메뉴 건너뛰기




Volumn 28, Issue 2, 2011, Pages 203-236

Understanding nonmalicious security violations in the workplace: A composite behavior model

Author keywords

information systems security; nonlinear construct relationships; nonmalicious security violation; perceived identity match; perceived security risk; relative advantage for job performance; workgroup norms

Indexed keywords

INFORMATION SYSTEMS SECURITY; JOB PERFORMANCE; NONLINEAR CONSTRUCT RELATIONSHIPS; NONMALICIOUS SECURITY VIOLATION; PERCEIVED IDENTITY MATCH; SECURITY RISKS; WORKGROUPS;

EID: 81255163048     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222280208     Document Type: Article
Times cited : (335)

References (98)
  • 1
    • 19944394275 scopus 로고    scopus 로고
    • Bridging the gap between organizational and user perspectives of security in the clinical domain
    • Adams, A., and Blandford, A. Bridging the gap between organizational and user perspectives of security in the clinical domain. International Journal of Human-Computer Studies, 63, 1-2 (2005), 175-202.
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 175-202
    • Adams, A.1    Blandford, A.2
  • 3
    • 81255210180 scopus 로고    scopus 로고
    • Constructing a TPB questionnaire: Conceptual and methodological considerations. University of Massachusetts, Amherst available at
    • Ajzen, I. Constructing a TPB questionnaire: Conceptual and methodological considerations. University of Massachusetts, Amherst, 2006 (available at http://people.umass.edu/aizen/ pdf/tpb.measurement.pdf).
    • (2006)
    • Ajzen, I.1
  • 5
    • 0002520483 scopus 로고    scopus 로고
    • Modeling IT ethics: A study in situational ethics
    • Banerjee, D.; Cronan, T.P.; and Jones, T.W. Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22, 1 (1998), 31-60.
    • (1998) MIS Quarterly , vol.22 , Issue.1 , pp. 31-60
    • Banerjee, D.1    Cronan, T.P.2    Jones, T.W.3
  • 6
    • 12244306739 scopus 로고    scopus 로고
    • An information security meta-policy for emergent organizations
    • Baskerville, R.L., and Siponen, M.T. An information security meta-policy for emergent organizations. Logistics Information Management, 15, 5-6 (2002), 337-346.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 337-346
    • Baskerville, R.L.1    Siponen, M.T.2
  • 7
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard, D., and Arief, B. Computer security impaired by legitimate users. Computers & Security, 23, 3 (2004), 253-264.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 8
    • 33846007680 scopus 로고    scopus 로고
    • Influence processes for information technology acceptance: An elaboration likelihood model
    • Bhattacherjee, A., and Sanford, C. Influence processes for information technology acceptance: An elaboration likelihood model. MIS Quarterly, 30, 4 (2006), 805-825.
    • (2006) MIS Quarterly , vol.30 , Issue.4 , pp. 805-825
    • Bhattacherjee, A.1    Sanford, C.2
  • 9
    • 0141640903 scopus 로고    scopus 로고
    • Deviance regulation: A theory of action and identity
    • Blanton, H., and Christie, C. Deviance regulation: A theory of action and identity. Review of General Psychology, 7, 2 (2003), 115-149.
    • (2003) Review of General Psychology , vol.7 , Issue.2 , pp. 115-149
    • Blanton, H.1    Christie, C.2
  • 10
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study on rationality-based beliefs and information security awareness
    • Bulgurcu, B.; Cavusoglu, H.; and Benbasat, I. Information security policy compliance: An empirical study on rationality-based beliefs and information security awareness. MIS Quarterly, 34, 3 (2010), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 12
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security at the workplace: Linking information security climate to compliant behavior
    • Chan, M.; Woon, I.; and Kankanhalli, A. Perceptions of information security at the workplace: Linking information security climate to compliant behavior. Journal of Information Privacy and Security, 1, 3 (2005), 18-41.
    • (2005) Journal of Information Privacy and Security , vol.1 , Issue.3 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 13
    • 84928505317 scopus 로고
    • Role identity and reasoned action in the prediction of repeated behavior
    • Charng, H.W.; Piliavin, J.A.; and Callero, P.L. Role identity and reasoned action in the prediction of repeated behavior. Social Psychology Quarterly, 51, 4 (1988), 303-317.
