메뉴 건너뛰기




Volumn 37, Issue 4, 2013, Pages 1189-1210

Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors

Author keywords

Behavioral information security; Cluster analysis; Multidimensional scaling; Protection motivated behaviors; Systematics; Taxonomy; Theory of diversity

Indexed keywords

CLUSTER ANALYSIS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84887697195     PISSN: 02767783     EISSN: 21629730     Source Type: Journal    
DOI: 10.25300/MISQ/2013/37.4.09     Document Type: Article
Times cited : (190)

References (139)
  • 1
    • 67649708310 scopus 로고    scopus 로고
    • The information security digital divide between information security managers and users
    • Albrechtsen, E., and Hovden, J. 2009. "The Information Security Digital Divide Between Information Security Managers and Users," Computers & Security (28:6), pp. 476-490.
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 476-490
    • Albrechtsen, E.1    Hovden, J.2
  • 2
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
    • Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 4
    • 44249110999 scopus 로고    scopus 로고
    • Establishing trust in electronic commerce through online word of mouth: An examination across genders
    • Awad, N. F., and Ragowsky, A. 2008. "Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders," Journal of Management Information Systems (24:4), pp. 101-121.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 101-121
    • Awad, N.F.1    Ragowsky, A.2
  • 5
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • Aytes, K., and Connolly, T. 2004. "Computer Security and Risky Computing Practices: A Rational Choice Perspective," Journal of Organizational and End User Computing (16:3), pp. 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 6
    • 0001156375 scopus 로고
    • Managing computer crime: A research outlook
    • Backhouse, J., and Dhillon, G. 1995. "Managing Computer Crime: A Research Outlook," Computers & Security (14:7), pp. 645-651.
    • (1995) Computers & Security , vol.14 , Issue.7 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 8
    • 0000293153 scopus 로고
    • The effects of risk probability, outcome severity, efficacy of protection and access to protection on decision making: A further test of protection motivation theory
    • Beck, K. H. 1984. "The Effects of Risk Probability, Outcome Severity, Efficacy of Protection and Access to Protection on Decision Making: A Further Test of Protection Motivation Theory," Social Behavior and Personality (12:2), pp. 121-125.
    • (1984) Social Behavior and Personality , vol.12 , Issue.2 , pp. 121-125
    • Beck, K.H.1
  • 9
    • 84953086245 scopus 로고
    • Information seeking among safety and health managers
    • Beck, K. H., and Feldman, R. H. 1983. "Information Seeking among Safety and Health managers," The Journal of Psychology (115:1), pp. 23-31.
    • (1983) The Journal of Psychology , vol.115 , Issue.1 , pp. 23-31
    • Beck, K.H.1    Feldman, R.H.2
  • 10
    • 67650100804 scopus 로고    scopus 로고
    • If someone is watching, i'll do what i'm asked: Mandatoriness, control, and information security
    • Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., and Boss, R. W. 2009. "If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security," European Journal of Information Systems (18:2), pp. 151-164.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 151-164
    • Boss, S.R.1    Kirsch, L.J.2    Angermeier, I.3    Shingler, R.A.4    Boss, R.W.5
  • 11
    • 70849104596 scopus 로고    scopus 로고
    • Effects of individual and organization based beliefs and the moderating role of work experience on insiders' good security behaviors
    • Vancouver, BC, Canada, August 29-31
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2009. "Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors," in Proceedings of the IEEE International Conference on Computational Science and Engineering, Vancouver, BC, Canada, August 29-31, pp. 476-481.
    • (2009) Proceedings of the IEEE International Conference on Computational Science and Engineering , pp. 476-481
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 12
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly (34:3), pp. 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 13
    • 84937549955 scopus 로고
    • The scree test for the number of factors
    • Cattell, R. B. 1966. "The Scree Test for the Number of Factors," Multivariate Behavioral Research (1:2), pp. 245-276.
    • (1966) Multivariate Behavioral Research , vol.1 , Issue.2 , pp. 245-276
    • Cattell, R.B.1
  • 14
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
    • Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004. "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," International Journal of Electronic Commerce (9:1), pp. 70-104.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 70-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 15
    • 3042724903 scopus 로고    scopus 로고
    • A paradigmatic and methodological examination of information systems research from 1991 to 2001
    • Chen, W., and Hirschheim, R. 2004. "A Paradigmatic and Methodological Examination of Information Systems Research from 1991 to 2001," Information Systems Journal (14:3), pp. 197-235.
    • (2004) Information Systems Journal , vol.14 , Issue.3 , pp. 197-235
    • Chen, W.1    Hirschheim, R.2
  • 17
    • 21044443622 scopus 로고    scopus 로고
    • A visual framework for knowledge discovery on the web: An empirical study of business intelligence exploration
    • Chung, W., Chen, H., and Nunamaker Jr., J. F. 2005. "A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration," Journal of Management Information Systems (21:4), pp. 57-84.
