메뉴 건너뛰기




Volumn 43, Issue , 2014, Pages 90-110

Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture

Author keywords

Cultural differences; Information security; Knowledge sharing; Mixed methods research; Multigroup analysis; Partial least squares structural equation modeling

Indexed keywords

CULTURAL DIFFERENCE; KNOWLEDGE-SHARING; MIXED-METHODS RESEARCH; MULTI-GROUP; STRUCTURAL EQUATION MODELING;

EID: 84898078970     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.03.004     Document Type: Article
Times cited : (128)

References (110)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • E. Albrechtsen A qualitative study of users' view on information security Comput Secur 26 4 2007 Jun 276 289
    • (2007) Comput Secur , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 2
    • 0001658577 scopus 로고
    • Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities
    • J.C. Anderson, and D.W. Gerbing Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities J Appl Psychol 76 5 1991 732 740
    • (1991) J Appl Psychol , vol.76 , Issue.5 , pp. 732-740
    • Anderson, J.C.1    Gerbing, D.W.2
  • 3
    • 85006674485 scopus 로고    scopus 로고
    • Social engineering: Hacking the wetware!
    • Taylor & Francis
    • S.D. Applegate Social engineering: hacking the wetware! Inf Secur J Glob Perspect 18 1 2009 Feb 6 40 46 Taylor & Francis
    • (2009) Inf Secur J Glob Perspect , vol.18 , Issue.1 , pp. 40-46
    • Applegate, S.D.1
  • 4
    • 0000357545 scopus 로고
    • Estimating nonresponse bias in mail surveys
    • J.S. Armstrong, and T.S. Overton Estimating nonresponse bias in mail surveys J Mark Res 14 1977 396 402
    • (1977) J Mark Res , vol.14 , pp. 396-402
    • Armstrong, J.S.1    Overton, T.S.2
  • 5
    • 84936824236 scopus 로고
    • Assessing construct validity in organizational research
    • R.P. Bagozzi, Y. Yi, and L.W. Phillips Assessing construct validity in organizational research Adm Sci Q 36 3 1991 421 458
    • (1991) Adm Sci Q , vol.36 , Issue.3 , pp. 421-458
    • Bagozzi, R.P.1    Yi, Y.2    Phillips, L.W.3
  • 6
    • 84898065711 scopus 로고    scopus 로고
    • User acceptance of information technology across cultures
    • Inderscience Publishers
    • K. Bandyopadhyay, and S. Bandyopadhyay User acceptance of information technology across cultures Int J Intercult Inf Manag 2 3 2010 218 Inderscience Publishers
    • (2010) Int J Intercult Inf Manag , vol.2 , Issue.3 , pp. 218
    • Bandyopadhyay, K.1    Bandyopadhyay, S.2
  • 7
    • 0003258063 scopus 로고
    • The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration
    • D. Barclay, C. Higgins, and R. Thompson The partial least squares (PLS) approach to causal modeling: personal computer adoption and use as an illustration Technol Stud 2 2 1995 285 309
    • (1995) Technol Stud , vol.2 , Issue.2 , pp. 285-309
    • Barclay, D.1    Higgins, C.2    Thompson, R.3
  • 8
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research - Conceptual, strategic, and statistical considerations
    • R.M. Baron, and D.A. Kenny The moderator-mediator variable distinction in social psychological research - conceptual, strategic, and statistical considerations J Pers Soc Psychol 51 6 1986 1173 1182
    • (1986) J Pers Soc Psychol , vol.51 , Issue.6 , pp. 1173-1182
    • Baron, R.M.1    Kenny, D.A.2
  • 9
    • 24144458931 scopus 로고    scopus 로고
    • Information systems security from a knowledge management perspective
    • Emerald Group Publishing Limited
    • P. Belsis, S. Kokolakis, and E. Kiountouzis Information systems security from a knowledge management perspective Inf Manag Comput Secur 13 3 2005 Jan 7 189 202 Emerald Group Publishing Limited
    • (2005) Inf Manag Comput Secur , vol.13 , Issue.3 , pp. 189-202
    • Belsis, P.1    Kokolakis, S.2    Kiountouzis, E.3
  • 10
    • 0000864824 scopus 로고
    • The parochial dinosaur: Organizational science in a global context
    • Academy of Management
    • N.A. Boyacigiller, and N.J. Adler The parochial dinosaur: organizational science in a global context Acad Manag Rev 16 2 1991 Apr 1 262 290 Academy of Management
    • (1991) Acad Manag Rev , vol.16 , Issue.2 , pp. 262-290
    • Boyacigiller, N.A.1    Adler, N.J.2
  • 12
