메뉴 건너뛰기




Volumn 17, Issue 4, 2009, Pages 330-340

Impact of perceived technical protection on security behaviors

Author keywords

Behaviour; Data security; Risk analysis

Indexed keywords

BEHAVIORAL INTENTION; COMPENSATION EFFECTS; DATA ANALYSIS; DATA SECURITY RISKS; DESIGN/METHODOLOGY/APPROACH; EMPIRICAL EXAMINATION; END-USERS; INFORMATION SECURITY; ONLINE SURVEYS; PERCEIVED BEHAVIORAL CONTROL; RESEARCH MODELS; SECURITY POLICY; SECURITY PRACTICE; SECURITY TRAINING; SIGNIFICANT IMPACTS; TECHNICAL PROTECTION; TECHNICAL SECURITY; THEORY OF PLANNED BEHAVIOR;

EID: 76649137264     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220910993980     Document Type: Article
Times cited : (95)

References (36)
  • 2
    • 0002305454 scopus 로고
    • From intentions to action: A theory of planned behavior
    • Kukl, J. and Beckman, J. (Eds), Springer, New York, NY
    • Ajzen, I. (1985), "From intentions to action: a theory of planned behavior", in Kukl, J. and Beckman, J. (Eds), Action Control: From Cognitions to Behaviors, Springer, New York, NY, pp. 11-39.
    • (1985) Action Control: From Cognitions to Behaviors , pp. 11-39
    • Ajzen, I.1
  • 4
    • 0035999319 scopus 로고    scopus 로고
    • Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
    • Ajzen, I. (2002), "Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior", Journal of Applied Social Psychology, Vol.32 No.4, pp. 665-683
    • (2002) Journal of Applied Social Psychology , vol.32 , Issue.4 , pp. 665-683
    • Ajzen, I.1
  • 5
    • 0032590244 scopus 로고    scopus 로고
    • Distinguishing perceptions of control from self-efficacy: Predicting consumption of a low-fat diet using the theory of planned behavior
    • Armitage, C.J. and Conner, M. (1999a), "Distinguishing perceptions of control from self-efficacy: predicting consumption of a low-fat diet using the theory of planned behavior", Journal of Applied Social Psychology, Vol.29 No.1, pp. 72-90.
    • (1999) Journal of Applied Social Psychology , vol.29 , Issue.1 , pp. 72-90
    • Armitage, C.J.1    Conner, M.2
  • 6
    • 0033423024 scopus 로고    scopus 로고
    • The theory of planned behaviour: Assessment of predictive validity and 'perceived control
    • Armitage, C.J. and Conner, M. (1999b), "The theory of planned behaviour: assessment of predictive validity and 'perceived control'", British Journal of Social Psychology, Vol.38 No.1, pp. 35-54.
    • (1999) British Journal of Social Psychology , vol.38 , Issue.1 , pp. 35-54
    • Armitage, C.J.1    Conner, M.2
  • 7
  • 8
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L.A., Loeb, M.P. and Zhou, L. (2003), "The economic cost of publicly announced information security breaches: empirical evidence from the stock market", Journal of Computer Security, Vol.11 No.3, pp. 431-448
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 9
    • 0042242856 scopus 로고    scopus 로고
    • A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail adoption study
    • Chin, W.W., Marcolin, B.L. and Newsted, P.R. (2003), "A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic mail adoption study", Information Systems Research, Vol.14 No.2, pp. 189-217.
    • (2003) Information Systems Research , vol.14 , Issue.2 , pp. 189-217
    • Chin, W.W.1    Marcolin, B.L.2    Newsted, P.R.3
  • 10
    • 76649092131 scopus 로고    scopus 로고
    • DTT available at: (accessed April 6, 2009)
    • DTT (2009), Protecting What Matters: The 6th Annual Global Security Survey, available at: www. deloitte.com/dtt/cda/doc/content/dtt-fsi- GlobalSecuritySurvey-0901.pdf (accessed April 6, 2009).
    • (2009) Protecting What Matters: The 6th Annual Global Security Survey
  • 11
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C. and Larcker, D. (1981), "Evaluating structural equation models with unobservable variables and measurement error", Journal of Marketing Research, Vol.18 No.1, pp. 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.2
  • 12
    • 0031128568 scopus 로고    scopus 로고
    • An investigation of behavioral adaptation to airbags and antilock brakes among taxi drivers
    • Fosser, S., Saetermo, I. and Sagberg, F. (1997), "An investigation of behavioral adaptation to airbags and antilock brakes among taxi drivers", Accident Analysis and Prevention, Vol.29 No.3, pp. 293-302.
    • (1997) Accident Analysis and Prevention , vol.29 , Issue.3 , pp. 293-302
    • Fosser, S.1    Saetermo, I.2    Sagberg, F.3
  • 13
    • 29444460597 scopus 로고    scopus 로고
    • A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example
    • Gefen, D. and Straub, D. (2005), "A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example", Communications of the AIS, Vol.16 No.5, pp. 91-109.
    • (2005) Communications of the AIS , vol.16 , Issue.5 , pp. 91-109
    • Gefen, D.1    Straub, D.2
  • 15
