메뉴 건너뛰기




Volumn 33, Issue 1, 2009, Pages 71-90

Avoidance of information technology threats: A theoretical perspective

Author keywords

Avoidability; Coping; Costs; Cybernetics; Effectiveness; Malicious IT; Safeguarding measure; Self efficacy; Severity; Susceptibility; Technology threat avoidance theory; Threat; Virtuous IT

Indexed keywords

COSTS; CYBERNETICS; MAGNETIC SUSCEPTIBILITY; SECURITY OF DATA;

EID: 60649084770     PISSN: 02767783     EISSN: None     Source Type: Journal    
DOI: 10.2307/20650279     Document Type: Article
Times cited : (480)

References (109)
  • 1
    • 33746633350 scopus 로고
    • Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication
    • Adams, D. A., Nelson, R. R., and Todd, P. A. 1992. "Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication," MIS Quarterly (16:2), pp. 227-247.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 227-247
    • Adams, D.A.1    Nelson, R.R.2    Todd, P.A.3
  • 2
    • 0034557459 scopus 로고    scopus 로고
    • Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment
    • Agarwal, R., Sambamurthy, V., and Stair, R. M. 2000. "Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment," Information Systems Research (11:4), pp. 418-430.
    • (2000) Information Systems Research , vol.11 , Issue.4 , pp. 418-430
    • Agarwal, R.1    Sambamurthy, V.2    Stair, R.M.3
  • 5
    • 30744434347 scopus 로고    scopus 로고
    • An Analysis of the Growth of Computer and Internet Security Breaches
    • Bagchi, K., and Udo, G. 2003. "An Analysis of the Growth of Computer and Internet Security Breaches," Communications of the AIS (12), pp. 684-700.
    • (2003) Communications of the AIS , vol.12 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 6
    • 0017472917 scopus 로고
    • Self-Efficacy: Toward a Unifying Theory of Behavior Change
    • Bandura, A. 1977. "Self-Efficacy: Toward a Unifying Theory of Behavior Change," Psychological Review (84), pp. 191-215.
    • (1977) Psychological Review , vol.84 , pp. 191-215
    • Bandura, A.1
  • 7
    • 33746878674 scopus 로고
    • Self-Efficacy Mechanism in Human Agency
    • Bandura, A. 1982. "Self-Efficacy Mechanism in Human Agency," American Psychologist (37), pp. 122-147.
    • (1982) American Psychologist , vol.37 , pp. 122-147
    • Bandura, A.1
  • 8
    • 0001099198 scopus 로고    scopus 로고
    • Preference Parameters and Behavioral Heterogeneity: An Experimental Approach in the Health and Retirement Study
    • Barsky, R. B., Juster, F. T., Kimball, M. S., and Shapiro, M. D. 1997. "Preference Parameters and Behavioral Heterogeneity: An Experimental Approach in the Health and Retirement Study," The Quarterly Journal of Economics (72:3), pp. 537-579.
    • (1997) The Quarterly Journal of Economics , vol.72 , Issue.3 , pp. 537-579
    • Barsky, R.B.1    Juster, F.T.2    Kimball, M.S.3    Shapiro, M.D.4
  • 10
    • 0013324190 scopus 로고
    • Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security
    • Baskerville, R. 1991a. "Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security," European Journal of Information Systems (1:2), pp. 121-130.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 11
    • 0026398826 scopus 로고
    • Risk Analysis as a Source of Professional Knowledge
    • Baskerville, R. 1991b. "Risk Analysis as a Source of Professional Knowledge," Computer & Security (10:8), pp. 749-764.
    • (1991) Computer & Security , vol.10 , Issue.8 , pp. 749-764
    • Baskerville, R.1
  • 12
    • 0027804413 scopus 로고
    • Information Systems Security Design Methods: Implications for Information Systems Development
    • Baskerville, R. 1993. "Information Systems Security Design Methods: Implications for Information Systems Development," ACM Computing Surveys (25:4), pp. 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 13
    • 33645301638 scopus 로고    scopus 로고
    • Understanding User Responses to Information Technology: A Coping Model of User Adaptation
    • Beaudry, A., and Pinsonneault, A. 2005. "Understanding User Responses to Information Technology: A Coping Model of User Adaptation," MIS Quarterly (29:3), pp. 493-524.