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • B. Bulgurcu, H. Cavusoglu, and I. Benbasat Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness MIS Q 34 3 2010 Sep 1 523 548
    • (2010) MIS Q , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 14
    • 33645031405 scopus 로고    scopus 로고
    • Organizational factors to the effectiveness of implementing information security management
    • S. Chang, and C. Ho Organizational factors to the effectiveness of implementing information security management Ind Manag Data Syst 106 3 2006 345 361
    • (2006) Ind Manag Data Syst , vol.106 , Issue.3 , pp. 345-361
    • Chang, S.1    Ho, C.2
  • 15
    • 80054030193 scopus 로고    scopus 로고
    • Information systems resources and information security
    • K. Chang, and C. Wang Information systems resources and information security Inf Syst Front 13 4 2010 Apr 27 579 593
    • (2010) Inf Syst Front , vol.13 , Issue.4 , pp. 579-593
    • Chang, K.1    Wang, C.2
  • 17
    • 0003095695 scopus 로고
    • The partial least squares approach to structural equation modeling
    • G.A. Marcoulides, Lawrence Erlbaum Associates Mahwah, NJ
    • W.W. Chin The partial least squares approach to structural equation modeling G.A. Marcoulides, Modern methods for business research 1988 Lawrence Erlbaum Associates Mahwah, NJ 295 358
    • (1988) Modern Methods for Business Research , pp. 295-358
    • Chin, W.W.1
  • 18
    • 78049329432 scopus 로고    scopus 로고
    • An introduction to a permutation based procedure for multi-group PLS analysis: Results of tests of differences on simulated data and a cross cultural analysis of the sourcing of information system services between Germany and the USA
    • V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin Heidelberg
    • W. Chin, and J. Dibbern An introduction to a permutation based procedure for multi-group PLS analysis: results of tests of differences on simulated data and a cross cultural analysis of the sourcing of information system services between Germany and the USA V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of partial least squares 2010 Springer Berlin Heidelberg 171 193
    • (2010) Handbook of Partial Least Squares , pp. 171-193
    • Chin, W.1    Dibbern, J.2
  • 19
    • 84882800467 scopus 로고    scopus 로고
    • Insider threat and information security management
    • C.W. Probst, J. Hunker, M. Bishop, D. Gollmann, Advances in information security Springer US
    • L. Coles-Kemp, and M. Theoharidou Insider threat and information security management C.W. Probst, J. Hunker, M. Bishop, D. Gollmann, Insider threats in cyber security Advances in information security 2010 Springer US 45 71
    • (2010) Insider Threats in Cyber Security , pp. 45-71
    • Coles-Kemp, L.1    Theoharidou, M.2
  • 20
    • 84863720925 scopus 로고    scopus 로고
    • Information systems user security: A structured model of the knowing-doing gap
    • J. Cox Information systems user security: a structured model of the knowing-doing gap Comput Hum Behav 28 5 2012 Sep 1849 1858
    • (2012) Comput Hum Behav , vol.28 , Issue.5 , pp. 1849-1858
    • Cox, J.1
  • 23
    • 1842682482 scopus 로고    scopus 로고
    • Work groups, structural diversity, and knowledge sharing in a global organization
    • INFORMS
    • J.N. Cummings Work groups, structural diversity, and knowledge sharing in a global organization Manag Sci 50 3 2004 Mar 1 352 364 INFORMS
    • (2004) Manag Sci , vol.50 , Issue.3 , pp. 352-364
    • Cummings, J.N.1
  • 26
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • G. Dhillon, and J. Backhouse Current directions in IS security research: towards socio-organizational perspectives Inf Syst J 11 2 2001 127 153
    • (2001) Inf Syst J , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 27
    • 67650318762 scopus 로고    scopus 로고
    • User behaviour towards protective information technologies: The role of national cultural differences
    • T. Dinev, J. Goo, Q. Hu, and K. Nam User behaviour towards protective information technologies: the role of national cultural differences Inf Syst J 19 4 2009 Jul 391 412
    • (2009) Inf Syst J , vol.19 , Issue.4 , pp. 391-412
    • Dinev, T.1    Goo, J.2    Hu, Q.3    Nam, K.4
  • 28
    • 0001548448 scopus 로고    scopus 로고
    • Common methods bias: Does common methods variance really bias results?