    • (2005) Journal of Management Information Systems , vol.21 , Issue.4 , pp. 57-84
    • Chung, W.1    Chen, H.2    Nunamaker Jr., J.F.3
  • 18
    • 0001878819 scopus 로고
    • A paradigm for developing better measures of marketing constructs
    • Churchill, G. A. 1979. "A Paradigm for Developing Better Measures of Marketing Constructs," Journal of Marketing Research (16:1), pp. 64-73.
    • (1979) Journal of Marketing Research , vol.16 , Issue.1 , pp. 64-73
    • Churchill, G.A.1
  • 21
    • 34848873123 scopus 로고    scopus 로고
    • Deterring internal information systems misuse
    • D'Arcy, J., and Hovav, A. 2007. "Deterring Internal Information Systems Misuse," Communications of the ACM (50:10), pp. 113-117.
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 113-117
    • D'Arcy, J.1    Hovav, A.2
  • 22
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research (20:1), pp. 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 23
    • 0035063716 scopus 로고    scopus 로고
    • Violation of safeguards by trusted personnel and understanding related information security concerns
    • Dhillon, G. 2001. "Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns," Computers & Security (20:2), pp. 165-172.
    • (2001) Computers & Security , vol.20 , Issue.2 , pp. 165-172
    • Dhillon, G.1
  • 24
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G., and Backhouse, J. 2000. "Information System Security Management in the New Millennium," Communications of the ACM (43:7), pp. 125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 25
    • 33744830087 scopus 로고    scopus 로고
    • Value-focused assessment of information system security in organizations
    • Dhillon, G., and Torkzadeh, G. 2006. "Value-Focused Assessment of Information System Security in Organizations," Information Systems Journal (16:3), pp. 293-314.
    • (2006) Information Systems Journal , vol.16 , Issue.3 , pp. 293-314
    • Dhillon, G.1    Torkzadeh, G.2
  • 27
    • 67650318762 scopus 로고    scopus 로고
    • User behavior towards protective information technologies: The role of national cultural differences
    • Dinev, T., Goo, J., Hu, Q., and Nam, K. 2009. "User Behavior Towards Protective Information Technologies: The Role of National Cultural Differences," Information Systems Journal (19:4), pp. 391-412.
    • (2009) Information Systems Journal , vol.19 , Issue.4 , pp. 391-412
    • Dinev, T.1    Goo, J.2    Hu, Q.3    Nam, K.4
  • 28
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • Dinev, T., and Hu, Q. 2007. "The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies," Journal of the Association for Information Systems (8:1), pp. 386-408.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.1 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 29
    • 21344483530 scopus 로고
    • Typologies as a unique form of theory building: Toward improved understanding and modeling
    • Doty, D. H., and Glick, W. H. 1994. "Typologies as a Unique Form of Theory Building: Toward Improved Understanding and Modeling," Academy of Management Review (19:2), pp. 230-251.
    • (1994) Academy of Management Review , vol.19 , Issue.2 , pp. 230-251
    • Doty, D.H.1    Glick, W.H.2
  • 30
    • 0034899986 scopus 로고    scopus 로고
    • Knowledge management strategies: Toward a taxonomy
    • Earl, M. 2001. "Knowledge Management Strategies: Toward a Taxonomy," Journal of Management Information Systems (18:1), pp. 215-233.
    • (2001) Journal of Management Information Systems , vol.18 , Issue.1 , pp. 215-233
    • Earl, M.1
  • 31
    • 0030130222 scopus 로고    scopus 로고
    • Mapping the intellectual structure of research in decision support systems through author cocitation analysis (1971-1993)
    • Eom, S. B. 1996. "Mapping the Intellectual Structure of Research in Decision Support Systems through Author Cocitation Analysis (1971-1993)," Decision Support Systems (16:4), pp. 315-338.
    • (1996) Decision Support Systems , vol.16 , Issue.4 , pp. 315-338
    • Eom, S.B.1
  • 32
    • 84880196111 scopus 로고    scopus 로고
    • Behavioral information security
    • L. J. Janczewski and A. M. Colarik (eds.), Hershey, PA: Idea Group Inc
    • Fagnot, I. J. 2008. "Behavioral Information Security," in Encyclopedia of Cyber Warfare and Cyber Terrorism, L. J. Janczewski and A. M. Colarik (eds.), Hershey, PA: Idea Group Inc., pp. 199-205.
    • (2008) Encyclopedia of Cyber Warfare and Cyber Terrorism , pp. 199-205
    • Fagnot, I.J.1
  • 33
    • 0030307361 scopus 로고    scopus 로고
    • An empirically derived taxonomy of information technology structure and its relationship to organizational structure
    • Fiedler, K. D., Grover, V., and Teng, J. T. C. 1996. "An Empirically Derived Taxonomy of Information Technology Structure and its Relationship to Organizational Structure," Journal of Management Information Systems (13:1), pp. 9-34.
