메뉴 건너뛰기




Volumn 16, Issue 6, 2007, Pages 315-331

Gaining access with social engineering: An empirical study of the threat

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84995871700     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1080/10658980701788165     Document Type: Article
Times cited : (113)

References (109)
  • 1
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making, IEEE Security and Privacy, 3: 26-33.
    • (2005) IEEE Security and Privacy , vol.3 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 2
    • 0035999319 scopus 로고    scopus 로고
    • Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
    • Ajzen, I. (2002). Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior, Journal of Applied Social Psychology, 32: 665-683.
    • (2002) Journal of Applied Social Psychology , vol.32 , pp. 665-683
    • Ajzen, I.1
  • 3
    • 51349167484 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Albrechtsen, E. (2006). A qualitative study of users' view on information security, Computers & Security, 25: 6, 445-451.
    • (2006) Computers & Security , vol.25 , Issue.6 , pp. 445-451
    • Albrechtsen, E.1
  • 4
    • 33748660099 scopus 로고    scopus 로고
    • The roles of perceived shared involvement and information overload in understanding how audiences make meaning of news about bioterrorism
    • Aldoory, L., & Van Dyke, M. A. (2006). The roles of perceived shared involvement and information overload in understanding how audiences make meaning of news about bioterrorism, Journalism & Mass Communication Quarterly, 83: 346-361.
    • (2006) Journalism & Mass Communication Quarterly , vol.83 , pp. 346-361
    • Aldoory, L.1    Van Dyke, M.A.2
  • 5
    • 84986665106 scopus 로고
    • The measurement and antecedents of affective, continuance and normative commitment to the organization
    • Allen, N. J., & Meyer, J. P. (1990). The measurement and antecedents of affective, continuance and normative commitment to the organization, Journal of Occupational Psychology, 63: 1-18.
    • (1990) Journal of Occupational Psychology , vol.63 , pp. 1-18
    • Allen, N.J.1    Meyer, J.P.2
  • 8
    • 0005959905 scopus 로고    scopus 로고
    • Development of affective organizational commitment: A cross-sectional examination of change with tenure
    • Beck, K., & Wilson, C. (2000). Development of affective organizational commitment: A cross-sectional examination of change with tenure, Journal of Vocational Behavior, 56: 114-136.
    • (2000) Journal of Vocational Behavior , vol.56 , pp. 114-136
    • Beck, K.1    Wilson, C.2
  • 9
    • 33746279675 scopus 로고    scopus 로고
    • The relationship between affective and normative commitment: Review and research agenda
    • Bergman, M. E. (2006). The relationship between affective and normative commitment: Review and research agenda, Journal of Organizational Behavior, 27: 645-663.
    • (2006) Journal of Organizational Behavior , vol.27 , pp. 645-663
    • Bergman, M.E.1
  • 10
    • 10844269972 scopus 로고    scopus 로고
    • Invited response to review of –obedience to authority: Current perspectives on the milgram paradigm,—
    • Blass, T. (2000). Invited response to review of –Obedience to authority: Current perspectives on the Milgram paradigm,— British Journal of Educational Psychology, 70: 624-625.
    • (2000) British Journal of Educational Psychology , vol.70 , pp. 624-625
    • Blass, T.1
  • 11
    • 84992542393 scopus 로고
    • On the interchangeability of objective and subjective measures of employee performance: A meta-analysis
    • Bommer, W. H., Johnson, J. L., Rich, G. A., Podsakoff, P. M., & MacKenzie, S. B. (1995). On the interchangeability of objective and subjective measures of employee performance: A meta-analysis, Personnel Psychology, 48: 587-605.
    • (1995) Personnel Psychology , vol.48 , pp. 587-605
    • Bommer, W.H.1    Johnson, J.L.2    Rich, G.A.3    Podsakoff, P.M.4    MacKenzie, S.B.5
  • 14
    • 33846367309 scopus 로고    scopus 로고
    • People-often the weakest link in security, but one of the best places to start
    • July- August
    • Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start, Journal of Health Care Compliance, July- August: 57-60.