    • D.H. Doty, and W.H. Glick Common methods bias: does common methods variance really bias results? Organ Res Methods 1 4 1998 Oct 1 374 406
    • (1998) Organ Res Methods , vol.1 , Issue.4 , pp. 374-406
    • Doty, D.H.1    Glick, W.H.2
  • 29
    • 84861414677 scopus 로고    scopus 로고
    • Assessment of information security maturity: An exploration study of Malaysian public service organizations
    • Emerald Group Publishing Limited
    • S. Dzazali, and A.H. Zolait Assessment of information security maturity: an exploration study of Malaysian public service organizations J Syst Inf Technol 14 1 2012 Mar 17 23 57 Emerald Group Publishing Limited
    • (2012) J Syst Inf Technol , vol.14 , Issue.1 , pp. 23-57
    • Dzazali, S.1    Zolait, A.H.2
  • 30
    • 80455178572 scopus 로고    scopus 로고
    • A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings
    • Nature Publishing Group
    • J. D'Arcy, and T. Herath A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings Eur J Inf Syst 20 6 2011 Jun 14 643 658 Nature Publishing Group
    • (2011) Eur J Inf Syst , vol.20 , Issue.6 , pp. 643-658
    • D'Arcy, J.1    Herath, T.2
  • 31
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • J. D'Arcy, A. Hovav, and D. Galletta User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach Inf Syst Res 20 1 2008 Jun 20 79 98
    • (2008) Inf Syst Res , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 32
    • 79952785183 scopus 로고    scopus 로고
    • An application of PLS in multi-group analysis: The need for differentiated corporate-level marketing in the mobile communications industry
    • V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin Heidelberg
    • M. Eberl An application of PLS in multi-group analysis: the need for differentiated corporate-level marketing in the mobile communications industry V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of partial least squares 2010 Springer Berlin Heidelberg 487 514
    • (2010) Handbook of Partial Least Squares , pp. 487-514
    • Eberl, M.1
  • 33
    • 84880196111 scopus 로고    scopus 로고
    • Behavioral information security
    • L. Janczewski, A. Colarik, Hershey, PA, USA
    • I.J. Fagnot Behavioral information security L. Janczewski, A. Colarik, Encyclopedia of cyber warfare and cyber terrorism 2008 199 205 Hershey, PA, USA
    • (2008) Encyclopedia of Cyber Warfare and Cyber Terrorism , pp. 199-205
    • Fagnot, I.J.1
  • 35
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • INFORMS
    • E. Gal-Or, and A. Ghose The economic incentives for sharing security information Inf Syst Res 16 2 2005 Jun 1 186 208 INFORMS
    • (2005) Inf Syst Res , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 37
    • 84898064989 scopus 로고    scopus 로고
    • Knowledge for managing information system security: Review and future research directions
    • Paper 37
    • H. Guo Knowledge for managing information system security: review and future research directions CONF-IRM 2008 proceedings 2008 Paper 37
    • (2008) CONF-IRM 2008 Proceedings
    • Guo, H.1
  • 39
    • 0027813283 scopus 로고
    • Strategic alignment: Leveraging information technology for transforming organizations
    • J.C. Henderson, and N. Venkatraman Strategic alignment: leveraging information technology for transforming organizations IBM Syst J 32 1 1993 Jan 1 4 16
    • (1993) IBM Syst J , vol.32 , Issue.1 , pp. 4-16
    • Henderson, J.C.1    Venkatraman, N.2
  • 40
    • 0012728420 scopus 로고    scopus 로고
    • An analysis of variance approach to content validation
    • T.R. Hinkin, and J.B. Tracey An analysis of variance approach to content validation Organ Res Methods 2 2 1999 Apr 175 186
    • (1999) Organ Res Methods , vol.2 , Issue.2 , pp. 175-186
    • Hinkin, T.R.1    Tracey, J.B.2
  • 42
    • 0002390117 scopus 로고
    • Cultural constraints in management theories
    • Academy of Management
    • G. Hofstede Cultural constraints in management theories Acad Manag Perspect 7 1 1993 Feb 1 81 94 Academy of Management
    • (1993) Acad Manag Perspect , vol.7 , Issue.1 , pp. 81-94
    • Hofstede, G.1
  • 43
    • 84872371758 scopus 로고    scopus 로고
    • [Internet]. Available from: [cited 13.06.13]
    • G. Hofstede National cultural dimensions [Internet]. Available from: http://geert-hofstede.com/dimensions.html 2013 [cited 13.06.13]
    • (2013) National Cultural Dimensions
    • Hofstede, G.1
