[thesis]
서보밀
/ 2002
/ Security Control and Risk Analysis under EC Environment
/ 박사
/ Graduate School of Management, KAIST
[journal]
Anderson, J.
/ 1988
/ Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach
/ Psychological Bulletin
103(4)
: 411~423
[journal]
Bandura, A.
/ 2001
/ Social Cognitive Theory: An Agentive Perspective
/ Annual Review of Psychology
52
: 1~26
[journal]
Barclay, D.
/ 1995
/ The Partial Least Squares (PLS) Approach to Causal Modeling, Personal Computer Adoption and Use as an Illustration
/ Technology Studies
2(2)
: 285~324
[journal]
Belanger, F.
/ 2006
/ A Framework for E-Government: Privacy Implications
/ Business Process Management Journal
12(1)
: 48~60
[journal]
Belanger, F.
/ 2011
/ Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
/ MIS Quarterly
35(4)
: 1017~1041
[book]
BSI
/ 1999
/ BS7799: Code of Practices for Information Security Management
/ United Kingdom
[confproc]
Chenoweth, T.
/ 2009
/ Application of Protection Motivation Theory to Adoption of Protective Technologies
/ Proceedings of the 42nd Hawaii International Conference on System Science
[book]
Chin, W. W.
/ 1998
/ The Partial Least Squares Approach to Structural Equation Modeling, In Modern Methods for Business Research
/ Lawrence Erlbaum Associates
: 295~336
[book]
Cohen, J. O.
/ 1988
/ Statistical Power Analysis for the Behavioral Sciences
/ Lawrence Erlbaum
[journal]
Dinev, T.
/ 2006
/ An Extended Privacy Calculus Model for E-Commerce Transactions
/ Information Systems Research
17(1)
: 61~80
[journal]
Doz, Y. L.
/ 2000
/ Formation Processes of R&D Consortia: Which Path to Take? Where Does It Lead?
/ Strategic Management Journal
21(3)
: 239~266
[journal]
Efron, B.
/ 1997
/ Improvements on Crossvalidation: The 0.632+ Bootstrap Method
/ Journal of the American Statistical Association
92(438)
: 548~560
[journal]
Floyd, D. L.
/ 2000
/ A Meta-Analysis of Reseach on Protection Motivation Theory
/ Journal of Applied Social Psychology
30(2)
: 407~429
[journal]
Fornell, C.
/ 1981
/ Evaluating Structural Equation Models with Unobservable Variables and Measurement Error
/ Journal of Marketing Research
18
: 39~50
[journal]
Gray, P. H.
/ 2004
/ Knowledge Sourcing Effectiveness
/ Management Science
50(6)
: 821~
[journal]
Ifinedo, P.
/ 2012
/ Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
/ Computers & Security
31
: 83~95
[other]
ISO/IEC JTC1/SC27
/ 2000
/ Guidelines for the Management of IT Security(GMITS)-Part 1: Concepts and Models of IT Security, TR 13335-1
[journal]
Johnston, A. C.
/ 2010
/ Fear Appeals and Inforamtion Security Behaviors: An Empirical Study
/ MIS Quarterly
34(3)
: 549~566
[journal]
Lee, Y.
/ 2011
/ Understanding Anti-plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective
/ Decision Support Systems
50
: 361~369
[journal]
Li, H.
/ 2010
/ Understanding Situational Online Information Disclosure as a Privacy Calculus
/ Journal of Computer Information Systems
51(1)
: 62~71
[journal]
Li, H.
/ 2011
/ The Role of Affect and Cognition on Online Consumers’Decision to Disclose Personal Information to Unfamiliar Online Vendors
/ Decision Support systems
51(3)
: 434~445
[journal]
Liang, H.
/ 2010
/ Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective
/ Journal of the Association for Information Systems
11(7)
: 394~413
[journal]
Malhotra, N. K.
/ 2004
/ Internet Users’ Information Privacy Concerns(IUIPC): The Construct, the Scale, and a Causal Model
/ Information Systems Research
15(4)
: 336~355
[journal]
Mayer, R.
/ 1995
/ An Integrative Model of Organizational Trust
/ Academy of Management Review
20(3)
: 709~734
[journal]
McKnight, D. H.
/ 2002
/ The Impact of Initial Consumer Trust on Intentions to Transact with a Web Site: A Trust Building Model
/ Journal of Strategic Information Systems
11(3)
: 297~323
[journal]
Milen, G.
/ 2004
/ Strategies for Reducing Online Privacy Risks: Why Consumers Read (or Don’t Read) Online Privacy Notices
/ Journal of Interactive Marketing
18(3)
: 15~29
[book]
Nunnally, J. C.
/ 1994
/ Psychometric Theory
/ McGraw-Hill
[confproc]
Pavlou, P. A.
/ 2002
/ Building Effective Online Marketplaces with Institution-Based Trust
/ Twenty-Third International Conference on Information Systems
[journal]
Pavlou, P. A.
/ 2011
/ State of the Information Privacy Literature: Where Are We Now and Where Should We Go?
/ MIS Quarterly
35(4)
: 977~988
[journal]
Petter, S.
/ 2007
/ Specifying Formative Constructs in Information Systems Research
/ MIS Quarterly
31(4)
: 623~656
[journal]
Rogers, R. W.
/ 1975
/ A Protection Motivation Theory of Fear Appeals and Attitude Change
/ The Journal of Psychology
91
: 93~114
[book]
Rogers, R. W.
/ 1983
/ Cognitive and Physiological Processes in Fear-based Attitude Change: A Revised Theory of Protection Motivation, In Social Psychophysiology: A sourcebook
/ Guilford Press
: 153~176
[journal]
Segars, A.
/ 1993
/ Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis
/ MIS Quarterly
17(4)
: 517~525
[journal]
Smith, H. J.
/ 1996
/ Information Privacy Measuring Individuals’Concerns about Organizational Practices
/ MIS Quarterly
20(2)
: 167~196
[journal]
Smith, H. J.
/ 2011
/ Information Privacy Research: An Interdisciplinary Review
/ MIS Quarterly
35(4)
: 989~1015
[journal]
Solove, D. J.
/ 2006
/ A Taxonomy of Privacy
/ University of Pennsylvania Law Review
154(3)
: 477~564
[book]
Stevens, J.
/ 1992
/ Applied Multivariate Statistics for the Social Sciences
/ Lawrence Erlbaum Associates
[journal]
Stone, E. F.
/ 1983
/ A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes across Several Types of Organizations
/ Journal of Applied Psychology
68(3)
: 459~468
[journal]
Tenenhaus, M.
/ 2005
/ PLS Path Modeling
/ Computational Statistics & Data Analysis
48(1)
: 159~205
[journal]
Teo, T. S. H.
/ 2007
/ Consumer Trust in e-commerce in the United States, Singapore, and China
/ The International Journal of Management Science
35
: 22~38
[journal]
Witte, K.
/ 1994
/ Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)
/ Communication Monographs
61
: 113~134
[confproc]
Woon, I. M. Y
/ 2005
/ A Protection Motivation Theory Approach to Home Wireless Security
/ Proceedings of the 26th International Conference on Information Systems
[journal]
Workman, M.
/ 2009
/ The Amplification Effects of Procedural Justice on a Threat Control Model of Information Systems Security Behaviours
/ Behaviour & Information Technology
28(6)
: 563~575
[journal]
Xu, H.
/ 2011
/ The Personalization Privacy Paradox: An Exploratory Study of Decision Making Process for Location-Aware Marketing
/ Decision Support Systems
51(1)
: 42~52