메뉴 건너뛰기




Volumn 37, Issue , 2015, Pages 257-285

Critical discourse analysis as a review methodology: An empirical example

Author keywords

Critical discourse analysis; Ideological hegemony; Information security; Literature review; Security behavior; Theory and review

Indexed keywords

SECURITY OF DATA;

EID: 84940370178     PISSN: 15293181     EISSN: None     Source Type: Journal    
DOI: 10.17705/1cais.03711     Document Type: Article
Times cited : (52)

References (100)
  • 2
    • 78650385795 scopus 로고    scopus 로고
    • A comprehensive review and synthesis of open source research
    • Aksulu, A., & Wade, M. (2010). A comprehensive review and synthesis of open source research. Journal of the Association for Information Systems, 11(11), 576-656.
    • (2010) Journal of the Association for Information Systems , vol.11 , Issue.11 , pp. 576-656
    • Aksulu, A.1    Wade, M.2
  • 3
    • 77953969323 scopus 로고    scopus 로고
    • Actor-network theory, organizations and critique: Towards a politics of organizing
    • Alcadipani, R., & Hassard, J. (2010). Actor-network theory, organizations and critique: Towards a politics of organizing. Organization, 17(4), 419-435.
    • (2010) Organization , vol.17 , Issue.4 , pp. 419-435
    • Alcadipani, R.1    Hassard, J.2
  • 4
    • 79952786467 scopus 로고    scopus 로고
    • Generating research questions through problematization
    • Alvesson, M., & Sandberg, J. (2011). Generating research questions through problematization. Academy of Management Review, 36(2), 247-271.
    • (2011) Academy of Management Review , vol.36 , Issue.2 , pp. 247-271
    • Alvesson, M.1    Sandberg, J.2
  • 5
    • 79958697053 scopus 로고    scopus 로고
    • Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations
    • Bagozzi, R. P. (2011). Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations. MIS Quarterly, 35(2), 261-292.
    • (2011) MIS Quarterly , vol.35 , Issue.2 , pp. 261-292
    • Bagozzi, R.P.1
  • 6
    • 0018083950 scopus 로고
    • Compliance, adherence and the therapeutic alliance: Steps in the development of selfcare
    • Barofsky, I. (1978). Compliance, adherence and the therapeutic alliance: Steps in the development of selfcare. Social Science and Medicine, 12(5), 369-376.
    • (1978) Social Science and Medicine , vol.12 , Issue.5 , pp. 369-376
    • Barofsky, I.1
  • 7
    • 81355150547 scopus 로고    scopus 로고
    • Privacy in the digital age: A review of information privacy research in information systems
    • Belanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1041.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 1017-1041
    • Belanger, F.1    Crossler, R.E.2
  • 8
    • 33751507430 scopus 로고    scopus 로고
    • Collaborative information synthesis II: Recommendations for information systems to support synthesis activities
    • Blake, C., & Pratt, W. (2006). Collaborative information synthesis II: Recommendations for information systems to support synthesis activities. Journal of the American Society for Information Science and Technology, 57(14), 1888-1895.
    • (2006) Journal of the American Society for Information Science and Technology , vol.57 , Issue.14 , pp. 1888-1895
    • Blake, C.1    Pratt, W.2
  • 9
    • 84893068754 scopus 로고    scopus 로고
    • A hermeneutic approach to conducting literature reviews and literature searches
    • Boell, S. K., & Cecez-Kecmanovic, D. (2014). A hermeneutic approach to conducting literature reviews and literature searches. Communications of AIS, 34(1), 257-286.
    • (2014) Communications of AIS , vol.34 , Issue.1 , pp. 257-286
    • Boell, S.K.1    Cecez-Kecmanovic, D.2
  • 11
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523-527.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-527
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 12
    • 0012589538 scopus 로고    scopus 로고
    • Doing critical IS research: The question of methodology
    • In E. M. Trauth (Ed.), Hershey, PA: Idea Group Publishing
    • Cecez-Kecmanovic, D. (2001). Doing critical IS research: The question of methodology. In E. M. Trauth (Ed.), Qualitative research in IS: Issues and trends. Hershey, PA: Idea Group Publishing.