    • (1996) Journal of Management Information Systems , vol.13 , Issue.1 , pp. 9-34
    • Fiedler, K.D.1    Grover, V.2    Teng, J.T.C.3
  • 35
    • 21844487262 scopus 로고
    • Protection motivation theory and adherence to medical treatment regimens for muscular dystrophy
    • Flynn, M. F., Lyman, R. D., and Prentice-Dunn, S. 1995. "Protection Motivation Theory and Adherence to Medical Treatment Regimens for Muscular Dystrophy," Journal of Social and Clinical Psychology (14:1), pp. 61-75.
    • (1995) Journal of Social and Clinical Psychology , vol.14 , Issue.1 , pp. 61-75
    • Flynn, M.F.1    Lyman, R.D.2    Prentice-Dunn, S.3
  • 36
    • 70949101472 scopus 로고    scopus 로고
    • The negative aspects of social exchange: An introduction to perceived organizational obstruction
    • Gibney, R., Zagenczyk, T. J., and Masters, M. F. 2009. "The Negative Aspects of Social Exchange: An Introduction to Perceived Organizational Obstruction," Group & Organization Management (34:6), pp. 665-697.
    • (2009) Group & Organization Management , vol.34 , Issue.6 , pp. 665-697
    • Gibney, R.1    Zagenczyk, T.J.2    Masters, M.F.3
  • 37
    • 63849106909 scopus 로고    scopus 로고
    • Rethinking organisational size in is research: Meaning, measurement and redevelopment
    • Goode, S., and Gregor, S. 2009. "Rethinking Organisational Size in IS Research: Meaning, Measurement and Redevelopment," European Journal of Information Systems (18:1), pp. 4-25.
    • (2009) European Journal of Information Systems , vol.18 , Issue.1 , pp. 4-25
    • Goode, S.1    Gregor, S.2
  • 39
    • 33846102423 scopus 로고    scopus 로고
    • The nature of theory in information systems
    • Gregor, S. 2006. "The Nature of Theory in Information Systems," MIS Quarterly (30:3), pp. 611-642.
    • (2006) MIS Quarterly , vol.30 , Issue.3 , pp. 611-642
    • Gregor, S.1
  • 41
  • 42
    • 0000474891 scopus 로고
    • General attitudes and organizational withdrawal: An evaluation of a causal model
    • Hanisch, K. A., and Hulin, C. L. 1991. "General Attitudes and Organizational Withdrawal: An Evaluation of a Causal Model," Journal of Vocational Behavior (39:1), pp. 110-128.
    • (1991) Journal of Vocational Behavior , vol.39 , Issue.1 , pp. 110-128
    • Hanisch, K.A.1    Hulin, C.L.2
  • 43
    • 0032148410 scopus 로고    scopus 로고
    • The importance of individuals' repertoires of behaviors: The scientific appropriateness of studying multiple behaviors and general attitudes
    • Hanisch, K. A., Hulin, C. L., and Roznowski, M. 1998. "The Importance of Individuals' Repertoires of Behaviors: The Scientific Appropriateness of Studying Multiple Behaviors and General Attitudes," Journal of Organizational Behavior (19:5), pp. 463-480.
    • (1998) Journal of Organizational Behavior , vol.19 , Issue.5 , pp. 463-480
    • Hanisch, K.A.1    Hulin, C.L.2    Roznowski, M.3
  • 44
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., and Rao, H. R. 2009a. "Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness," Decision Support Systems (47:2), pp. 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 45
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., and Rao, H. R. 2009b. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations," European Journal of Information Systems (28:2), pp. 106-125.
    • (2009) European Journal of Information Systems , vol.28 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 46
    • 0040157746 scopus 로고    scopus 로고
    • A multidirectional approach toward leadership: An extension of the concept of behavioral complexity
    • Hooijberg, R. 1996. "A Multidirectional Approach Toward Leadership: An Extension of the Concept of Behavioral Complexity," Human Relations (49:7), pp. 917-946.
    • (1996) Human Relations , vol.49 , Issue.7 , pp. 917-946
    • Hooijberg, R.1
  • 47
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence work in reducing information security policy abuse by employees?
    • Hu, Q., Xu, Z., Dinev, T., and Ling, H. 2011. "Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?," Communications of the ACM (54:6), pp. 54-60.
    • (2011) Communications of the ACM , vol.54 , Issue.6 , pp. 54-60
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 48
    • 33750442910 scopus 로고    scopus 로고
    • Expertise visualization: An implementation and study based on cognitive fit theory
    • Huang, Z., Chen, H., Guo, F., Xu, J. J., Wu, S., and Chen, W. H. 2006. "Expertise Visualization: An Implementation and Study Based on Cognitive Fit Theory," Decision Support Systems (42:3), pp. 1539-1557.
    • (2006) Decision Support Systems , vol.42 , Issue.3 , pp. 1539-1557
    • Huang, Z.1    Chen, H.2    Guo, F.3    Xu, J.J.4    Wu, S.5    Chen, W.H.6
  • 49
    • 33751161222 scopus 로고    scopus 로고
    • A longitudinal study of information system threat categories: The enduring problem of human error
    • Im, G. P., and Baskerville, R. L. 2005. "A Longitudinal Study of Information System Threat Categories: The Enduring Problem of Human Error," The DATA BASE for Advances in Information Systems (36:4), pp. 68-79.