    • (2004) Journal of Health Care Compliance , pp. 57-60
    • Bresz, F.P.1
  • 15
    • 85023980343 scopus 로고    scopus 로고
    • Escalation of economic costs, sunk costs, and opportunity costs: A psychological investment perspective
    • Brill D. W., & Molton, P. (2006). Escalation of economic costs, sunk costs, and opportunity costs: A psychological investment perspective, International Journal of Human Decisioning, 12: 29-38.
    • (2006) International Journal of Human Decisioning , vol.12 , pp. 29-38
    • Brill, D.W.1    Molton, P.2
  • 17
    • 33750922314 scopus 로고    scopus 로고
    • Ethics in information technology and software use
    • Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3): 301-312.
    • (2004) Journal of Business Ethics , vol.51 , Issue.3 , pp. 301-312
    • Calluzzo, V.J.1    Cante, C.J.2
  • 18
    • 20144378379 scopus 로고    scopus 로고
    • Competent jerks, lovable fools, and the formation of social networks
    • Casciaro, T., & Lobo, M. S. (2005). Competent jerks, lovable fools, and the formation of social networks, Harvard Business Review, 83: 92-99.
    • (2005) Harvard Business Review , vol.83 , pp. 92-99
    • Casciaro, T.1    Lobo, M.S.2
  • 19
    • 19644365309 scopus 로고    scopus 로고
    • Individuality, willingness to take risk, and use of a personal e-card
    • Charbaji, A., & Jannoun, S. E. L. (2005). Individuality, willingness to take risk, and use of a personal e-card, Journal of Managerial Psychology, 20: 51-58.
    • (2005) Journal of Managerial Psychology , vol.20 , pp. 51-58
    • Charbaji, A.1    Jannoun, S.2
  • 22
    • 33749468564 scopus 로고    scopus 로고
    • Security information management as an outsourced service
    • Debar, H., & Viinikka, J. (2006). Security information management as an outsourced service, Information Management & Computer Security, 14:5: 417-435.
    • (2006) Information Management & Computer Security , vol.14 , Issue.5 , pp. 417-435
    • Debar, H.1    Viinikka, J.2
  • 26
    • 33745726919 scopus 로고    scopus 로고
    • The practically of super bowl advertising for new products and companies
    • Dotterweich, D. P., & Collins, K. S. (2006). The practically of super bowl advertising for new products and companies, Journal of Promotion Management, 11: 19-31.
    • (2006) Journal of Promotion Management , vol.11 , pp. 19-31
    • Dotterweich, D.P.1    Collins, K.S.2
  • 27
    • 0001762979 scopus 로고
    • A cognitive theory of resistance and reactance: Implications for treatment
    • Dowd, E. T., & Seibel, C. A. (1990). A cognitive theory of resistance and reactance: Implications for treatment, Journal of Mental Health Counseling, 12: 458-469.
    • (1990) Journal of Mental Health Counseling , vol.12 , pp. 458-469
    • Dowd, E.T.1    Seibel, C.A.2
  • 28
    • 39749112353 scopus 로고    scopus 로고
    • Accessed January 29, 2007, from http://www.ftc.gov/bcp/ conline/pubs/buspubs/tsrcomp.htm
    • Federal Trade Commission. (2003). Complying with the telemarketing sales rule. Accessed January 29, 2007, from http://www.ftc.gov/bcp/ conline/pubs/buspubs/tsrcomp.htm
    • (2003) Complying with the Telemarketing Sales Rule
  • 29
    • 33646671664 scopus 로고    scopus 로고
    • Interpersonal communication and compliance: The disrupt-then-reframe technique in dyadic influence settings
    • Fennis, B. M., Das, E., & Pruyn, A. Th. H. (2006). Interpersonal communication and compliance: The disrupt-then-reframe technique in dyadic influence settings, Communication Research, 33(2): 136-151.
    • (2006) Communication Research , vol.33 , Issue.2 , pp. 136-151
    • Fennis, B.M.1    Das, E.2    Pruyn, A.T.3
  • 31
    • 85023968268 scopus 로고    scopus 로고
    • Robbing the cradle is like taking candy from a baby, proceedings of the annual conference of the security policy institute (Gcspi), october 4, amsterdam
    • Gao, W., & Kim, J. (2007). Robbing the cradle is like taking candy from a baby, Proceedings of the Annual Conference of the Security Policy Institute (GCSPI), October 4, Amsterdam, The Netherlands, 1, 23-37.