    • (2001) Qualitative Research in IS: Issues and Trends
    • Cecez-Kecmanovic, D.1
  • 13
    • 84877935501 scopus 로고    scopus 로고
    • Organizations’ information security policy compliance: Stick or carrot approach?
    • Chen, Y., Ramamurthy, K. R., & Wen, K.-W. (2012). Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157-188.
    • (2012) Journal of Management Information Systems , vol.29 , Issue.3 , pp. 157-188
    • Chen, Y.1    Ramamurthy, K.R.2    Wen, K.-W.3
  • 14
    • 84875523871 scopus 로고    scopus 로고
    • Assessing researcher publication productivity in the leading information systems journals: A 2005-2009 update
    • Clark, J. G., Au, Y. A., Walz, D. B., & Warren, J. (2011). Assessing researcher publication productivity in the leading information systems journals: A 2005-2009 update. Communications of the Association for Information Systems, 29, 459-504.
    • (2011) Communications of the Association for Information Systems , vol.29 , pp. 459-504
    • Clark, J.G.1    Au, Y.A.2    Walz, D.B.3    Warren, J.4
  • 16
    • 34247732721 scopus 로고
    • Grounded theory method: Procedures, canons, and evaluative criteria
    • Corbin, J., & Strauss, A. (1990). Grounded theory method: Procedures, canons, and evaluative criteria. Qualitative Sociology, 13, 3-21.
    • (1990) Qualitative Sociology , vol.13 , pp. 3-21
    • Corbin, J.1    Strauss, A.2
  • 18
    • 60249094410 scopus 로고    scopus 로고
    • A critical analysis of media discourse on information technology: Preliminary results of a proposed method for critical discourse analysis
    • Cukier, W., Ngwenyama, O., Bauer, R., & Middleton, C. (2009). A critical analysis of media discourse on information technology: Preliminary results of a proposed method for critical discourse analysis. Information Systems Journal, 19(2), 175-196.
    • (2009) Information Systems Journal , vol.19 , Issue.2 , pp. 175-196
    • Cukier, W.1    Ngwenyama, O.2    Bauer, R.3    Middleton, C.4
  • 19
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'arcy, J.1    Hovav, A.2    Galletta, D.3
  • 21
    • 0033220501 scopus 로고    scopus 로고
    • A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation
    • Deci, E. L., Koestner, R., & Ryan, R. M. (1999). A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. Psychological Bulletin, 125(6), 627-668.
    • (1999) Psychological Bulletin , vol.125 , Issue.6 , pp. 627-668
    • Deci, E.L.1    Koestner, R.2    Ryan, R.M.3
  • 22
    • 72249114849 scopus 로고
    • Information systems success: The quest for the dependent variable
    • DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60-95.
    • (1992) Information Systems Research , vol.3 , Issue.1 , pp. 60-95
    • Delone, W.H.1    McLean, E.R.2
  • 23
    • 10044273544 scopus 로고    scopus 로고
    • The discipline and practice of qualitative research
    • In N. K. Denzin, & Y. S. Lincoln (Eds.), Thousand Oaks, CA: Sage
    • Denzin, N. K., & Lincoln, Y. S. (2005). The discipline and practice of qualitative research. In N. K. Denzin, & Y. S. Lincoln (Eds.), The Sage handbook of qualitative research (pp. 1-33). Thousand Oaks, CA: Sage
    • (2005) The Sage Handbook of Qualitative Research , pp. 1-33
    • Denzin, N.K.1    Lincoln, Y.S.2
  • 24
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socioorganizational perspectives
    • Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Towards socioorganizational perspectives. Information Systems Journal, 11(2), 127-153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 25
    • 67650318762 scopus 로고    scopus 로고
    • User behaviour towards protective information technologies: The role of national cultural differences
    • Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal, 19(4), 391-412.
