메뉴 건너뛰기




Volumn 24, Issue 6, 2008, Pages 2799-2816

Security lapses and the omission of information security measures: A threat control model and empirical test

Author keywords

Information security; Omissive behaviors; Protection motivation theory; Social cognitive theory; Threat control model

Indexed keywords

COMPUTER NETWORKS;

EID: 51349158689     PISSN: 07475632     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.chb.2008.04.005     Document Type: Article
Times cited : (442)

References (91)
  • 1
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • Acquisti A., and Grossklags J. Privacy and rationality in individual decision making. IEEE Security and Privacy 3 (2005) 26-33
    • (2005) IEEE Security and Privacy , vol.3 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 2
    • 51349146769 scopus 로고    scopus 로고
    • Acquisti, J., & Grossklags, A. (2007). When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information, Sixth Workshop on the Economics of Information Security (WEIS 2007), June 6, Pittsburgh, PA (pp. 7-18).
    • Acquisti, J., & Grossklags, A. (2007). When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information, Sixth Workshop on the Economics of Information Security (WEIS 2007), June 6, Pittsburgh, PA (pp. 7-18).
  • 3
    • 33746633350 scopus 로고
    • Perceived usefulness, ease of use, and usage of information technology: A replication
    • Adams D.A., Nelson R.R., and Todd P.A. Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly 16 (1992) 227-247
    • (1992) MIS Quarterly , vol.16 , pp. 227-247
    • Adams, D.A.1    Nelson, R.R.2    Todd, P.A.3
  • 4
    • 0035999319 scopus 로고    scopus 로고
    • Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
    • Ajzen I. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology 32 (2002) 665-683
    • (2002) Journal of Applied Social Psychology , vol.32 , pp. 665-683
    • Ajzen, I.1
  • 5
    • 51349167484 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Albrechtsen E. A qualitative study of users' view on information security. Computers and Security 25 (2006) 445-451
    • (2006) Computers and Security , vol.25 , pp. 445-451
    • Albrechtsen, E.1
  • 6
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behavioral change
    • Bandura A. Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review 84 2 (1977) 191-215
    • (1977) Psychological Review , vol.84 , Issue.2 , pp. 191-215
    • Bandura, A.1
  • 8
    • 0035227452 scopus 로고    scopus 로고
    • Social cognitive theory: An agentive perspective
    • Bandura A. Social cognitive theory: An agentive perspective. Annual Review of Psychology 52 (2001) 1-26
    • (2001) Annual Review of Psychology , Issue.52 , pp. 1-26
    • Bandura, A.1
  • 10
    • 51349124614 scopus 로고    scopus 로고
    • Global IT spending and investment forecast, 2006 To 2007
    • Bartels A. Global IT spending and investment forecast, 2006 To 2007. Forrester Research 12 (2006) 4-31
    • (2006) Forrester Research , vol.12 , pp. 4-31
    • Bartels, A.1
  • 11
    • 0034418773 scopus 로고    scopus 로고
    • Relation of general deviance to academic dishonesty
    • Blankenship K.L., and Whitley B.E. Relation of general deviance to academic dishonesty. Ethics and Behavior 10 1 (2000) 1-12
    • (2000) Ethics and Behavior , vol.10 , Issue.1 , pp. 1-12
    • Blankenship, K.L.1    Whitley, B.E.2
  • 14
    • 33846367309 scopus 로고    scopus 로고
    • People - Often the weakest link in security, but one of the best places to start
    • Bresz F.P. People - Often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance (2004) 57-60
    • (2004) Journal of Health Care Compliance , pp. 57-60
    • Bresz, F.P.1
  • 15
    • 0242692297 scopus 로고    scopus 로고
    • Collaboration for successful prisoner reentry: The role of parole and the courts
    • Burke P.B. Collaboration for successful prisoner reentry: The role of parole and the courts. Corrections Management Quarterly 5 (2001) 11-22
    • (2001) Corrections Management Quarterly , vol.5 , pp. 11-22
    • Burke, P.B.1
  • 16
    • 33750922314 scopus 로고    scopus 로고
    • Ethics in information technology and software use
    • Calluzzo V.J., and Cante C.J. Ethics in information technology and software use. Journal of Business Ethics 51 3 (2004) 301-312
    • (2004) Journal of Business Ethics , vol.51 , Issue.3 , pp. 301-312
    • Calluzzo, V.J.1    Cante, C.J.2
  • 17
    • 2442654928 scopus 로고    scopus 로고