  • 44
    • 84863542038 scopus 로고    scopus 로고
    • Managing employee compliance with information security policies: The critical role of top management and organizational culture
    • Q. Hu, T. Dinev, P. Hart, and D. Cooke Managing employee compliance with information security policies: the critical role of top management and organizational culture Decis Sci 43 4 2012 Aug 28 615 660
    • (2012) Decis Sci , vol.43 , Issue.4 , pp. 615-660
    • Hu, Q.1    Dinev, T.2    Hart, P.3    Cooke, D.4
  • 46
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • P. Ifinedo Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory Comput Secur 31 1 2012 Feb 83 95
    • (2012) Comput Secur , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 48
    • 0034178923 scopus 로고    scopus 로고
    • Management ethics and corporate policy: A cross-cultural comparison
    • T. Jackson Management ethics and corporate policy: A cross-cultural comparison J Manag Stud 37 3 2000 May 349 369
    • (2000) J Manag Stud , vol.37 , Issue.3 , pp. 349-369
    • Jackson, T.1
  • 49
    • 0242424963 scopus 로고    scopus 로고
    • A critical review of construct indicators and measurement model misspecification in marketing and consumer research
    • The University of Chicago Press
    • C.B. Jarvis, S.B. MacKenzie, and P.M. Podsakoff A critical review of construct indicators and measurement model misspecification in marketing and consumer research J Consum Res 30 2 2003 Sep 21 199 218 The University of Chicago Press
    • (2003) J Consum Res , vol.30 , Issue.2 , pp. 199-218
    • Jarvis, C.B.1    Mackenzie, S.B.2    Podsakoff, P.M.3
  • 53
    • 0037400028 scopus 로고    scopus 로고
    • An integrative study of information systems security effectiveness
    • A. Kankanhalli An integrative study of information systems security effectiveness Int J Inf Manag 23 2 2003 Apr 139 154
    • (2003) Int J Inf Manag , vol.23 , Issue.2 , pp. 139-154
    • Kankanhalli, A.1
  • 54
    • 84928501185 scopus 로고    scopus 로고
    • One size does not fit all: Different cultures require different information systems security interventions
    • Paper 98
    • M. Karjalainen, M. Siponen, P. Petri, and S. Suprateek One size does not fit all: different cultures require different information systems security interventions PACIS 2013 proceedings 2013 Paper 98
    • (2013) PACIS 2013 Proceedings
    • Karjalainen, M.1    Siponen, M.2    Petri, P.3    Suprateek, S.4
  • 55
    • 78751472118 scopus 로고    scopus 로고
    • Effective information security requires a balance of social and technology factors
    • T. Kayworth, and D. Whitten Effective information security requires a balance of social and technology factors MIS Q Exec 9 3 2010 303 315
    • (2010) MIS Q Exec , vol.9 , Issue.3 , pp. 303-315
    • Kayworth, T.1    Whitten, D.2
  • 56
    • 0040918921 scopus 로고    scopus 로고
    • A cross-cultural study on escalation of commitment behavior in software projects
    • Society for Information Management and The Management Information Systems Research Center
    • M. Keil, B.C.Y. Tan, K.-K. Wei, T. Saarinen, V. Tuunainen, and A. Wassenaar A cross-cultural study on escalation of commitment behavior in software projects MIS Q 24 2 2000 Jun 1 299 Society for Information Management and The Management Information Systems Research Center
    • (2000) MIS Q , vol.24 , Issue.2 , pp. 299
    • Keil, M.1    Tan, B.C.Y.2    Wei, K.-K.3    Saarinen, T.4    Tuunainen, V.5    Wassenaar, A.6
  • 57
    • 84879838718 scopus 로고    scopus 로고
    • Disentangling the effects of team competences, team adaptability, and client communication on the performance of management consulting teams
    • P. Klarner, M. Sarstedt, M. Hoeck, and C.M. Ringle Disentangling the effects of team competences, team adaptability, and client communication on the performance of management consulting teams Long Range Plann 46 3 2013 Jun 258 286
    • (2013) Long Range Plann , vol.46 , Issue.3 , pp. 258-286
    • Klarner, P.1    Sarstedt, M.2    Hoeck, M.3    Ringle, C.M.4
  • 58
    • 85001799501 scopus 로고    scopus 로고
    • Information security effectiveness: Conceptualization and validation of a theory
    • Eyob E, editor Jan 31
    • Knapp KJ, Marshall TE, Rainer RK, Ford FN. Information security effectiveness: conceptualization and validation of a theory. In: Eyob E, editor. Int J Inf Secur Priv. IGI Global; 2007 Jan 31;1(2):37-60.
