메뉴 건너뛰기




Volumn 20, Issue 3, 2011, Pages 267-284

The influence of the informal social learning environment on information privacy policy compliance efficacy and intention

Author keywords

external cues; learning; privacy; situational support; verbal persuasion; vicarious experience

Indexed keywords

COMPUTER AIDED INSTRUCTION; DATA PRIVACY; HEALTH CARE; HEALTH INSURANCE; HUMAN RESOURCE MANAGEMENT; INFORMATION DISSEMINATION; MANAGERS; REGULATORY COMPLIANCE;

EID: 79955622246     PISSN: 0960085X     EISSN: 14769344     Source Type: Journal    
DOI: 10.1057/ejis.2010.72     Document Type: Article
Times cited : (189)

References (92)
  • 1
    • 34250274848 scopus 로고
    • A rating formulation for ordered response categories
    • ANDRICH D (1978) A rating formulation for ordered response categories. Pyschometirka 43(4), 561-573.
    • (1978) Pyschometirka , vol.43 , Issue.4 , pp. 561-573
    • Andrich, D.1
  • 2
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavioural intentions
    • ANDERSON C and AGARWAL R (2010) Practicing safe computing: A multimethod empirical examination of home computer user security behavioural intentions. MIS Quarterly 34(3), 613-643.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.1    Agarwal, R.2
  • 3
    • 0346076533 scopus 로고
    • Cognitive appraisal of performance capability in the prevention of drunken driving: A test of self-efficacy theory
    • ANDERSON RB (1995) Cognitive appraisal of performance capability in the prevention of drunken driving: A test of self-efficacy theory. Journal of Public Relations Research 7(3), 205-229.
    • (1995) Journal of Public Relations Research , vol.7 , Issue.3 , pp. 205-229
    • Anderson, R.B.1
  • 4
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations
    • BARON R and KENNY D (1986) The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations. Journal of Personality and Social Psychology 51(1), 1173-1182.
    • (1986) Journal of Personality and Social Psychology , vol.51 , Issue.1 , pp. 1173-1182
    • Baron, R.1    Kenny, D.2
  • 5
    • 0042188148 scopus 로고
    • Social learning theory: A framework for discrimination research
    • BARCLAY L (1982) Social learning theory: A framework for discrimination research. Academy of Management Review 7(4), 587-594.
    • (1982) Academy of Management Review , vol.7 , Issue.4 , pp. 587-594
    • Barclay, L.1
  • 6
    • 0039965147 scopus 로고
    • A social learning interpretation of psychological dysfunctions
    • (LONGON D and ROSENHAM D, Eds Holt, Rinehart & Winston, New York, NY
    • BANDURA A (1968) A social learning interpretation of psychological dysfunctions. In Foundations of Abnormal Psychology (LONGON D and ROSENHAM D, Eds), pp 293-344, Holt, Rinehart & Winston, New York, NY.
    • (1968) Foundations of Abnormal Psychology , pp. 293-344
    • Bandura, A.1
  • 7
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behavioral change
    • BANDURA A (1977) Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review 84(2), 191-215.
    • (1977) Psychological Review , vol.84 , Issue.2 , pp. 191-215
    • Bandura, A.1
  • 9
    • 84970382574 scopus 로고
    • Organizational applications of social cognitive theory
    • BANDURA A (1988) Organizational applications of social cognitive theory. Australian Journal of Management 13(2), 275.
    • (1988) Australian Journal of Management , vol.13 , Issue.2 , pp. 275
    • Bandura, A.1
  • 10
    • 0002206030 scopus 로고
    • Differential engagement of selfreactive influences in cognitive motivation
    • BANDURA A and CERVONE D (1986) Differential engagement of selfreactive influences in cognitive motivation. Organizational Behavior & Human Decision Processes 38(1), 92-114.
    • (1986) Organizational Behavior & Human Decision Processes , vol.38 , Issue.1 , pp. 92-114
    • Bandura, A.1    Cervone, D.2
  • 11
    • 21344496974 scopus 로고
    • Avoiding misuse of information technologies: Legal and societal considerations
    • BLOOM PN, MILNE GR and ADLER R (1994) Avoiding misuse of information technologies: Legal and societal considerations. Journal of Marketing 58(1), 98-110.
