1 Berejikian, J D““A Cognitive Theory of Deterrence””, Journal of Peace Research, (2002), Vol. 39, No. 2, pp. 165-183.
2 Bulgurcu, B, Cavusoglu, H and Benbasat, I““Information Security Policy Com- pliance: An Empirical Study of Rationality -Based Beliefs and Information Security Awareness””, MIS Quarterly, (2010), Vol. 34, No. 3, pp. 523-548.
3 Chen, C C, Medlin, B D and Shaw, R S““A Cross-Cultural Investigation of Situational Information Security Awareness Programs””, Information Management and Computer Security, (2008), Vol. 16, No. 4, pp. 360-376.
4 Choi, N, Kim, D, Goo, J and Whitmore, A““Knowing is Doing: An Empirical Validation of theRelationship between Managerial Information Security Awareness and Action””, Information Management and Computer Security, (2008), Vol. 16, No. 5, pp. 484-501.
5 Drevin, L, Kruger, H A and Steyn, T““Value Focused Assessment of ICT Security Awareness in an Academic Environment””, Computers and Security, (2007), Vol. 26, No. 1, pp. 36-43.
6 Frank, J, Shamir, B and Briggs, W““Security-related Behavior of PC Users in Organizations””, Information and Management, (1991), Vol. 21, No. 3, pp. 127-135.
7 Goodhue, D L and Straub, D W““Security Concerns of System User: A Study of Perceptions of the Adequacy of Security””, Information and Management, (1991), Vol. 20, No. 1, pp. 13-27.
8 Govindarajan, V and Fisher, J““Strategy, Control Systems, and Resource Sharing: Effects on Business-unit Performance””, The Academy of Management Journal, (1990), Vol. 33, No. 2, pp. 259-285.
9 Ha, S W and Kim, H J““The Effects of User’s Security Awareness on Password Security Behavior””, Journal of Digital Contents Society, (2013), Vol. 14, No. 2, pp. 179-189.
10 Kang, D Y and Chang, M H““Factors Influencing on the Compliance of Information Security Policy of Workers of Shipping and Port Organization””, The Korea Port Economic Association, (2012), Vol. 28, No. 1, pp. 1-23.
11 Kang, J Y““A Study on the Systematized and Unified Plan of Port Logistics Security Management System””, Journal of Law and Politics research, (2013), Vol. 13, No. 2, pp. 389-436.
12 Kankanhalli, A, Teo, H H, Tan, B C Y and Wei, K““An Integrative Study of Information Systems Security Effectiveness””, International Journal of Information Management, (2003), Vol. 23, No. 2, pp. 139-154.
13 Kim, H j and Ahn, J H““An Empirical Study of Employee’s Deviant Behavior for Improving Efficiency of Information Security Governance””, Society for e-Business Studies, (2013), Vol. 18, No. 1, pp. 147-164.
14 Kim, S H and Song, Y M““An Empirical Study on Motivational Factors Influencing Information Security Policy Compliance and Security Behavior of End-Users (Employees) in Organizations””, The e-Business Studies, (2011), Vol. 12, No. 3, pp. 327-249.
15 Knapp, K J, Marshall, T E, Rainer, R K and Ford, F N“Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness White Paper, Information Systems Security Certification Consortium (ISC) 2005), 2.
16 Layton, TInformation Security Awareness, The Psychology behind the Technology, AuthorHouse 2005.
17 Lebow, R and Stein, J““Deterrence: The Elusive Dependent Variable””, World Politics, (1990), Vol. 42, No. 3, pp. 336-369.
18 Lee, S M, Lee, S G and Yoo, S““An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories””, Information and Management, (2004), Vol. 41, No. 6, pp. 707-718.
19 Lee, S J and Lee, M J““An Exploratory Study on the Information Security Culture Indicator””, Informatization policy, (2008), Vol. 15, No. 3, pp. 100-119.
20 Nosworthy, J““Implementing Information Security in the 21st Century-do You Have the Balancing Factors?””, Computer and Security, (2000), Vol. 19, No. 4, pp. 337-347.
21 Park, C J and Yim, M S““An Understanding of Impact of Security Counter- measures on Persistent Policy Compliance””, The Society of Digital Policy & Management, (2012), Vol. 10, No. 4, pp. 23-35.
22 Park, I B and Kim, J D““A Study on the Policy Management for Industrial Security's Culture””, The Journal of Korean Association for Industry Security, (2011), Vol. 2, No. 1, pp. 33-46.
23 Park, J Y““An Analysis on Training Curriculum for Educating Information Security Experts””, Management Information Systems Review, (2012), Vol. 31, No. 1, pp. 149-165.
24 Park, S S““Concept of Strategy in Organizational Information Security””, Journal of Information and Security, (2007), Vol. 7, No. 3, pp. 15-24.
25 Rezgui, Y and Marks, A““Information Security Awareness in Higher Education: An Exploratory Study””, Computers and Security, (2008), Vol. 27, No. 7-8, pp. 241-253.
26 Stanton, J, Stam, K, Mastrangelo, P and Jolton, J““Analysis of End User Security Behaviors””, Computers and Security, (2005), Vol. 24, No. 2, pp. 124-133.
27 Siponen, M T““A Conceptual Foundation for Organization Information Security Awareness””, Information Management and Computer Security, (2000), Vol. 8, No. 1, pp. 31-41.
28 Siponen, M, Pahnila, S and Mahmood, M A““Compliance with Information Security Policies: An Empirical Investigation””, Computer, (2010), Vol. 43, No. 2, pp. 64-71.
29 Sun, H G““Impacts of Information Security Policies and Organizations on the Information Security Performance in Korean Enterprises””, The Korea Society of Management Information Systems proceedings, (2005), Vol. 2005, No. 1, pp. 1087-1095.
30 Woo, S H““A Study on Security Capability of IDPS””, The Institute of Electronics and Information Engineers-CI, (2012), Vol. 49, No. 4, pp. 9-15.
31 Workman, M and Gathegi, J““Puni- shment and Ethics Deterrents: A Study of Insider Security Contravention””, Journal of the American Society for Information Science and Technolog, (2006), Vol. 58, No. 2, pp. 212-222.
32 Yim, M S““A Path Way to Increase the Intention to Comply with Information Security Policy of Employees””, The Society of Digital Policy & Managemen, (2012), Vol. 10, No. 10, pp. 119-128.