    • (2005) MIS Quarterly , vol.29 , Issue.3 , pp. 493-524
    • Beaudry, A.1    Pinsonneault, A.2
  • 14
    • 0000998647 scopus 로고    scopus 로고
    • Understanding Information Systems Continuance: An Expectation-Confirmation Model
    • Bhattacherjee, A. 2001. "Understanding Information Systems Continuance: An Expectation-Confirmation Model," MIS Quarterly (25:3), pp. 351-370.
    • (2001) MIS Quarterly , vol.25 , Issue.3 , pp. 351-370
    • Bhattacherjee, A.1
  • 15
    • 9744225129 scopus 로고    scopus 로고
    • Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test
    • Bhattacherjee, A., and Premkumar, G. 2004. "Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test," MIS Quarterly (28:2), pp. 229-254.
    • (2004) MIS Quarterly , vol.28 , Issue.2 , pp. 229-254
    • Bhattacherjee, A.1    Premkumar, G.2
  • 17
    • 0001639903 scopus 로고
    • Informational and Normative Social Influence in Buyer Behavior
    • Burnkrant, R. E., and Cousineau, A. 1975. "Informational and Normative Social Influence in Buyer Behavior," Journal of Consumer Research (2), pp. 206-215.
    • (1975) Journal of Consumer Research , vol.2 , pp. 206-215
    • Burnkrant, R.E.1    Cousineau, A.2
  • 18
    • 33749634299 scopus 로고    scopus 로고
    • Approach, Avoidance, and the Self-Regulation of Affect and Action
    • Carver, C. S. 2006. "Approach, Avoidance, and the Self-Regulation of Affect and Action," Motivation and Emotion (30), pp. 105-110.
    • (2006) Motivation and Emotion , vol.30 , pp. 105-110
    • Carver, C.S.1
  • 19
    • 0020157678 scopus 로고
    • Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology
    • Carver, C. S., and Scheier, M. F. 1982. "Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology," Psychological Bulletin (92:1), pp. 111-135.
    • (1982) Psychological Bulletin , vol.92 , Issue.1 , pp. 111-135
    • Carver, C.S.1    Scheier, M.F.2
  • 20
    • 38549137059 scopus 로고
    • Behavioral Inhibition, Behavioral Activation, and Affective Responses to Impending Reward and Punishment: The BIS/BAS Scales
    • Carver, C. S., and White, T. L. 1994. "Behavioral Inhibition, Behavioral Activation, and Affective Responses to Impending Reward and Punishment: The BIS/BAS Scales," Journal of Personality and Social Psychology (67), pp. 319-333.
    • (1994) Journal of Personality and Social Psychology , vol.67 , pp. 319-333
    • Carver, C.S.1    White, T.L.2
  • 21
    • 0344527939 scopus 로고    scopus 로고
    • Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior
    • Chau, P. Y. K. 2001. "Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior," Journal of End User Computing (13:1), pp. 26-33.
    • (2001) Journal of End User Computing , vol.13 , Issue.1 , pp. 26-33
    • Chau, P.Y.K.1
  • 22
    • 49149116092 scopus 로고
    • Computer Self-Efficacy: Development of a Measure and Initial Test
    • Compeau, D. R., and Higgins, C. A. 1995. "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly (19), pp. 189-211.
    • (1995) MIS Quarterly (19) , pp. 189-211
    • Compeau, D.R.1    Higgins, C.A.2
  • 23
    • 0000004470 scopus 로고    scopus 로고
    • Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study
    • Compeau, D. R., Higgins, C. A., and Huff, S. 1999. "Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study," MIS Quarterly (23:2), 1999, pp. 145-158.
    • (1999) MIS Quarterly , vol.23 , Issue.2 , pp. 145-158
    • Compeau, D.R.1    Higgins, C.A.2    Huff, S.3
  • 24
    • 60649090989 scopus 로고    scopus 로고
    • Computer Economics
    • September
    • Computer Economics. 2003. "Virus Attack Costs on the Rise-Again," September (http://www.computereconomics.com/article.cfm?id= 873).
    • (2003) Virus Attack Costs on the Rise-Again
  • 26
    • 0001501223 scopus 로고
    • How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use
    • Culnan, M. 1993. ""How Did They Get My Name?" An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use," MIS Quarterly (17:3), pp. 341-363.
    • (1993) MIS Quarterly , vol.17 , Issue.3 , pp. 341-363
    • Culnan, M.1
  • 27
    • 0033464665 scopus 로고    scopus 로고
    • Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation
    • Culnan, M., and Armstrong, P. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science (10:1), pp. 104-115.