    • (1994) Journal of Marketing , vol.58 , Issue.1 , pp. 98-110
    • Bloom, P.N.1    Milne, G.R.2    Adler, R.3
  • 14
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • BULGURCU B, CAVUSOGLU H and BENBASAT I (2010) Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34(3), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 15
    • 34548235939 scopus 로고    scopus 로고
    • Prior family business exposure as intergenerational influence and entrepreneurial intent: A theory of planned behavior approach
    • CARR J and SEQUEIRA J (2007) Prior family business exposure as intergenerational influence and entrepreneurial intent: A theory of planned behavior approach. Journal of Business Research 60(10), 1090-1098.
    • (2007) Journal of Business Research , vol.60 , Issue.10 , pp. 1090-1098
    • Carr, J.1    Sequeira, J.2
  • 16
    • 72049101186 scopus 로고    scopus 로고
    • Interpretation of formative measurement in IS research
    • CENFETELLI R and BASSELIER G (2009) Interpretation of formative measurement in IS research. MIS Quarterly 33(4), 689-707.
    • (2009) MIS Quarterly , vol.33 , Issue.4 , pp. 689-707
    • Cenfetelli, R.1    Basselier, G.2
  • 17
    • 0041498311 scopus 로고
    • Partial least squares is to Lisrel as principal components analysis is to common factor analysis
    • CHIN W (1995) Partial least squares is to Lisrel as principal components analysis is to common factor analysis. Technology Studies 2, 315-319.
    • (1995) Technology Studies , vol.2 , pp. 315-319
    • Chin, W.1
  • 18
    • 0003095695 scopus 로고    scopus 로고
    • The partial least squares approach to structural equation modelling
    • (MARCOULIDES G, Ed. Lawrence Erlbaum Associates, Mahwah, NJ
    • CHIN W (1998) The partial least squares approach to structural equation modelling. In Modern Methods for Business Research (MARCOULIDES G, Ed.), pp 295-336, Lawrence Erlbaum Associates, Mahwah, NJ.
    • (1998) Modern Methods for Business Research , pp. 295-336
    • Chin, W.1
  • 19
    • 49149116092 scopus 로고
    • Computer self-efficacy: Development of a measure and initial test
    • COMPEAU D and HIGGINS CA. (1995) Computer self-efficacy: Development of a measure and initial test. MIS Quarterly 19(2), 189-211.
    • (1995) MIS Quarterly , vol.19 , Issue.2 , pp. 189-211
    • Compeau, D.1    Higgins, C.A.2
  • 20
    • 12144261968 scopus 로고    scopus 로고
    • A social learning theory of cross-functional case education
    • DOI 10.1016/j.jbusres.2003.12.005, PII S014829630400027X
    • CRITTENDEN WF (2005) A social learning theory of cross-functional case education. Journal of Business Research 58(7), 960-966. (Pubitemid 40105905)
    • (2005) Journal of Business Research , vol.58 , Issue.7 , pp. 960-966
    • Crittenden, W.F.1
  • 21
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'ARCY J, HOVAV A and GALETTA D (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galetta, D.3
  • 22
    • 0035063716 scopus 로고    scopus 로고
    • Violation of safeguards by trusted personnel and understanding related information security concerns
    • DHILLON G (2001) Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security 20(2), 165-173.
    • (2001) Computers & Security , vol.20 , Issue.2 , pp. 165-173
    • Dhillon, G.1
  • 23
    • 0035534144 scopus 로고    scopus 로고
    • Index construction with formative indicators: An alternative to scale development
    • DIAMANTOPOULOS A and WINKLHOFER H (2001) Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research 38(2), 269-277.
    • (2001) Journal of Marketing Research , vol.38 , Issue.2 , pp. 269-277
    • Diamantopoulos, A.1    Winklhofer, H.2
  • 24
    • 33749322976 scopus 로고    scopus 로고
    • Privacy calculus model in e-commerce - A study of Italy and the United States
    • DOI 10.1057/palgrave.ejis.3000590, PII 3000590
    • DINEV T, BELLOTTO M, HART P, RUSSO V, SERRA I and COLAUTTI C (2006) Privacy calculus model in e-commerce - a study of Italy and the Unites States. European Journal of Information Systems 15(4), 389-402. (Pubitemid 44494838)
    • (2006) European Journal of Information Systems , vol.15 , Issue.4 , pp. 389-402
    • Dinev, T.1    Bellotto, M.2    Hart, P.3    Russo, V.4    Serra, I.5    Colautti, C.6
  • 27
    • 33746766203 scopus 로고    scopus 로고
    • The role of theory in developing effective health communications
    • DOI 10.1111/j.1460-2466.2006.00280.x
    • FISHBEIN M and CAPPELLA JN (2006) The role of theory in developing effective health communications. Journal of Communication 56(s1), s1-s17. (Pubitemid 44165213)
    • (2006) Journal of Communication , vol.56 , Issue.SUPPL.
