메뉴 건너뛰기




Volumn 3, Issue , 2013, Pages 2222-2237

Information security awareness: Its antecedents and mediating effects on security compliant behavior

Author keywords

Information security awareness; Information security behavior; Information security policy; Information security training

Indexed keywords

BEHAVIORAL INTENTION; COMPLIANT BEHAVIOR; INFORMATION SECURITY AWARENESS; INFORMATION SECURITY POLICIES; INFORMATION SECURITY TRAININGS; MEDIATING EFFECT; MEDIATING ROLES; SECURITY ISSUES;

EID: 84897802746     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (44)

References (57)
  • 1
    • 79958712599 scopus 로고    scopus 로고
    • Attack Intelligence Research Center Annual Threat Report: 2008 Overview and 2009 Predictions
    • AIRC., Alladin Knowledge Systems, Belcamp, MD (available online at
    • AIRC. 2008. Attack Intelligence Research Center Annual Threat Report: 2008 Overview and 2009 Predictions, Attack Intelligence Research Center, Alladin Knowledge Systems, Belcamp, MD (available online at http://www. aladdin. com/pdf/airc/AIRC-Annual-Threat-Report2008. pdf).
    • (2008) Attack Intelligence Research Center
  • 3
    • 41649112685 scopus 로고
    • Structural equation modeling in practice: A review and recommended two-step approach
    • Anderson, J. C., and Gerbing, D. W. 1988. "Structural equation modeling in practice: A review and recommended two-step approach, " Psychological Bulletin (103: 3), pp. 411-423.
    • (1988) Psychological Bulletin , vol.103 , Issue.3 , pp. 411-423
    • Anderson, J.C.1    Gerbing, D.W.2
  • 4
    • 0942268246 scopus 로고    scopus 로고
    • The influence of business managers' IT competence on championing IT
    • Bassellier, G., Benbasat, I., and Reich, B. H. 2003. "The influence of business managers' IT competence on championing IT, " Information Systems Research (14: 4), pp. 317-336.
    • (2003) Information Systems Research , vol.14 , Issue.4 , pp. 317-336
    • Bassellier, G.1    Benbasat, I.2    Reich, B.H.3
  • 6
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations
    • Baron, R. M., and Kenny, D. A. 1986. "The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations, " Journal of Personality and Social Psychology (51: 6), pp. 1173-1182.
    • (1986) Journal of Personality and Social Psychology , vol.51 , Issue.6 , pp. 1173-1182
    • Baron, R.M.1    Kenny, D.A.2
  • 7
    • 9744225129 scopus 로고    scopus 로고
    • Understanding Changes in Belief and Attitude toward Information Technology Usage: A Theoretical Model and Longitudinal Test
    • Bhattacherjee, A., and Premkumar, G. (2004). "Understanding Changes in Belief and Attitude toward Information Technology Usage: A Theoretical Model and Longitudinal Test, " MIS Quarterly, (28: 2), pp. 229-254.
    • (2004) MIS Quarterly , vol.28 , Issue.2 , pp. 229-254
    • Bhattacherjee, A.1    Premkumar, G.2
  • 8
    • 67650100804 scopus 로고    scopus 로고
    • If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security
    • Boss, S., Kirsch, L., Angermeier, I., Shingler, R., and Boss, R. 2009. "If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security, " European Journal of Information Systems (18: 2), pp. 151-164.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 151-164
    • Boss, S.1    Kirsch, L.2    Angermeier, I.3    Shingler, R.4    Boss, R.5
  • 9
    • 33745082091 scopus 로고    scopus 로고
    • Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle
    • Brown, S. A., and Venkatesh, V. 2005. "Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle, " MIS Quarterly (29: 3), pp. 399-426.
    • (2005) MIS Quarterly , vol.29 , Issue.3 , pp. 399-426
    • Brown, S.A.1    Venkatesh, V.2
  • 10
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, " MIS Quarterly, (34: 3), pp. 523-A527.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-527
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 12
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security at the workplace: Linking information security climate to compliant behavior
    • Chan, M., Woon I., and Kankanhalli A. 2005. "Perceptions of information security at the workplace: linking information security climate to compliant behavior, " Journal of Information Privacy and Security (1: 3), pp. 18-41.
    • (2005) Journal of Information Privacy and Security , vol.1 , Issue.3 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 13
    • 0003095695 scopus 로고    scopus 로고
    • The partial least squares approach for structural equation modeling
    • G.A. Marcoulides (Hrsg.). Mahwah, New York: Lawrence erlbaum associates Publishers
    • Chin, W. W. 1998. "The partial least squares approach for structural equation modeling, " Modern Methods for Business Research, G. A. Marcoulides (Hrsg.). Mahwah, New York: Lawrence erlbaum associates Publishers, pp. 295-336.
    • (1998) Modern Methods for Business Research , pp. 295-336
    • Chin, W.W.1
  • 15
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, " Information Systems Research (20: 1), pp. 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 16
    • 0035534144 scopus 로고    scopus 로고
    • Index construction with formative indicators: An alternative to scale development
    • Diamantopoulos, A., and Winklhofer, H. M. 2001. "Index construction with formative indicators: An alternative to scale development, " Journal of Marketing Research (38: 2), pp. 269-277.
    • (2001) Journal of Marketing Research , vol.38 , Issue.2 , pp. 269-277