    • (2005) The DATA BASE for Advances in Information Systems , vol.36 , Issue.4 , pp. 68-79
    • Im, G.P.1    Baskerville, R.L.2
  • 50
    • 84887648358 scopus 로고    scopus 로고
    • ITRC. Identity Theft Resource Center, San Diego, CA
    • ITRC. 2012. "2012 ITRC Breach Reports," Identity Theft Resource Center, San Diego, CA.
    • (2012) 2012 ITRC Breach Reports
  • 51
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A. C., and Warkentin, M. E. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:2), pp. 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.2 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.E.2
  • 52
    • 54449093990 scopus 로고    scopus 로고
    • Personality traits and concern for privacy: An empirical study in the context of location-based services
    • Junglas, I. A., Johnson, N. A., and Spitzmuller, C. 2008. "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services," European Journal of Information Systems (17:4), pp. 387-402.
    • (2008) European Journal of Information Systems , vol.17 , Issue.4 , pp. 387-402
    • Junglas, I.A.1    Johnson, N.A.2    Spitzmuller, C.3
  • 54
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic, A. G., and Clark, J. G. 2004. "Why There Aren't More Information Security Research Studies," Information & Management (41:5), pp. 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 55
    • 84887717353 scopus 로고    scopus 로고
    • 2011 kroll global fraud report
    • Kroll Advisory Solutions, Kroll Advisory Solutions, New York, NY
    • Kroll Advisory Solutions. 2011. "2011 Kroll Global Fraud Report," in Fraud, Forensics & Compliance, Kroll Advisory Solutions, New York, NY.
    • (2011) Fraud, Forensics & Compliance
  • 56
    • 0003139452 scopus 로고
    • The relationship between multidimensional scaling and clustering
    • J. V. Ryzin (ed.), New York: Academic Press
    • Kruskal, J. B. 1977. "The Relationship Between Multidimensional Scaling and Clustering," in Classification and Clustering, J. V. Ryzin (ed.), New York: Academic Press, pp. 17-44.
    • (1977) Classification and Clustering , pp. 17-44
    • Kruskal, J.B.1
  • 58
    • 0041371655 scopus 로고
    • Understanding qualitative data: A framework of text analysis methods
    • Lacity, M. C., and Janson, M. A. 1994. "Understanding Qualitative Data: A Framework of Text Analysis Methods," Journal of Management Information Systems (11:2), pp. 137-155.
    • (1994) Journal of Management Information Systems , vol.11 , Issue.2 , pp. 137-155
    • Lacity, M.C.1    Janson, M.A.2
  • 60
    • 0242573536 scopus 로고    scopus 로고
    • A taxonomy of antecedents of information systems success: Variable analysis studies
    • Larsen, K. R. T. 2003. "A Taxonomy of Antecedents of Information Systems Success: Variable Analysis Studies," Journal of Management Information Systems (20:2), pp. 169-246.
    • (2003) Journal of Management Information Systems , vol.20 , Issue.2 , pp. 169-246
    • Larsen, K.R.T.1
  • 61
    • 0141860786 scopus 로고    scopus 로고
    • Generalizing generalizability in information systems research
    • Lee, A. S., and Baskerville, R. L. 2003. "Generalizing Generalizability in Information Systems Research," Information Systems Research (14:3), pp. 221-243.
    • (2003) Information Systems Research , vol.14 , Issue.3 , pp. 221-243
    • Lee, A.S.1    Baskerville, R.L.2
  • 62
    • 40049109336 scopus 로고    scopus 로고
    • An empirical investigation of anti-spyware software adoption: A multitheoretical perspective
    • Lee, Y., and Kozar, K. A. 2008. "An Empirical Investigation of Anti-Spyware Software Adoption: A Multitheoretical Perspective," Information & Management (45:2), pp. 109-119.
    • (2008) Information & Management , vol.45 , Issue.2 , pp. 109-119
    • Lee, Y.1    Kozar, K.A.2
  • 63
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of smb executives' decision to adopt anti- malware software
    • Lee, Y., and Larsen, K. R. 2009. "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti- Malware Software," European Journal of Information Systems (18:2), pp. 177-187.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 177-187
    • Lee, Y.1    Larsen, K.R.2
  • 64
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • Liang, H., and Xue, Y. 2009. "Avoidance of Information Technology Threats: A Theoretical Perspective," MIS Quarterly (33:1), pp. 71-90.
    • (2009) MIS Quarterly , vol.33 , Issue.1 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 66
    • 0032378420 scopus 로고    scopus 로고
    • Some possible antecedents and consequences of in-role and extra- role salesperson performance
    • MacKenzie, S. B., Podsakoff, P. M., and Ahearne, M. 1998. "Some Possible Antecedents and Consequences of In-Role and Extra- Role Salesperson Performance," Journal of Marketing (62:3), pp. 87-98.