    • Perceived information security, financial liability, and consumer trust in electronic commerce transactions
    • Challappa R.K., and Pavlou P. Perceived information security, financial liability, and consumer trust in electronic commerce transactions. Journal of Logistics Information Management 15 (2002) 358-368
    • (2002) Journal of Logistics Information Management , Issue.15 , pp. 358-368
    • Challappa, R.K.1    Pavlou, P.2
  • 19
    • 49149116092 scopus 로고
    • Computer self-efficacy: Development of a measure and initial test
    • Compeau D.R., and Higgins C.A. Computer self-efficacy: Development of a measure and initial test. MIS Quarterly 19 (1995) 189-211
    • (1995) MIS Quarterly , vol.19 , pp. 189-211
    • Compeau, D.R.1    Higgins, C.A.2
  • 20
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 (1989) 319-340
    • (1989) MIS Quarterly , vol.13 , pp. 319-340
    • Davis, F.D.1
  • 21
    • 84936823933 scopus 로고
    • User acceptance of computer technology: A comparison of two theoretical models
    • Davis F.D., Bagozzi R.P., and Warshaw P.R. User acceptance of computer technology: A comparison of two theoretical models. Management Science 35 (1989) 982-1003
    • (1989) Management Science , vol.35 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 23
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon G., and Backhouse J. Current directions in IS security research: Towards socio-organizational perspectives. Information Systems Journal 11 (2001) 127-153
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 24
    • 0035534144 scopus 로고    scopus 로고
    • Index construction with formative indicators: An alternative to scale development
    • Diamantopoulos A., and Winklhofer H.M. Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research 38 (2001) 269-277
    • (2001) Journal of Marketing Research , vol.38 , pp. 269-277
    • Diamantopoulos, A.1    Winklhofer, H.M.2
  • 25
    • 0141831952 scopus 로고    scopus 로고
    • Making sense of invulnerability at work - A qualitative study of police drivers
    • Dorn L., and Brown B. Making sense of invulnerability at work - A qualitative study of police drivers. Safety Science 41 (2003) 837-859
    • (2003) Safety Science , vol.41 , pp. 837-859
    • Dorn, L.1    Brown, B.2
  • 26
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: A hierarchical framework for various approaches
    • Eloff M.M., and von Solms S.H. Information security management: A hierarchical framework for various approaches. Computers and Security 19 (2000) 243-256
    • (2000) Computers and Security , vol.19 , pp. 243-256
    • Eloff, M.M.1    von Solms, S.H.2
  • 27
    • 3142661232 scopus 로고    scopus 로고
    • Information transfer among internet firms: The case of Hacker attacks
    • Ettredge M.L., and Richardson V.J. Information transfer among internet firms: The case of Hacker attacks. Journal of Information Systems 17 2 (2003) 71-82
    • (2003) Journal of Information Systems , vol.17 , Issue.2 , pp. 71-82
    • Ettredge, M.L.1    Richardson, V.J.2
  • 28
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell C., and Larcker D.F. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18 (1981) 39-50
    • (1981) Journal of Marketing Research , vol.18 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 29
    • 0000686460 scopus 로고    scopus 로고
    • Explanations from intelligent systems: Theoretical foundations and implications for practice
    • Gregor S., and Benbasat I. Explanations from intelligent systems: Theoretical foundations and implications for practice. MIS Quarterly 23 (1999) 497-527
    • (1999) MIS Quarterly , vol.23 , pp. 497-527
    • Gregor, S.1    Benbasat, I.2
  • 30
    • 33645848461 scopus 로고    scopus 로고
    • People at risk of flooding: Why some residents take precautionary action while others do not
    • Grothmann T., and Reusswig F. People at risk of flooding: Why some residents take precautionary action while others do not. Natural Hazards 38 (2006) 101-120
    • (2006) Natural Hazards , vol.38 , pp. 101-120
    • Grothmann, T.1    Reusswig, F.2
  • 31
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington S.J. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly 20 (1996) 257-258
    • (1996) MIS Quarterly , vol.20 , pp. 257-258
    • Harrington, S.J.1
  • 32
    • 51349135977 scopus 로고    scopus 로고
    • Harvey, C. (2007). The boss has new technology to spy on you. Datamation, April (pp. 1-5).