    • Fishbein, M.1    Cappella, J.N.2
  • 28
    • 0000356178 scopus 로고
    • Two structural equation models: LISREL and PLS applied to consumer exit-voice theory
    • FORNELL C and BOOKSTEIN F (1982) Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research 19, 440-452.
    • (1982) Journal of Marketing Research , vol.19 , pp. 440-452
    • Fornell, C.1    Bookstein, F.2
  • 29
    • 33645589662 scopus 로고    scopus 로고
    • A prototype tool for information security awareness and training
    • FURNELL S, GENNATOU M and DOWLAND P (2002) A prototype tool for information security awareness and training. Logistics Information Management 15(5/6), 352-357.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 352-357
    • Furnell, S.1    Gennatou, M.2    Dowland, P.3
  • 30
    • 0001178032 scopus 로고    scopus 로고
    • Structural equation modelling techniques and regression: Guidelines for research practice
    • GEFEN D, STRAUB D and BOUDREAU M (2000) Structural equation modelling techniques and regression: Guidelines for research practice. Communications of AIS 7(7), 1-78.
    • (2000) Communications of AIS , vol.7 , Issue.7 , pp. 1-78
    • Gefen, D.1    Straub, D.2    Boudreau, M.3
  • 31
    • 0000806910 scopus 로고
    • Self-efficacy: A theoretical analysis of its determinants and malleability
    • GIST M and MITCHELL T (1992) Self-efficacy: A theoretical analysis of its determinants and malleability. Academy of Management Review 17(2), 183-211.
    • (1992) Academy of Management Review , vol.17 , Issue.2 , pp. 183-211
    • Gist, M.1    Mitchell, T.2
  • 32
    • 0024859373 scopus 로고
    • Security concerns of system users: A proposed study of user perceptions of the adequacy of security measures
    • (HICSS), Kona, HA, January
    • GOODHUE DL and STRAUB DW (1989) Security concerns of system users: A proposed study of user perceptions of the adequacy of security measures. In Proceedings of the 21st Hawaii International Conference on System Science (HICSS), Kona, HA, January.
    • (1989) Proceedings of the 21st Hawaii International Conference on System Science
    • Goodhue, D.L.1    Straub, D.W.2
  • 33
    • 79955602138 scopus 로고    scopus 로고
    • Prescription for change
    • 20 October
    • GUPTA A (2008) Prescription for change. Wall Street Journal, 20 October.
    • (2008) Wall Street Journal
    • Gupta, A.1
  • 34
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • HERATH T and RAO HR (2009) Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems 18(2), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 35
    • 0040236696 scopus 로고
    • Communicating innovations: Convincing computer phobics to adopt innovative technologies
    • (LUTZ RJ, Ed. Association for Consumer Research, Provo, UT
    • HILL T, SMITH N and MANN M (1986) Communicating innovations: Convincing computer phobics to adopt innovative technologies. In Advances in Consumer Research (LUTZ RJ, Ed.), pp 419-422, Association for Consumer Research, Provo, UT.
    • (1986) Advances in Consumer Research , pp. 419-422
    • Hill, T.1    Smith, N.2    Mann, M.3
  • 36
    • 0002111266 scopus 로고
    • Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers
    • HILL T, SMITH N and MANN M (1987) Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers. Journal of Applied Psychology 72(2), 307-313.
    • (1987) Journal of Applied Psychology , vol.72 , Issue.2 , pp. 307-313
    • Hill, T.1    Smith, N.2    Mann, M.3
  • 37
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • HOFFER JA and STRAUB DW (1989) The 9 to 5 underground: Are you policing computer crimes? Sloan Management Review 30(4), 35-43.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-43
    • Hoffer, J.A.1    Straub, D.W.2
  • 38
    • 79955629140 scopus 로고    scopus 로고
    • Data breaches cost health care industry $6 billion annually
    • 10 November
    • HOROWITZ BT (2010) Data breaches cost health care industry $6 billion annually. eWeek Magazine, 10 November.