    • (2007) Int J Inf Secur Priv. IGI Global , vol.1 , Issue.2 , pp. 37-60
    • Knapp, K.J.1    Marshall, T.E.2    Rainer, R.K.3    Ford, F.N.4
  • 61
    • 84957059783 scopus 로고
    • Do corporate codes of ethics reflect national character? Evidence from Europe and the United States
    • Nature Publishing Group
    • C.C. Langlois, and B.B. Schlegelmilch Do corporate codes of ethics reflect national character? Evidence from Europe and the United States J Int Bus Stud 21 4 1990 Dec 1 519 539 Nature Publishing Group
    • (1990) J Int Bus Stud , vol.21 , Issue.4 , pp. 519-539
    • Langlois, C.C.1    Schlegelmilch, B.B.2
  • 62
    • 0346383178 scopus 로고
    • Integrating positivist and interpretive approaches to organizational research
    • A.S. Lee Integrating positivist and interpretive approaches to organizational research Organ Sci 2 4 1991 Nov 1 342 365
    • (1991) Organ Sci , vol.2 , Issue.4 , pp. 342-365
    • Lee, A.S.1
  • 63
    • 80455155149 scopus 로고    scopus 로고
    • Knowledge sharing and investment decisions in information security
    • D. Liu, Y. Ji, and V. Mookerjee Knowledge sharing and investment decisions in information security Decis Support Syst 52 1 2011 95 107
    • (2011) Decis Support Syst , vol.52 , Issue.1 , pp. 95-107
    • Liu, D.1    Ji, Y.2    Mookerjee, V.3
  • 64
    • 0022970868 scopus 로고    scopus 로고
    • Determination and quantification of content validity
    • M.R. Lynn Determination and quantification of content validity Nurs Res 35 6 2006 382 386
    • (2006) Nurs Res , vol.35 , Issue.6 , pp. 382-386
    • Lynn, M.R.1
  • 65
    • 80051733015 scopus 로고    scopus 로고
    • Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
    • S.B. MacKenzie, P.M. Podsakoff, and N.P. Podsakoff Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques MIS Q 35 2 2011 Jun 1 293 334
    • (2011) MIS Q , vol.35 , Issue.2 , pp. 293-334
    • Mackenzie, S.B.1    Podsakoff, P.M.2    Podsakoff, N.P.3
  • 66
    • 12044258070 scopus 로고
    • Culture and the self: Implications for cognition, emotion, and motivation
    • H.R. Markus, and S. Kitayama Culture and the self: implications for cognition, emotion, and motivation Psychol Rev 98 2 1991 224 253
    • (1991) Psychol Rev , vol.98 , Issue.2 , pp. 224-253
    • Markus, H.R.1    Kitayama, S.2
  • 67
    • 77249087157 scopus 로고    scopus 로고
    • Information systems security governance research: A behavioral perspective
    • New York State
    • S. Mishra, and G. Dhillon Information systems security governance research: a behavioral perspective 2nd Annual symposium on information assurance 2006 New York State
    • (2006) 2nd Annual Symposium on Information Assurance
    • Mishra, S.1    Dhillon, G.2
  • 68
    • 79952781109 scopus 로고    scopus 로고
    • Integrated model of export activity: Analysis of heterogeneity in managers' orientations and perceptions on strategic marketing management in foreign markets
    • A. Navarro, F. Acedo, F. Losada, and E. Ruzo Integrated model of export activity: analysis of heterogeneity in managers' orientations and perceptions on strategic marketing management in foreign markets J Mark Theory Pract 19 2 2011 187 204
    • (2011) J Mark Theory Pract , vol.19 , Issue.2 , pp. 187-204
    • Navarro, A.1    Acedo, F.2    Losada, F.3    Ruzo, E.4
  • 70
    • 31744432604 scopus 로고    scopus 로고
    • An empirical study of the relationship between knowledge sharing and IS/IT strategic planning (ISSP)
    • Emerald Group Publishing Limited
    • J.-C. Pai An empirical study of the relationship between knowledge sharing and IS/IT strategic planning (ISSP) Manag Decis 44 1 2006 Jan 1 105 122 Emerald Group Publishing Limited
    • (2006) Manag Decis , vol.44 , Issue.1 , pp. 105-122
    • Pai, J.-C.1
  • 71
    • 0030521693 scopus 로고    scopus 로고
    • Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
    • R. Paternoster, and S. Simpson Sanction threats and appeals to morality: testing a rational choice model of corporate crime Law Soc Rev 30 3 1996 549 584
    • (1996) Law Soc Rev , vol.30 , Issue.3 , pp. 549-584
    • Paternoster, R.1    Simpson, S.2
  • 72
    • 4644373002 scopus 로고    scopus 로고
    • What drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behavior
    • P.A. Pavlou, and L. Chai What drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behavior J Electron Commer Res 3 4 2002 240 253
    • (2002) J Electron Commer Res , vol.3 , Issue.4 , pp. 240-253
    • Pavlou, P.A.1    Chai, L.2
  • 73
    • 33847764616 scopus 로고    scopus 로고
    • Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
    • P.A. Pavlou, H. Liang, and Y. Xue Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective MIS Q 31 1 2007 Mar 1 105 136
