[journal]
곽금주
/ 1998
/ 자기효능감과 도덕적 이탈 (Ⅰ)
/ 한국심리학회지: 발달
11(1)
: 1~11
[book]
김계수
/ 2013
/ Smartpls 이용 쉬운 구조방정식모델
/ 청람
[confproc]
한국인터넷진흥원
/ 2018
/ KISA Report
/ RSA Conference 2018
[journal]
Alnuaimi, O. A.
/ 2010
/ Team size, dispersion, and social loafing in technology-supported teams: Aperspective on the theory of moral disengagement
/ Journal of Management Information Systems
27(1)
: 203~230
[journal]
Ayyagari, R.
/ 2011
/ Technostress: Technological Antecedents and Implications
/ MIS Quarterly
35(4)
: 831~858
[journal]
Bandura, A.
/ 1999
/ Moral Disengagement in the Perpetration of Inhumanities
/ Personality and Social Psychology Review
3(3)
: 193~209
[journal]
Bandura, A.
/ 1996
/ Mechanisms of Moral Disengagement in the Exercise of Moral Agency
/ Journal of Personality and Social Psychology
71(2)
: 364~373
[journal]
Chan, M.
/ 2005
/ Perceptions of information security in the workplace: linking information security climate to compliant behavior
/ Journal of Information Privacy and Security
1(3)
: 18~41
[journal]
Chatman, J. A.
/ 1989
/ Matching people and organizations: Selection and socialization in public accounting firms
/ Academy of Management Proceedings
1989(1)
: 199~203
[journal]
Cheng, L.
/ 2013
/ Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
/ Computers & Security
39
: 447~459
[journal]
Chu, A. M.
/ 2014
/ Development and Validation of Instruments of Information Security Deviant Behavior
/ Decision Support Systems
66
: 93~101
[journal]
C h u, A. M.
/ 2015
/ Explaining the misuse of information systems resources in the workplace: A dual-process approach
/ Journal of Business Ethics
131(1)
: 209~225
[book]
Cohen, J. O.
/ 1988
/ Statistical Power analysis for the behavioral science
/ Lawrence erlbaum associates
[journal]
Cox, J.
/ 2012
/ Information systems user security: A structured model of the knowing-doing gap
/ Computers in Human Behavior
28(5)
: 1849~1858
[journal]
D’arcy, J.
/ 2014
/ Understanding Employee Responses to Stressful Information Security Requirements:A Coping Perspective
/ Journal of Management Information Systems
31(2)
: 285~318
[journal]
D’Arcy, J.
/ 2009
/ User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
/ Information Systems Research
20(1)
: 79~98
[confproc]
Dang, D.
/ 2015
/ Factors of people-centric security climate:Conceptual model and exploratory study in Vietnam
/ ACIS 2015 Proceedings
[journal]
Detert, J. R.
/ 2008
/ Moral disengagement in ethical decision making: a study of antecedents and outcomes
/ Journal of Applied Psychology
93(2)
: 374~
[book]
Edwards, I. R.
/ 2007
/ Perspectives on organizational fit
: 1~75
[journal]
Edwards, J. R.
/ 1996
/ An Examination of Competing Version of the Person-Environment Fit Approach to Stress
/ Academy of Management Journal
39
: 292~339
[report]
Enterprise, Verizon
/ 2017
/ 2017 Data Breach Investigations Report
[confproc]
Greene, G.
/ 2010
/ Assessing the Impact of Security Culture and the Employee-Organization Relationship on IS Security Compliance
/ 5th Annual Symposium on Information Assurance
: 1~8
[journal]
Guo, , K. H.
/ 2013
/ Security-related behavior in using information systems in the workplace: A review and synthesis
/ Computer & Security
32
: 242~251
[journal]
Guo, K. H.
/ 2011
/ Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
/ Journal of Management Information Systems
28(2)
: 203~236
[journal]
Guo, K. H.
/ 2012
/ The Effects of Multilevel Sanctions on Information Security Violoations: A Mediating Model
/ Information & Management
49(6)
: 320~326
[journal]
Herath, T.
/ 2009
/ Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
/ Decision Support Systems
47(2)
: 154~165
[journal]
Hovav, A.
/ 2012
/ Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
/ Information &Management
49(2)
: 99~110
[journal]
Hsu, J. S. C.
/ 2015
/ The role of extra-role behaviors and social controls in information security policy effectiveness
/ Information Systems Research
26(2)
: 282~300
[journal]
Kim, H. W.
/ 2004
/ A comparison of online trust building factors between potential customers and repeat customers
/ Journal of the Association for Information Systems
5(10)
: 392~420
[journal]
Lee, C.
/ 2016
/ Understanding information security stress: Focusing on the type of information security compliance activity
/ Computer & Security
59
: 60~70
[confproc]
Mishra, S.
/ 2006
/ Information systems security governance research: a behavioral perspective
/ 1st Annual Symposium on Information Assurance, Academic Track of 9th Annual NYS Cyber Security Conference
: 27~35
[journal]
Moore, C.
/ 2012
/ Why employees do bad things: Moral disengagement and unethical organizational behavior
/ Personnel Psychology
65(1)
: 1~48
[journal]
Padayachee, K.
/ 2016
/ An assessment of opportunity-reducing techniques in information security: An insider threat perspective
/ Decision Support Systems
92
: 47~56
[journal]
Pinsonneault, A.
/ 1993
/ Survey research methodology in management information systems: an assessment
/ Journal of Management Information Systems
10(2)
: 75~105
[journal]
Safa, N. S.
/ 2018
/ Motivation and opportunity based model to reduce information security insider threats in organisations
/ Journal of Information Security and Applications
40
: 247~257
[journal]
Silverthorne, C.
/ 2004
/ The Impact of Organizational Culture and Person-Organization Fit on Organizational Commitment and Job Satisfaction in Taiwan
/ Leadership & Organization Development Journal
25(7)
: 592~599
[journal]
Siponen
/ 2010
/ Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
/ MIS Quarterly
34(3)
: 487~502
[confproc]
Stanton, J. M.
/ 2003
/ Examining the linkage between organizational commitment and information security
/ Presented at the SMC '03 2003 IEEE International Conference on Systems, Man and Cybernetics, IEEE
3
: 2501~2506
[journal]
Tenenhaus, M.
/ 2005
/ PLS path modeling
/ Computational Statistics & Data Analysis
48(1)
: 159~205
[journal]
Vance, A.
/ 2012
/ IS Security Policy Violations: A Rational Choice Perspective
/ Journal of Organizational and End User Computing
24(1)
: 21~41
[journal]
Vroom, C.
/ 2004
/ Towards information security behavioural compliance
/ Computers & Security
23(3)
: 191~198
[journal]
Workman, M.
/ 2008
/ Security lapses and the omission of information security measures: A threat control model and empirical test
/ Computers in Human Behavior
24(6)
: 2799~2816