    • (1988) Social Psychology Quarterly , vol.51 , Issue.4 , pp. 303-317
    • Charng, H.W.1    Piliavin, J.A.2    Callero, P.L.3
  • 15
    • 0003095695 scopus 로고    scopus 로고
    • The partial least squares approach to structural equation modeling. In G.A. Marcoulides (ed
    • Mahwah, NJ: Lawrence Erlbaum
    • Chin, W.W. The partial least squares approach to structural equation modeling. In G.A. Marcoulides (ed.), Modern Methods for Business Research. Mahwah, NJ: Lawrence Erlbaum, 1998, pp. 295-336.
    • (1998) Modern Methods for Business Research , pp. 295-336
    • Chin, W.W.1
  • 16
    • 0001878819 scopus 로고
    • Jr. A paradigm for developing better measures of marketing constructs
    • Churchill, G.A., Jr. A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16, 1 (1979), 64-73.
    • (1979) Journal of Marketing Research , vol.16 , Issue.1 , pp. 64-73
    • Churchill, G.A.1
  • 18
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J.; Hovav, A.; and Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20, 1 (2009), 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 19
    • 0002698747 scopus 로고    scopus 로고
    • Information systems security management in the new millennium
    • Dhillon, G., and Backhouse, J. Information systems security management in the new millennium. Communications of the ACM, 43, 7 (2000), 125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 20
    • 81255197040 scopus 로고    scopus 로고
    • Information technology at work: The implications for dignity at work
    • In S.C. Bolton (ed Oxford, UK: Butterworth- Heinemann
    • Doolin, B., and McLeod, L. Information technology at work: The implications for dignity at work. In S.C. Bolton (ed.), Dimensions of Dignity at Work. Oxford, UK: Butterworth- Heinemann, 2007, pp. 154-175.
    • (2007) Dimensions of Dignity at Work , pp. 154-175
    • Doolin, B.1    McLeod, L.2
  • 21
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • Dourish, P.; Grinter, R.E.; de la Flor, R.D.; and Joseph, M. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8, 6 (2004), 391-401.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    De La Flor, R.D.3    Joseph, M.4
  • 22
    • 81255176181 scopus 로고    scopus 로고
    • End users behaving badly. Network World December 10 available at
    • Dubie, D. End users behaving badly. Network World, December 10, 2007 (available at www. networkworld.com/slideshows/2007/121007-end-users-behaving- badly.html). 23. Eagly, A.H., and Chaiken, S. The Psychology of Attitudes. Fort Worth, TX: Harcourt Brace Jovanovich, 1993.
    • (2007)
    • Dubie, D.1
  • 25
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C., and Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (1981), 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 26
    • 21344491319 scopus 로고
    • Social construction of communication technology
    • Fulk, J. Social construction of communication technology. Academy of Management Journal, 36, 5 (1993), 921-950.
    • (1993) Academy of Management Journal , vol.36 , Issue.5 , pp. 921-950
    • Fulk, J.1
  • 27
    • 0000789331 scopus 로고
    • An updated paradigm for scale development incorporating unidimensionality and its assessment
    • Gerbing, D.W., and Anderson, J.C. An updated paradigm for scale development incorporating unidimensionality and its assessment. Journal of Marketing Research, 25, 2 (1988), 186-192.
    • (1988) Journal of Marketing Research , vol.25 , Issue.2 , pp. 186-192
    • Gerbing, D.W.1    Anderson, J.C.2
  • 30
    • 0000917858 scopus 로고    scopus 로고
    • The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington, S.J. The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20, 3 (1996), 257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 31
    • 85119232862 scopus 로고
    • From wishes to action: The dead ends and short cuts on the long way to action
    • In M. Frese and J. Sabini (eds Hillsdale, NJ: Lawrence Erlbaum
    • Heckhausen, H., and Kuhl, J. From wishes to action: The dead ends and short cuts on the long way to action. In M. Frese and J. Sabini (eds.), Goal Directed Behavior: The Concept of Action in Psychology. Hillsdale, NJ: Lawrence Erlbaum, 1985, pp. 134-159.
    • (1985) Goal Directed Behavior: The Concept of Action in Psychology , pp. 134-159
    • Heckhausen, H.1    Kuhl, J.2
  • 32
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness
    • Herath, T., and Rao, H.R. Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness. Decision Support Systems, 47, 2 (2009), 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 33
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation an deterrence: A framework for security policy compliance in organizations
    • Herath, T., and Rao, H.R. Protection motivation an deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18, 2 (2009), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 34
    • 0002863814 scopus 로고
    • Knowledge-based causal attribution-The abnormal conditions focus model
    • Hilton, D.J., and Slugoski, B.R. Knowledge-based causal attribution-The abnormal conditions focus model. Psychological Review, 93, 1 (1986), 75-88.