    • (2007) MIS Q , vol.31 , Issue.1 , pp. 105-136
    • Pavlou, P.A.1    Liang, H.2    Xue, Y.3
  • 74
    • 38549116762 scopus 로고    scopus 로고
    • Specifying formative constructs in information systems research
    • S. Petter, D. Straub, and A. Rai Specifying formative constructs in information systems research MIS Q 31 4 2007 623 656
    • (2007) MIS Q , vol.31 , Issue.4 , pp. 623-656
    • Petter, S.1    Straub, D.2    Rai, A.3
  • 75
    • 84970235764 scopus 로고
    • Self-reports in organizational research: Problems and prospects
    • P.M. Podsakoff Self-reports in organizational research: problems and prospects J Manag 12 4 1986 Dec 1 531 544
    • (1986) J Manag , vol.12 , Issue.4 , pp. 531-544
    • Podsakoff, P.M.1
  • 76
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • P.M. Podsakoff, S.B. MacKenzie, J.-Y. Lee, and N.P. Podsakoff Common method biases in behavioral research: a critical review of the literature and recommended remedies J Appl Psychol 88 5 2003 Oct 879 903
    • (2003) J Appl Psychol , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    Mackenzie, S.B.2    Lee, J.-Y.3    Podsakoff, N.P.4
  • 77
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • P. Puhakainen, and M. Siponen Improving employees' compliance through information systems security training: an action research study MIS Q 34 4 2010 Dec 1 757 778
    • (2010) MIS Q , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 78
  • 79
    • 70350061364 scopus 로고    scopus 로고
    • An empirical comparison of the efficacy of covariance-based and variance-based SEM
    • W. Reinartz, M. Haenlein, and J. Henseler An empirical comparison of the efficacy of covariance-based and variance-based SEM Int J Res Mark 26 4 2009 Dec 332 344
    • (2009) Int J Res Mark , vol.26 , Issue.4 , pp. 332-344
    • Reinartz, W.1    Haenlein, M.2    Henseler, J.3
  • 80
    • 44049107399 scopus 로고    scopus 로고
    • Factors influencing organizational knowledge transfer: Implication for corporate performance
    • Emerald Group Publishing Limited
    • J. Rhodes, R. Hung, P. Lok, B.Y.-H. Lien, and C.-M. Wu Factors influencing organizational knowledge transfer: implication for corporate performance J Knowl Manag 12 3 2008 May 30 84 100 Emerald Group Publishing Limited
    • (2008) J Knowl Manag , vol.12 , Issue.3 , pp. 84-100
    • Rhodes, J.1    Hung, R.2    Lok, P.3    Lien, B.Y.-H.4    Wu, C.-M.5
  • 82
    • 84898061000 scopus 로고    scopus 로고
    • The development of an instrument for assessing information security in organizations: Examining the content validity using quantitative methods
    • Natal, Brazil, May 22-24
    • W. Rocha Flores, and E. Antonsen The development of an instrument for assessing information security in organizations: examining the content validity using quantitative methods Proceedings of the 2013 international conference on information resources management 2013 Natal, Brazil, May 22-24
    • (2013) Proceedings of the 2013 International Conference on Information Resources Management
    • Rocha Flores, W.1    Antonsen, E.2
  • 83
    • 84898062134 scopus 로고    scopus 로고
    • Conceptualization of constructs for shaping information security behavior: Towards a measurement instrument
    • Orlando, Florida, USA, December 16
    • W. Rocha Flores, and M. Korman Conceptualization of constructs for shaping information security behavior: towards a measurement instrument Proceedings of the 7th annual workshop on information security and privacy 2012 Orlando, Florida, USA, December 16
    • (2012) Proceedings of the 7th Annual Workshop on Information Security and Privacy
    • Rocha Flores, W.1    Korman, M.2
  • 84
    • 84898073317 scopus 로고    scopus 로고
    • Using phishing experiments and scenario-based surveys to understand security behaviours in practice
    • [To be available]
    • W. Rocha Flores, H. Holm, G. Svensson, and G. Ericsson Using phishing experiments and scenario-based surveys to understand security behaviours in practice Inf Manag Comput Secur 2014 [To be available]
    • (2014) Inf Manag Comput Secur
    • Rocha Flores, W.1    Holm, H.2    Svensson, G.3    Ericsson, G.4
  • 85
    • 34147178117 scopus 로고    scopus 로고
    • Introduction: Understanding and dealing with organizational survey nonresponse
    • S.G. Rogelberg, and J.M. Stanton Introduction: understanding and dealing with organizational survey nonresponse Organ Res Methods 10 2 2007 Apr 1 195 209
    • (2007) Organ Res Methods , vol.10 , Issue.2 , pp. 195-209
    • Rogelberg, S.G.1    Stanton, J.M.2
  • 86
    • 84898059846 scopus 로고    scopus 로고
