메뉴 건너뛰기




Volumn 22, Issue 3, 2010, Pages 1-21

The influence of perceived source credibility on end user attitudes and intentions to comply with recommended it actions

Author keywords

Effective communication; End user attitudes; Information technology; Persuasion; Source credibility

Indexed keywords

BEHAVIORAL INTENTION; COMMUNICATION THEORY; CONCEPTUAL MODEL; EFFECTIVE COMMUNICATION; END USERS; INFLUENTIAL FACTORS; INFORMATION TECHNOLOGIES (IT); PERSUASION; PERSUASIVE EFFECTIVENESS; SENIOR MANAGEMENT; SOURCE CREDIBILITY; TECHNOLOGY USAGES;

EID: 77956282930     PISSN: 15462234     EISSN: 15465012     Source Type: Journal    
DOI: 10.4018/joeuc.2010070101     Document Type: Article
Times cited : (35)

References (85)
  • 1
    • 0036015953 scopus 로고    scopus 로고
    • Assessing a firm's web presence: A heuristic evaluation procedure for the measurement of usability
    • doi:10.1287/isre.13.2.168.84
    • Agarwal, R., & Venkatesh, V. (2002). Assessing a firm's web presence: A heuristic evaluation procedure for the measurement of usability. Information Systems Research, 13(2), 168-186. doi:10.1287/ isre.13.2.168.84
    • (2002) Information Systems Research , vol.13 , Issue.2 , pp. 168-186
    • Agarwal, R.1    Venkatesh, V.2
  • 2
    • 33645003633 scopus 로고    scopus 로고
    • Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on postadoption information technology use
    • Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on postadoption information technology use. Management Information Systems Quarterly, 29(3), 427-459.
    • (2005) Management Information Systems Quarterly , vol.29 , Issue.3 , pp. 427-459
    • Ahuja, M.K.1    Thatcher, J.B.2
  • 3
    • 0002305454 scopus 로고
    • From intentions to actions: A theory of planned behavior
    • In Kuhl, J., & Beckmann, J. (Eds.) New York: Springer Verlag
    • Ajzen, I. (1985). From intentions to actions: A theory of planned behavior . In Kuhl, J., & Beckmann, J. (Eds.), Action Control: From Cognition to Behavior. New York: Springer Verlag.
    • (1985) Action Control: From Cognition to Behavior
    • Ajzen, I.1
  • 4
    • 0001837453 scopus 로고
    • Attitude structure and behavior relations
    • In Partkanis, A. R., Berckler, S. T., & Greenwald, A. G. (Eds.)Hillsdale, NJ: Erlbaum
    • Ajzen, I. (1988). Attitude structure and behavior relations . In Partkanis, A. R., Berckler, S. T., & Greenwald, A. G. (Eds.), Attitude Structure and Function. Hillsdale, NJ: Erlbaum.
    • (1988) Attitude Structure and Function
    • Ajzen, I.1
  • 5
    • 44949274046 scopus 로고
    • The theory of planned behavior
    • doi:10.1016/0749- 5978(91)90020-T
    • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749- 5978(91)90020-T
    • (1991) Organizational Behavior and Human Decision Processes , vol.50 , Issue.2 , pp. 179-211
    • Ajzen, I.1
  • 6
    • 0032626827 scopus 로고    scopus 로고
    • Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology
    • doi:10.1080/014492999119020
    • Al-Gahtani, S. S., & King, M. (1999). Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology. Behaviour & Information Technology, 18(4), 277-297. doi:10.1080/ 014492999119020
    • (1999) Behaviour & Information Technology , vol.18 , Issue.4 , pp. 277-297
    • Al-Gahtani, S.S.1    King, M.2
  • 7
    • 17144420958 scopus 로고
    • The relationships among job satisfaction, organizational norms, and communicational climate among employees in an academic organization
    • doi:10.1080/00909887909365196
    • Applebaum, R. L., & Anatol, K. W. E. (1979). The relationships among job satisfaction, organizational norms, and communicational climate among employees in an academic organization. Journal of Applied Communication Research, 7(2), 83-90. doi:10.1080/00909887909365196
    • (1979) Journal of Applied Communication Research , vol.7 , Issue.2 , pp. 83-90
    • Applebaum, R.L.1    Anatol, K.W.E.2
  • 8
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • Aytes, K., & Connolly, T. (2004). Computer security and risky computing practices: A rational choice perspective. Journal of Organizational and End User Computing, 16(3), 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 9
    • 0003526171 scopus 로고    scopus 로고
    • (10th ed.). Belmont, CA: Wadsworth/Thomson Learning
    • Babbie, E. (2004). The practice of social research (10th ed.). Belmont, CA: Wadsworth/Thomson Learning.