    • (1986) Psychological Review , vol.93 , Issue.1 , pp. 75-88
    • Hilton, D.J.1    Slugoski, B.R.2
  • 35
    • 0000230521 scopus 로고    scopus 로고
    • Use of partial least squares (PLS) in strategic management research: A review of four recent studies
    • Hulland, J. Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20, 2 (1999), 195-204.
    • (1999) Strategic Management Journal , vol.20 , Issue.2 , pp. 195-204
    • Hulland, J.1
  • 36
    • 33751161222 scopus 로고    scopus 로고
    • A longitudinal study of information system threat categories: The enduring problem of human error
    • Im, G.P., and Baskerville, R.L. A longitudinal study of information system threat categories: The enduring problem of human error. DATA BASE for Advances in Information Systems, 36, 4 (2005), 68-79.
    • (2005) DATA BASE for Advances in Information Systems , vol.36 , Issue.4 , pp. 68-79
    • Im, G.P.1    Baskerville, R.L.2
  • 37
    • 81255197039 scopus 로고    scopus 로고
    • Information security breaches survey Department for Business Enterprise & Regulatory Reform (BERR London 2008 available at
    • Information security breaches survey 2008. Department for Business Enterprise & Regulatory Reform (BERR), London, 2008 (available at www.bis.gov.uk/files/file45714.pdf).
    • (2008)
  • 40
    • 0033479307 scopus 로고    scopus 로고
    • Why differences make a difference: A field study of diversity, conflict, and performance in workgroups
    • Jehn, K.A.; Northcraft, G.B.; and Neale, M.A. Why differences make a difference: A field study of diversity, conflict, and performance in workgroups. Administrative Science Quarterly, 44, 4 (1999), 741-763.
    • (1999) Administrative Science Quarterly , vol.44 , Issue.4 , pp. 741-763
    • Jehn, K.A.1    Northcraft, G.B.2    Neale, M.A.3
  • 41
    • 58849133506 scopus 로고    scopus 로고
    • Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain
    • Fall
    • Johnson, M.E. Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain. Journal of Management Information Systems, 25, 2 (Fall 2008), 97-123.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 97-123
    • Johnson, M.E.1
  • 42
    • 33746380994 scopus 로고    scopus 로고
    • How large can a standardized coefficient be?
    • available at
    • Jöreskog, K.G. How large can a standardized coefficient be? Scientific Software International, Chicago, 1999 (available at www.ssicentral.com/lisrel/techdocs/HowLargeCana StandardizedCoefficientbe.pdf).
    • (1999) Scientific Software International Chicago
    • Jöreskog, K.G.1
  • 43
    • 0001094004 scopus 로고    scopus 로고
    • Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs
    • Karahanna, E.; Straub, D.W.; and Chervany, N.L. Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23, 2 (1999), 183-213.
    • (1999) MIS Quarterly , vol.23 , Issue.2 , pp. 183-213
    • Karahanna, E.1    Straub, D.W.2    Chervany, N.L.3
  • 44
    • 0036000547 scopus 로고    scopus 로고
    • Self-reported counterproductive behaviors and organizational citizenship behaviors: Separate but related constructs
    • Kelloway, E.K.; Loughlin, C.; Barling, J.; and Nault, A. Self-reported counterproductive behaviors and organizational citizenship behaviors: Separate but related constructs. International journal of Selection and Assessment, 10, 1-2 (2002), 143-151.
    • (2002) International journal of Selection and Assessment , vol.10 , Issue.1-2 , pp. 143-151
    • Kelloway, E.K.1    Loughlin, C.2    Barling, J.3    Nault, A.4
  • 45
    • 73549118703 scopus 로고
    • Computer abuse and computer crime as organizational activities
    • Kling, R. Computer abuse and computer crime as organizational activities. Computer/ Law Journal, 2, 2 (1980), 186-196.
    • (1980) Computer/ Law Journal , vol.2 , Issue.2 , pp. 186-196
    • Kling, R.1
  • 47
    • 77956445011 scopus 로고    scopus 로고
    • WarpPLS 1.0 user manual
    • available at
    • Kock, N. WarpPLS 1.0 user manual. ScriptWarp Systems, 2010 (available at www .scriptwarp.com/warppls/UserManual.pdf).