    • (1998) Journal of Marketing , vol.62 , Issue.3 , pp. 87-98
    • Mackenzie, S.B.1    Podsakoff, P.M.2    Ahearne, M.3
  • 67
    • 0000149877 scopus 로고
    • A program for research on management information systems
    • Mason, R. O., and Mitroff, I. I. 1973. "A Program for Research on Management Information Systems," Management Science (19:5), pp. 475-487.
    • (1973) Management Science , vol.19 , Issue.5 , pp. 475-487
    • Mason, R.O.1    Mitroff, I.I.2
  • 68
    • 77949491745 scopus 로고    scopus 로고
    • Types of business-to-business e-marketplaces: The role of a theory-based, domain-specific model
    • Matook, S., and Vessey, I. 2008. "Types of Business-to-Business E-Marketplaces: The Role of a Theory-Based, Domain-Specific Model," Journal of Electronic Commerce Research (9:4), pp. 260-279.
    • (2008) Journal of Electronic Commerce Research , vol.9 , Issue.4 , pp. 260-279
    • Matook, S.1    Vessey, I.2
  • 70
    • 0011629953 scopus 로고
    • Organizational systematics: Taxonomic lessons from biology
    • McKelvey, B. 1978. "Organizational Systematics: Taxonomic Lessons from Biology," Management Science (24:13), pp. 1428-1440.
    • (1978) Management Science , vol.24 , Issue.13 , pp. 1428-1440
    • McKelvey, B.1
  • 72
    • 77957076927 scopus 로고    scopus 로고
    • Information about information: A taxonomy of views
    • McKinney, E., and Yoos, C. 2010. "Information About Information: A Taxonomy of Views," MIS Quarterly (34:2), pp. 329-344.
    • (2010) MIS Quarterly , vol.34 , Issue.2 , pp. 329-344
    • McKinney, E.1    Yoos, C.2
  • 73
    • 21844506930 scopus 로고
    • The role of dispositional and situational antecedents in prosocial organizational behavior: An examination of the intended beneficiaries of prosocial behavior
    • McNeely, B. L., and Meglino, B. M. 1994. "The Role of Dispositional and Situational Antecedents in Prosocial Organizational Behavior: An Examination of the Intended Beneficiaries of Prosocial Behavior," Journal of Applied Psychology (79:6), pp. 836-844.
    • (1994) Journal of Applied Psychology , vol.79 , Issue.6 , pp. 836-844
    • McNeely, B.L.1    Meglino, B.M.2
  • 77
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
    • Milne, S., Sheeran, P., and Orbell, S. 2000. "Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory," Journal of Applied Social Psychology (30:1), pp. 106-143.
    • (2000) Journal of Applied Social Psychology , vol.30 , Issue.1 , pp. 106-143
    • Milne, S.1    Sheeran, P.2    Orbell, S.3
  • 78
    • 0035599029 scopus 로고    scopus 로고
    • Combining is research methods: Towards a pluralist methodology
    • Mingers, J. 2001. "Combining IS Research Methods: Towards a Pluralist Methodology," Information Systems Research (12:3), pp. 240-259.
    • (2001) Information Systems Research , vol.12 , Issue.3 , pp. 240-259
    • Mingers, J.1
  • 80
    • 0010100431 scopus 로고
    • Role definitions and organizational citizenship behavior: The importance of the employee's perspective
    • Morrison, E. W. 1994. "Role Definitions and Organizational Citizenship Behavior: The Importance of the Employee's Perspective," Academy of Management Journal (37:6), pp. 1543-1567.
    • (1994) Academy of Management Journal , vol.37 , Issue.6 , pp. 1543-1567
    • Morrison, E.W.1
  • 81
    • 33846313618 scopus 로고    scopus 로고
    • The qualitative interview in is research: Examining the craft
    • Myers, M. D., and Newman, M. 2007. "The Qualitative Interview in IS Research: Examining the Craft," Information and Organization (17:1), pp. 2-26.
    • (2007) Information and Organization , vol.17 , Issue.1 , pp. 2-26
    • Myers, M.D.1    Newman, M.2
  • 82
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance, A. 2009. "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study," European Journal of Information Systems (18:2), pp. 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 83
    • 21144477183 scopus 로고
    • Explaining the whistle-blowing process: Suggestions from power theory and justice theory
    • Near, J. P., Dworkin, T. M., and Miceli, J. P. 1993. "Explaining the Whistle-Blowing Process: Suggestions from Power Theory and Justice Theory," Organization Science (4:3), pp. 393-411.
    • (1993) Organization Science , vol.4 , Issue.3 , pp. 393-411
    • Near, J.P.1    Dworkin, T.M.2    Miceli, J.P.3
  • 84
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Ng, B. Y., Kankanhalli, A., and Xu, Y. 2009. "Studying Users' Computer Security Behavior: A Health Belief Perspective," Decision Support Systems (46:4), pp. 815-825.