    • (2007) The Netherlands , vol.1 , pp. 23-37
    • Gao, W.1    Kim, J.2
  • 33
    • 24644517491 scopus 로고    scopus 로고
    • Can you judge a questionnaire by its cover? The effect of questionnaire cover design on mail survey response
    • Gendall, P. (2005). Can you judge a questionnaire by its cover? The effect of questionnaire cover design on mail survey response, International Journal of Public Opinion Research, 17: 346-361.
    • (2005) International Journal of Public Opinion Research , vol.17 , pp. 346-361
    • Gendall, P.1
  • 34
    • 0003385603 scopus 로고
    • Language, social comparison and power
    • C. R. Berger and S. H. Chaffee (Eds.), Newbury Park, CA: Sage
    • Giles, H., & Wiemann, J. M. (1987). Language, social comparison and power. In C. R. Berger and S. H. Chaffee (Eds.), The Handbook of Communication Science (pp. 350-384). Newbury Park, CA: Sage.
    • (1987) The Handbook of Communication Science , pp. 350-384
    • Giles, H.1    Wiemann, J.M.2
  • 36
    • 33645848461 scopus 로고    scopus 로고
    • People at risk of flooding: Why some residents take precautionary action while others do not
    • Grothmann, T., & Reusswig, F. (2006). People at risk of flooding: Why some residents take precautionary action while others do not, Natural Hazards, 38: 101-120.
    • (2006) Natural Hazards , vol.38 , pp. 101-120
    • Grothmann, T.1    Reusswig, F.2
  • 37
    • 0007124075 scopus 로고    scopus 로고
    • A situational theory of publics: Conceptual history, recent challenges and new research
    • D. Moss, T. MacManus, & D. Vercic (Eds.), London: International Thomson Business Press
    • Grunig, J. E. (1997). A situational theory of publics: Conceptual history, recent challenges and new research. In D. Moss, T. MacManus, & D. Vercic (Eds.), Public Relations Research: An International Perspective (pp. 3-48). London: International Thomson Business Press.
    • (1997) Public Relations Research: An International Perspective , pp. 3-48
    • Grunig, J.E.1
  • 38
    • 0036125972 scopus 로고    scopus 로고
    • On-line persuasion: An examination of differences in computer-mediated interpersonal influence
    • Guadagno, R. E., & Cialdini, R. B. (2002). On-line persuasion: An examination of differences in computer-mediated interpersonal influence, Group Dynamics: Theory, Research and Practice, 6: 38-51.
    • (2002) Group Dynamics: Theory, Research and Practice , vol.6 , pp. 38-51
    • Guadagno, R.E.1    Cialdini, R.B.2
  • 40
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • (Sept.)
    • Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, MIS Quarterly, 20(Sept.): 257-258.
    • (1996) MIS Quarterly , vol.20 , pp. 257-258
    • Harrington, S.J.1
  • 41
    • 84982737886 scopus 로고
    • Obedience to authority in a laboratory setting: Generalizability and context dependency
    • Helm, C., & Morelli, M. (1985). Obedience to authority in a laboratory setting: Generalizability and context dependency, Political Studies, 14: 610-627.
    • (1985) Political Studies , vol.14 , pp. 610-627
    • Helm, C.1    Morelli, M.2
  • 42
    • 33846389143 scopus 로고    scopus 로고
    • Smart executives, dumb decisions
    • Hochhauser, M. (2004). Smart executives, dumb decisions, Journal of Risk Management, 51: 64-73.
    • (2004) Journal of Risk Management , vol.51 , pp. 64-73
    • Hochhauser, M.1
  • 43
    • 84925886526 scopus 로고
    • The effects of expertise and physical attractiveness upon opinion agreement and liking
    • Horai, J., Naccari, N., & Fatoullah, E. (1974). The effects of expertise and physical attractiveness upon opinion agreement and liking, Sociometry, 37: 601-606.