    • (2004) The Practice Of Social Research
    • Babbie, E.1
  • 10
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behavioral change
    • doi:10.1037/0033-295X.84.2.191
    • Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215. doi:10.1037/0033-295X.84.2.191
    • (1977) Psychological Review , vol.84 , Issue.2 , pp. 191-215
    • Bandura, A.1
  • 13
    • 0002198728 scopus 로고
    • Performance outcome feedback and attributional feedback: Interactive effects on recipient responses
    • doi:10.1037/0021-9010.71.2.203
    • Bannister, B. D. (1986). Performance outcome feedback and attributional feedback: Interactive effects on recipient responses. The Journal of Applied Psychology, 71, 203-210. doi:10.1037/0021-9010.71.2.203
    • (1986) The Journal of Applied Psychology , vol.71 , pp. 203-210
    • Bannister, B.D.1
  • 14
    • 0024302579 scopus 로고
    • Can the field of MIS be disciplined
    • doi:10.1145/63238.63241
    • Banville, C., & Landry, M. (1989). Can the field of MIS be disciplined? Communications of the ACM, 32(1), 48-60. doi:10.1145/63238.63241
    • (1989) Communications of the ACM , vol.32 , Issue.1 , pp. 48-60
    • Banville, C.1    Landry, M.2
  • 15
    • 0039988884 scopus 로고    scopus 로고
    • Supporting the information technology champion
    • doi:10.2307/249647
    • Beath, C. M. (1991). Supporting the information technology champion. Management Information Systems Quarterly, 15(3), 355-371. doi:10.2307/249647
    • Management Information Systems Quarterly , vol.15 , Issue.3 , pp. 355-371
    • Beath, C.M.1
  • 17
    • 0000365869 scopus 로고
    • Dimensions for evaluating the acceptability of message sources
    • doi:10.1086/267745
    • Berlo, D. K., Lemert, J. B., & Mertz, R. J. (1969). Dimensions for evaluating the acceptability of message sources. Public Opinion Quarterly, 33(4), 563-576. doi:10.1086/267745
    • (1969) Public Opinion Quarterly , vol.33 , Issue.4 , pp. 563-576
    • Berlo, D.K.1    Lemert, J.B.2    Mertz, R.J.3
  • 18
    • 84960686650 scopus 로고
    • Persuasiveness of communication is affected by exposure frequency and message quality: A theoretical and empirical analysis of persisting attitude change
    • Cacioppo, J. T., & Petty, R. E. (1980). Persuasiveness of communication is affected by exposure frequency and message quality: A theoretical and empirical analysis of persisting attitude change. Current Issues & Research in Advertising, 3(1), 97-122.