    • (2010) EWeek Magazine
    • Horowitz, B.T.1
  • 39
    • 0242424963 scopus 로고    scopus 로고
    • A critical review of construct indicators and measurement model misspecification in marketing and consumer research
    • DOI 10.1086/376806
    • JARVIS C, MACKENZIE S, PODSAKOFF P and MICK D (2003) A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of Consumer Research 30(2), 199-218. (Pubitemid 37374305)
    • (2003) Journal of Consumer Research , vol.30 , Issue.2 , pp. 199-218
    • Jarvis, C.B.1    Mackenzie, S.B.2    Podsakoff, P.M.3    Giliatt, N.4    Mee, J.F.5
  • 40
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviours: An empirical study
    • JOHNSTON AC and WARKENTIN M (2010) Fear appeals and information security behaviours: An empirical study. MIS Quarterly 34(3), 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 41
    • 0000515289 scopus 로고
    • Motivation and cognitive abilities: An integrative/aptitude-treatment interaction approach to skill acquisition
    • KANFER R and ACKERMAN PL (1989) Motivation and cognitive abilities: An integrative/aptitude-treatment interaction approach to skill acquisition. Journal of Applied Psychology 74(4), 657-690.
    • (1989) Journal of Applied Psychology , vol.74 , Issue.4 , pp. 657-690
    • Kanfer, R.1    Ackerman, P.L.2
  • 43
    • 1842832761 scopus 로고    scopus 로고
    • Oh, what a tangled web we weave: The state of privacy protection in the information economy and recommendations for governance
    • DOI 10.1016/S0148-2963(02)00359-4, PII S0148296302003594
    • LANGENDERFER J and COOK DL (2004) Oh, what a tangled web we weave: The state of privacy protection in the information economy and recommendations for governance. Journal of Business Research 57(4), 734-747. (Pubitemid 38491772)
    • (2004) Journal of Business Research , vol.57 , Issue.7 , pp. 734-747
    • Langenderfer, J.1    Cook, D.L.2
  • 44
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • LEACH J (2003) Improving user security behaviour. Computers & Security 22(8), 685-692.
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 46
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
    • LEE Y and LARSEN KR (2009) Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems 18(2), 177-187.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 177-187
    • Lee, Y.1    Larsen, K.R.2
  • 47
    • 0037322632 scopus 로고    scopus 로고
    • Diffusing the internet in the Arab world: The role of social norms and technological culturation
    • LOCH K, STRAUB D and KAMEL S (2003) Diffusing the internet in the Arab world: The role of social norms and technological culturation. IEEE Transactions on Engineering Management 50(1), 45-64.
    • (2003) IEEE Transactions on Engineering Management , vol.50 , Issue.1 , pp. 45-64
    • Loch, K.1    Straub, D.2    Kamel, S.3
  • 48
    • 24944589695 scopus 로고    scopus 로고
    • The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions
    • DOI 10.1037/0021-9010.90.4.710
    • MACKENZIE S, PODSAKOFF P and JARVIS C (2005) The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions. Journal of Applied Psychology 90(4), 710-730. (Pubitemid 41304795)
    • (2005) Journal of Applied Psychology , vol.90 , Issue.4 , pp. 710-730
    • MacKenzie, S.B.1    Podsakoff, P.M.2    Jarvis, C.B.3
  • 49
    • 0000109250 scopus 로고
    • Vicarious learning: The influence of modeling on organizational behavior
    • MANZ CC and SIMS Jr. HP (1981) Vicarious learning: The influence of modeling on organizational behavior. Academy of Management Review 6(1), 105-113.
    • (1981) Academy of Management Review , vol.6 , Issue.1 , pp. 105-113
    • Manz, C.C.1    Sims Jr., H.P.2
  • 50
    • 0032341068 scopus 로고    scopus 로고
    • The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research
    • MARAKAS G, YI M and JOHNSON R (1998) The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research 9(2), 126-163.