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.Y.1    Kankanhalli, A.2    Xu, Y.3
  • 87
    • 71549126429 scopus 로고
    • Studying information technology in organizations: Research approaches and assumptions
    • Orlikowski, W. J., and Baroudi, J. J. 1991. "Studying Information Technology in Organizations: Research Approaches and Assumptions," Information Systems Research (2:1), pp. 1-28.
    • (1991) Information Systems Research , vol.2 , Issue.1 , pp. 1-28
    • Orlikowski, W.J.1    Baroudi, J.J.2
  • 88
    • 33748811786 scopus 로고
    • Ethical standards for information systems professionals: A case for a unified code
    • Oz, E. 1992. "Ethical Standards for Information Systems Professionals: A Case for a Unified Code," MIS Quarterly (16:4), pp. 423-433.
    • (1992) MIS Quarterly , vol.16 , Issue.4 , pp. 423-433
    • Oz, E.1
  • 89
    • 36349016612 scopus 로고    scopus 로고
    • Differentiation via technology: Strategic positioning of services following the introduction of disruptive technology
    • Padgett, D., and Mulvey, M.S. 2007. "Differentiation via Technology: Strategic Positioning of Services Following the Introduction of Disruptive Technology," Journal of Retailing (83:4), pp. 375-391.
    • (2007) Journal of Retailing , vol.83 , Issue.4 , pp. 375-391
    • Padgett, D.1    Mulvey, M.S.2
  • 91
    • 84887767879 scopus 로고    scopus 로고
    • Deltek: Cybersecurity spending should grow
    • December 11
    • Peterson, D. 2011. "Deltek: Cybersecurity Spending Should Grow," Washington Post, Business Section, December 11.
    • (2011) Washington Post, Business Section
    • Peterson, D.1
  • 92
    • 77952042701 scopus 로고    scopus 로고
    • The online community self-disclosure model: The case of working professionals in france and the uk who use online communities
    • Posey, C., Lowry, P. B., Roberts, T. L., and Ellis, T. S. 2010. "The Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities," European Journal of Information Systems (19:2), pp. 181-195.
    • (2010) European Journal of Information Systems , vol.19 , Issue.2 , pp. 181-195
    • Posey, C.1    Lowry, P.B.2    Roberts, T.L.3    Ellis, T.S.4
  • 93
    • 84887807314 scopus 로고    scopus 로고
    • Operations security
    • H. F. Tipton and K. Henry (eds.), Boca Raton, FL: Auerbach
    • Price, S. M. 2007. "Operations Security," in Official (ISC)2 Guide to the CISSP CBK, H. F. Tipton and K. Henry (eds.), Boca Raton, FL: Auerbach, pp. 633-681.
    • (2007) Official (ISC)2 Guide to the CISSP CBK , pp. 633-681
    • Price, S.M.1
  • 94
    • 0036899071 scopus 로고    scopus 로고
    • Executives' perceptions of uncertainty sources: A numerical taxonomy and underlying dimensions
    • Priem, R. L., Love, L. G., and Shaffer, M. A. 2002. "Executives' Perceptions of Uncertainty Sources: A Numerical Taxonomy and Underlying Dimensions," Journal of Management (28:6), pp. 725-746.
    • (2002) Journal of Management , vol.28 , Issue.6 , pp. 725-746
    • Priem, R.L.1    Love, L.G.2    Shaffer, M.A.3
  • 96
    • 84925891222 scopus 로고
    • An introduction to nonmetric multidimensional scaling
    • Rabinowitz, G. B. 1975. "An Introduction to Nonmetric Multidimensional Scaling," American Journal of Political Science (19:2), pp. 343-390.
    • (1975) American Journal of Political Science , vol.19 , Issue.2 , pp. 343-390
    • Rabinowitz, G.B.1
  • 97
    • 61349185822 scopus 로고    scopus 로고
    • Antecedents and outcomes of retaliation against whistleblowers: Gender differences and power relationships
    • Rehg, M. T., Miceli, M. P., Near, J. P., and Scotter, J. R. V. 2008. "Antecedents and Outcomes of Retaliation Against Whistleblowers: Gender Differences and Power Relationships," Organization Science (19:2), pp. 221-240.
    • (2008) Organization Science , vol.19 , Issue.2 , pp. 221-240
    • Rehg, M.T.1    Miceli, M.P.2    Near, J.P.3    Scotter, J.R.V.4
  • 98
    • 0003194268 scopus 로고
    • Relating electronic mail use and network structure to r&d work networks and performance
    • Rice, R. E. 1994. "Relating Electronic Mail Use and Network Structure to R&D Work Networks and Performance," Journal of Management Information Systems (11:1), pp. 9-29.
    • (1994) Journal of Management Information Systems , vol.11 , Issue.1 , pp. 9-29
    • Rice, R.E.1
  • 99
    • 21844526560 scopus 로고
    • A typology of deviant workplace behaviors: A multidimensional scaling study
    • Robinson, S. L., and Bennett, R. J. 1995. "A Typology of Deviant Workplace Behaviors: A Multidimensional Scaling Study," Academy of Management Journal (38:2), pp. 555-572.