    • (1974) Sociometry , vol.37 , pp. 601-606
    • Horai, J.1    Naccari, N.2    Fatoullah, E.3
  • 44
    • 0037276463 scopus 로고    scopus 로고
    • An investigation of volitional control in information ethics
    • Hsu, M-H., & Kuo, F-Y. (2003). An investigation of volitional control in information ethics, Behavior and Information Technology, 22: 53-62.
    • (2003) Behavior and Information Technology , vol.22 , pp. 53-62
    • Hsu, M.-H.1    Kuo, F.-Y.2
  • 46
    • 84993839827 scopus 로고
    • A theoretical perspective for understanding reactions to victimization
    • Janoff-Bulman, R., & Frieze, I. H. (1983). A theoretical perspective for understanding reactions to victimization, Journal of Social Issues, 39: 1-17.
    • (1983) Journal of Social Issues , vol.39 , pp. 1-17
    • Janoff-Bulman, R.1    Frieze, I.H.2
  • 48
    • 39749188622 scopus 로고    scopus 로고
    • Disruptive technologies and the evolution of the law
    • Keck, R. (2005). Disruptive technologies and the evolution of the law, Legal Briefs, 23(1): 22-49.
    • (2005) Legal Briefs , vol.23 , Issue.1 , pp. 22-49
    • Keck, R.1
  • 50
    • 85024035089 scopus 로고
    • Communities of practice and communities of trust: Global culture and information technology
    • Komlto, L. (1994). Communities of practice and communities of trust: Global culture and information technology, Journal of Anthropology, 4: 33-45.
    • (1994) Journal of Anthropology , vol.4 , pp. 33-45
    • Komlto, L.1
  • 51
  • 52
    • 84986356306 scopus 로고
    • Ethical intentions and the theories of reasoned action and planned behavior
    • Kurland, N. B. (1995). Ethical intentions and the theories of reasoned action and planned behavior. Journal of Applied Social Psychology, 25(4): 297-313.
    • (1995) Journal of Applied Social Psychology , vol.25 , Issue.4 , pp. 297-313
    • Kurland, N.B.1
  • 53
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behavior
    • Leach, J. (2003). Improving user security behavior, Computers & Security, 22: 685-691.
    • (2003) Computers & Security , vol.22 , pp. 685-691
    • Leach, J.1
  • 54
    • 84965799600 scopus 로고
    • On being mugged: The event and its aftermath
    • Lejeune, R., & Alex, N. (1973). On being mugged: The event and its aftermath, Urban Life and Culture, 2: 259-287.
    • (1973) Urban Life and Culture , vol.2 , pp. 259-287
    • Lejeune, R.1    Alex, N.2
  • 55
    • 60049089661 scopus 로고    scopus 로고
    • Clueless office workers help spread computer viruses, the register
    • Leyden, J. (2004). Clueless office workers help spread computer viruses, The Register, February 6: 17-21.
    • (2004) February , vol.6 , pp. 17-21
    • Leyden, J.1
  • 56
    • 26644460676 scopus 로고    scopus 로고
    • Anticipated guilt as behavioral motivation: An examination of appeals to help unknown others through bone marrow donation
    • Lindsey, L. L. M. (2005). Anticipated guilt as behavioral motivation: An examination of appeals to help unknown others through bone marrow donation, Human Communication Research, 31: 453-481.
    • (2005) Human Communication Research , vol.31 , pp. 453-481
    • Lindsey, L.1
  • 57
    • 39749172221 scopus 로고    scopus 로고
    • Orlando, FL: The Information Law Web. Accessed November 5, 2007, at http://fioridalawfirm.com/privacy.html
    • Losey, R. C. (1998). The electronic communications privacy act: United States Code. Orlando, FL: The Information Law Web. Accessed November 5, 2007, at http://fioridalawfirm.com/privacy.html
    • (1998) The Electronic Communications Privacy Act: United States Code
    • Losey, R.C.1
  • 58
    • 84948872568 scopus 로고
    • Scarcity's enhancement of desirability
    • Lynn, M. (1992). Scarcity's enhancement of desirability, Basic and Applied Social Psychology, 13: 67-78.
