메뉴 건너뛰기




Volumn 28, Issue 5, 2012, Pages 1849-1858

Information systems user security: A structured model of the knowing-doing gap

Author keywords

Attitude; Information security; Intention; Narcissism; Omissive behavior; Threat

Indexed keywords

ATTITUDE; INTENTION; NARCISSISM; OMISSIVE BEHAVIOR; THREAT;

EID: 84863720925     PISSN: 07475632     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.chb.2012.05.003     Document Type: Article
Times cited : (106)

References (47)
  • 1
    • 33645986181 scopus 로고    scopus 로고
    • Personal fables, narcissism, and adolescent adjustment
    • DOI 10.1002/pits.20162
    • M.C. Aalsma, D.K. Lapsley, and D.J. Flannery Personal fables, narcissism, and adolescent adjustment Psychology in the Schools 43 2006 481 491 10.1002/pits.20162 (Pubitemid 43600878)
    • (2006) Psychology in the Schools , vol.43 , Issue.4 , pp. 481-491
    • Aalsma, M.C.1    Lapsley, D.K.2    Flannery, D.J.3
  • 3
    • 0035999319 scopus 로고    scopus 로고
    • Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
    • I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior Journal of Applied Social Psychology 32 2002 665 683
    • (2002) Journal of Applied Social Psychology , vol.32 , pp. 665-683
    • Ajzen, I.1
  • 4
    • 33646888013 scopus 로고    scopus 로고
    • The NPI-16 as a short measure of narcissism
    • DOI 10.1016/j.jrp.2005.03.002, PII S0092656605000504
    • D.R. Ames, P. Rose, and C.P. Anderson The NPI-16 as a short measure of narcissism Journal of Research in Personality 40 2006 440 450 10.1016/j.jrp.2005.03.002 (Pubitemid 43779138)
    • (2006) Journal of Research in Personality , vol.40 , Issue.4 , pp. 440-450
    • Ames, D.R.1    Rose, P.2    Anderson, C.P.3
  • 5
    • 0035753278 scopus 로고    scopus 로고
    • Efficacy of the theory of planned behaviour: A meta-analytic review
    • DOI 10.1348/014466601164939
    • C.J. Armitage, and M. Conner Efficacy of the theory of planned behaviour: A meta-analytic review The British Journal of Social Psychology 40 2001 471 499 (Pubitemid 33597358)
    • (2001) British Journal of Social Psychology , vol.40 , Issue.4 , pp. 471-499
    • Armitage, C.J.1    Conner, M.2
  • 6
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • K. Aytes, and T. Connolly Computer security and risky computing practices: A rational choice perspective Journal of Organizational and End User Computing 16 2004 22 40
    • (2004) Journal of Organizational and End User Computing , vol.16 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 7
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behavioral change
    • A. Bandura Self-efficacy: Toward a unifying theory of behavioral change Psychological Review 84 1977 191 215
    • (1977) Psychological Review , vol.84 , pp. 191-215
    • Bandura, A.1
  • 8
    • 0002520483 scopus 로고    scopus 로고
    • Modeling it ethics: A study in situational ethics
    • D. Banerjee, T.P. Cronan, and T.W. Jones Modeling it ethics: A study in situational ethics MIS Quarterly 22 1998 31 60
    • (1998) MIS Quarterly , vol.22 , pp. 31-60
    • Banerjee, D.1    Cronan, T.P.2    Jones, T.W.3
  • 9
    • 0347973105 scopus 로고
    • Conventional wisdom on measurement: A structural equation perspective
    • K. Bollen, and R. Lennox Conventional wisdom on measurement: A structural equation perspective Psychological Bulletin 110 1991 305 314
    • (1991) Psychological Bulletin , vol.110 , pp. 305-314
    • Bollen, K.1    Lennox, R.2
  • 10
    • 0031501312 scopus 로고    scopus 로고
    • Narcissism, identity, and legitimacy
    • A.D. Brown Narcissism, identity, and legitimacy Academy of Management Review 22 1997 643 686
    • (1997) Academy of Management Review , vol.22 , pp. 643-686
    • Brown, A.D.1
  • 11
    • 26444606854 scopus 로고    scopus 로고
    • Ethical decision making in the public accounting profession: An extension of Ajzen's theory of planned behavior