    • (1995) Academy of Management Journal , vol.38 , Issue.2 , pp. 555-572
    • Robinson, S.L.1    Bennett, R.J.2
  • 100
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology (91:1), pp. 93-114.
    • (1975) The Journal of Psychology , vol.91 , Issue.1 , pp. 93-114
    • Rogers, R.W.1
  • 101
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
    • J. T. Cacioppo and R. E. Petty (eds.), New York: Guilford
    • Rogers, R. W. 1983. "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A Sourcebook, J. T. Cacioppo and R. E. Petty (eds.), New York: Guilford, pp. 153-176.
    • (1983) Social Psychophysiology: A Sourcebook , pp. 153-176
    • Rogers, R.W.1
  • 108
    • 75349114163 scopus 로고    scopus 로고
    • Using social marketing to enhance hotel reuse programs
    • Shang, J., Basil, D. Z., and Wymer, W. 2010. "Using Social Marketing to Enhance Hotel Reuse Programs," Journal of Business Research (63:2), pp. 166-172.
    • (2010) Journal of Business Research , vol.63 , Issue.2 , pp. 166-172
    • Shang, J.1    Basil, D.Z.2    Wymer, W.3
  • 109
    • 0010886652 scopus 로고    scopus 로고
    • The insider threat to information systems: The psychology of the dangerous insider
    • Shaw, E., Ruby, K. G., and Post, J. M. 1998. "The Insider Threat to Information Systems: The Psychology of the Dangerous Insider," Security Awareness Bulletin (2-98), pp. 1-10.
    • (1998) Security Awareness Bulletin , vol.2 , Issue.98 , pp. 1-10
    • Shaw, E.1    Ruby, K.G.2    Post, J.M.3
  • 110
    • 77956755581 scopus 로고
    • Changes in taxonomy and nomenclature of important genera of plant pathogens
    • Shoemaker, R. A. 1981. "Changes in Taxonomy and Nomenclature of Important Genera of Plant Pathogens," Annual Review of Phytopathology (19:1), pp. 297-307.
    • (1981) Annual Review of Phytopathology , vol.19 , Issue.1 , pp. 297-307
    • Shoemaker, R.A.1
  • 112
    • 36248967046 scopus 로고    scopus 로고
    • Employees' adherence to information security policies: An empirical study
    • H. Venter, M. Eloff, L. Labuschagne, J. Eloff and R. von Solms (eds.), Boston: Springer
    • Siponen, M., Pahnila, S., and Mahmood, A. 2007. "Employees' Adherence to Information Security Policies: An Empirical Study," in New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff and R. von Solms (eds.), Boston: Springer, pp. 133-144.
    • (2007) New Approaches for Security, Privacy and Trust in Complex Environments , pp. 133-144
    • Siponen, M.1    Pahnila, S.2    Mahmood, A.3
  • 113
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen, M., and Vance, A. 2010. "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly (34:3), pp. 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 114
    • 0013294343 scopus 로고    scopus 로고
    • Revolution or evolution? A comparison of object-oriented and structured systems development methods
    • Sircar, S., Nerur, S. P., and Mahapatra, R. 2001. "Revolution or Evolution? A Comparison of Object-Oriented and Structured Systems Development Methods," MIS Quarterly (25:4), pp. 457-471.
    • (2001) MIS Quarterly , vol.25 , Issue.4 , pp. 457-471
    • Sircar, S.1    Nerur, S.P.2    Mahapatra, R.3
  • 115
    • 50249151484 scopus 로고    scopus 로고
    • Internet users' information privacy-protective responses: A taxonomy and a nomological model
    • Son, J. Y., and Kim, S. S. 2008. "Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model," MIS Quarterly (32:3), pp. 503-529.
    • (2008) MIS Quarterly , vol.32 , Issue.3 , pp. 503-529
    • Son, J.Y.1    Kim, S.S.2
  • 116
    • 77957070672 scopus 로고    scopus 로고
    • User participation in is security risk management
    • Spears, J. L., and Barki, H. 2010. "User Participation in IS Security Risk Management," MIS Quarterly (34:3), pp. 503-522.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 120
    • 0000280419 scopus 로고
    • Effective is security
    • Straub, D. W. 1990. "Effective IS Security," Information Systems Research (1:3), pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 122
    • 53349102510 scopus 로고
    • Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
    • Straub, D. W., and Collins, R. W. 1990. "Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy," MIS Quarterly (14:2), pp. 143-156.
    • (1990) MIS Quarterly , vol.14 , Issue.2 , pp. 143-156
    • Straub, D.W.1    Collins, R.W.2
  • 123
    • 0037707050 scopus 로고    scopus 로고
    • The repertory grid technique: A method for the study of cognition in information systems
    • Tan, F. B., and Hunter, M. G. 2002. "The Repertory Grid Technique: A Method for the Study of Cognition in Information Systems," MIS Quarterly (26:1), pp. 39-57.