    • (1980) Current Issues & Research in Advertising , vol.3 , Issue.1 , pp. 97-122
    • Cacioppo, J.T.1    Petty, R.E.2
  • 20
    • 0001879464 scopus 로고
    • Effects of message repetition on argument processing, recall, and persuasion
    • doi:10.1207/s15324834basp1001-2
    • Cacioppo, J. T., & Petty, R. E. (1989). Effects of message repetition on argument processing, recall, and persuasion. Basic and Applied Social Psychology, 10(1), 3-12. doi:10.1207/s15324834basp1001-2
    • (1989) Basic and Applied Social Psychology , vol.10 , Issue.1 , pp. 3-12
    • Cacioppo, J.T.1    Petty, R.E.2
  • 22
    • 58149403717 scopus 로고
    • Communicator physical attractiveness and persuasion
    • doi:10.1037/0022-3514.37.8.1387
    • Chaiken, S. (1979). Communicator physical attractiveness and persuasion. Journal of Personality and Social Psychology, 37(8), 1387-1397. doi:10.1037/0022-3514.37.8.1387
    • (1979) Journal of Personality and Social Psychology , vol.37 , Issue.8 , pp. 1387-1397
    • Chaiken, S.1
  • 24
    • 49149116092 scopus 로고
    • Computer self-efficacy: Development of a measure and initial test
    • doi:10.2307/249688
    • Compeau, D., & Higgins, C. A. (1995b). Computer self-efficacy: Development of a measure and initial test. Management Information Systems Quarterly, 19(2), 189-211. doi:10.2307/249688
    • (1995) Management Information Systems Quarterly , vol.19 , Issue.2 , pp. 189-211
    • Compeau, D.1    Higgins, C.A.2
  • 25
    • 77956272019 scopus 로고    scopus 로고
    • Retrieved February 15, 2006, from
    • Cramm, S. (2005). The soft side of persuasion. Retrieved February 15, 2006, from http://www.cio.com/research/leadership/edit/ec051705-persuasion.html
    • (2005) The Soft Side of Persuasion
    • Cramm, S.1
  • 26
    • 1542304914 scopus 로고
    • Effect of perceived expertise, strength of advice, and environmental setting on parental compliance
    • Crisci, R., & Kassinove, H. (1973). Effect of perceived expertise, strength of advice, and environmental setting on parental compliance. The Journal of Social Psychology, 89, 245-250.
    • (1973) The Journal of Social Psychology , vol.89 , pp. 245-250
    • Crisci, R.1    Kassinove, H.2
  • 27
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • doi:10.2307/249008
    • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems Quarterly, 13(3), 318-340. doi:10.2307/249008
    • (1989) Management Information Systems Quarterly , vol.13 , Issue.3 , pp. 318-340
    • Davis, F.D.1
  • 28
    • 0000916949 scopus 로고
    • An attribution analysis of the effect of communicator characteristics on opinion change: The case of communicator attractiveness
    • doi:10.1037/h0076850
    • Eagly, A. H., & Chaiken, S. (1975). An attribution analysis of the effect of communicator characteristics on opinion change: The case of communicator attractiveness. Journal of Personality and Social Psychology, 32(1), 136-144. doi:10.1037/h0076850
    • (1975) Journal of Personality and Social Psychology , vol.32 , Issue.1 , pp. 136-144
    • Eagly, A.H.1    Chaiken, S.2
  • 30
    • 18844456006 scopus 로고    scopus 로고
    • Have you met your organization's computer usage policy
    • doi:10.1108/02635570510583280
    • Foltz, C. B., Cronan, T. P., & Jones, T. W. (2005). Have you met your organization's computer usage policy? Industrial Management & Data Systems, 105(2), 137-146. doi:10.1108/02635570510583280
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.2 , pp. 137-146
    • Foltz, C.B.1    Cronan, T.P.2    Jones, T.W.3
  • 31
    • 21344490393 scopus 로고
    • The persuasion knowledge model: How people cope with persuasion attempts
    • doi:10.1086/209380
    • Friestad, M., & Wright, P. (1994). The persuasion knowledge model: How people cope with persuasion attempts. The Journal of Consumer Research, 21(1), 1-31. doi:10.1086/209380
    • (1994) The Journal of Consumer Research , vol.21 , Issue.1 , pp. 1-31
    • Friestad, M.1    Wright, P.2
  • 32
    • 0001178032 scopus 로고    scopus 로고
    • Structural equation modeling techniques and regression: Guidelines for research practice
    • Gefen, D., Straub, D., & Boudreau, M. (2000). Structural equation modeling techniques and regression: Guidelines for research practice. Communications of AIS, 7(7), 1-78.