    • (2009) Information Systems Journal , vol.19 , Issue.4 , pp. 391-412
    • Dinev, T.1    Goo, J.2    Hu, Q.3    Nam, K.4
  • 26
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 386-408.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 27
    • 0020021336 scopus 로고
    • Compliance: An interactionist approach
    • Dracup, A., & Meleis, A. (1982). Compliance: An interactionist approach. Nursing Research, 31(1), 31-36.
    • (1982) Nursing Research , vol.31 , Issue.1 , pp. 31-36
    • Dracup, A.1    Meleis, A.2
  • 28
    • 0037244449 scopus 로고    scopus 로고
    • Managing empowerment and control in an intranet environment
    • Duane, A., & Finnegan, P. (2003). Managing empowerment and control in an intranet environment. Information Systems Journal, 13, 133-158.
    • (2003) Information Systems Journal , vol.13 , pp. 133-158
    • Duane, A.1    Finnegan, P.2
  • 35
    • 84876665025 scopus 로고    scopus 로고
    • Security-related behavior in using information systems in the workplace: A review and synthesis
    • Guo, K. H. (2013). Security-related behavior in using information systems in the workplace: A review and synthesis. Computers & Security, 32, 242-251.
    • (2013) Computers & Security , vol.32 , pp. 242-251
    • Guo, K.H.1
  • 36
    • 81255163048 scopus 로고    scopus 로고
    • Understanding nonmalicious security violations in the workplace: A composite behavior model
    • Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28(2), 203-236.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.2 , pp. 203-236
    • Guo, K.H.1    Yuan, Y.2    Archer, N.P.3    Connelly, C.E.4
  • 38
    • 33750613422 scopus 로고    scopus 로고
    • Political communication in media society: Does democracy still enjoy an epistemic dimension? The impact of normative theory on empirical research
    • Habermas, J. (2006). Political communication in media society: Does democracy still enjoy an epistemic dimension? The impact of normative theory on empirical research. Communication Theory, 16(4), 411-426.
    • (2006) Communication Theory , vol.16 , Issue.4 , pp. 411-426
    • Habermas, J.1
  • 39
    • 33846126313 scopus 로고    scopus 로고
    • 2nd ed.). London: Routledge
    • Hawkes, D. (2003). Ideology (2nd ed.). London: Routledge.
    • (2003) Ideology
    • Hawkes, D.1
  • 40
    • 84889663520 scopus 로고    scopus 로고
    • Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service
    • Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., & Rao, H. R. (2012). Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61-48.
    • (2012) Information Systems Journal , vol.24 , Issue.1 , pp. 61-68
    • Herath, T.1    Chen, R.2    Wang, J.3    Banjara, K.4    Wilbur, J.5    Rao, H.R.6
  • 41
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 42
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18, 106-125.
    • (2009) European Journal of Information Systems , vol.18 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 44
    • 84859105508 scopus 로고    scopus 로고
    • Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. And South Korea
    • Hovav, A., & D'Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. And South Korea. Information & Management, 49(2), 99-110.
    • (2012) Information & Management , vol.49 , Issue.2 , pp. 99-110
    • Hovav, A.1    D'arcy, J.2
  • 46
    • 1442303699 scopus 로고    scopus 로고
    • Disciplining information systems: Truth and its regimes
    • Introna, L. D. (2003). Disciplining information systems: Truth and its regimes. European Journal of Information Systems, 12(3), 235-240.
    • (2003) European Journal of Information Systems , vol.12 , Issue.3 , pp. 235-240
    • Introna, L.D.1
  • 47
    • 1242318217 scopus 로고    scopus 로고
    • Power and information technology research: A metatriangulation review
    • Jasperson, J., Butler, B. S., Carte, T. A., Croes, H. J. P., Saunders, C. S., & Zheng, W. (2002). Power and information technology research: A metatriangulation review. MIS Quarterly, 26(4), 397-459.