    • DOI 10.1007/s10551-005-0277-2
    • H.F. Buchan Ethical decision making in the public accounting profession: An extension of Ajzen's theory of planned behavior Journal of Business Ethics 61 2005 165 181 10.1007/s10551-005-0277-2 (Pubitemid 41433516)
    • (2005) Journal of Business Ethics , vol.61 , Issue.2 , pp. 165-181
    • Buchan, H.F.1
  • 12
    • 33750922314 scopus 로고    scopus 로고
    • Ethics in information technology and software use
    • V.J. Calluzzo, and C.J. Cante Ethics in information technology and software use Journal of Business Ethics 51 2004 301 312
    • (2004) Journal of Business Ethics , vol.51 , pp. 301-312
    • Calluzzo, V.J.1    Cante, C.J.2
  • 14
    • 38049065466 scopus 로고    scopus 로고
    • It's all about me: Narcissistic chief executive officers and their effects on company strategy and performance
    • A. Chatterjee, and D.C. Hambrick It's all about me: Narcissistic chief executive officers and their effects on company strategy and performance Administrative Science Quarterly 52 2007 351 386
    • (2007) Administrative Science Quarterly , vol.52 , pp. 351-386
    • Chatterjee, A.1    Hambrick, D.C.2
  • 15
    • 0002042337 scopus 로고    scopus 로고
    • Issues and opinion on structural equation modeling
    • W.W. Chin Issues and opinion on structural equation modeling MIS Quarterly 1 1998 vii xvi
    • (1998) MIS Quarterly , vol.1
    • Chin, W.W.1
  • 16
    • 16244391780 scopus 로고    scopus 로고
    • An empirical validation of perceived importance and behavior intention in IT ethics
    • DOI 10.1007/s10551-004-2727-7
    • T.P. Cronan, L.N.K. Leonard, and J. Kreie An empirical validation of perceived importance and behavior intention in it ethics Journal of Business Ethics 56 2005 231 238 (Pubitemid 40465274)
    • (2005) Journal of Business Ethics , vol.56 , Issue.3 , pp. 231-238
    • Cronan, T.P.1    Leonard, L.N.K.2    Kreie, J.3
  • 18
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • T. Dinev, and Q. Hu The centrality of awareness in the formation of user behavioral intention toward protective information technologies Journal of the Association for Information Systems 8 2007 386 408
    • (2007) Journal of the Association for Information Systems , vol.8 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 19
    • 54049117123 scopus 로고    scopus 로고
    • Organizational narcissism
    • 10.1016/j.orgdyn.2008.07.004
    • D. Duchon, and M. Burns Organizational narcissism Organizational Dynamics 37 2008 354 364 10.1016/j.orgdyn.2008.07.004
    • (2008) Organizational Dynamics , vol.37 , pp. 354-364
    • Duchon, D.1    Burns, M.2
  • 22
    • 69849097162 scopus 로고    scopus 로고
    • Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors
    • 10.1016/j.paid.2009.07.008
    • J.D. Foster, J.W. Shenesey, and J.S. Goff Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors Personality and Individual Differences 47 2009 885 889 10.1016/j.paid.2009.07. 008
    • (2009) Personality and Individual Differences , vol.47 , pp. 885-889
    • Foster, J.D.1    Shenesey, J.W.2    Goff, J.S.3
  • 24
    • 0031498112 scopus 로고    scopus 로고
    • Truth or consequences: A study of critical issues and decision making in accounting
    • A.M. Gibson, and A.H. Frakes Truth or consequences: A study of critical issues and decision making in accounting Journal of Business Ethics 16 1997 161 171 (Pubitemid 127173108)
    • (1997) Journal of Business Ethics , vol.16 , Issue.2 , pp. 161-171
    • Gibson, A.M.1    Frakes, A.H.2
  • 25
    • 51349120627 scopus 로고    scopus 로고
    • Probing the link between narcissism and gambling: The mediating role of judgment and decision-making biases
    • 10.1002/bdm.582