    • (2000) Communications of AIS , vol.7 , Issue.7 , pp. 1-78
    • Gefen, D.1    Straub, D.2    Boudreau, M.3
  • 33
    • 0011109771 scopus 로고
    • Source credibility and response to fear-arousing communications
    • doi:10.1080/03637756509375436
    • Hewgill, M. A., & Miller, G. (1965). Source credibility and response to fear-arousing communications. Speech Monographs, 32(2), 95-101. doi:10.1080/03637756509375436
    • (1965) Speech Monographs , vol.32 , Issue.2 , pp. 95-101
    • Hewgill, M.A.1    Miller, G.2
  • 35
    • 33750479041 scopus 로고    scopus 로고
    • Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet
    • doi:10.1016/j.dss.2006.03.009
    • Hong, S., Thong, J. Y. L., & Tam, K. Y. (2006). Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet. Decision Support Systems, 42(3), 1819-1834. doi:10.1016/j.dss.2006.03.009
    • (2006) Decision Support Systems , vol.42 , Issue.3 , pp. 1819-1834
    • Hong, S.1    Thong, J.Y.L.2    Tam, K.Y.3
  • 37
    • 77958414685 scopus 로고
    • The influence of source credibility on communication effectiveness
    • doi:10.1086/266350
    • Hovland, C., & Weiss, W. (1951). The influence of source credibility on communication effectiveness. Public Opinion Quarterly, 15, 635-650. doi:10.1086/266350
    • (1951) Public Opinion Quarterly , vol.15 , pp. 635-650
    • Hovland, C.1    Weiss, W.2
  • 38
    • 0001199110 scopus 로고
    • End-user computing effectiveness: A structural equation model
    • doi:10.1016/0305-0483(90)90055-E
    • Igbaria, M. (1990). End-user computing effectiveness: A structural equation model. OMEGA International Journal of Management Science, 18(6), 637-652. doi:10.1016/0305-0483(90)90055-E
    • (1990) OMEGA International Journal of Management Science , vol.18 , Issue.6 , pp. 637-652
    • Igbaria, M.1
  • 39
    • 84950633680 scopus 로고
    • Computer anxiety and attitudes towards microcomputer use
    • doi:10.1080/01449299008924239
    • Igbaria, M., & Chakrabarti, A. (1990). Computer anxiety and attitudes towards microcomputer use. Behaviour & Information Technology, 9, 229-241. doi:10.1080/01449299008924239
    • (1990) Behaviour & Information Technology , vol.9 , pp. 229-241
    • Igbaria, M.1    Chakrabarti, A.2
  • 41
    • 0037217039 scopus 로고    scopus 로고
    • The effects of source credibility and message framing on exercise intentions, behaviors, and attitudes: An integration of the elaboration likelihood model and prospect theory
    • doi:10.1111/j.1559-1816.2003.tb02078.x
    • Jones, L. W., Sinclair, R. C., & Courneya, K. S. (2003). The effects of source credibility and message framing on exercise intentions, behaviors, and attitudes: An integration of the elaboration likelihood model and prospect theory. Journal of Applied Social Psychology, 33(1), 179-196. doi:10.1111/j.1559-1816.2003. tb02078.x
    • (2003) Journal of Applied Social Psychology , vol.33 , Issue.1 , pp. 179-196
    • Jones, L.W.1    Sinclair, R.C.2    Courneya, K.S.3
  • 42
    • 0346962358 scopus 로고
    • Reinstatement of the communicator in delayed measurement of opinion change
    • doi:10.1037/h0061861
    • Kelman, H. C., & Hovland, C. I. (1953). Reinstatement of the communicator in delayed measurement of opinion change. Journal of Abnormal and Social Psychology, 48(3), 327-335. doi:10.1037/h0061861
    • (1953) Journal of Abnormal and Social Psychology , vol.48 , Issue.3 , pp. 327-335
    • Kelman, H.C.1    Hovland, C.I.2
  • 43
    • 84970118687 scopus 로고
    • Speaker credibility in persuasive business communication: A model which explains gender differences
    • doi:10.1177/002194368902600204
    • Kenton, S. B. (1989). Speaker credibility in persuasive business communication: A model which explains gender differences. Journal of Business Communication, 26(2), 143-157. doi:10.1177/002194368902600204
    • (1989) Journal of Business Communication , vol.26 , Issue.2 , pp. 143-157
    • Kenton, S.B.1
  • 46
    • 84986173272 scopus 로고    scopus 로고
    • Internet acceptable usage policy for organizations
    • doi:10.1108/09685229710367726
    • Lichtenstein, S., & Swatman, P. M. C. (1997). Internet acceptable usage policy for organizations. Information Management & Computer Security, 5(5), 182-190. doi:10.1108/09685229710367726
    • (1997) Information Management & Computer Security , vol.5 , Issue.5 , pp. 182-190
    • Lichtenstein, S.1    Swatman, P.M.C.2
  • 47
    • 0022729874 scopus 로고
    • Credibility of source of communication on products' safety hazards
    • Lirtzman, S. I., & Shuv-Ami, A. (1986). Credibility of source of communication on products' safety hazards. Psychological Reports, 58, 707-718.