    • (1998) Information Systems Research , vol.9 , Issue.2 , pp. 126-163
    • Marakas, G.1    Yi, M.2    Johnson, R.3
  • 51
    • 85018355209 scopus 로고
    • Individual and situational influences on the development of self-efficacy: Implications for training effectiveness
    • MATHIEU JE, MARTINEAU JW and TANNENBAUM SI (1993) Individual and situational influences on the development of self-efficacy: Implications for training effectiveness. Personnel Psychology 46(1), 125-147.
    • (1993) Personnel Psychology , vol.46 , Issue.1 , pp. 125-147
    • Mathieu, J.E.1    Martineau, J.W.2    Tannenbaum, S.I.3
  • 52
    • 21144459329 scopus 로고
    • Influences of individual and situational characteristics on measures of training effectiveness
    • MATHIEU JE, TANNENBAUM SI and SALAS E (1992) Influences of individual and situational characteristics on measures of training effectiveness. Academy of Management Journal 35(4), 828-847.
    • (1992) Academy of Management Journal , vol.35 , Issue.4 , pp. 828-847
    • Mathieu, J.E.1    Tannenbaum, S.I.2    Salas, E.3
  • 53
    • 4243139489 scopus 로고    scopus 로고
    • The HIPAA-potamus in health care data security
    • MERCURI RT (2004) The HIPAA-potamus in health care data security. Communications of the ACM 47(7), 25-28.
    • (2004) Communications of the ACM , vol.47 , Issue.7 , pp. 25-28
    • Mercuri, R.T.1
  • 54
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • MYYRY L, SIPONEN M, PAHNILA S, VARTIAINEN T and VANCE A (2009) What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems 18(2), 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 57
    • 79953705461 scopus 로고
    • Situational constraints and work outcomes: The influences of a frequently overlooked construct
    • PETERS LH and O'CONNOR EJ (1980) Situational constraints and work outcomes: The influences of a frequently overlooked construct. Academy of Management Review 5(3), 391-397.
    • (1980) Academy of Management Review , vol.5 , Issue.3 , pp. 391-397
    • Peters, L.H.1    O'Connor, E.J.2
  • 58
    • 0011545501 scopus 로고
    • An examination of situational constraints in air force work settings
    • PETERS LH, O'CONNOR EJ, EULBERG JR and WATSON TW (1988) An examination of situational constraints in air force work settings. Human Performance 1(2), 133-144.
    • (1988) Human Performance , vol.1 , Issue.2 , pp. 133-144
    • Peters, L.H.1    O'Connor, E.J.2    Eulberg, J.R.3    Watson, T.W.4
  • 59
    • 38549116762 scopus 로고    scopus 로고
    • Specifying formative constructs in is research
    • PETTER S, STRAUB DW and RAI A (2007) Specifying formative constructs in is research. MIS Quarterly 31(4), 623-656.
    • (2007) MIS Quarterly , vol.31 , Issue.4 , pp. 623-656
    • Petter, S.1    Straub, D.W.2    Rai, A.3
  • 60
    • 84973676082 scopus 로고
    • Situational performance constraints and task characteristics: Their relationship to motivation and satisfaction
    • PHILLIPS JS and FREEDMAN SM (1984) Situational performance constraints and task characteristics: Their relationship to motivation and satisfaction. Journal of Management 10(3), 321-331.
    • (1984) Journal of Management , vol.10 , Issue.3 , pp. 321-331
    • Phillips, J.S.1    Freedman, S.M.2
  • 61
    • 84970235764 scopus 로고
    • Self-reports in organizational research: Problems and prospects
    • PODSAKOFF PM and ORGAN D (1986) Self-reports in organizational research: Problems and prospects. Journal of Management 12(4), 531-544.
    • (1986) Journal of Management , vol.12 , Issue.4 , pp. 531-544
    • Podsakoff, P.M.1    Organ, D.2
  • 62
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • DOI 10.1037/0021-9010.88.5.879
    • PODSAKOFF PM, MACKENZIE SB, LEE JY and PODSAKOFF NP (2003) Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879-903. (Pubitemid 37239703)
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.-Y.3    Podsakoff, N.P.4
  • 63
    • 35148820994 scopus 로고    scopus 로고
    • Commentary: Legal effect of revealing private information in the US and abroad
    • RADCLIFF S (2007) Commentary: Legal effect of revealing private information in the US and abroad. Information Systems Management 24(4), 343-344.