    • [Internet]. Available from: [cited 01.11.12]
    • SANS gpwn-list [Internet]. Available from: https://lists.sans.org/ mailman/listinfo/gpwn-list 2013 [cited 01.11.12]
    • (2013) Gpwn-list
    • Sans1
  • 87
    • 31744441942 scopus 로고    scopus 로고
    • Knowledge management: At a cross-way of perspectives and approaches
    • A. Sarmento Knowledge management: at a cross-way of perspectives and approaches Inf Resour Manag J 18 1 2005 1 7
    • (2005) Inf Resour Manag J , vol.18 , Issue.1 , pp. 1-7
    • Sarmento, A.1
  • 88
    • 77955399954 scopus 로고    scopus 로고
    • Treating unobserved heterogeneity in PLS path modeling: A comparison of FIMIX-PLS with different data analysis strategies
    • Taylor & Francis
    • M. Sarstedt, and C.M. Ringle Treating unobserved heterogeneity in PLS path modeling: a comparison of FIMIX-PLS with different data analysis strategies J Appl Stat 37 8 2010 Aug 1299 1318 Taylor & Francis
    • (2010) J Appl Stat , vol.37 , Issue.8 , pp. 1299-1318
    • Sarstedt, M.1    Ringle, C.M.2
  • 89
    • 0006528240 scopus 로고    scopus 로고
    • Profiles of strategic information systems planning
    • INFORMS
    • A.H. Segars, and V. Grover Profiles of strategic information systems planning Inf Syst Res 10 3 1999 Sep 1 199 232 INFORMS
    • (1999) Inf Syst Res , vol.10 , Issue.3 , pp. 199-232
    • Segars, A.H.1    Grover, V.2
  • 90
    • 30744438863 scopus 로고    scopus 로고
    • An analysis of the traditional IS security approaches: Implications for research and practice
    • M.T. Siponen An analysis of the traditional IS security approaches: implications for research and practice Eur J Inf Syst 14 3 2005 Sep 1 303 315
    • (2005) Eur J Inf Syst , vol.14 , Issue.3 , pp. 303-315
    • Siponen, M.T.1
  • 91
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee systems security policy violations
    • M. Siponen, and A. Vance Neutralization: new insights into the problem of employee systems security policy violations MIS Q 34 3 2010 Sep 1 487 502
    • (2010) MIS Q , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 92
    • 67651102640 scopus 로고    scopus 로고
    • Information security management standards: Problems and solutions
    • M. Siponen, and R. Willison Information security management standards: problems and solutions Inf Manag 46 5 2009 267 270
    • (2009) Inf Manag , vol.46 , Issue.5 , pp. 267-270
    • Siponen, M.1    Willison, R.2
  • 94
    • 84893698217 scopus 로고    scopus 로고
    • Variables influencing information security policy compliance: A systematic review of quantitative studies
    • Emerald Group Publishing Limited
    • T. Sommestad, J. Hallberg, K. Lundholm, and J. Bengtsson Variables influencing information security policy compliance: a systematic review of quantitative studies Inf Manag Comput Secur 22 1 2013 Nov 19 3 Emerald Group Publishing Limited
    • (2013) Inf Manag Comput Secur , vol.22 , Issue.1 , pp. 3
    • Sommestad, T.1    Hallberg, J.2    Lundholm, K.3    Bengtsson, J.4
  • 95
    • 0035995867 scopus 로고    scopus 로고
    • An internet knowledge sharing system
    • S. Song An internet knowledge sharing system J Comput Inf Syst 42 3 2002 25 30
    • (2002) J Comput Inf Syst , vol.42 , Issue.3 , pp. 25-30
    • Song, S.1
  • 96
    • 77957070672 scopus 로고    scopus 로고
    • User participation in information systems security risk management
    • JL Spears, and H Barki User participation in information systems security risk management MIS Q 34 3 2010 503 522
    • (2010) MIS Q , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 97
    • 33846076044 scopus 로고    scopus 로고
    • The role of espoused national cultural values in technology acceptance
    • Society for Information Management and The Management Information Systems Research Center
    • M. Srite, and E. Karahanna The role of espoused national cultural values in technology acceptance MIS Q 30 3 2006 Sep 1 679 704 Society for Information Management and The Management Information Systems Research Center
    • (2006) MIS Q , vol.30 , Issue.3 , pp. 679-704
    • Srite, M.1    Karahanna, E.2
  • 98
    • 0034340864 scopus 로고    scopus 로고
    • Team structure and performance: Assessing the mediating role of intrateam process and the moderating role of task type
    • G.L. Stewart, and M.R. Barrick Team structure and performance: assessing the mediating role of intrateam process and the moderating role of task type Acad Manag J Acad Manag 43 2 2000 Apr 1 135 148
    • (2000) Acad Manag J Acad Manag , vol.43 , Issue.2 , pp. 135-148
    • Stewart, G.L.1    Barrick, M.R.2
  • 99
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • INFORMS