    • (2002) MIS Quarterly , vol.26 , Issue.4 , pp. 397-459
    • Jasperson, J.1    Butler, B.S.2    Carte, T.A.3    Croes, H.4    Saunders, C.S.5    Zheng, W.6
  • 48
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 49
    • 34548383363 scopus 로고    scopus 로고
    • Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development
    • Joseph, D., Ng, K.-Y., Koh, C., & Ang, S. (2007). Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly, 31(3), 547-577.
    • (2007) MIS Quarterly , vol.31 , Issue.3 , pp. 547-577
    • Joseph, D.1    Ng, K.-Y.2    Koh, C.3    Ang, S.4
  • 50
    • 18844431067 scopus 로고    scopus 로고
    • Information systems security policies: A contextual perspective
    • Karyda, M., Kiountouzis, E., & Kokolakis, S. (2005). Information systems security policies: A contextual perspective. Computers & Security, 24(3), 246-260.
    • (2005) Computers & Security , vol.24 , Issue.3 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 51
    • 0003437064 scopus 로고
    • Critique and power: Recasting the Foucault
    • (Ed.), Cambridge, MA: MIT Press
    • Kelly, M. (Ed.). (1994). Critique and power: Recasting the Foucault. Habermas debate. Cambridge, MA: MIT Press.
    • (1994) Habermas Debate
    • Kelly, M.1
  • 52
    • 61349195732 scopus 로고    scopus 로고
    • Clarifying the Foucault-Habermas debate: Morality, ethics, and “normative foundations”
    • King, M. (2009). Clarifying the Foucault-Habermas debate: Morality, ethics, and “normative foundations”. Philosophy & Social Criticism, 35(3), 287-314.
    • (2009) Philosophy & Social Criticism , vol.35 , Issue.3 , pp. 287-314
    • King, M.1
  • 53
    • 33747865449 scopus 로고    scopus 로고
    • Understanding the role and methods of meta-analysis in IS research
    • King, W. R., & He, J. (2005). Understanding the role and methods of meta-analysis in IS research. Communications of the AIS, 16, 665-686
    • (2005) Communications of the AIS , vol.16 , pp. 665-686
    • King, W.R.1    He, J.2
  • 54
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23(1), 67-94.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 67-94
    • Klein, H.K.1    Myers, M.D.2
  • 55
    • 84965719345 scopus 로고
    • Corporate strategy, organizations, and subjectivity: A critique
    • Knights, D., & Morgan, G. (1991). Corporate strategy, organizations, and subjectivity: A critique. Organization Studies, 12(2), 251-273.
    • (1991) Organization Studies , vol.12 , Issue.2 , pp. 251-273
    • Knights, D.1    Morgan, G.2
  • 56
    • 85027950618 scopus 로고    scopus 로고
    • Organizational power and information security rule compliance
    • Kolkowska, E., & Dhillon, G. (2013). Organizational power and information security rule compliance. Computers & Security, 33, 3-11.
    • (2013) Computers & Security , vol.33 , pp. 3-11
    • Kolkowska, E.1    Dhillon, G.2
  • 58
    • 47249153911 scopus 로고    scopus 로고
    • A multidimensional conceptualization of organizational corruption control
    • Lange, D. (2008). A multidimensional conceptualization of organizational corruption control. Academy of Management Review, 33(3), 710-729.
    • (2008) Academy of Management Review , vol.33 , Issue.3 , pp. 710-729
    • Lange, D.1
  • 59
    • 33846010136 scopus 로고    scopus 로고
    • A review of culture in information systems research: Toward a theory of information technology culture conflict
    • Leidner, D., & Kayworth, T. (2006). A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30(2), 357-399.