    • C.E. Lakey, P. Rose, W.K. Campbell, and A.S. Goodie Probing the link between narcissism and gambling: the mediating role of judgment and decision-making biases Journal of Behavioral Decision Making 21 2008 113 137 10.1002/bdm.582
    • (2008) Journal of Behavioral Decision Making , vol.21 , pp. 113-137
    • Lakey, C.E.1    Rose, P.2    Campbell, W.K.3    Goodie, A.S.4
  • 26
    • 27544432825 scopus 로고    scopus 로고
    • Why employees do non-work-related computing: An exploratory investigation through multiple theoretical perspectives
    • Computer Society Press
    • O.D. Lee, K.H. Lim, and W.M. Wong Why employees do non-work-related computing: an exploratory investigation through multiple theoretical perspectives Proceedings of the 38th Hawaii international conference on system Sciences Vol. 7 2005 Computer Society Press 1 9
    • (2005) Proceedings of the 38th Hawaii International Conference on System Sciences , vol.7 VOL. , pp. 1-9
    • Lee, O.D.1    Lim, K.H.2    Wong, W.M.3
  • 28
    • 28644441165 scopus 로고    scopus 로고
    • Attitude toward ethical behavior in computer use: A shifting model
    • DOI 10.1108/02635570510633239
    • L. Leonard, and T. Cronan Attitude toward ethical behavior in computer use: A shifting model Industrial Management & Data Systems 105 2005 1150 1171 10.1108/02635570510633239 (Pubitemid 41751761)
    • (2005) Industrial Management and Data Systems , vol.105 , Issue.9 , pp. 1150-1171
    • Leonard, L.N.K.1    Cronan, T.P.2
  • 29
    • 0036479255 scopus 로고    scopus 로고
    • The long-term organizational impact of destructively narcissistic managers
    • R. Lubit The long-term organizational impact of destructively narcissistic managers Academy of Management Executive 16 2002 127 138
    • (2002) Academy of Management Executive , vol.16 , pp. 127-138
    • Lubit, R.1
  • 30
    • 0035623459 scopus 로고    scopus 로고
    • Unraveling the paradoxes of narcissism: A dynamic self-regulatory processing model
    • C.C. Morf, and F. Rhodewalt Unraveling the paradoxes of narcissism: A dynamic self-regulatory processing model Psychological Inquiry 12 2001 177 196
    • (2001) Psychological Inquiry , vol.12 , pp. 177-196
    • Morf, C.C.1    Rhodewalt, F.2
  • 31
    • 0001354917 scopus 로고
    • Ethical decision making in the medical profession: An application of the theory of planned behavior
    • D.M. Randall, and A.M. Gibson Ethical decision making in the medical profession: An application of the theory of planned behavior Journal of Business Ethics 10 1991 111 122
    • (1991) Journal of Business Ethics , vol.10 , pp. 111-122
    • Randall, D.M.1    Gibson, A.M.2
  • 32
    • 0024004572 scopus 로고
    • A principal-components analysis of the narcissistic personality inventory and further evidence of its construct validity
    • R. Raskin, and H. Terry A principal-components analysis of the narcissistic personality inventory and further evidence of its construct validity Journal of Personality and Social Psychology 54 1988 890 902
    • (1988) Journal of Personality and Social Psychology , vol.54 , pp. 890-902
    • Raskin, R.1    Terry, H.2
  • 33
    • 0009112512 scopus 로고
    • Sex, locus of control, and job involvement: A six-country investigation
    • H.J. Reitz, and L.N. Jewell Sex, locus of control, and job involvement: A six-country investigation Academy of Management Journal 22 1979 72 80
    • (1979) Academy of Management Journal , vol.22 , pp. 72-80
    • Reitz, H.J.1    Jewell, L.N.2
  • 34
    • 71949094501 scopus 로고    scopus 로고
    • Self-efficacy in information security: Its influence on end users' information security practice behavior
    • 10.1016/j.cose.2009.05.008
    • H. -S. Rhee, C. Kim, and Y.U. Ryu Self-efficacy in information security: Its influence on end users' information security practice behavior Computers & Security 28 2009 816 826 10.1016/j.cose.2009.05.008
    • (2009) Computers & Security , vol.28 , pp. 816-826
    • Rhee, H.-S.1    Kim, C.2    Ryu, Y.U.3