    • (2010) ScriptWarp Systems
    • Kock, N.1
  • 48
    • 81255176179 scopus 로고    scopus 로고
    • Why are cross-loadings so low in WarpPLS?
    • available at
    • Kock, N. Why are cross-loadings so low in WarpPLS? WarpPLS, 2010 (available at http:// warppls.blogspot.com/2010/01/why-are-cross-loadings-so- low-in.html).
    • (2010) WarpPLS
    • Kock, N.1
  • 49
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic, A.G., and Clark, J.G. Why there aren't more information security research studies. Information & Management, 41, 5 (2004), 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 50
    • 33644667546 scopus 로고    scopus 로고
    • A multilevel model of resistance to information technology implementation
    • Lapointe, L., and Rivard, S. A multilevel model of resistance to information technology implementation. MIS Quarterly, 29, 3 (2005), 461-491.
    • (2005) MIS Quarterly , vol.29 , Issue.3 , pp. 461-491
    • Lapointe, L.1    Rivard, S.2
  • 52
    • 4644242309 scopus 로고    scopus 로고
    • Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences
    • Article 12
    • Leonard, L.N.K., and Cronan, T.P. Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences. Journal of the Association for Information Systems, 1, 1 (2001), Article 12.
    • (2001) Journal of the Association for Information Systems , vol.1 , pp. 1
    • Leonard, L.N.K.1    Cronan, T.P.2
  • 54
    • 33847761422 scopus 로고    scopus 로고
    • Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
    • Liang, H.; Saraf, N.; Hu, Q.; and Xue, Y. Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31, 1 (2007), 59-87.
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 59-87
    • Liang, H.1    Saraf, N.2    Hu, Q.3    Xue, Y.4
  • 55
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K.D.; Carr, H.H.; and Warkentin, M.E. Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly, 17, 2 (1992), 173-186.
    • (1992) MIS Quarterly , vol.17 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 56
    • 13244298307 scopus 로고    scopus 로고
    • Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
    • Malhotra, N.K.; Kim, S.S.; and Agarwal, J. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (2004), 336-355.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 57
    • 73449149291 scopus 로고
    • Development of an instrument to measure the perceptions of adopting an information technology innovation
    • Moore, G.C., and Benbasat, I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2, 3 (1991), 192-222.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 192-222
    • Moore, G.C.1    Benbasat, I.2
  • 58
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L.; Siponen, M.; Pahnila, S.; Vartiainen, T., and Vance, A. What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18, 2 (2009), 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 60
    • 67649951505 scopus 로고    scopus 로고
    • Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model
    • Pavlou, P.A. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7, 3 (2003), 69-103.
    • (2003) International Journal of Electronic Commerce , vol.7 , Issue.3 , pp. 69-103
    • Pavlou, P.A.1
  • 61
    • 2442676514 scopus 로고    scopus 로고
    • Building effective online marketplaces with institution-based trust
    • Pavlou, P.A., and Gefen, D. Building effective online marketplaces with institution-based trust. Information Systems Research, 15, 1 (2004), 37-59.
    • (2004) Information Systems Research , vol.15 , Issue.1 , pp. 37-59
    • Pavlou, P.A.1    Gefen, D.2
  • 62
    • 81255210175 scopus 로고    scopus 로고
    • Perceptions and behaviors of remote workers: Keys to building a secure company White Paper, Cisco Systems, San Jose, CA
    • Perceptions and behaviors of remote workers: Keys to building a secure company. White Paper, Cisco Systems, San Jose, CA, 2006.
    • (2006)
  • 63
    • 35448977285 scopus 로고    scopus 로고
    • A multi-level perspective on personal selection research and practice: Implications for selection system design, assessment, and construct validation
    • In F.J. Yammarino and F. Dansereau (eds Oxford: Elsevier Science
    • Ployhart, R.E., and Schneider, B. A multi-level perspective on personal selection research and practice: Implications for selection system design, assessment, and construct validation. In F.J. Yammarino and F. Dansereau (eds.), The Many Faces of Multi-Level Issues. Oxford: Elsevier Science, 2002, pp. 95-140.