    • (1986) Psychological Reports , vol.58 , pp. 707-718
    • Lirtzman, S.I.1    Shuv-Ami, A.2
  • 48
    • 0001395146 scopus 로고
    • Effects of source expertness, physical attractiveness, and supporting arguments on persuasion: A case of brains over beauty
    • doi:10.1037/0022-3514.39.2.235
    • Maddux, J. E., & Rogers, R. W. (1980). Effects of source expertness, physical attractiveness, and supporting arguments on persuasion: A case of brains over beauty. Journal of Personality and Social Psychology, 39, 235-244. doi:10.1037/0022- 3514.39.2.235
    • (1980) Journal of Personality and Social Psychology , vol.39 , pp. 235-244
    • Maddux, J.E.1    Rogers, R.W.2
  • 49
    • 0032341068 scopus 로고    scopus 로고
    • The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research
    • doi:10.1287/isre.9.2.126
    • Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research, 9(2), 126-163. doi:10.1287/isre.9.2.126
    • (1998) Information Systems Research , vol.9 , Issue.2 , pp. 126-163
    • Marakas, G.M.1    Yi, M.Y.2    Johnson, R.D.3
  • 50
    • 84985100162 scopus 로고
    • The effects of message intensity on receiver evaluations of source, message and topic
    • doi:10.1111/j.1460-2466.1970.tb00892.x
    • McEwen, W. J., & Greenberg, B. S. (1970). The effects of message intensity on receiver evaluations of source, message and topic. The Journal of Communication, 20(4), 340-350. doi:10.1111/j.1460-2466.1970.tb00892.x
    • (1970) The Journal of Communication , vol.20 , Issue.4 , pp. 340-350
    • McEwen, W.J.1    Greenberg, B.S.2
  • 51
    • 0001924576 scopus 로고
    • An information-processing model of advertising effectiveness
    • In Davis, H. L., & Silk, A. J. (Eds.) New York: Wiley
    • McGuire, W. J. (1978). An information-processing model of advertising effectiveness . In Davis, H. L., & Silk, A. J. (Eds.), Behavioral and management sciences in marketing (pp. 156-180). New York: Wiley.