    • Diamantopoulos, A.1    Winklhofer, H.M.2
  • 17
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • Dinev, T., and Hu, Q. 2007. "The centrality of awareness in the formation of user behavioral intention toward protective information technologies, " Journal of the Association for Information Systems (8: 7), pp. 386-408.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 20
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C., and Larcker, D. F. 1981. "Evaluating structural equation models with unobservable variables and measurement error, " Journal of Marketing Research (18: 1), pp. 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 21
    • 0040661360 scopus 로고
    • Security-related behavior of pc users in organizations
    • Frank, J., Shamir, B., and Briggs, W. 1991. "Security-related behavior of pc users in organizations, " Information and Management (21: 3), pp. 127-135.
    • (1991) Information and Management , vol.21 , Issue.3 , pp. 127-135
    • Frank, J.1    Shamir, B.2    Briggs, W.3
  • 22
    • 84965629744 scopus 로고
    • A scoial information processing model of media in organizations
    • Fulk, J., Steinfield, J., and Power, G. 1987. "A scoial information processing model of media in organizations, " Communication Research (14: 5), pp. 529-552.
    • (1987) Communication Research , vol.14 , Issue.5 , pp. 529-552
    • Fulk, J.1    Steinfield, J.2    Power, G.3
  • 23
    • 33750958522 scopus 로고    scopus 로고
    • Remote pc security: Securing the home worker
    • Furnell, S. M. 2006. "Remote pc security: Securing the home worker, " Network Security (11), pp. 6-12.
    • (2006) Network Security , Issue.11 , pp. 6-12
    • Furnell, S.M.1
  • 26
    • 29444460597 scopus 로고    scopus 로고
    • A practical guide to factorial validity using PLS-graph: Tutorial and annotated example
    • Gefen, D., and Straub, D. 2005. "A practical guide to factorial validity using PLS-graph: Tutorial and annotated example, " Communications of the AIS (16: 1), pp. 91-109.
    • (2005) Communications of the AIS , vol.16 , Issue.1 , pp. 91-109
    • Gefen, D.1    Straub, D.2
  • 28
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., and Rao, H. R. 2009a. "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, " Decision Support Systems (47: 2), pp. 1-12.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 1-12
    • Herath, T.1    Rao, H.R.2
  • 29
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., and Rao, H. G. 2009b. "Protection motivation and deterrence: A framework for security policy compliance in organisations, " European Journal of Information Systems (18: 2), pp. 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.G.2
  • 30
    • 0242424963 scopus 로고    scopus 로고
    • A critical review of construct indicators and measurement model misspecification in marketing and consumer research
    • Jarvis, C., Mackenzie, S., and Podsakoff, P. 2003. "A critical review of construct indicators and measurement model misspecification in marketing and consumer research, " Journal of Consumer Research (30: 2), pp. 199-218.
    • (2003) Journal of Consumer Research , vol.30 , Issue.2 , pp. 199-218
    • Jarvis, C.1    Mackenzie, S.2    Podsakoff, P.3
  • 31
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behavior
    • Leach, J. 2003. "Improving user security behavior, " Computers & Security (22: 8), pp. 685-693.
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-693
    • Leach, J.1
  • 32
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, J. and Lee, Y. 2002. "A holistic model of computer abuse within organizations, " Information Management and Computer Security, (10: 2), pp. 57-63.
    • (2002) Information Management and Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 33
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S. M., Lee, S. G., and Yoo, S. 2004. "An integrative model of computer abuse based on social control and general deterrence theories, " Information Management (41: 6), pp. 707-718.
    • (2004) Information Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 34
    • 84991904404 scopus 로고    scopus 로고
    • Accounting for common method variance in cross-sectional research designs
    • Lindell, M. K., and Whitney, D. J. 2001. "Accounting for common method variance in cross-sectional research designs, " Journal of Applied Psychology, (86: 1), pp. 114-121.
    • (2001) Journal of Applied Psychology , vol.86 , Issue.1 , pp. 114-121
    • Lindell, M.K.1    Whitney, D.J.2
  • 35
    • 0037322632 scopus 로고    scopus 로고
    • Diffusing the internet in the Arab world: The role of social norms and techological culturation
    • Loch, K. D., Straub, D. W., and Kamel, S. 2003. "Diffusing the internet in the Arab world: The role of social norms and techological culturation, " Engineering Management (50: 1), pp. 45-63.
    • (2003) Engineering Management , vol.50 , Issue.1 , pp. 45-63
    • Loch, K.D.1    Straub, D.W.2    Kamel, S.3
  • 36
    • 73449149291 scopus 로고
    • Development of an instrument to measure the perceptions of adopting an information technology innovation
    • Moore, G. C., and Benbasat, I. 1991. "Development of an instrument to measure the perceptions of adopting an information technology innovation, " Information Systems Research (2: 3), pp. 192-222.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 192-222
    • Moore, G.C.1    Benbasat, I.2
  • 38
