정보보호 거버넌스 효율성 제고를 위한 조직원의 정보보호 행위에 관한 실증 연구
暂无分享,去创建一个
[1] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[2] A HigginsChristopher,et al. Influence of experience on personal computer utilization , 1994 .
[3] Qing Hu,et al. User behavior toward preventive technologies - cultural differences between the United States and South Korea , 2006, ECIS.
[4] Ken Stevens,et al. An Investigation of the Impact of Corporate Culture on Employee Information Systems Security Behaviour , 2009 .
[5] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[6] Beomsoo Kim,et al. Primary Factors Affecting Corporate Employees’ Attitudes Toward Information Security , 2011 .
[7] John Gordineer,et al. Blended Threats: A New Era in Anti-Virus Protection , 2003, Inf. Secur. J. A Glob. Perspect..
[8] Carl A. Kallgren,et al. A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places. , 1990 .
[9] P. Lachenbruch. Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .
[10] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .
[11] M. McLure Wasko,et al. "It is what one does": why people participate and help others in electronic communities of practice , 2000, J. Strateg. Inf. Syst..
[12] P. Sheeran,et al. Augmenting the Theory of Planned Behavior: Roles for Anticipated Regret and Descriptive Norms , 1999 .
[13] M. Schnake,et al. AN EMPIRICAL ASSESSMENT OF THE EFFECTS OF AFFECTIVE RESPONSE IN THE MEASUREMENT OF ORGANIZATIONAL CLIMATE , 1983 .
[14] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[15] Robert Dubin,et al. DEVIANT BEHAVIOR AND SOCIAL STRUCTURE: CONTINUITIES IN SOCIAL THEORY * , 1959 .
[16] Bob E. Hayes,et al. Measuring Perceptions of Workplace Safety: Development and Validation of the Work Safety Scale , 1998 .
[17] Alexander Ardichvili,et al. Motivation and barriers to participation in virtual knowledge-sharing communities of practice , 2003, J. Knowl. Manag..
[18] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[19] Richard A. Cloward. Illegitimate Means, Anomie, and Deviant Behavior , 1959 .
[20] A. V. D. Ven,et al. Measuring And Assessing Organizations , 1980 .
[21] Irene M. Y. Woon,et al. Perceptions of Information Security at the Workplace : Linking Information Security Climate to Compliant Behavior , 2006 .
[22] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..