    • (1978) Behavioral and Management Sciences In Marketing , pp. 156-180
    • McGuire, W.J.1
  • 52
    • 0001827817 scopus 로고
    • A theoretical assessment of the user satisfaction construct in information systems research
    • doi:10.1287/mnsc.36.1.76
    • Melone, N. P. (1990). A theoretical assessment of the user satisfaction construct in information systems research. Management Science, 36(1), 76-91. doi:10.1287/mnsc.36.1.76
    • (1990) Management Science , vol.36 , Issue.1 , pp. 76-91
    • Melone, N.P.1
  • 53
    • 73449149291 scopus 로고
    • Development of an instrument to measure the perceptions of adopting an information technology innovation
    • doi:10.1287/ isre.2.3.192
    • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222. doi:10.1287/ isre.2.3.192
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 192-222
    • Moore, G.C.1    Benbasat, I.2
  • 56
    • 4644268774 scopus 로고    scopus 로고
    • Crafting information technology governance
    • doi:10.1201/1078/44705.21.4.200409 01/84183.2
    • Peterson, R. (2004). Crafting information technology governance. Information Systems Management, 21(4), 7-22. doi:10.1201/1078/44705.21.4.200409 01/84183.2
    • (2004) Information Systems Management , vol.21 , Issue.4 , pp. 7-22
    • Peterson, R.1
  • 58
    • 1542380758 scopus 로고    scopus 로고
    • The persuasiveness of source credibility: A critical review of five decade's evidence
    • doi:10.1111/j.1559-1816.2004.tb02547.x
    • Pornpitakpan, C. (2004). The persuasiveness of source credibility: A critical review of five decade's evidence. Journal of Applied Social Psychology, 34(2), 243-281. doi:10.1111/j.1559-1816.2004. tb02547.x
    • (2004) Journal of Applied Social Psychology , vol.34 , Issue.2 , pp. 243-281
    • Pornpitakpan, C.1
  • 59
    • 0344521267 scopus 로고
    • Do current measures of dimensions of source credibility produce stable outcomes in replicated tests
    • Powell, F. C., & Wanzenried, J. W. (1995). Do current measures of dimensions of source credibility produce stable outcomes in replicated tests? Perceptual and Motor Skills, 81(2), 675-687.
    • (1995) Perceptual and Motor Skills , vol.81 , Issue.2 , pp. 675-687
    • Powell, F.C.1    Wanzenried, J.W.2
  • 60
    • 21844526896 scopus 로고
    • Source attributions and persuasion: Perceived honesty as a determinant of message scrutiny
    • doi:10.1177/0146167295216010
    • Priester, J. R., & Petty, R. E. (1995). Source attributions and persuasion: Perceived honesty as a determinant of message scrutiny. Personality and Social Psychology Bulletin, 21(6), 637-654. doi:10.1177/0146167295216010
    • (1995) Personality and Social Psychology Bulletin , vol.21 , Issue.6 , pp. 637-654
    • Priester, J.R.1    Petty, R.E.2
  • 61
    • 0001940135 scopus 로고    scopus 로고
    • Factors that influence the social dimension of alignment between business and information technology objectives
    • doi:10.2307/3250980
    • Reich, B. H., & Benbasat, I. (2000). Factors that influence the social dimension of alignment between business and information technology objectives. Management Information Systems Quarterly, 24(1), 81-113. doi:10.2307/3250980
    • (2000) Management Information Systems Quarterly , vol.24 , Issue.1 , pp. 81-113
    • Reich, B.H.1    Benbasat, I.2
  • 62
    • 0037373508 scopus 로고    scopus 로고
    • Understanding it adoption decisions in small business: Integrating current theories
    • doi:10.1016/ S0378-7206(02)00010-1
    • Riemenschneider, C. K., Harrison, D. A., & Mykytyn, P. P. (2003). Understanding it adoption decisions in small business: Integrating current theories. Information & Management, 40(4), 269-285. doi:10.1016/ S0378-7206(02)00010-1
    • (2003) Information & Management , vol.40 , Issue.4 , pp. 269-285
    • Riemenschneider, C.K.1    Harrison, D.A.2    Mykytyn, P.P.3