  • 35
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • P.A. Rippetoe, and R.W. Rogers Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat Journal of Personality and Social Psychology 52 1987 596 604
    • (1987) Journal of Personality and Social Psychology , vol.52 , pp. 596-604
    • Rippetoe, P.A.1    Rogers, R.W.2
  • 37
    • 0000747474 scopus 로고
    • Internal versus external control of reinforcement: A case history of a variable
    • J.B. Rotter Internal versus external control of reinforcement: A case history of a variable American Psychologist 45 1990 489 493
    • (1990) American Psychologist , vol.45 , pp. 489-493
    • Rotter, J.B.1
  • 38
    • 1242263792 scopus 로고    scopus 로고
    • Security training and awareness - Fitting a square peg in a round hole
    • E. Schultz Security training and awareness - fitting a square peg in a round hole Computers & Security 23 2004 1 2
    • (2004) Computers & Security , vol.23 , pp. 1-2
    • Schultz, E.1
  • 39
    • 71149100808 scopus 로고    scopus 로고
    • Are employees putting your company at risk by not following information security policies?
    • 10.1145/1610252.1610289
    • M. Siponen, M.A. Mahmood, and S. Pahnila Are employees putting your company at risk by not following information security policies? Communications of the ACM 52 2009 145 147 10.1145/1610252.1610289
    • (2009) Communications of the ACM , vol.52 , pp. 145-147
    • Siponen, M.1    Mahmood, M.A.2    Pahnila, S.3
  • 40
    • 84995542671 scopus 로고    scopus 로고
    • An introduction to insider threat management
    • S. Steele, and C. Wargo An introduction to insider threat management Information Systems Security 16 2007 23 34
    • (2007) Information Systems Security , vol.16 , pp. 23-34
    • Steele, S.1    Wargo, C.2
  • 42
    • 33646779531 scopus 로고    scopus 로고
    • Impulsivity and the self-defeating behavior of narcissists
    • DOI 10.1207/s15327957pspr1002-4
    • S. Vazire, and D.C. Funder Impulsivity and the self-defeating behavior of narcissists Personality & Social Psychology Review (Lawrence Erlbaum Associates) 10 2006 154 165 (Pubitemid 43764488)
    • (2006) Personality and Social Psychology Review , vol.10 , Issue.2 , pp. 154-165
    • Vazire, S.1    Funder, D.C.2
  • 43
    • 0041524980 scopus 로고    scopus 로고
    • Information Security Governance
    • DOI 10.1016/S1363-4127(01)00309-0
    • P. Williams Information security governance Information Security Technical Report 6 2001 60 70 10.1016/S1363-4127(01)00309-0 (Pubitemid 33663935)
    • (2001) Information Security Technical Report , vol.6 , Issue.3 , pp. 60-70
    • Williams, P.1
  • 44
    • 57649095360 scopus 로고    scopus 로고
    • In a 'trusting' environment, everyone is responsible for information security
    • 10.1016/j.istr.2008.10.009
    • P. Williams In a 'trusting' environment, everyone is responsible for information security Information Security Technical Report 13 2008 207 215 10.1016/j.istr.2008.10.009
    • (2008) Information Security Technical Report , vol.13 , pp. 207-215
    • Williams, P.1
  • 45
    • 84995871700 scopus 로고    scopus 로고
    • Gaining access with social engineering: An empirical study of the threat
    • 10.1080/1065890701788165
    • M. Workman Gaining access with social engineering: An empirical study of the threat Information Systems Security 16 2007 315 331 10.1080/1065890701788165
    • (2007) Information Systems Security , vol.16 , pp. 315-331
    • Workman, M.1
  • 46
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • 10.1016/j.chb.2008.04.005
    • M. Workman, W.H. Bommer, and D. Straub Security lapses and the omission of information security measures: A threat control model and empirical test Computers in Human Behavior 24 2008 2799 2816 10.1016/j.chb.2008.04.005
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.