    • D.W. Straub Effective is security: an empirical study Inf Syst Res 1 3 1990 Sep 1 255 276 INFORMS
    • (1990) Inf Syst Res , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 100
    • 13244286108 scopus 로고    scopus 로고
    • Validation guidelines for is positivist research
    • D. Straub, M.-C. Boudreau, and D. Gefen Validation guidelines for is positivist research Commun Assoc Inf Syst 13 1 2004 380 427
    • (2004) Commun Assoc Inf Syst , vol.13 , Issue.1 , pp. 380-427
    • Straub, D.1    Boudreau, M.-C.2    Gefen, D.3
  • 101
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • L. Sun, R.P. Ivastave, and T.J. Mock An information systems security risk assessment model under the Dempster-Shafer theory of belief functions J Manag Inf Syst 22 4 2006 Apr 109 142
    • (2006) J Manag Inf Syst , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Ivastave, R.P.2    Mock, T.J.3
  • 102
    • 39849107632 scopus 로고    scopus 로고
    • A conceptual model for online shopping behaviour: Trust and national culture
    • Temple University Philadelphia, PA, USA
    • F.B. Tan, C. Urquhart, and S. Yan A conceptual model for online shopping behaviour: trust and national culture Proceedings of the 5th international business research forum 2004 Temple University Philadelphia, PA, USA
    • (2004) Proceedings of the 5th International Business Research Forum
    • Tan, F.B.1    Urquhart, C.2    Yan, S.3
  • 104
    • 35148886676 scopus 로고    scopus 로고
    • An information security governance framework
    • ACM Press
    • A Da Veiga, and J.H.P. Eloff An information security governance framework Inf Syst Manag 24 4 2007 Oct 2 361 372 ACM Press
    • (2007) Inf Syst Manag , vol.24 , Issue.4 , pp. 361-372
    • Veiga, A.D.1    Eloff, J.H.P.2
  • 105
    • 76749117937 scopus 로고    scopus 로고
    • Knowledge sharing: A review and directions for future research
    • S. Wang, and R.A. Noe Knowledge sharing: a review and directions for future research Hum Resour Manag Rev 20 2 2010 115 131
    • (2010) Hum Resour Manag Rev , vol.20 , Issue.2 , pp. 115-131
    • Wang, S.1    Noe, R.A.2
  • 106
    • 85106113141 scopus 로고    scopus 로고
    • It governance and organizational design for security management
    • D.W. Straub, S. Goodman, R.L. Baskerville
    • M. Warkentin, and A.C. Johnston It governance and organizational design for security management D.W. Straub, S. Goodman, R.L. Baskerville, Information security: policy, processes, and practice 2007 46 68
    • (2007) Information Security: Policy, Processes, and Practice , pp. 46-68
    • Warkentin, M.1    Johnston, A.C.2
  • 107
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • Nature Publishing Group
    • M. Warkentin, and R. Willison Behavioral and policy issues in information systems security: the insider threat Eur J Inf Syst 18 2 2009 Apr 1 101 105 Nature Publishing Group
    • (2009) Eur J Inf Syst , vol.18 , Issue.2 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 108
    • 79955622246 scopus 로고    scopus 로고
    • The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
    • Nature Publishing Group
    • M. Warkentin, A.C. Johnston, and J. Shropshire The influence of the informal social learning environment on information privacy policy compliance efficacy and intention Eur J Inf Syst 20 3 2011 Jan 25 267 284 Nature Publishing Group
    • (2011) Eur J Inf Syst , vol.20 , Issue.3 , pp. 267-284
    • Warkentin, M.1    Johnston, A.C.2    Shropshire, J.3
  • 109
    • 67650883222 scopus 로고    scopus 로고
    • An integrated view of human, organizational, and technological challenges of IT security management
    • Emerald Group Publishing Limited
    • R. Werlinger, K. Hawkey, and K. Beznosov An integrated view of human, organizational, and technological challenges of IT security management Inf Manag Comput Secur 17 1 2009 Mar 20 4 19 Emerald Group Publishing Limited
    • (2009) Inf Manag Comput Secur , vol.17 , Issue.1 , pp. 4-19
    • Werlinger, R.1    Hawkey, K.2    Beznosov, K.3
  • 110
    • 33845536599 scopus 로고    scopus 로고
    • Internalisation of information security culture amongst employees through basic security knowledge
    • S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog, Kluwer Academic Publishers Boston
    • O. Zakaria Internalisation of information security culture amongst employees through basic security knowledge S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog, Security and privacy in dynamic environments 2006 Kluwer Academic Publishers Boston 437 441
    • (2006) Security and Privacy in Dynamic Environments , pp. 437-441
    • Zakaria, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.