    • (1999) Organization Science , vol.10 , Issue.1 , pp. 104-115
    • Culnan, M.1    Armstrong, P.2
  • 28
    • 0001217382 scopus 로고
    • Cerebral Asymmetry, Emotion, and Affective Style
    • K. Hugdahl ed, Cambridge, MA: MIT Press
    • Davidson, R. 1995. "Cerebral Asymmetry, Emotion, and Affective Style," in Brain Asymmetry, K. Hugdahl (ed.), Cambridge, MA: MIT Press.
    • (1995) Brain Asymmetry
    • Davidson, R.1
  • 29
    • 55249087535 scopus 로고
    • Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
    • Davis, F. D. 1989. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly (13:3), pp. 319-338.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-338
    • Davis, F.D.1
  • 30
    • 84936823933 scopus 로고
    • User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
    • Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. 1989. "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science (35:8), pp. 982-1003.
    • (1989) Management Science , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 31
    • 33846002705 scopus 로고
    • A Study of Normative and Informational Social Influences upon Individual Judgment
    • Deutsch, M., and Gerard, H. B. 1955. "A Study of Normative and Informational Social Influences upon Individual Judgment," Journal of Abnormal and Social Psychology (51), pp. 629-636.
    • (1955) Journal of Abnormal and Social Psychology , vol.51 , pp. 629-636
    • Deutsch, M.1    Gerard, H.B.2
  • 32
    • 0002698747 scopus 로고    scopus 로고
    • Information System Security Management in the New Millennium
    • Dhillon, G., and Backhouse, J. 2000. "Information System Security Management in the New Millennium," Communications of the ACM (43:7), pp. 125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 33
    • 0001285417 scopus 로고
    • A Cybernetic Theory of Stress, Coping, and Well-Being in Organizations
    • Edwards, J. 1992. "A Cybernetic Theory of Stress, Coping, and Well-Being in Organizations," Academy of Management Review (17:2), pp. 238-274.
    • (1992) Academy of Management Review , vol.17 , Issue.2 , pp. 238-274
    • Edwards, J.1
  • 34
    • 33749613842 scopus 로고    scopus 로고
    • The Hierarchical Model of Approach-Avoidance Motivation
    • Elliot, A. J. 2006. "The Hierarchical Model of Approach-Avoidance Motivation," Motivation and Emotion (30), pp. 111-116.
    • (2006) Motivation and Emotion , vol.30 , pp. 111-116
    • Elliot, A.J.1
  • 38
    • 21844487262 scopus 로고
    • Protection Motivation Theory and Adherence to Medical Treatment Regimens for Muscular Dystrophy
    • Flynn, M. F., Lyman, R. D., and Prentice-Dunn, S. 1995. "Protection Motivation Theory and Adherence to Medical Treatment Regimens for Muscular Dystrophy," Journal of Social and Clinical Psychology 1995, pp. 61-75.
    • (1995) Journal of Social and Clinical Psychology , vol.1995 , pp. 61-75
    • Flynn, M.F.1    Lyman, R.D.2    Prentice-Dunn, S.3
  • 40
    • 0001823869 scopus 로고
    • Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security
    • Goodhue, D., and Straub, D. 1991. "Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security," Information & Management (20), pp. 13-27.
    • (1991) Information & Management , vol.20 , pp. 13-27
    • Goodhue, D.1    Straub, D.2
  • 42
    • 0034373966 scopus 로고    scopus 로고
    • Financial Risk Tolerance and Additional Factors That Affect Risk Taking in Everyday Money Matters
    • Grable, J. 2000. "Financial Risk Tolerance and Additional Factors That Affect Risk Taking in Everyday Money Matters," Journal of Business and Psychology (14:4), pp. 625-630.
    • (2000) Journal of Business and Psychology , vol.14 , Issue.4 , pp. 625-630
    • Grable, J.1
  • 43
    • 60649102826 scopus 로고    scopus 로고
    • Risk Tolerance, Projection Bias, Vividness, and Equity Prices
    • Grable, J., Lytton, R. H., O'Neill, B., Joo, S., and Klock, D. 2006. "Risk Tolerance, Projection Bias, Vividness, and Equity Prices," Journal of Investing, (15:2), pp. 68-74.