    • 33745446307 scopus 로고    scopus 로고
    • NIST, M. Wilson (eds.), Gaithersburg: National Institute of Standards and Technology, NIST Special Publication, retrieved from
    • NIST 2003. "Building an information technology security awareness and training program, " M. Wilson (eds.), Gaithersburg: National Institute of Standards and Technology, NIST Special Publication, pp. 800-50, retrieved from http://csrc. nist. gov/publications/nistpubs/.
    • (2003) Building an information technology security awareness and training program , pp. 800-850
  • 40
    • 38549116762 scopus 로고    scopus 로고
    • Specifying formative constructs in information systems research
    • Petter S., Straub D., and Rai, A. 2007. "Specifying formative constructs in information systems research, " MIS Quarterly (31: 4), pp. 623-656.
    • (2007) MIS Quarterly , vol.31 , Issue.4 , pp. 623-656
    • Petter, S.1    Straub, D.2    Rai, A.3
  • 41
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. 2003. "Common method biases in behavioral research: A critical review of the literature and recommended remedies, " Journal of Applied Psychology, (88: 5), pp. 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    McKenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 42
    • 55849105212 scopus 로고    scopus 로고
    • Information security awareness in higher education: An exploratory study
    • Rezgui, Y., and Marks, A. 2008. "Information security awareness in higher education: An exploratory study, " Computers & Security (27: 7-8), pp. 241-253.
    • (2008) Computers & Security , vol.27 , Issue.7-8 , pp. 241-253
    • Rezgui, Y.1    Marks, A.2
  • 43
    • 71949094501 scopus 로고    scopus 로고
    • Self-efficacy in information security: Its influence on end users' information security practice behavior
    • Rhee, H.-S., Kim, C., and Ryu, Y. U. 2009. "Self-efficacy in information security: Its influence on end users' information security practice behavior, " Computers & Security (28: 8), pp. 1-11.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 1-11
    • Rhee, H.-S.1    Kim, C.2    Ryu, Y.U.3
  • 45
    • 77952381412 scopus 로고    scopus 로고
    • How to create a security culture in your organization
    • Rotvold, G. 2008. "How to create a security culture in your organization. " The Information Management Journal (42: 6), pp. 32-38.
    • (2008) The Information Management Journal , vol.42 , Issue.6 , pp. 32-38
    • Rotvold, G.1
  • 46
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. 2000. "A conceptual foundation for organizational information security awareness, " Information Management and Computer Security (8: 1), pp. 31-41.
    • (2000) Information Management and Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 47
    • 71149100808 scopus 로고    scopus 로고
    • Are employees putting your company at risk by not following information security policies?
    • Siponen, M., Mahmood, M. A., and Pahnila, S. 2009. "Are employees putting your company at risk by not following information security policies?" Communications of the ACM (52: 12), pp. 145-147.
    • (2009) Communications of the ACM , vol.52 , Issue.12 , pp. 145-147
    • Siponen, M.1    Mahmood, M.A.2    Pahnila, S.3
  • 48
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insight into the problem of employee information systems security policy violations
    • Siponen, M., and Vance, A. 2010. "Neutralization: New insight into the problem of employee information systems security policy violations, " MIS Quarterly (34: 3), pp. 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 49
    • 0002037905 scopus 로고
    • Asymptotic intervals for indirect effects in structural euquation models
    • Leinhart, S. (e. d.). San Francisco: Jossy-Bass
    • Sobel, M. 1982. "Asymptotic intervals for indirect effects in structural euquation models, " Sociological methodology. Leinhart, S. (e. d.). San Francisco: Jossy-Bass, pp. 290-312.
    • (1982) Sociological methodology , pp. 290-312
    • Sobel, M.1
  • 51
    • 77957070672 scopus 로고    scopus 로고
    • User participation in information systems security risk management
    • Spears, J. L., and Barki, H. 2010. "User participation in information systems security risk management, " MIS Quarterly (34: 3), pp. 503-522.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 53
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., and Welke, R. J. 1998. "Coping with systems risk: Security planning models for management decision making, " MIS Quarterly (22: 4), pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 54
    • 77954950954 scopus 로고    scopus 로고
    • Symantec, Symantec Corporation, Cupertino, CA (available online at
    • Symantec. 2009. Symantec Internet Security Threat Report: Trends for 2008, Symantec Corporation, Cupertino, CA (available online at http://eval. symantec. com/mktginfo/enterprise/white_papers/bwhitepaper_exec_summary_internet_security_threat_report_xiv_04-2009. en-us. pdf).
    • (2009) Symantec Internet Security Threat Report: Trends for 2008
  • 55
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M. E., and von Solms, R. 1998. "Information security awareness: Educating your users effectively, " Information Management and Computer Security (6: 4), pp. 167-173.
    • (1998) Information Management and Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    von Solms, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.