    • Harvey, C. (2007). The boss has new technology to spy on you. Datamation, April (pp. 1-5).
  • 33
  • 34
    • 0037276463 scopus 로고    scopus 로고
    • An investigation of volitional control in information ethics
    • Hsu M.-H., and Kuo F.-Y. An investigation of volitional control in information ethics. Behavior and Information Technology 22 (2003) 53-62
    • (2003) Behavior and Information Technology , vol.22 , pp. 53-62
    • Hsu, M.-H.1    Kuo, F.-Y.2
  • 35
    • 51349094012 scopus 로고    scopus 로고
    • International Federation of Accountants (2006). Intellectual assets and value creation: Implications for corporate reporting. Paris France. Retrieved 11.4.07.
    • International Federation of Accountants (2006). Intellectual assets and value creation: Implications for corporate reporting. Paris France. Retrieved 11.4.07.
  • 36
    • 84993839827 scopus 로고
    • A theoretical perspective for understanding reactions to victimization
    • Janoff-Bulman R., and Frieze I.H. A theoretical perspective for understanding reactions to victimization. Journal of Social Issues 39 (1983) 1-17
    • (1983) Journal of Social Issues , vol.39 , pp. 1-17
    • Janoff-Bulman, R.1    Frieze, I.H.2
  • 37
    • 85016560868 scopus 로고    scopus 로고
    • Secure coding: Building security into the software development life cycle
    • Jones R.L., and Rastogi A. Secure coding: Building security into the software development life cycle. Information Systems Security 13 (2004) 29-39
    • (2004) Information Systems Security , vol.13 , pp. 29-39
    • Jones, R.L.1    Rastogi, A.2
  • 38
    • 17444423290 scopus 로고    scopus 로고
    • Sociotechnical architecture for online privacy
    • Jutla D.N., and Bodorik P. Sociotechnical architecture for online privacy. IEEE, Security and Privacy 3 (2005) 29-39
    • (2005) IEEE, Security and Privacy , vol.3 , pp. 29-39
    • Jutla, D.N.1    Bodorik, P.2
  • 40
    • 39749188622 scopus 로고    scopus 로고
    • Disruptive technologies and the evolution of the law
    • Keck R. Disruptive technologies and the evolution of the law. Legal Briefs 23 (2005) 22-49
    • (2005) Legal Briefs , vol.23 , pp. 22-49
    • Keck, R.1
  • 41
    • 27544446278 scopus 로고    scopus 로고
    • Kim, Y., & Kim, D. J. (2005). A study of online transaction self-efficacy, consumer trust, and uncertainty reduction in electronic commerce transaction. In Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS), June (pp. 170-183).
    • Kim, Y., & Kim, D. J. (2005). A study of online transaction self-efficacy, consumer trust, and uncertainty reduction in electronic commerce transaction. In Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS), June (pp. 170-183).
  • 42
    • 0040436852 scopus 로고    scopus 로고
    • Development and validation of ethical computer self-efficacy measure: The case of shoplifting
    • Kuo F.-Y., and Hsu M.-H. Development and validation of ethical computer self-efficacy measure: The case of shoplifting. Journal of Business Ethics 32 (2001) 299-315
    • (2001) Journal of Business Ethics , vol.32 , pp. 299-315
    • Kuo, F.-Y.1    Hsu, M.-H.2
  • 43
    • 84986356306 scopus 로고
    • Ethical intentions and the theories of reasoned action and planned behavior
    • Kurland N.B. Ethical intentions and the theories of reasoned action and planned behavior. Journal of Applied Social Psychology 25 (1995) 297-313
    • (1995) Journal of Applied Social Psychology , vol.25 , pp. 297-313
    • Kurland, N.B.1
  • 45
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • Leach J. Improving user security behaviour. Computers and Security 22 (2003) 685-691
    • (2003) Computers and Security , vol.22 , pp. 685-691
    • Leach, J.1
  • 46
    • 84965799600 scopus 로고
    • On being mugged: The event and its aftermath
    • Lejeune R., and Alex N. On being mugged: The event and its aftermath. Urban Life and Culture 2 (1973) 259-287
    • (1973) Urban Life and Culture , vol.2 , pp. 259-287
    • Lejeune, R.1    Alex, N.2
  • 47
    • 51349155814 scopus 로고    scopus 로고
    • Leyden, J. (2004). Clueless office workers help spread computer viruses, The Register, February 6 (pp. 17-21).