    • (2006) Journal of Investing , vol.15 , Issue.2 , pp. 68-74
    • Grable, J.1    Lytton, R.H.2    O'Neill, B.3    Joo, S.4    Klock, D.5
  • 45
    • 0000299603 scopus 로고
    • Cybernetics and Dependence: Reframing the Control Concept
    • Green, S. G., and Welsh, M. A. 1988. "Cybernetics and Dependence: Reframing the Control Concept," Academy of Management Review (13:2), pp. 287-301.
    • (1988) Academy of Management Review , vol.13 , Issue.2 , pp. 287-301
    • Green, S.G.1    Welsh, M.A.2
  • 46
    • 33646493500 scopus 로고    scopus 로고
    • An Empirical Investigation of Personal Financial Risk Tolerance
    • Hallahan, T. A., Faff, R. W., and McKenzie, M. D. 2004. "An Empirical Investigation of Personal Financial Risk Tolerance," Financial Service Review (13:1), pp. 57-78.
    • (2004) Financial Service Review , vol.13 , Issue.1 , pp. 57-78
    • Hallahan, T.A.1    Faff, R.W.2    McKenzie, M.D.3
  • 47
    • 0031304419 scopus 로고    scopus 로고
    • Beyond Pleasure and Pain
    • Higgins, E. T. 1997. "Beyond Pleasure and Pain," American Psychologist (52:12), pp. 1280-1300.
    • (1997) American Psychologist , vol.52 , Issue.12 , pp. 1280-1300
    • Higgins, E.T.1
  • 48
    • 0032089314 scopus 로고    scopus 로고
    • The Intention to Give up Smoking: Disease Versus Social Dimensions
    • Ho, R. 1998. "The Intention to Give up Smoking: Disease Versus Social Dimensions," Journal of Social Psychology (138), pp. 368-380.
    • (1998) Journal of Social Psychology , vol.138 , pp. 368-380
    • Ho, R.1
  • 51
    • 2942715005 scopus 로고    scopus 로고
    • New Threats This Year
    • Hunter, P. 2004. "New Threats This Year," Computer Fraud & Security (2004:11), pp. 12-13.
    • (2004) Computer Fraud & Security , vol.2004 , Issue.11 , pp. 12-13
    • Hunter, P.1
  • 53
    • 77956811393 scopus 로고
    • Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research
    • L. Berkowitz ed, New York: Academic Press, pp
    • Janis, M. 1967. "Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research," in Advances in Experimental Social Psychology, L. Berkowitz (ed.), New York: Academic Press, pp. 166-224.
    • (1967) Advances in Experimental Social Psychology , pp. 166-224
    • Janis, M.1
  • 54
    • 0021397380 scopus 로고
    • The Health Belief Model: A Decade Later
    • Janz, N. K., and Becker, M. H. 1984. "The Health Belief Model: A Decade Later," Health Education Quarterly (11:1), pp. 1-45.
    • (1984) Health Education Quarterly , vol.11 , Issue.1 , pp. 1-45
    • Janz, N.K.1    Becker, M.H.2
  • 55
    • 0000125532 scopus 로고
    • Prospect Theory: An Analysis of Decision Under Risk
    • Kahneman, D., and Tversky, A. 1979. "Prospect Theory: An Analysis of Decision Under Risk," Econometrica (47:2), pp. 263-291.
    • (1979) Econometrica , vol.47 , Issue.2 , pp. 263-291
    • Kahneman, D.1    Tversky, A.2
  • 56
    • 0001094004 scopus 로고    scopus 로고
    • Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs
    • Karahanna, E., Straub, D., and Chervany, N. 1999. "Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs," MIS Quarterly (23:2), pp. 183-213.
    • (1999) MIS Quarterly , vol.23 , Issue.2 , pp. 183-213
    • Karahanna, E.1    Straub, D.2    Chervany, N.3
  • 57
    • 0038590049 scopus 로고
    • Further Thoughts on the Processes of Compliance, Identification, and Internalization
    • J. T. Tedeschi ed, Chicago: Aldine, pp
    • Kelman, H. C. 1974. "Further Thoughts on the Processes of Compliance, Identification, and Internalization," in Perspectives on Social Power, J. T. Tedeschi (ed.), Chicago: Aldine, pp. 126-171.
    • (1974) Perspectives on Social Power , pp. 126-171
    • Kelman, H.C.1
  • 58
    • 0000886740 scopus 로고
    • An Integrated Control Theory Model of Work Motivation
    • Klein, H. J. 1989. "An Integrated Control Theory Model of Work Motivation," Academy of Management Review (14:2), pp. 150-172.