    • (2007) Information Systems Management , vol.24 , Issue.4 , pp. 343-344
    • Radcliff, S.1
  • 65
    • 17744373574 scopus 로고
    • Research note: Detecting a response set to likert-style attitude items with the rating model
    • RENNIE L (1982) Research note: Detecting a response set to likert-style attitude items with the rating model. Education Research and Perspectives 9(1), 114-118.
    • (1982) Education Research and Perspectives , vol.9 , Issue.1 , pp. 114-118
    • Rennie, L.1
  • 66
    • 71949094501 scopus 로고    scopus 로고
    • Self-efficacy in information security: Its influence on end users' information security practice behavior
    • RHEE HS, KIM C and RYU YU (2009) Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers & Security 28(6), 816-826.
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 816-826
    • Rhee, H.S.1    Kim, C.2    Ryu, Y.U.3
  • 68
    • 37749043462 scopus 로고    scopus 로고
    • Data security in the age of compliance
    • ROBINSON T (2005) Data security in the age of compliance. Networker 9(3), 24-30.
    • (2005) Networker , vol.9 , Issue.3 , pp. 24-30
    • Robinson, T.1
  • 69
    • 0000492513 scopus 로고
    • Some implications of a social learning theory for the prediction of goal directed behavior from testing procedures
    • ROTTER JB (1960) Some implications of a social learning theory for the prediction of goal directed behavior from testing procedures. Psychological Review 67, 301-316.
    • (1960) Psychological Review , vol.67 , pp. 301-316
    • Rotter, J.B.1
  • 70
    • 10344240580 scopus 로고    scopus 로고
    • Sampling and estimation in hidden populations using respondent-driven sampling
    • SALGANIK MJ and HECKATHORD DD (2004) Sampling and estimation in hidden populations using respondent-driven sampling. Sociological Methodology 34(1), 193-239. (Pubitemid 40465521)
    • (2004) Sociological Methodology , vol.34 , pp. 193-239
    • Salganik, M.J.1    Heckathorn, D.D.2
  • 71
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • DOI 10.1023/A:1011902718709
    • SASSE MA, BROSTOFF S and WEIRICH D (2001) Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19(3), 122-131. (Pubitemid 32903117)
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 72
    • 0000852824 scopus 로고
    • Ability versus effort attributional feedback: Differential effects on self-efficacy and achievement
    • SCHUNK DH (1983) Ability versus effort attributional feedback: Differential effects on self-efficacy and achievement. Journal of Educational Psychology 75(6), 848-856.
    • (1983) Journal of Educational Psychology , vol.75 , Issue.6 , pp. 848-856
    • Schunk, D.H.1
  • 73
    • 0001342546 scopus 로고
    • Sequential attributional feedback and children's achievement behavior
    • SCHUNK DH (1984) Sequential attributional feedback and children's achievement behavior. Journal of Educational Psychology 76(5), 1159-1169.
    • (1984) Journal of Educational Psychology , vol.76 , Issue.5 , pp. 1159-1169
    • Schunk, D.H.1
  • 74
    • 84936823564 scopus 로고
    • The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research
    • SHEPPARD B, HARTWICK J and WARSHAW P (1988) The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research 15(3), 325-343.
    • (1988) Journal of Consumer Research , vol.15 , Issue.3 , pp. 325-343
    • Sheppard, B.1    Hartwick, J.2    Warshaw, P.3
  • 76
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information assurance awareness
    • SIPONEN MT (2000) A conceptual foundation for organizational information assurance awareness. Information Management and Computer Security 8(1), 31-41.
    • (2000) Information Management and Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 77
    • 0011644488 scopus 로고    scopus 로고
    • An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
    • (DHILLON G, Ed.), Idea Group, Hershey, PA
    • SIPONEN MT (2001) An analysis of the recent IS security development approaches: Descriptive and prescriptive implications. In Information Security Management - Global Challenges in the Next Millennium (DHILLON G, Ed.), Idea Group, Hershey, PA.