    • Leyden, J. (2004). Clueless office workers help spread computer viruses, The Register, February 6 (pp. 17-21).
  • 48
    • 3843070789 scopus 로고    scopus 로고
    • Modeling information ethics: The joint moderating role of locus of control and job insecurity
    • Lin C.-P., and Ding C.G. Modeling information ethics: The joint moderating role of locus of control and job insecurity. Journal of Business Ethics 48 (2003) 335-347
    • (2003) Journal of Business Ethics , vol.48 , pp. 335-347
    • Lin, C.-P.1    Ding, C.G.2
  • 49
    • 51349143328 scopus 로고    scopus 로고
    • Losey, R. C. (1998). The electronic communications privacy act: United States Code. Orlando, FL. Retrieved 10.12.07.
    • Losey, R. C. (1998). The electronic communications privacy act: United States Code. Orlando, FL. Retrieved 10.12.07.
  • 50
    • 38249040548 scopus 로고
    • The rotter locus of control scale: The comparison of alternative response formats and implications for reliability, validity and dimensionality
    • Marsh H.W., and Richards G.E. The rotter locus of control scale: The comparison of alternative response formats and implications for reliability, validity and dimensionality. Journal of Research in Personality 20 (1986) 509-558
    • (1986) Journal of Research in Personality , vol.20 , pp. 509-558
    • Marsh, H.W.1    Richards, G.E.2
  • 51
    • 0011534110 scopus 로고
    • Relapse prevention in managerial training: A model for maintenance of behavior change
    • Marx R.D. Relapse prevention in managerial training: A model for maintenance of behavior change. Academy of Management Review 7 1 (1982) 433-441
    • (1982) Academy of Management Review , vol.7 , Issue.1 , pp. 433-441
    • Marx, R.D.1
  • 53
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in health-related behaviour: A meta-analytic review of protection motivation theory
    • Milne S.S.P., and Orbell S. Prediction and intervention in health-related behaviour: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 30 (2000) 106-143
    • (2000) Journal of Applied Social Psychology , vol.30 , pp. 106-143
    • Milne, S.S.P.1    Orbell, S.2
  • 56
    • 51349113141 scopus 로고    scopus 로고
    • Ong, T. H., Tan, C. P., Tan, Y. T., & Ting, C. (1999). SNMS - Shadow network management system. In Symposium on network computing and management. Singapore. May 21 (pp. 1-9).
    • Ong, T. H., Tan, C. P., Tan, Y. T., & Ting, C. (1999). SNMS - Shadow network management system. In Symposium on network computing and management. Singapore. May 21 (pp. 1-9).
  • 57
    • 39749168050 scopus 로고    scopus 로고
    • Pahnila, S., Siponen, M. T., & Mahmood, A. (2007). Employees' behavior towards IS security policy compliance. In Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS (pp. 156-165).
    • Pahnila, S., Siponen, M. T., & Mahmood, A. (2007). Employees' behavior towards IS security policy compliance. In Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS (pp. 156-165).
