analysis Using SmartPLS 4, Researchtree Education.
- Rosenstock, I. M. (1974). Historical Origins of the Health Belief Model, Health Education Monographs, 2(4), 329.
- Rosenstock, I. M. (2005). Why People Use Health Services, The Milbank Quarterly, 83(4).
- Shin, S. M., Kim, S. J. and Kwon, D. S. (2016). Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model, Journal of the Korea Institute of Information Security & Cryptology, 26(6), 1619-1637.
- Soh, H. C. and Kim, J. K. (2017). Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence: Focusing on the Mediating Effect of Information Security Awareness, Journal of Korea Society of Industrial Information Systems, 22(4), 45-64.
- Sosik, J. J., Kahai, S. S. and Piovoso, M. J. (2009). Silver Bullet or Voodoo Statistics? A Primer for Using the Partial Least Squares Data Analytic Technique in Group and Organization Research, Group & Organization Management, 34(1), 5-36.
- Suh, K. H. (2020). Verification of a Theory of Planned Behavior Model of Medication Adherence in Korean Adults: Focused on Moderating Effects of Optimistic or Present Bias Delay Discounting, The Korean Journal of Health Psychology, 25(5), 1007-1024.
- Sung, W. (2013). A Study on the Acceptance Factors of Smart Work Policy in Korea: Using the User Survey of Smart Work Center, Korean Policy Studies Review, 22(1), 331-359.
- Yang, E. H. and Chung, J. S. (2006). In Search of Diagnostic Tools for Learning Transfer, Journal of Corporate Education, 8(2), 101-122.
- Yim, M. S. (2013). The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees, Journal of Digital Convergence, 11(1), 27-38.