메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Factors influencing protection motivation and IS security policy a compliance

Author keywords

[No Author keywords available]

Indexed keywords

IS SECURITY; NEW MODEL; SELF-EFFICACY;

EID: 50049128296     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INNOVATIONS.2006.301907     Document Type: Conference Paper
Times cited : (43)

References (21)
  • 3
    • 2642549662 scopus 로고    scopus 로고
    • Computer and Risky Computing Practices: A Rational Choice Perspective
    • Aytes, K. and Connolly, T, "Computer and Risky Computing Practices: A Rational Choice Perspective", Journal of Organizational and End User Computing, 16,2, 2004, 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.2 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 4
    • 30744434347 scopus 로고    scopus 로고
    • An analysis of the growth of computer and Internet security breaches
    • Bagchi, K. and Udo, G., "An analysis of the growth of computer and Internet security breaches", Communications of AIS 12, 2003, 684-700.
    • (2003) Communications of AIS 12 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 5
    • 0017472917 scopus 로고
    • Self-Efficacy: Toward a Unifying Theory of Behaviour Change
    • Bandura, A., "Self-Efficacy: Toward a Unifying Theory of Behaviour Change", Psychological Review 84, 2, 1977, 191-215.
    • (1977) Psychological Review , vol.84 , Issue.2 , pp. 191-215
    • Bandura, A.1
  • 10
    • 0036299585 scopus 로고    scopus 로고
    • Security surveys spring crop
    • Hinde, S., "Security surveys spring crop", Computers & Security, 21, 4, 2002, 310-321.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 310-321
    • Hinde, S.1
  • 11
    • 0001094004 scopus 로고    scopus 로고
    • Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs
    • Karahanna, E., Straub, D. W. and Chervany, N. L., "Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs", MIS Quarterly, 23,2, 1999, 183-213.
    • (1999) MIS Quarterly , vol.23 , Issue.2 , pp. 183-213
    • Karahanna, E.1    Straub, D.W.2    Chervany, N.L.3
  • 12
    • 73449149291 scopus 로고
    • Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation
    • Moore, G.C. and Benbasat, I., "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation". Information Systems Research, 1991. 2(3): p. 191-222.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 191-222
    • Moore, G.C.1    Benbasat, I.2
  • 14
    • 0002247369 scopus 로고
    • Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory
    • J. Cacioppo and R. Petty Eds, Guilford, New York
    • Rogers, R. W., "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory", in Social Psychophysiology, J. Cacioppo and R. Petty (Eds.), Guilford, New York, 1983.
    • (1983) Social Psychophysiology
    • Rogers, R.W.1
  • 16
    • 0033683516 scopus 로고    scopus 로고
    • A Conceptual Foundation for Organizational Information Security Awareness
    • Siponen, M., "A Conceptual Foundation for Organizational Information Security Awareness", Information Management & Computer Security, 8, 1, 2000, 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 17
    • 55249123249 scopus 로고
    • Validating Instruments in MIS Research
    • Straub, D. W., "Validating Instruments in MIS Research", MIS Quarterly, 13, 2, 1989, 147-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 18
    • 0000280419 scopus 로고
    • Effective IS Security: An Empirical Study
    • Straub, D.W., "Effective IS Security: An Empirical Study", Information Systems Research, 1, 3, 1990, 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 19
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models fir. Management Decision-Making
    • Straub, DW. and Welke, RJ., "Coping with Systems Risk: Security Planning Models fir. Management Decision-Making" , MIS Quarterly, 22, 4, 1998, 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.