  • 58
    • 0037396112 scopus 로고    scopus 로고
    • What to convey in antismoking advertisements of adolescents: The use of protection motivation theory to identify effective message themes
    • Pechmann C., Zhao G., Goldberg M., and Reibling E.T. What to convey in antismoking advertisements of adolescents: The use of protection motivation theory to identify effective message themes. Journal of Marketing 67 (2003) 1-18
    • (2003) Journal of Marketing , vol.67 , pp. 1-18
    • Pechmann, C.1    Zhao, G.2    Goldberg, M.3    Reibling, E.T.4
  • 59
    • 34248334263 scopus 로고    scopus 로고
    • Evaluating information security tradeoffs: Restricting access can interfere with user tasks
    • Post G.V., and Kagan A. Evaluating information security tradeoffs: Restricting access can interfere with user tasks. Computers and Security 26 (2007) 229-237
    • (2007) Computers and Security , vol.26 , pp. 229-237
    • Post, G.V.1    Kagan, A.2
  • 61
    • 21444458113 scopus 로고    scopus 로고
    • Why do we need what we need? A terror management perspective on the roots of human social motivation
    • Pyszczynski T., Greenberg J., and Solomon S. Why do we need what we need? A terror management perspective on the roots of human social motivation. Psychological Inquiry 8 (1997) 1-20
    • (1997) Psychological Inquiry , vol.8 , pp. 1-20
    • Pyszczynski, T.1    Greenberg, J.2    Solomon, S.3
  • 62
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • Rippetoe P.A., and Rogers R.W. Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. Journal of Personnel Social Psychology 52 (1987) 596-604
    • (1987) Journal of Personnel Social Psychology , vol.52 , pp. 596-604
    • Rippetoe, P.A.1    Rogers, R.W.2
  • 63
    • 0030919502 scopus 로고    scopus 로고
    • The association between illusions of invulnerability and exposure to trauma
    • Roe-Berning S., and Straker G. The association between illusions of invulnerability and exposure to trauma. Journal of Traumatic Stress 10 (1997) 319-327
    • (1997) Journal of Traumatic Stress , vol.10 , pp. 319-327
    • Roe-Berning, S.1    Straker, G.2
  • 64
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers R.W. A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91 (1975) 93-114
    • (1975) Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 65
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
    • Cacioppo J., and Petty R. (Eds), Guilford Press, New York
    • Rogers R.W. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In: Cacioppo J., and Petty R. (Eds). Social Psychophysiology (1983), Guilford Press, New York 153-176
    • (1983) Social Psychophysiology , pp. 153-176
    • Rogers, R.W.1
  • 66
    • 0013994747 scopus 로고
    • Generalized expectancies for internal versus external control of reinforcement
    • Rotter J. Generalized expectancies for internal versus external control of reinforcement. Psychological Monographs 1 (1966) 1-28
    • (1966) Psychological Monographs , vol.1 , pp. 1-28
    • Rotter, J.1
  • 67
    • 33846849570 scopus 로고    scopus 로고
    • Organisational security culture: Extending the end-user perspective
    • Ruighaver A.B., Maynard S.B., and Chang S. Organisational security culture: Extending the end-user perspective. Computers and Security 26 (2007) 56-62
    • (2007) Computers and Security , vol.26 , pp. 56-62
    • Ruighaver, A.B.1    Maynard, S.B.2    Chang, S.3
  • 68
    • 3242661948 scopus 로고    scopus 로고
    • Information security tools and practices: What works?
    • Ryan J. Information security tools and practices: What works?. IEEE Transactions on Computers 53 (2004) 1060-1064
    • (2004) IEEE Transactions on Computers , vol.53 , pp. 1060-1064
    • Ryan, J.1
  • 70
    • 51349137263 scopus 로고    scopus 로고
    • SANS. (2005). The SANS security policy project. Bethesda, MD.
    • SANS. (2005). The SANS security policy project. Bethesda, MD.
  • 71
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the weakest link - A human/computer interaction approach to usable and effective security
    • Sasse M.A., Brostoff S., and Weirich D. Transforming the weakest link - A human/computer interaction approach to usable and effective security. BT Technology Journal 19 (2004) 122-131
    • (2004) BT Technology Journal , vol.19 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 72
    • 0007026070 scopus 로고    scopus 로고
    • Enforcement policy and corporate misconduct: The changing perspective of deterrence theory
    • Scholz J.T. Enforcement policy and corporate misconduct: The changing perspective of deterrence theory. Law and Contemporary Problems 60 (1997) 153-268
    • (1997) Law and Contemporary Problems , vol.60 , pp. 153-268
    • Scholz, J.T.1
  • 74
    • 51349167925 scopus 로고    scopus 로고
    • Shreve, M. (2004). The office now a major place for identity theft. Crains. September, (pp. 1-4).
    • Shreve, M. (2004). The office now a major place for identity theft. Crains. September, (pp. 1-4).
  • 75
    • 50049128296 scopus 로고    scopus 로고
    • Siponen, M. T., Pahnila, S., Mahmood, A. (2006). Factors influencing protection motivation and IS security policy compliance, Innovations in Information Technology, November, 1-5.
    • Siponen, M. T., Pahnila, S., Mahmood, A. (2006). Factors influencing protection motivation and IS security policy compliance, Innovations in Information Technology, November, 1-5.