    • (2006) MIS Quarterly , vol.30 , Issue.2 , pp. 357-399
    • Leidner, D.1    Kayworth, T.2
  • 60
    • 75349090403 scopus 로고    scopus 로고
    • Understanding compliance with internet use policy from the perspective of rational choice theory
    • Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635-645.
    • (2010) Decision Support Systems , vol.48 , Issue.4 , pp. 635-645
    • Li, H.1    Zhang, J.2    Sarathy, R.3
  • 61
    • 84857365270 scopus 로고    scopus 로고
    • HIPAA privacy rule compliance: An interpretive study using Norman’s action theory
    • Liginlal, D., Sim, I., Khansa, L., & Fearn, P. (2012). HIPAA privacy rule compliance: An interpretive study using Norman’s action theory. Computers & Security, 31(2), 206-220.
    • (2012) Computers & Security , vol.31 , Issue.2 , pp. 206-220
    • Liginlal, D.1    Sim, I.2    Khansa, L.3    Fearn, P.4
  • 62
    • 84855531961 scopus 로고    scopus 로고
    • Paradigmatic controversies, contradictions, and emerging confluences, revisited
    • In N. K. Denzin & Y. S. Lincoln (Eds.), Thousand Oaks, CA: Sage
    • Lincoln, Y. S., Lynham, S. A., & Guba, E. G. (2011). Paradigmatic controversies, contradictions, and emerging confluences, revisited. In N. K. Denzin & Y. S. Lincoln (Eds.), The Sage handbook of qualitative research (pp. 97-128). Thousand Oaks, CA: Sage.
    • (2011) The Sage Handbook of Qualitative Research , pp. 97-128
    • Lincoln, Y.S.1    Lynham, S.A.2    Guba, E.G.3
  • 64
    • 80051733015 scopus 로고    scopus 로고
    • Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
    • MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293-334.
    • (2011) MIS Quarterly , vol.35 , Issue.2 , pp. 293-334
    • Mackenzie, S.B.1    Podsakoff, P.M.2    Podsakoff, N.P.3
  • 65
    • 33847691905 scopus 로고    scopus 로고
    • Editor's comments: Looking for a few good concepts and theories for the information systems field
    • Markus, M. L., & Saunders, C. (2007). Editor's comments: Looking for a few good concepts and theories for the information systems field. MIS Quarterly, 31(1), 3-4.
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 3-4
    • Markus, M.L.1    Saunders, C.2
  • 67
    • 79959546460 scopus 로고    scopus 로고
    • A set of principles for conducting critical research in information systems
    • Myers, M. D., & Klein, H. K. (2011). A set of principles for conducting critical research in information systems. MIS Quarterly, 35(1), 17-36.
    • (2011) MIS Quarterly , vol.35 , Issue.1 , pp. 17-36
    • Myers, M.D.1    Klein, H.K.2
  • 68
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 69
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Ng, B.-Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825.
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.C.3
  • 70
    • 71549126429 scopus 로고
    • Studying information technology in organizations: Research approaches and assumptions
    • Orlikowski, W. J., & Baroudi, J. J. (1991). Studying information technology in organizations: Research approaches and assumptions. Information Systems Research, 2(1), 1-28.
    • (1991) Information Systems Research , vol.2 , Issue.1 , pp. 1-28
    • Orlikowski, W.J.1    Baroudi, J.J.2
  • 71
    • 0035611374 scopus 로고    scopus 로고
    • Research commentary: Desperately seeking the "IT" in IT research--a Call to theorizing the IT artifact
    • Orlikowski, W. J., & Iacono, C. S. (2001). Research commentary: Desperately seeking the "IT" in IT research--a Call to theorizing the IT artifact. Information Systems Research, 12(2), 121-134.
    • (2001) Information Systems Research , vol.12 , Issue.2 , pp. 121-134
    • Orlikowski, W.J.1    Iacono, C.S.2
  • 72
    • 79960118806 scopus 로고    scopus 로고
    • The impact of norm-conforming behaviors on firm reputation
    • Philippe, D., & Durand, R. (2011). The impact of norm-conforming behaviors on firm reputation. Strategic Management Journal, 32(9), 969-993.