    • 0030851774 scopus 로고    scopus 로고
    • Application of Ajzen's theory of planned behavior to predict sunbathing, tanning salon use, and sunscreen use intentions and behaviors
    • Hillhouse, J.J., Adler, C.M., Drinnon, J. and Turrist, R. (1997), "Application of Ajzen's theory of planned behavior to predict sunbathing, tanning salon use, and sunscreen use intentions and behaviors", Journal of Behavioral Medicine, Vol.20 No.4, pp. 365-378
    • (1997) Journal of Behavioral Medicine , vol.20 , Issue.4 , pp. 365-378
    • Hillhouse, J.J.1    Adler, C.M.2    Drinnon, J.3    Turrist, R.4
  • 16
    • 0042573985 scopus 로고    scopus 로고
    • A qualitative and quantitative review of antecedents of counterproductive behavior in organizations
    • Lau, V.C.S., Au, W.T. and Ho, J.M.C. (2003), "A qualitative and quantitative review of antecedents of counterproductive behavior in organizations", Journal of Business and Psychology, Vol.18 No.1, pp. 73-99.
    • (2003) Journal of Business and Psychology , vol.18 , Issue.1 , pp. 73-99
    • Lau, V.C.S.1    Au, W.T.2    Ho, J.M.C.3
  • 17
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, J. and Lee, Y. (2002), "A holistic model of computer abuse within organizations", Information Management & Computer Security, Vol.10 No.2, pp. 57-63.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 20
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Ng, B.Y., Kankanhalli, A. and Xu, Y.C. (2008), "Studying users' computer security behavior: a health belief perspective", Decision Support Systems, Vol.46 No.4, pp. 815-825
    • (2008) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.Y.1    Kankanhalli, A.2    Xu, Y.C.3
  • 23
    • 0000851466 scopus 로고
    • The effects of automobile safety regulation
    • Peltzman, S. (1975), "The effects of automobile safety regulation", Journal of Political Economy, Vol.83 No.4, pp. 677-725.
    • (1975) Journal of Political Economy , vol.83 , Issue.4 , pp. 677-725
    • Peltzman, S.1
  • 24
    • 0001354917 scopus 로고
    • Ethical decision making in the medical profession: An application of the theory of planned behavior
    • Randall, D.M. and Gibson, A.M. (1991), "Ethical decision making in the medical profession: an application of the theory of planned behavior", Journal of Business Ethics, Vol.10 No.2, pp. 111-122
    • (1991) Journal of Business Ethics , vol.10 , Issue.2 , pp. 111-122
    • Randall, D.M.1    Gibson, A.M.2
  • 25
    • 76649107261 scopus 로고    scopus 로고
    • The people, policy, technology (PPT) model: Core elements of the security process
    • Schlarman, S. (2001), "The people, policy, technology (PPT) model: core elements of the security process", Information Security Journal, Vol.10 No.5, pp. 1-6.
    • (2001) Information Security Journal , vol.10 , Issue.5 , pp. 1-6
    • Schlarman, S.1
  • 26
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol.8 No.1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 27
    • 53049103906 scopus 로고    scopus 로고
    • Five dimensions of information security awareness
    • Siponen, M.T. (2001), "Five dimensions of information security awareness", ACM SIGCAS Computers and Society, Vol.31 No.2, pp. 24-29
    • (2001) ACM SIGCAS Computers and Society , vol.31 , Issue.2 , pp. 24-29
    • Siponen, M.T.1
  • 30
    • 3042857071 scopus 로고    scopus 로고
    • On risk: Perception and direction
    • Stewart, A. (2004), "On risk: perception and direction", Computers & Security, Vol.23 No.5, pp. 362-370
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 362-370
    • Stewart, A.1
  • 31
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M.E. and von Solms, R. (1998), "Information security awareness: educating your users effectively", Information Management & Computer Security, Vol.6 No.4, pp. 167-173
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 33
    • 0033872521 scopus 로고    scopus 로고
    • A theoretical extension of the technology acceptance model: Four longitudinal field studies
    • Venkatesh, V. and Davis, F.D. (2000), "A theoretical extension of the technology acceptance model: four longitudinal field studies", Management Science, Vol.46 No.2, pp. 186-204.
    • (2000) Management Science , vol.46 , Issue.2 , pp. 186-204
    • Venkatesh, V.1    Davis, F.D.2
  • 34
    • 2942564710 scopus 로고    scopus 로고
    • From policies to culture
    • von Solms, R. and von Solms, B. (2004), "From policies to culture", Computers & Security, Vol.23 No.4, pp. 275-279
    • (2004) Computers & Security , vol.23 , Issue.4 , pp. 275-279
    • Von Solms, R.1    Von Solms, B.2
  • 35
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security
    • West, R. (2008), "The psychology of security", Communications of the ACM, Vol.51 No.4, pp. 34-40.
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.