    • (1989) Academy of Management Review , vol.14 , Issue.2 , pp. 150-172
    • Klein, H.J.1
  • 59
    • 0025455754 scopus 로고
    • Emotion, Attention, and the Startle Reflex
    • Lang, P., Bradley, M., and Cuthbert, B. 1990. "Emotion, Attention, and the Startle Reflex," Psychological Review (97), pp. 377-395.
    • (1990) Psychological Review , vol.97 , pp. 377-395
    • Lang, P.1    Bradley, M.2    Cuthbert, B.3
  • 62
    • 0000133760 scopus 로고
    • Threats to Information Systems: Today's Reality, Yesterday's Understanding
    • Loch, K. D., Carr, H. H., and Warkentin, M. E. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), pp. 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 63
    • 0000242433 scopus 로고
    • Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change
    • Maddus, J. E., and Rogers, R. W. 1983. "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change," Journal of Experimental Social Psychology (19), pp. 469-479.
    • (1983) Journal of Experimental Social Psychology , vol.19 , pp. 469-479
    • Maddus, J.E.1    Rogers, R.W.2
  • 64
    • 73449149291 scopus 로고
    • Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation
    • Moore, G. C., and Benbasat, I. 1991. "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation," Information Systems Research (2:3), pp. 192-239.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 192-239
    • Moore, G.C.1    Benbasat, I.2
  • 65
    • 60649115838 scopus 로고    scopus 로고
    • Two Years Later, Blaster Worm Still Squirming
    • eWeek.com, December 5
    • Naraine, R. 2005. "Two Years Later, Blaster Worm Still Squirming," eWeek.com, December 5 (http://www.eweek.com/c/a/Security/Two- Years-Later-Blaster-Worm-Still-Squirming/).
    • (2005)
    • Naraine, R.1
  • 67
    • 84938050384 scopus 로고
    • A Path Analysis of Preventive Health Care Decision Models
    • Oliver, R. L., and Berger, P. K. 1979. "A Path Analysis of Preventive Health Care Decision Models," Journal of Consumer Research (6:2), pp. 113-122.
    • (1979) Journal of Consumer Research , vol.6 , Issue.2 , pp. 113-122
    • Oliver, R.L.1    Berger, P.K.2
  • 69
    • 0037396112 scopus 로고    scopus 로고
    • What to Convey in Antismoking Advertisements for Adolescents: The Use of Protection Motivation Theory to Identify Effective Message Themes
    • Pechmann, C., Zhao, G., Goldberg, M. E., and Reibling, E. T. 2003. "What to Convey in Antismoking Advertisements for Adolescents: The Use of Protection Motivation Theory to Identify Effective Message Themes," Journal of Marketing (67), pp. 1-18.
    • (2003) Journal of Marketing , vol.67 , pp. 1-18
    • Pechmann, C.1    Zhao, G.2    Goldberg, M.E.3    Reibling, E.T.4
  • 70
    • 0002692710 scopus 로고
    • Fear: The Potential of an Appeal Neglected by Marketing
    • Ray, M., and Wilkie, W. 1970. "Fear: The Potential of an Appeal Neglected by Marketing," Journal of Marketing (34:1), pp. 54-62.
    • (1970) Journal of Marketing , vol.34 , Issue.1 , pp. 54-62
    • Ray, M.1    Wilkie, W.2
  • 71
    • 0023304222 scopus 로고
    • Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat
    • Rippetoe, P. A., and Rogers, R. W. 1987. "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat," Journal of Personality and Social Psychology (52:3), pp. 596-604.
    • (1987) Journal of Personality and Social Psychology , vol.52 , Issue.3 , pp. 596-604
    • Rippetoe, P.A.1    Rogers, R.W.2
  • 74
    • 0001840352 scopus 로고
    • A Protection Motivation Theory of Fear Appeals and Attitude Change
    • Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology (91), pp. 93-114.
    • (1975) Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 75
    • 0002247369 scopus 로고
    • Cognitive and Physiological Process in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation
    • R. Petty ed, New York: Guilford Press, pp
    • Rogers, R. W. 1983. "Cognitive and Physiological Process in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A Source Book, R. Petty (ed.), New York: Guilford Press, pp. 153-176.