  • 63
    • 0001543567 scopus 로고
    • User attitudes and management information systems use
    • doi:10.2307/255742
    • Robey, D. (1979). User attitudes and management information systems use. Academy of Management, 22(3), 527-538. doi:10.2307/255742
    • (1979) Academy of Management , vol.22 , Issue.3 , pp. 527-538
    • Robey, D.1
  • 64
    • 58149405986 scopus 로고
    • Interpersonal trust, trustworthiness, and gullibility
    • doi:10.1037/0003-066X.35.1.1
    • Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. The American Psychologist, 35(1), 1-7. doi:10.1037/0003-066X.35.1.1
    • (1980) The American Psychologist , vol.35 , Issue.1 , pp. 1-7
    • Rotter, J.B.1
  • 65
    • 2942738445 scopus 로고    scopus 로고
    • Arrangements for information technology governance: A theory of multiple contingencies
    • doi:10.2307/249754
    • Sambamurthy, V., & Zmud, R. W. (1999). Arrangements for information technology governance: A theory of multiple contingencies. Management Information Systems Quarterly, 23(2), 261-290. doi:10.2307/249754
    • (1999) Management Information Systems Quarterly , vol.23 , Issue.2 , pp. 261-290
    • Sambamurthy, V.1    Zmud, R.W.2
  • 66
    • 0035580128 scopus 로고    scopus 로고
    • Computers as tools or as social actors? The users' perspective on anthropomorphic agents
    • doi:10.1142/S0218843001000321
    • Schaumburg, H. (2001). Computers as tools or as social actors? The users' perspective on anthropomorphic agents. International Journal of Cooperative Information Systems, 10(1-2), 217-234. doi:10.1142/ S0218843001000321
    • (2001) International Journal of Cooperative Information Systems , vol.10 , Issue.1-2 , pp. 217-234
    • Schaumburg, H.1
  • 67
    • 50049128296 scopus 로고    scopus 로고
    • Factors influencing protection motivation and IS security policy compliance
    • November
    • Siponen, M., Pahnila, S., & Mahmood, A. (2006, November). Factors influencing protection motivation and IS security policy compliance. Innovations in Information Technology, 1.
    • (2006) Innovations in Information Technology , vol.1
    • Siponen, M.1    Pahnila, S.2    Mahmood, A.3
  • 68
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • doi:10.1108/09685220010371394
    • Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41. doi:10.1108/09685220010371394
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 69
    • 47049090036 scopus 로고    scopus 로고
    • The attitude-behavior relationship in consumer conduct: The role of norms, past behavior, and self-identity
    • doi:10.3200/ SOCP.148.3.311-334
    • Smith, J. R., Terry, D. J., Manstead, A. S., Louis, W. R., & Wolfs, D. K. J. (2008). The attitude-behavior relationship in consumer conduct: The role of norms, past behavior, and self-identity. The Journal of Social Psychology, 148(3), 311-333. doi:10.3200/ SOCP.148.3.311-334
    • (2008) The Journal of Social Psychology , vol.148 , Issue.3 , pp. 311-333
    • Smith, J.R.1    Terry, D.J.2    Manstead, A.S.3    Louis, W.R.4    Wolfs, D.K.J.5
  • 70
    • 13244286108 scopus 로고    scopus 로고
    • Validation guidelines for IS positivist research
    • Straub, D. W., Boudreau, M. C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of AIS, 13, 380-427.
    • (2004) Communications of AIS , vol.13 , pp. 380-427
    • Straub, D.W.1    Boudreau, M.C.2    Gefen, D.3
  • 71
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • doi:10.2307/249551
    • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441-469. doi:10.2307/249551
    • (1998) Management Information Systems Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 72
    • 85007654794 scopus 로고
    • Acceptance and rejection of a suggestion
    • Suzuki, K. (1978). Acceptance and rejection of a suggestion. The Japanese Psychological Research, 20, 60-70.