  • 76
    • 39749091576 scopus 로고    scopus 로고
    • IS security design theory framework and six approaches to the application of IS security policies and guidelines
    • Siponen M.T., and Iivari J. IS security design theory framework and six approaches to the application of IS security policies and guidelines. Journal of the Association for Information Systems 7 7 (2006) 445-472
    • (2006) Journal of the Association for Information Systems , vol.7 , Issue.7 , pp. 445-472
    • Siponen, M.T.1    Iivari, J.2
  • 77
    • 0032375196 scopus 로고    scopus 로고
    • Self-efficacy and work-related performance: A meta-analysis
    • Stajkovic A.D., and Luthans F. Self-efficacy and work-related performance: A meta-analysis. Psychological Bulletin 124 (1998) 240-261
    • (1998) Psychological Bulletin , vol.124 , pp. 240-261
    • Stajkovic, A.D.1    Luthans, F.2
  • 79
    • 0141463342 scopus 로고
    • Deterring cheating by student programmers: A field experiment in computer security
    • Straub D.W., Carlson P.J., and Jones E.H. Deterring cheating by student programmers: A field experiment in computer security. Journal of Management Systems 5 (1993) 33-48
    • (1993) Journal of Management Systems , vol.5 , pp. 33-48
    • Straub, D.W.1    Carlson, P.J.2    Jones, E.H.3
  • 80
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub D.W., and Nance W.D. Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly 14 (1990) 45-62
    • (1990) MIS Quarterly , vol.14 , pp. 45-62
    • Straub, D.W.1    Nance, W.D.2
  • 81
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub D.W., and Welke R.J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22 (1998) 441-469
    • (1998) MIS Quarterly , vol.22 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 82
    • 0036024765 scopus 로고    scopus 로고
    • Responsibility attribution for violence against women: A study of Chinese public service professionals
    • Tang C.S.-K., Pun S.H., and Cheung F.M. Responsibility attribution for violence against women: A study of Chinese public service professionals. Psychology of Women Quarterly 26 (2002) 175-185
    • (2002) Psychology of Women Quarterly , vol.26 , pp. 175-185
    • Tang, C.S.-K.1    Pun, S.H.2    Cheung, F.M.3
  • 83
  • 85
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • von Solms B., and von Solms R. The 10 deadly sins of information security management. Computers and Security 23 (2004) 371-376
    • (2004) Computers and Security , vol.23 , pp. 371-376
    • von Solms, B.1    von Solms, R.2
  • 86
    • 0004187241 scopus 로고    scopus 로고
    • PDE Publications, Toronto
    • Wilde G.J.S. Target risk (2001), PDE Publications, Toronto
    • (2001) Target risk
    • Wilde, G.J.S.1
  • 87
    • 84869780575 scopus 로고    scopus 로고
    • Woon, I. M. Y., Tan, G. W., & Low, R. T. (2005). A protection motivation theory approach to home wireless security. International Conference on Information Systems, Las Vegas (Vol. 26, pp. 367-380).
    • Woon, I. M. Y., Tan, G. W., & Low, R. T. (2005). A protection motivation theory approach to home wireless security. International Conference on Information Systems, Las Vegas (Vol. 26, pp. 367-380).
  • 88
    • 84995871700 scopus 로고    scopus 로고
    • Gaining access with social engineering: An empirical study of the threat
    • Workman M. Gaining access with social engineering: An empirical study of the threat. Information Systems Security Journal 16 (2007) 315-331
    • (2007) Information Systems Security Journal , vol.16 , pp. 315-331
    • Workman, M.1
  • 89
    • 33846393137 scopus 로고    scopus 로고
    • Workman, M., & Gathegi, J. (2005). Observance and contravention of information security measures. In Proceedings of the world conference on security management and applied computing, Las Vegas, NV (pp. 241-247).
    • Workman, M., & Gathegi, J. (2005). Observance and contravention of information security measures. In Proceedings of the world conference on security management and applied computing, Las Vegas, NV (pp. 241-247).
  • 91
    • 13244273409 scopus 로고    scopus 로고
    • Protection motivation theory and adolescent drug trafficking: Relationship between health motivation and longitudinal risk involvement
    • Wu Y., Stanton B.F., Li X., Galbraith J., and Cole M.L. Protection motivation theory and adolescent drug trafficking: Relationship between health motivation and longitudinal risk involvement. Journal of Pediatric Psychology 30 (2005) 122-137
    • (2005) Journal of Pediatric Psychology , vol.30 , pp. 122-137
    • Wu, Y.1    Stanton, B.F.2    Li, X.3    Galbraith, J.4    Cole, M.L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.