    • (1983) Social Psychophysiology: A Source Book , pp. 153-176
    • Rogers, R.W.1
  • 76
    • 84973751588 scopus 로고
    • The Health Belief Model and Preventive Health Behavior
    • Rosenstock, I. M. 1974. "The Health Belief Model and Preventive Health Behavior," Health education Monographs (2), pp. 354-386.
    • (1974) Health education Monographs , vol.2 , pp. 354-386
    • Rosenstock, I.M.1
  • 77
    • 0038780931 scopus 로고    scopus 로고
    • Pandora's Box: Spyware, Adware, Autoexecution, and NGSCB
    • Schultz, E. 2003. "Pandora's Box: Spyware, Adware, Autoexecution, and NGSCB," Computer & Security (22:5), pp. 366-367.
    • (2003) Computer & Security (22:5) , pp. 366-367
    • Schultz, E.1
  • 78
    • 0141458141 scopus 로고    scopus 로고
    • Spyware & Adware: The Risks Facing Businesses
    • Shaw, G. 2003. "Spyware & Adware: The Risks Facing Businesses," Network Security (2003:9), pp. 12-14.
    • (2003) Network Security , vol.2003 , Issue.9 , pp. 12-14
    • Shaw, G.1
  • 81
    • 0000981743 scopus 로고    scopus 로고
    • Information Privacy: Measuring Individuals' Concerns about Organizational Practices
    • Smith, H., Milberg, S., and Burke, S. 1996. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly (20:2), pp. 167-196.
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 167-196
    • Smith, H.1    Milberg, S.2    Burke, S.3
  • 83
    • 33750414789 scopus 로고    scopus 로고
    • Integrating Theories of Motivation
    • Steel, P., and Konig, C. J. 2006. "Integrating Theories of Motivation," A cademy of Management Review (31:4), pp. 889-913.
    • (2006) A cademy of Management Review , vol.31 , Issue.4 , pp. 889-913
    • Steel, P.1    Konig, C.J.2
  • 85
    • 0000920697 scopus 로고
    • A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes across Several Types of Organizations
    • Stone, E., Gardner, D., Gueutal, H., and McClure, S. 1983. "A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes across Several Types of Organizations," Journal of Applied Psychology (68:3), pp. 459-468.
    • (1983) Journal of Applied Psychology , vol.68 , Issue.3 , pp. 459-468
    • Stone, E.1    Gardner, D.2    Gueutal, H.3    McClure, S.4
  • 86
    • 0000280419 scopus 로고
    • Effective IS Security: An Empirical Study
    • Straub, D. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 87
    • 0002699431 scopus 로고
    • Discovering and Disciplining Computer Abuse in Organizations: A Field Study
    • Straub, D., and Nance, W. 1990. "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly (14:1), pp. 45-62.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-62
    • Straub, D.1    Nance, W.2
  • 88
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Management Decision Making
    • Straub, D., and Welke, R. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 89
    • 0346938412 scopus 로고    scopus 로고
    • Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems
    • Sutton, S. K., and Davidson, R. 1997. "Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems," Psychological Science (8:3), pp. 204-210.
    • (1997) Psychological Science , vol.8 , Issue.3 , pp. 204-210
    • Sutton, S.K.1    Davidson, R.2
  • 90
    • 38249004423 scopus 로고
    • Protection Motivation Theory: An Extension of Fear Appeals Theory in Communication
    • Tanner, J. F., Day, E., and Crask, M. R. 1989. "Protection Motivation Theory: an Extension of Fear Appeals Theory in Communication," Journal of Business Research (19), pp. 267-276.
    • (1989) Journal of Business Research , vol.19 , pp. 267-276
    • Tanner, J.F.1    Day, E.2    Crask, M.R.3
  • 91
    • 0002735809 scopus 로고
    • The Protection Motivation Model: A Normative Model of Fear Appeals
    • Tanner, J. F., Hunt, J. B., and Eppright, D. R. 1991. "The Protection Motivation Model: a Normative Model of Fear Appeals," Journal of Marketing (55), pp. 36-45.
    • (1991) Journal of Marketing , vol.55 , pp. 36-45
    • Tanner, J.F.1    Hunt, J.B.2    Eppright, D.R.3
  • 92
    • 73549120882 scopus 로고
    • Understanding Information Technology Usage: A Test of Competing Models
    • Taylor, S., and Todd, P. A. 1995. "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research (6:2), pp. 144-177.