    • (2002) MIS Quarterly , vol.26 , Issue.1 , pp. 39-57
    • Tan, F.B.1    Hunter, M.G.2
  • 124
    • 84887798288 scopus 로고    scopus 로고
    • Cluster analysis and multidimensional scaling
    • N. H. Timm (ed.), New York: Springer
    • Timm, N. H. 2002. "Cluster Analysis and Multidimensional Scaling," in Applied Multivariate Analysis, N. H. Timm (ed.), New York: Springer, pp. 515-555.
    • (2002) Applied Multivariate Analysis , pp. 515-555
    • Timm, N.H.1
  • 126
    • 0344641263 scopus 로고
    • General organizational classification: An empirical test using the united states and japanese electronics industries
    • Ulrich, D., and McKelvey, B. 1990. "General Organizational Classification: An Empirical Test Using the United States and Japanese Electronics Industries," Organization Science (1:1), pp. 99-118.
    • (1990) Organization Science , vol.1 , Issue.1 , pp. 99-118
    • Ulrich, D.1    McKelvey, B.2
  • 127
    • 9744222169 scopus 로고
    • Extra- role behaviors: In pursuit of construct and definitional clarity (a bridge over muddied waters)
    • L. L. Cummings and B. M. Staw (eds.), Greenwich, CT: JAI Press
    • Van Dyne, L., Cummings, L. L., and Parks, J. M. 1995. "Extra- Role Behaviors: In Pursuit of Construct and Definitional Clarity (A Bridge Over Muddied Waters)," in Research in Organizational Behavior (Volume 17), L. L. Cummings and B. M. Staw (eds.), Greenwich, CT: JAI Press, pp. 215-285.
    • (1995) Research in Organizational Behavior , vol.17 , pp. 215-285
    • Van Dyne, L.1    Cummings, L.L.2    Parks, J.M.3
  • 128
    • 77951209282 scopus 로고    scopus 로고
    • Information security culture: A management perspective
    • Van Niekerk, J. F., and von Solms, R. 2010. "Information Security Culture: A Management Perspective " Computers & Security (29:4), pp. 476-486.
    • (2010) Computers & Security , vol.29 , Issue.4 , pp. 476-486
    • Van Niekerk, J.F.1    Von Solms, R.2
  • 129
    • 84887741949 scopus 로고    scopus 로고
    • Veriphyr survey finds more than 70 percent of healthcare providers suffered privacy breach in past 12 months
    • Veriphyr, August 31, Veriphyr, Los Altos, CA
    • Veriphyr. 2011. "Veriphyr Survey Finds More than 70 Percent of Healthcare Providers Suffered Privacy Breach in Past 12 Months," Press Release, August 31, Veriphyr, Los Altos, CA.
    • (2011) Press Release
  • 130
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • Vroom, C., and von Solms, R. 2004. "Towards Information Security Behavioural Compliance," Computers & Security (23:3), pp. 191-198.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 131
    • 0029749803 scopus 로고    scopus 로고
    • Ethical theory, codes of ethics and is practice
    • Walsham, G. 1996. "Ethical Theory, Codes of Ethics and IS Practice," Information Systems Journal (6:1), pp. 69-81.
    • (1996) Information Systems Journal , vol.6 , Issue.1 , pp. 69-81
    • Walsham, G.1
  • 132
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • Warkentin, M., and Willison, R. 2009. "Behavioral and Policy Issues in Information Systems Security: The Insider Threat," European Journal of Information Systems (18:2), pp. 101-105.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 133
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • Whitman, M. E. 2003. "Enemy at the Gate: Threats to Information Security," Communications of the ACM (46:8), pp. 91-95.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1
  • 134
    • 70149119150 scopus 로고    scopus 로고
    • Overcoming the insider: Reducing employee computer crime through situational crime prevention
    • Willison, R., and Siponen, M. 2009. "Overcoming the Insider: Reducing Employee Computer Crime through Situational Crime Prevention," Communications of the ACM (52:9), pp. 133-137.
    • (2009) Communications of the ACM , vol.52 , Issue.9 , pp. 133-137
    • Willison, R.1    Siponen, M.2
  • 136
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., Bommer, W. H., and Straub, D. W. 2008. "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test," Computers in Human Behavior (24:6), pp. 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.W.3
  • 137
    • 0011467689 scopus 로고
    • Eliciting and modelling expert knowledge
    • Wright, G., and Ayton, P. 1987. "Eliciting and Modelling Expert Knowledge," Decision Support Systems (3:1), pp. 13-26.
    • (1987) Decision Support Systems , vol.3 , Issue.1 , pp. 13-26
    • Wright, G.1    Ayton, P.2
  • 138
    • 77954212699 scopus 로고    scopus 로고
    • Wearing many hats: Supply managers' behavioral complexity and its impact on supplier relationships
    • Wu, Z., Steward, M., and Hartley, J. 2010. "Wearing Many Hats: Supply Managers' Behavioral Complexity and its Impact on Supplier Relationships," Journal of Business Research (63:8), pp. 817-823.
    • (2010) Journal of Business Research , vol.63 , Issue.8 , pp. 817-823
    • Wu, Z.1    Steward, M.2    Hartley, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.