    • (2011) Strategic Management Journal , vol.32 , Issue.9 , pp. 969-993
    • Philippe, D.1    Durand, R.2
  • 73
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    Mackenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 74
    • 84875487357 scopus 로고    scopus 로고
    • When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse
    • Posey, C., Bennett, R. J., Roberts, T. L., & Lowry, P. B. (2011). When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse. Journal of Information Systems Security, 7(1), 24-47.
    • (2011) Journal of Information Systems Security , vol.7 , Issue.1 , pp. 24-47
    • Posey, C.1    Bennett, R.J.2    Roberts, T.L.3    Lowry, P.B.4
  • 75
    • 84887697195 scopus 로고    scopus 로고
    • Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
    • Posey, C., Roberts, T. L., Lowry, P. B., Bennett, R. J., & Courtney, J. (2013). Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37(4), 1189-1210.
    • (2013) MIS Quarterly , vol.37 , Issue.4 , pp. 1189-1210
    • Posey, C.1    Roberts, T.L.2    Lowry, P.B.3    Bennett, R.J.4    Courtney, J.5
  • 76
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • Puhakainen, P., & Siponen, M. (2010). Improving employees' compliance through information systems security training: An action research study. MIS Quarterly, 34(4), 757-778.
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 77
    • 55849105212 scopus 로고    scopus 로고
    • Information security awareness in higher education: An exploratory study
    • Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7), 421-253.
    • (2008) Computers & Security , vol.27 , Issue.7 , pp. 421-453
    • Rezgui, Y.1    Marks, A.2
  • 78
    • 84860658465 scopus 로고    scopus 로고
    • Absorptive capacity and information systems research: Review, synthesis, and directions for future research
    • Roberts, N., Galluch, P. S., Dinger, M., & Grover, V. (2012). Absorptive capacity and information systems research: Review, synthesis, and directions for future research. MIS Quarterly, 36(2), 625-648.
    • (2012) MIS Quarterly , vol.36 , Issue.2 , pp. 625-648
    • Roberts, N.1    Galluch, P.S.2    Dinger, M.3    Grover, V.4
  • 80
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487-A412.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-512
    • Siponen, M.1    Vance, A.2
  • 82
    • 58149367515 scopus 로고
    • Organizational citizenship behavior: Its nature and antecedents
    • Smith, C. A., Organ, D. W., & Near, J. P. (1983). Organizational citizenship behavior: Its nature and antecedents. Journal of Applied Psychology, 68(4), 653-663.
    • (1983) Journal of Applied Psychology , vol.68 , Issue.4 , pp. 653-663
    • Smith, C.A.1    Organ, D.W.2    Near, J.P.3
  • 83
    • 81355150537 scopus 로고    scopus 로고
    • Information privacy research: An interdisciplinary review
    • Smith, J. H., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989-1015.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 989-1015
    • Smith, J.H.1    Dinev, T.2    Xu, H.3
  • 84
    • 80054707541 scopus 로고    scopus 로고
    • Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies
    • Son, J.-Y. (2011). Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Information & Management, 48, 296-302.
    • (2011) Information & Management , vol.48 , pp. 296-302
    • Son, J.-Y.1
  • 85
    • 77957070672 scopus 로고    scopus 로고
    • User participation in information systems security risk management
    • Spears, J. L., & H. Barki (2010). User participation in information systems security risk management. MIS Quarterly, 34(3), 503-522.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 87
    • 84855226627 scopus 로고    scopus 로고
    • Information security policies in the UK healthcare sector: A critical evaluation
    • Stahl, B. C., Doherty, N. F., & Shaw, M. (2012). Information security policies in the UK healthcare sector: A critical evaluation. Information Systems Journal, 22(1), 77-94.