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 144-177
    • Taylor, S.1    Todd, P.A.2
  • 94
    • 0040176028 scopus 로고
    • The Past Explains the Present: Emotional Adaptions and the Structure of Ancestral Environments
    • Tooby, J., and Cosmides, L. 1990. "The Past Explains the Present: Emotional Adaptions and the Structure of Ancestral Environments," Ethology and Sociobiology (11), pp. 375-424.
    • (1990) Ethology and Sociobiology , vol.11 , pp. 375-424
    • Tooby, J.1    Cosmides, L.2
  • 95
    • 0016264378 scopus 로고
    • Judgment under Uncertainty: Heuristics and Biases
    • Tversky, A., and Kahneman, D. 1974. "Judgment under Uncertainty: Heuristics and Biases," Science (185:4157), pp. 1124-1131.
    • (1974) Science , vol.185 , Issue.4157 , pp. 1124-1131
    • Tversky, A.1    Kahneman, D.2
  • 96
    • 31744450082 scopus 로고
    • Advances in Prospect Theory: Cumulative Representation of Uncertainty
    • Tversky, A., and Kahneman, D. 1992. "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty (5), pp. 297-323.
    • (1992) Journal of Risk and Uncertainty , vol.5 , pp. 297-323
    • Tversky, A.1    Kahneman, D.2
  • 97
    • 9744271731 scopus 로고    scopus 로고
    • User Acceptance of Hedonic Information Systems
    • van der Heijden, H. 2004. "User Acceptance of Hedonic Information Systems," MIS Quarterly (28:4), pp. 695-704.
    • (2004) MIS Quarterly , vol.28 , Issue.4 , pp. 695-704
    • van der Heijden, H.1
  • 98
    • 0034559541 scopus 로고    scopus 로고
    • Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
    • Venkatesh, V. 2000. "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research (11:4), pp. 342-365.
    • (2000) Information Systems Research , vol.11 , Issue.4 , pp. 342-365
    • Venkatesh, V.1
  • 99
    • 0002888544 scopus 로고    scopus 로고
    • A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges
    • Venkatesh, V., and Brown, S. 2001. "A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges," MIS Quarterly (25:1), pp. 71-102.
    • (2001) MIS Quarterly , vol.25 , Issue.1 , pp. 71-102
    • Venkatesh, V.1    Brown, S.2
  • 100
    • 0033872521 scopus 로고    scopus 로고
    • A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies
    • Venkatesh, V., and Davis, F. D. 2000. "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science (46:2), pp. 186-204.
    • (2000) Management Science , vol.46 , Issue.2 , pp. 186-204
    • Venkatesh, V.1    Davis, F.D.2
  • 101
    • 1542382496 scopus 로고    scopus 로고
    • User Acceptance of Information Technology: Toward a Unified View
    • Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly (27:3), pp. 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 103
    • 0027633395 scopus 로고
    • Testing Four Competing Theories of Health-Protective Behavior
    • Weinstein, N. D. 1993. "Testing Four Competing Theories of Health-Protective Behavior," Health Psychology (12:4), pp. 324-333.
    • (1993) Health Psychology , vol.12 , Issue.4 , pp. 324-333
    • Weinstein, N.D.1
  • 104
    • 0033768584 scopus 로고    scopus 로고
    • Perceived Probability, Perceived Severity, and Health-Protective Behavior
    • Weinstein, N. D. 2000. "Perceived Probability, Perceived Severity, and Health-Protective Behavior," Health Psychology (19:1), pp. 65-74.
    • (2000) Health Psychology , vol.19 , Issue.1 , pp. 65-74
    • Weinstein, N.D.1
  • 106
    • 0001268563 scopus 로고
    • What Constitutes a Theoretical Contribution?
    • Whetten, D. 1989. "What Constitutes a Theoretical Contribution?," Academy of Management Review (14:4), pp. 190-195.
    • (1989) Academy of Management Review , vol.14 , Issue.4 , pp. 190-195
    • Whetten, D.1
  • 108
    • 33747733159 scopus 로고    scopus 로고
    • Changes in Financial Risk Tolerance, 1983-2001
    • Yao, R., Hanna, S. D., and Lindamood, S. 2004. "Changes in Financial Risk Tolerance, 1983-2001," Financial Services Review (13:4), pp. 249-266.
    • (2004) Financial Services Review , vol.13 , Issue.4 , pp. 249-266
    • Yao, R.1    Hanna, S.D.2    Lindamood, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.