    • (2002) The Many Faces of Multi-Level Issues , pp. 95-140
    • Ployhart, R.E.1    Schneider, B.2
  • 64
    • 85046049330 scopus 로고    scopus 로고
    • Multilevel selection and prediction: Theories, methods, and models
    • In A. Evers, O. Omit-Voskuyl, and N. Anderson (eds Malden, MA: Blackwell
    • Ployhart, R.E., and Schneider, B. Multilevel selection and prediction: Theories, methods, and models. In A. Evers, O. Omit-Voskuyl, and N. Anderson (eds.), The Blackwell Handbook of Personnel Selection. Malden, MA: Blackwell, 2005, pp. 495-516.
    • (2005) The Blackwell Handbook of Personnel Selection , pp. 495-516
    • Ployhart, R.E.1    Schneider, B.2
  • 65
    • 84970235764 scopus 로고
    • Self-reports in organizational research: Problems and prospects
    • Podasakoff, P.M., and Organ, D.W. Self-reports in organizational research: Problems and prospects. Journal of Management, 12, 4 (1986), 531-544.
    • (1986) Journal of Management , vol.12 , Issue.4 , pp. 531-544
    • Podasakoff, P.M.1    Organ, D.W.2
  • 66
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podasakoff, P.M.; MacKenzie, S.B.; Lee, J.-Y.; and Podsakoff, N.P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podasakoff, P.M.1    MacKenzie, S.B.2    Lee, J.-Y.3    Podsakoff, N.P.4
  • 67
    • 34248334263 scopus 로고    scopus 로고
    • Evaluating information security tradeoff: Restricting access can interfere with user tasks
    • Post, G.V., and Kagan, A. Evaluating information security tradeoff: Restricting access can interfere with user tasks. Computers & Security, 26, 3 (2007), 229-237.
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 229-237
    • Post, G.V.1    Kagan, A.2
  • 70
    • 26844501781 scopus 로고    scopus 로고
    • Changing faces: Professional image construction in diverse organizational settings
    • Roberts, L.M. Changing faces: Professional image construction in diverse organizational settings. Academy of Management Review, 30, 4 (2005), 685-711.
    • (2005) Academy of Management Review , vol.30 , Issue.4 , pp. 685-711
    • Roberts, L.M.1
  • 71
    • 0032218162 scopus 로고    scopus 로고
    • Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees
    • Robinson, S.L., and O'Leary-Kelly, A.M. Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees. Academy of Management Journal, 41, 6 (1998), 658-672.
    • (1998) Academy of Management Journal , vol.41 , Issue.6 , pp. 658-672
    • Robinson, S.L.1    O'Leary-Kelly, A.M.2
  • 72
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest link"-A human/ computer interaction approach to usable and effective security
    • Sasse, M.A.; Brostoff, S.; and Weirich, D. Transforming the "weakest link"-A human/ computer interaction approach to usable and effective security. BT Technology Journal, 19, 2 (2001), 122-131.
    • (2001) BT Technology Journal , vol.19 , Issue.2 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 75
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.T. A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8, 1 (2000), 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 76
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insight into the problem of employee information systems security policy violation
    • Siponen, M.T., and Vance, A. Neutralization: New insight into the problem of employee information systems security policy violation. MIS Quarterly, 34, 3 (2010), 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.T.1    Vance, A.2
  • 77
    • 0036001754 scopus 로고    scopus 로고
    • Consumer trust, value, and loyalty in relational exchanges
    • Sirdeshmukh, D.; Singh, J.; and Sabol, B. Consumer trust, value, and loyalty in relational exchanges. Journal of Marketing, 65, 1 (2002), 15-37.
    • (2002) Journal of Marketing , vol.65 , Issue.1 , pp. 15-37
    • Sirdeshmukh, D.1    Singh, J.2    Sabol, B.3
  • 78
    • 0000987320 scopus 로고
    • Acting on one's attitudes: Procedures for linking attitude and behavior
    • Snyder, M., and Kendzierski, D. Acting on one's attitudes: Procedures for linking attitude and behavior. Journal of Experimental Social Psychology, 18, 2 (1982), 165-183.
    • (1982) Journal of Experimental Social Psychology , vol.18 , Issue.2 , pp. 165-183
    • Snyder, M.1    Kendzierski, D.2
  • 79
    • 77957070672 scopus 로고    scopus 로고
    • User participation in information systems security risk management
    • Spears, J.L., and Barki, H. User participation in information systems security risk management. MIS Quarterly, 34, 3 (2010), 503-522.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 80
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • Straub, D.W. Validating instruments in MIS research. MIS Quarterly, 13, 2 (1989), 147-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 81
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. Effective IS security: An empirical study. Information Systems Research, 1, 3 (1990), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 82
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub, D.W., and Nance, W.D. Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly, 14, 1 (1990), 45-60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 84
    • 0013435035 scopus 로고    scopus 로고
    • The theory of planned behaviour: Self-identity, social identity and group norms
    • Terry, D.J.; Hogg, M.A.; and White, K.M. The theory of planned behaviour: Self-identity, social identity and group norms. British Journal of Social Psychology, 38, 3 (1999), 225-244.
