메뉴 건너뛰기




Volumn 3, Issue , 2007, Pages 1452-1459

The it security adoption conundrum: An initial step toward validation of applicable measures

Author keywords

Assurance; Behavior; Construct; Formative; Individual; Reflective; Scale; Security; TAM; Technology adoption; UTAUT; Validation; Validity

Indexed keywords

ASSURANCE; BEHAVIOR; CONSTRUCT; FORMATIVE; INDIVIDUAL; REFLECTIVE; SCALE; SECURITY; TAM; TECHNOLOGY ADOPTION; UTAUT; VALIDATION; VALIDITY;

EID: 84870167456     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (21)
  • 1
  • 3
    • 55249087535 scopus 로고
    • Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
    • Davis, F. D. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly (13:3), 1989, pp. 319-339.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-339
    • Davis, F.D.1
  • 4
    • 33645589662 scopus 로고    scopus 로고
    • A Prototype Tool for Information Security Awareness and Training
    • Furnell, S. M., Gennatou, M., and Dowland, P. S. "A Prototype Tool for Information Security Awareness and Training," Logistics Information Management (15:6), 2002, pp. 352-357.
    • (2002) Logistics Information Management , vol.15 , Issue.6 , pp. 352-357
    • Furnell, S.M.1    Gennatou, M.2    Dowland, P.S.3
  • 5
    • 84871032505 scopus 로고    scopus 로고
    • Google Scholar. Search conducted March 3, accessed at
    • Google Scholar. Search conducted March 3, 2007, accessed at http://scholar.google.com/scholar?hl=en&lr=&q=Perceived+usefulness%2C+perceived+ease+of+use%2C+and+user+acceptance+of+information+technology.&btnG=Search
    • (2007)
  • 6
    • 0242424963 scopus 로고    scopus 로고
    • A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research
    • Jarvis, C. B., Mackenzie, S. B., and Podsakoff, P. M. "A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research, Journal of Consumer Research (30:2), 2003, pp. 199-218.
    • (2003) Journal of Consumer Research , vol.30 , Issue.2 , pp. 199-218
    • Jarvis, C.B.1    Mackenzie, S.B.2    Podsakoff, P.M.3
  • 7
    • 33846005128 scopus 로고    scopus 로고
    • Reconceptualizing Compatibility Beliefs in Technology Acceptance Research
    • Karahanna, E., Agarwal, R., and Angst, C. "Reconceptualizing Compatibility Beliefs in Technology Acceptance Research," MIS Quarterly (30:4), 2006, pp. 781-804.
    • (2006) MIS Quarterly , vol.30 , Issue.4 , pp. 781-804
    • Karahanna, E.1    Agarwal, R.2    Angst, C.3
  • 8
    • 84870224179 scopus 로고    scopus 로고
    • Legal Issues Alone Are Not Enough to Manage Computer Fraud Committed by Employees
    • Kesar, S. "Legal Issues Alone Are Not Enough to Manage Computer Fraud Committed by Employees," Journal of International Commercial Law and Technology (1:1), 2006, pp. 25-40.
    • (2006) Journal of International Commercial Law and Technology , vol.1 , Issue.1 , pp. 25-40
    • Kesar, S.1
  • 9
    • 0345764837 scopus 로고    scopus 로고
    • Improving Security Use Behavior
    • Leach, J. "Improving Security Use Behavior," Computers & Security (22:8), 2003, pp. 685-693.
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-693
    • Leach, J.1
  • 10
    • 0037322632 scopus 로고    scopus 로고
    • Diffusing the Internet in the Arab World: The Role of Social Norms and Technological Culturation
    • Loch, K. D., Straub, D. W., Kamel, S. "Diffusing the Internet in the Arab World: The Role of Social Norms and Technological Culturation," IEEE Transactions on Engineering Management (50:1), 2003, pp. 45-63.
    • (2003) IEEE Transactions On Engineering Management , vol.50 , Issue.1 , pp. 45-63
    • Loch, K.D.1    Straub, D.W.2    Kamel, S.3
  • 11
    • 33846704341 scopus 로고    scopus 로고
    • IT Security: In Search of the Holy Grail
    • Oppliger, R. "IT Security: In Search of the Holy Grail," Communications of the ACM (50:2), 2007, pp. 96-98.
    • (2007) Communications of the ACM , vol.50 , Issue.2 , pp. 96-98
    • Oppliger, R.1
  • 12
    • 29444459006 scopus 로고    scopus 로고
    • Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role
    • Pavlou, P., and Gefen, D. "Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role," Information Systems Research (16:4), 2005, pp. 372-399.
    • (2005) Information Systems Research , vol.16 , Issue.4 , pp. 372-399
    • Pavlou, P.1    Gefen, D.2
  • 14
    • 49249132931 scopus 로고    scopus 로고
    • Intrusion Detection Technology: Leveraging the Organization's Security Posture
    • Rosenthal, D. A. "Intrusion Detection Technology: Leveraging the Organization's Security Posture," Information Systems Management (19:1), 2002, pp. 35-44.
    • (2002) Information Systems Management , vol.19 , Issue.1 , pp. 35-44
    • Rosenthal, D.A.1
  • 15
    • 53049103906 scopus 로고    scopus 로고
    • Five Dimensions of Information Security Awareness
    • Siponen, M. T. "Five Dimensions of Information Security Awareness," Computers and Society (31:2), 2001, pp. 24-29.
    • (2001) Computers and Society , vol.31 , Issue.2 , pp. 24-29
    • Siponen, M.T.1
  • 16
    • 33845962305 scopus 로고    scopus 로고
    • A Meta-Analysis of the Technology Acceptance Model: Investigating Subjective Norm and Moderation Effects
    • Schepers, J., and Wetzels, M. "A Meta-Analysis of the Technology Acceptance Model: Investigating Subjective Norm and Moderation Effects," Information & Management (44:1), 2007, pp. 90-103.
    • (2007) Information & Management , vol.44 , Issue.1 , pp. 90-103
    • Schepers, J.1    Wetzels, M.2
  • 18
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Management Decision Making
    • Straub, D. W., and Welke, R. J. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), 1998, pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 19
    • 1542382496 scopus 로고    scopus 로고
    • User Acceptance of Information Technology: Toward a Unified View
    • Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly (27:3), 2003, pp. 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 20
    • 2642569127 scopus 로고    scopus 로고
    • Introducing the Check-off Password System (COPS): An Advancement in User Authentication Methods and Information Security
    • Warkentin, M., Davis, K., and Bekkering, E. "Introducing the Check-off Password System (COPS): An Advancement in User Authentication Methods and Information Security," Journal of Organizational & End User Computing (16:3), 2004, pp. 41-58.
    • (2004) Journal of Organizational & End User Computing , vol.16 , Issue.3 , pp. 41-58
    • Warkentin, M.1    Davis, K.2    Bekkering, E.3
  • 21
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the Gates: Threats to Information Security
    • Whitman, M. Enemy at the Gates: Threats to Information Security, Communications of the ACM (46:8), 2003, pp. 91-95.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.