    • (1992) Basic and Applied Social Psychology , vol.13 , pp. 67-78
    • Lynn, M.1
  • 59
    • 84965484852 scopus 로고
    • Assessing organizational commitment: An employee's global attitude toward the organization
    • McCaul, H. S., Hinsz, V. B., & McCaul, K. D. (1995). Assessing organizational commitment: An employee's global attitude toward the organization, Journal of Applied Behavioral Science, 31: 80-90.
    • (1995) Journal of Applied Behavioral Science , vol.31 , pp. 80-90
    • McCaul, H.S.1    Hinsz, V.B.2    McCaul, K.D.3
  • 63
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
    • Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory, Journal of Applied Social Psychology, (30): 106-143.
    • (2000) Journal of Applied Social Psychology , Issue.30 , pp. 106-143
    • Milne, S.1    Sheeran, P.2    Orbell, S.3
  • 66
    • 60049100586 scopus 로고    scopus 로고
    • Snms - shadow network management system, symposium on network computing and management, singapore
    • Ong, T. H., Tan, C. P., Tan, Y. T., & Ting, C. (1999). SNMS - Shadow network management system, Symposium on Network Computing and Management, Singapore, May 21, 1-9.
    • (1999) May , vol.21 , pp. 1-9
    • Ong, T.H.1    Tan, C.P.2    Tan, Y.T.3    Ting, C.4
  • 69
    • 0037396112 scopus 로고    scopus 로고
    • What to convey in antismoking advertisements of adolescents: The use of protection motivation theory to identify effective message themes
    • Pechmann, C., Zhao, G., Goldberg, M., & Reibling E. T. (2003). What to convey in antismoking advertisements of adolescents: The use of protection motivation theory to identify effective message themes, Journal of Marketing, 67(2): 1-18.
    • (2003) Journal of Marketing , vol.67 , Issue.2 , pp. 1-18
    • Pechmann, C.1    Zhao, G.2    Goldberg, M.3    Reibling, E.T.4
  • 72
    • 85047671982 scopus 로고    scopus 로고
    • Thought confidence as a determinant of persuasion: The self-validation hypothesis
    • Petty, R. E., Brinol, P., & Tormala, Z. L. (2002). Thought confidence as a determinant of persuasion: The self-validation hypothesis, Journal of Personality and Social Psychology, 82: 722-741.
    • (2002) Journal of Personality and Social Psychology , vol.82 , pp. 722-741
    • Petty, R.E.1    Brinol, P.2    Tormala, Z.L.3
  • 74
    • 0000428577 scopus 로고
    • Central and peripheral routes to advertising effectiveness: The moderating role of involvement
    • Petty, R. E., Cacioppo, J. T., & Schumann, D. W. (1983). Central and peripheral routes to advertising effectiveness: The moderating role of involvement, Journal of Consumer Research, 10: 135-146.
    • (1983) Journal of Consumer Research , vol.10 , pp. 135-146
    • Petty, R.E.1    Cacioppo, J.T.2    Schumann, D.W.3
  • 76
    • 21444458113 scopus 로고    scopus 로고
    • Why do we need what we need? A terror management perspective on the roots of human social motivation,"
    • Pyszczynski, T., Greenberg, J., & Solomon, S. (1997). Why do we need what we need? A terror management perspective on the roots of human social motivation," Psychological Inquiry, 8: 1-20.
    • (1997) Psychological Inquiry , vol.8 , pp. 1-20
    • Pyszczynski, T.1    Greenberg, J.2    Solomon, S.3
  • 77
    • 0030919502 scopus 로고    scopus 로고
    • The association between illusions of invulnerability and exposure to trauma
    • Roe-Berning, S., & Straker, G. (1997). The association between illusions of invulnerability and exposure to trauma, Journal of Traumatic Stress, 10: 319-327.
    • (1997) Journal of Traumatic Stress , vol.10 , pp. 319-327
    • Roe-Berning, S.1    Straker, G.2
  • 78
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change, Journal of Psychology, 91: 93-114.
    • (1975) Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 79
    • 84973744422 scopus 로고
    • Historical origins of the health belief model
    • Rosenstock, I. M. (1974). Historical origins of the health belief model, Health Education Monograph, 2: 328-335.