    • (1999) British Journal of Social Psychology , vol.38 , Issue.3 , pp. 225-244
    • Terry, D.J.1    Hogg, M.A.2    White, K.M.3
  • 85
    • 0020744868 scopus 로고
    • Multiple identities and psychological well-being: A reformulation and test of the social isolation hypothesis
    • Thoits, P.A. Multiple identities and psychological well-being: A reformulation and test of the social isolation hypothesis. American Sociological Review, 48, 2 (1983), 174-187.
    • (1983) American Sociological Review , vol.48 , Issue.2 , pp. 174-187
    • Thoits, P.A.1
  • 86
    • 84936146063 scopus 로고
    • On merging identity theory and stress research
    • Thoits, P.A. On merging identity theory and stress research. Social Psychology Quarterly, 54, 2 (1991), 101-112.
    • (1991) Social Psychology Quarterly , vol.54 , Issue.2 , pp. 101-112
    • Thoits, P.A.1
  • 87
    • 72049126081 scopus 로고    scopus 로고
    • Nonlinearities between attitude and subjective norms in information technology acceptance: A negative synergy?
    • Titah, R., and Barki, H. Nonlinearities between attitude and subjective norms in information technology acceptance: A negative synergy? MIS Quarterly, 33, 4 (2009), 827-844.
    • (2009) MIS Quarterly , vol.33 , Issue.4 , pp. 827-844
    • Titah, R.1    Barki, H.2
  • 89
    • 32544440696 scopus 로고    scopus 로고
    • Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings
    • Tyler, T.R., and Blader, S.L. Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings. Academy of Management Journal, 48, 6 (2005), 1143-1158.
    • (2005) Academy of Management Journal , vol.48 , Issue.6 , pp. 1143-1158
    • Tyler, T.R.1    Blader, S.L.2
  • 90
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V.; Morris, M.G.; Davis, G.B.; and Davis, F.D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 3 (2003), 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 92
    • 21844511816 scopus 로고
    • Rational and social theories as complementary explanations of communication media choices: Two policy-capturing studies
    • Webster, J., and Trevino, L.K. Rational and social theories as complementary explanations of communication media choices: Two policy-capturing studies. Academy of Management Journal, 38, 6 (1995), 1544-1572.
    • (1995) Academy of Management Journal , vol.38 , Issue.6 , pp. 1544-1572
    • Webster, J.1    Trevino, L.K.2
  • 93
    • 18844458431 scopus 로고    scopus 로고
    • An unappreciated reason why information security policies fail
    • Wood, C.C. An unappreciated reason why information security policies fail. Computer Fraud & Security, 10 (2000), 13-14.
    • (2000) Computer Fraud & Security , vol.10 , pp. 13-14
    • Wood, C.C.1
  • 95
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M.; Bommer, W.H.; and Straub, D.W. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24, 6 (2008), 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.W.3
  • 96
    • 27544443011 scopus 로고    scopus 로고
    • Predicting the usage of P2P sharing software: The role of trust and perceived risk
    • IEEE Computer Society Press In R.H. Sprague (ed Los Alamitos, CA :
    • Xu, H.; Wang, H.; and Teo, H.-H. Predicting the usage of P2P sharing software: The role of trust and perceived risk. In R.H. Sprague (ed.), Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA : IEEE Computer Society Press, 2005.
    • (2005) Proceedings of the 38th Annual Hawaii International Conference on System Sciences
    • Xu, H.1    Wang, H.2    Teo, H.-H.3
  • 97
    • 44449104957 scopus 로고    scopus 로고
    • Exploring asymmetric effects in the formation of retail price satisfaction
    • Zielke, S. Exploring asymmetric effects in the formation of retail price satisfaction. Journal of Retailing and Consumer Services, 15, 5 (2008), 335-347.
    • (2008) Journal of Retailing and Consumer Services , vol.15 , Issue.5 , pp. 335-347
    • Zielke, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.