    • (2001) Information Security Management - Global Challenges in the Next Millennium
    • Siponen, M.T.1
  • 78
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • SIPONEN M and VANCE A (2010) Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 79
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • STANTON JM, STAM KR, MASTRANGELO PM and JOLTON JA (2005) Analysis of end user security behaviors. Computers & Security 24(2), 124-133. (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 80
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • STRAUB D (1990) Effective IS security: An empirical study. Information Systems Research 1(3), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 81
    • 13244286108 scopus 로고    scopus 로고
    • Validation guidelines for IS positivist research
    • STRAUB DW, BOUDREAU MC and GEFEN D (2004) Validation guidelines for IS positivist research. Communications of AIS 13(63), 380-427.
    • (2004) Communications of AIS , vol.13 , Issue.63 , pp. 380-427
    • Straub, D.W.1    Boudreau, M.C.2    Gefen, D.3
  • 82
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • STRAUB DW and WELKE RJ (1998) Coping with system risk: Security planning models for management decision making. MIS Quarterly 22(4), 441-464. (Pubitemid 128684563)
    • (1998) MIS Quarterly: Management Information Systems , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 83
    • 69949098041 scopus 로고    scopus 로고
    • Understanding frame-of-reference training success: A social learning theory perspective
    • SULSKY LM and KLINE TJ (2007) Understanding frame-of-reference training success: A social learning theory perspective. International Journal of Training and Development 11(2), 121-131.
    • (2007) International Journal of Training and Development , vol.11 , Issue.2 , pp. 121-131
    • Sulsky, L.M.1    Kline, T.J.2
  • 84
    • 0036721863 scopus 로고    scopus 로고
    • Effects of training on Internet self-efficacy and computer user attitudes
    • DOI 10.1016/S0747-5632(02)00010-9, PII S0747563202000109
    • TORKZADEH G and VAN DYKE TP (2002) Effects of training on internet selfefficacy and computer user attitudes. Computers in Human Behavior 18(5), 479-494. (Pubitemid 34771850)
    • (2002) Computers in Human Behavior , vol.18 , Issue.5 , pp. 479-494
    • Torkzadeh, G.1    Van Dyke, T.P.2
  • 85
    • 0033084258 scopus 로고    scopus 로고
    • Managerial self-efficacy, outcome expectancies, and work-role salience as determinants of ambition for a managerial position
    • VAN VIANEN AE (1999) Managerial self-efficacy, outcome expectancies, and work-role salience as determinants of ambition for a managerial position. Journal of Applied Social Psychology 29(3), 639-665.
    • (1999) Journal of Applied Social Psychology , vol.29 , Issue.3 , pp. 639-665
    • Van Vianen, A.E.1
  • 86
    • 79955586709 scopus 로고    scopus 로고
    • Can privacy compliance be monitored?
    • VOGT N (2005) Can privacy compliance be monitored? Journal of Health Care Compliance 7(4), 56-58.
    • (2005) Journal of Health Care Compliance , vol.7 , Issue.4 , pp. 56-58
    • Vogt, N.1
  • 87
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • VROOM C and VON SOLMS R (2004) Towards information security behavioural compliance. Computers & Security 23(3), 191-198.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 88
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • WARKENTIN M and WILLISON R (2009) Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18(2), 101-105.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 90
    • 70350572582 scopus 로고    scopus 로고
    • Making users mindful of IT security; awareness training is vital to keeping the idea of IT security uppermost in employees' minds
    • WHITMAN EM and MATTORD HJ (2004) Making users mindful of IT security; awareness training is vital to keeping the idea of IT security uppermost in employees' minds. Security Management 48(11), 32-34.
    • (2004) Security Management , vol.48 , Issue.11 , pp. 32-34
    • Whitman, E.M.1    Mattord, H.J.2
  • 91
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer crime: Considering systems risk from a criminological perspective
    • DOI 10.1057/palgrave.ejis.3000592, PII 3000592
    • WILLISON R and BACKHOUSE J (2006) Opportunities for computer crime: Considering systems risk from a criminological perspective. European Journal of Information Systems 15(4), 403-414. (Pubitemid 44494839)
    • (2006) European Journal of Information Systems , vol.15 , Issue.4 , pp. 403-414
    • Willison, R.1    Backhouse, J.2
  • 92
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • WORKMAN M, BOMMER WH and STRAUB D (2008) Security lapses and the omission of information security measures: A threat control model and empirical test. Computer in Human Behavior 24(6), 2799-2816.
    • (2008) Computer in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.