    • (1974) Health Education Monograph , vol.2 , pp. 328-335
    • Rosenstock, I.M.1
  • 80
    • 33846849570 scopus 로고    scopus 로고
    • Organizational security culture: Extending the end-user perspective
    • Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organizational security culture: Extending the end-user perspective, Computers and Security, 26(1): 56-62.
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 56-62
    • Ruighaver, A.B.1    Maynard, S.B.2    Chang, S.3
  • 81
    • 85023971931 scopus 로고    scopus 로고
    • Report of the U.S. Department of Justice, INET'99 Conference. Retrieved February 6, 2007, from: http://www.isoc.org/inet99/proceedings/3g/3g_2.htm
    • Rusch, J. J. (1999). The social engineering of Internet fraud. Report of the U.S. Department of Justice, INET'99 Conference. Retrieved February 6, 2007, from: http://www.isoc.org/inet99/proceedings/3g/3g_2.htm
    • (1999) The Social Engineering of Internet Fraud
    • Rusch, J.J.1
  • 82
    • 45949118681 scopus 로고
    • Scarcity or abundance caused by people or the environment as determinants of behavior in the resource dilemma
    • Rutte, C. G., Wilke, H. A. M., & Messick, D. M. (1987). Scarcity or abundance caused by people or the environment as determinants of behavior in the resource dilemma, Journal of Experimental Social Psychology, 23: 208-216.
    • (1987) Journal of Experimental Social Psychology , vol.23 , pp. 208-216
    • Rutte, C.G.1    Wilke, H.2    Messick, D.M.3
  • 84
    • 0009206503 scopus 로고    scopus 로고
    • Employee absenteeism, organizational commitment, and job satisfaction: Another look
    • Sagie, A. (1998). Employee absenteeism, organizational commitment, and job satisfaction: Another look, Journal of Vocational Behavior, 52: 156-171.
    • (1998) Journal of Vocational Behavior , vol.52 , pp. 156-171
    • Sagie, A.1
  • 85
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the weakest link-a human/computer interaction approach to usable and effective security
    • Sasse, M. A., Brostoff, S., & Weirich, D. (2004). Transforming the weakest link-A human/computer interaction approach to usable and effective security, BT Technology Journal, 19(3): 122-131.
    • (2004) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 86
    • 0007026070 scopus 로고    scopus 로고
    • Enforcement policy and corporate misconduct: The changing perspective of deterrence theory
    • Scholz, J. T. (1997). Enforcement policy and corporate misconduct: The changing perspective of deterrence theory, Law and Contemporary Problem, (60): 153-268.
    • (1997) Law and Contemporary Problem , Issue.60 , pp. 153-268
    • Scholz, J.T.1
  • 87
    • 84936043926 scopus 로고
    • Corporate advertising in america: A review of published studies on use, measurement, and effectiveness
    • September
    • Schumann, D. W., Hathcote, J. M., & West, S. (1991). Corporate advertising in America: A review of published studies on use, measurement, and effectiveness, Journal of Advertising September: 35-55.
    • (1991) Journal of Advertising , pp. 35-55
    • Schumann, D.W.1    Hathcote, J.M.2    West, S.3
  • 90
    • 77649328070 scopus 로고    scopus 로고
    • The office now a major place for identity theft
    • (Sept.): 1-4
    • Shreve, M. (2004). The office now a major place for identity theft, Crains, (Sept.): 1-4.
    • (2004) Crains
    • Shreve, M.1
  • 91
    • 0000815341 scopus 로고
    • The escalation of commitment to a course of action
    • Staw, B. M. (1981). The escalation of commitment to a course of action, The Academy of Management Review, 6: 577-587.
    • (1981) The Academy of Management Review , vol.6 , pp. 577-587
    • Staw, B.M.1
  • 94
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study, mis quarterly
    • Straub, D. W., & Nance, W. D. (1990). Discovering and disciplining computer abuse in organizations: A field study, MIS Quarterly, March 14: 45-62.
    • (1990) March , vol.14 , pp. 45-62
    • Straub, D.W.1    Nance, W.D.2
  • 95
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision-making
    • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision-making, MIS Quarterly, 22: 441-469.