    • (1978) The Japanese Psychological Research , vol.20 , pp. 60-70
    • Suzuki, K.1
  • 74
    • 38749129220 scopus 로고
    • Personal computing: Toward a conceptual model of utilization
    • doi:10.2307/249443
    • Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. Management Information Systems Quarterly, 15(1), 125-143. doi:10.2307/249443
    • (1991) Management Information Systems Quarterly , vol.15 , Issue.1 , pp. 125-143
    • Thompson, R.L.1    Higgins, C.A.2    Howell, J.M.3
  • 75
    • 0033872521 scopus 로고    scopus 로고
    • A theoretical extension of the technology acceptance model: Four longitudinal field studies
    • doi:10.1287/mnsc.46.2.186.11926
    • Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204. doi:10.1287/mnsc.46.2.186.11926
    • (2000) Management Science , vol.46 , Issue.2 , pp. 186-204
    • Venkatesh, V.1    Davis, F.D.2
  • 77
    • 2642569127 scopus 로고    scopus 로고
    • Introducing the Check-Off Password System (COPS): An advancement in user authentication methods and information security
    • Warkentin, M., Davis, K., & Bekkering, E. (2004). Introducing the Check-Off Password System (COPS): An advancement in user authentication methods and information security. Journal of Organizational and End User Computing, 16(3), 41-58.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 41-58
    • Warkentin, M.1    Davis, K.2    Bekkering, E.3
  • 79
    • 67650180632 scopus 로고    scopus 로고
    • IT governance and organizational design for security management
    • In Baskerville, R., Goodman, S., & Straub, D. W. (Eds.) Armonk, NY: M.E. Sharpe
    • Warkentin, M., & Johnston, A. C. (2008). IT governance and organizational design for security management . In Baskerville, R., Goodman, S., & Straub, D. W. (Eds.), Information Security Policies and Practices. Armonk, NY: M. E. Sharpe.
    • (2008) Information Security Policies and Practices
    • Warkentin, M.1    Johnston, A.C.2
  • 80
    • 84889576026 scopus 로고
    • Factors of source credibility
    • doi:10.1080/00335636809382870
    • Whitehead, J. L. Jr. (1968). Factors of source credibility. The Quarterly Journal of Speech, 54, 59-63. doi:10.1080/00335636809382870
    • (1968) The Quarterly Journal of Speech , vol.54 , pp. 59-63
    • Whitehead Jr., J.L.1
  • 81
    • 0000126592 scopus 로고
    • Personal communication in marketing: An examination of self-interest contingency relationships
    • doi:10.2307/3172849.May
    • Wiener, J. L., LaForge, R. W., & Goolsby, J. R. (1990, May). Personal communication in marketing: An examination of self-interest contingency relationships. JMR, Journal of Marketing Research, 27, 227-231. doi:10.2307/3172849
    • (1990) JMR, Journal of Marketing Research , vol.27 , pp. 227-231
    • Wiener, J.L.1    LaForge, R.W.2    Goolsby, J.R.3
  • 82
    • 84995188403 scopus 로고
    • Retention of opinion change as a function of differential source credibility
    • doi:10.1080/00207596808247232
    • Wittaker, J. O., & Meade, R. D. (1968). Retention of opinion change as a function of differential source credibility. International Journal of Psychology, 3, 103-108. doi:10.1080/00207596808247232
    • (1968) International Journal of Psychology , vol.3 , pp. 103-108
    • Wittaker, J.O.1    Meade, R.D.2
  • 83
    • 84941646855 scopus 로고
    • Putting the fear back into fear appeals: The extended parallel process model
    • doi:10.1080/03637759209376276
    • Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communication Monographs, 59, 329-349. doi:10.1080/03637759209376276
    • (1992) Communication Monographs , vol.59 , pp. 329-349
    • Witte, K.1
  • 84
    • 0000798667 scopus 로고    scopus 로고
    • The effect of numbers on the route to persuasion
    • doi:10.1086/208988
    • Yalch, R. F., & Elmore-Yalch, R.. The effect of numbers on the route to persuasion. The Journal of Consumer Research, 11, 522-527. doi:10.1086/208988
    • The Journal of Consumer Research , vol.11 , pp. 522-527
    • Yalch, R.F.1    Elmore-Yalch, R.2
  • 85
    • 33745728522 scopus 로고    scopus 로고
    • Supporting distributed groups with group support systems: A study of the effects of group leaders and communication modes on group performance
    • Youngjin, K. (2006). Supporting distributed groups with group support systems: A study of the effects of group leaders and communication modes on group performance. Journal of Organizational and End User Computing, 18(2), 20-37.
    • (2006) Journal of Organizational and End User Computing , vol.18 , Issue.2 , pp. 20-37
    • Youngjin, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.