    • (2012) Information Systems Journal , vol.22 , Issue.1 , pp. 77-94
    • Stahl, B.C.1    Doherty, N.F.2    Shaw, M.3
  • 88
    • 67249159713 scopus 로고    scopus 로고
    • Editor's comments: Why top journals accept your paper
    • Straub, D. W. (2009). Editor's comments: Why top journals accept your paper. MIS Quarterly, 33(3), 3-10.
    • (2009) MIS Quarterly , vol.33 , Issue.3 , pp. 3-10
    • Straub, D.W.1
  • 91
    • 84861093724 scopus 로고    scopus 로고
    • Motivating IS security compliance: Insights from habit and protection motivation theory
    • Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49, 190-198.
    • (2012) Information & Management , vol.49 , pp. 190-198
    • Vance, A.1    Siponen, M.2    Pahnila, S.3
  • 92
    • 9744223613 scopus 로고    scopus 로고
    • The resource-based view and information systems research: Review, extension, and suggestions for future research
    • Wade, M., & Hulland, J. (2004). The resource-based view and information systems research: Review, extension, and suggestions for future research. MIS Quarterly, 28(1), 107-142.
    • (2004) MIS Quarterly , vol.28 , Issue.1 , pp. 107-142
    • Wade, M.1    Hulland, J.2
  • 93
    • 84905975061 scopus 로고    scopus 로고
    • Control-related motivations and information security policy compliance: The role of autonomy and efficacy
    • Wall, J. D., Palvia, P., & Lowry, P. B. (2013). Control-related motivations and information security policy compliance: The role of autonomy and efficacy. Journal of Information Privacy and Security, 9(4), 52-79.
    • (2013) Journal of Information Privacy and Security , vol.9 , Issue.4 , pp. 52-79
    • Wall, J.D.1    Palvia, P.2    Lowry, P.B.3
  • 95
    • 79955622246 scopus 로고    scopus 로고
    • The Influence of the informal social learning environment on information privacy policy compliance efficacy and intention
    • Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The Influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20, 267-284.
    • (2011) European Journal of Information Systems , vol.20 , pp. 267-284
    • Warkentin, M.1    Johnston, A.C.2    Shropshire, J.3
  • 96
    • 9744248960 scopus 로고    scopus 로고
    • Editor's comments: Theoretically speaking
    • Weber, R. (2003). Editor's comments: Theoretically speaking. MIS Quarterly, 27(3), 3-7.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 3-7
    • Weber, R.1
  • 97
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the past to prepare for the future: Writing a literature review
    • Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26(2), 8-23.
    • (2002) MIS Quarterly , vol.26 , Issue.2 , pp. 8-23
    • Webster, J.1    Watson, R.T.2
  • 98
    • 40849131050 scopus 로고    scopus 로고
    • Is actor network theory critique?
    • Whittle, A., & Spicer, A. (2008). Is actor network theory critique? Organization Studies, 29(4), 611-629.
    • (2008) Organization Studies , vol.29 , Issue.4 , pp. 611-629
    • Whittle, A.1    Spicer, A.2
  • 99
    • 84873974226 scopus 로고    scopus 로고
    • Beyond deterrence: An expanded view of employee computer abuse
    • Willison, R., & Warkentin, M. (2013). Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly, 37(1), 1-20.
    • (2013) MIS Quarterly , vol.37 , Issue.1 , pp. 1-20
    • Willison, R.1    Warkentin, M.2
  • 100
    • 79960702988 scopus 로고    scopus 로고
    • Punishment, justice, and compliance in Mandatory IT settings
    • Xue, Y., Liang, H., & Wu, L. (2011). Punishment, justice, and compliance in Mandatory IT settings. Information Systems Research, 22(2), 400-414.
    • (2011) Information Systems Research , vol.22 , Issue.2 , pp. 400-414
    • Xue, Y.1    Liang, H.2    Wu, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.