    • (1998) MIS Quarterly , vol.22 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 96
    • 0001868677 scopus 로고
    • The social identity theory of inter-group behavior
    • S. Worchel & L. W. Austin (Eds.), Chicago, IL: Nelson-Hall
    • Tajfel, H., & Turner, J. C. (1986). The social identity theory of inter-group behavior. In S. Worchel & L. W. Austin (Eds.), Psychology of Intergroup Relations. Chicago, IL: Nelson-Hall.
    • (1986) Psychology of Intergroup Relations
    • Tajfel, H.1    Turner, J.C.2
  • 97
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of iso17799
    • Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799, Computers and Security, 24: 472-484.
    • (2005) Computers and Security , vol.24 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 99
    • 39749183298 scopus 로고    scopus 로고
    • Violation of 18 usc. Gaining unauthorized access
    • U.S. Department of Justice
    • U.S. Department of Justice. (2004). Violation of 18 USC. Gaining unauthorized access. Information Security Report of the GAO, 17: 188-219.
    • (2004) Information Security Report of the GAO , vol.17 , pp. 188-219
  • 100
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • von Solms, B., & von Solms, R. (2004). The 10 deadly sins of information security management, Computers & Security, 23: 371-376.
    • (2004) Computers & Security , vol.23 , pp. 371-376
    • Von Solms, B.1    Von Solms, R.2
  • 101
    • 33745700454 scopus 로고    scopus 로고
    • Examining user perceptions of third-party organization credibility and trust in an e-retailer
    • Wakefield, R. L., & Whitten, D. (2006). Examining user perceptions of third-party organization credibility and trust in an e-retailer, Journal of Organizational and End User Computing, 18: 1-19.
    • (2006) Journal of Organizational and End User Computing , vol.18 , pp. 1-19
    • Wakefield, R.L.1    Whitten, D.2
  • 102
    • 4544277953 scopus 로고    scopus 로고
    • Psychological antecedents of institution-based consumer trust in e-retailing
    • Walczuch, R., & Lundgren, H. (2004). Psychological antecedents of institution-based consumer trust in e-retailing, Information & Management, 42(1): 159-177.
    • (2004) Information & Management , vol.42 , Issue.1 , pp. 159-177
    • Walczuch, R.1    Lundgren, H.2
  • 103
    • 9244224654 scopus 로고    scopus 로고
    • An overview of online trust: Concepts, elements, and implications
    • Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications, Journal of Computers in Human Behavior, 21: 105-125.
    • (2005) Journal of Computers in Human Behavior , vol.21 , pp. 105-125
    • Wang, Y.D.1    Emurian, H.H.2
  • 105
    • 33846345293 scopus 로고    scopus 로고
    • Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminology theory to the is security context
    • January 5, Waikoloa, Hawaii
    • Wilson, R. (2004). Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminology theory to the IS security context, Proceedings from the 37th Hawaii International Conference on System Sciences (HICSS), January 5, Waikoloa, Hawaii, 1-10.
    • (2004) Th Hawaii International Conference on System Sciences (HICSS) , pp. 1-10
    • Wilson, R.1
  • 108
    • 27144550225 scopus 로고    scopus 로고
    • Are the drivers and role of online trust the same for all web sites and consumers?: A large scale exploratory empirical study
    • Yakov, B., Shankar, V., Sultan, F., & Urban G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers?: A large scale exploratory empirical study, Journal of Marketing, 69 (4): 133-152.
    • (2005) Journal of Marketing , vol.69 , Issue.4 , pp. 133-152
    • Yakov, B.1    Shankar, V.2    Sultan, F.3    Urban, G.L.4
  • 109
    • 33646689546 scopus 로고    scopus 로고
    • Investigating initial trust toward e-tailers from the elaboration likelihood model perspective
    • Yang, S., Hung, W., Sung, K., & Farn, C. (2006). Investigating initial trust toward e-tailers from the elaboration likelihood model perspective, Psychology and Marketing, 23: 429-445.
    • (2006) Psychology and Marketing , vol.23 , pp. 429-445
    • Yang, S.1    Hung, W.2    Sung, K.3    Farn, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.