§ 瀏覽學位論文書目資料
  
系統識別號 U0002-0207201421131100
DOI 10.6846/TKU.2014.00067
論文名稱(中文) 以資訊安全氣候與心理觀點探討資安政策順從之研究
論文名稱(英文) Information Security Policy Compliance:A View from Information Security Climate and Psychology
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊管理學系碩士班
系所名稱(英文) Department of Information Management
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 102
學期 2
出版年 103
研究生(中文) 劉家吟
研究生(英文) Jia-Yin Liou
學號 601630121
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2014-06-21
論文頁數 93頁
口試委員 指導教授 - 施盛寶
委員 - 游佳萍
委員 - 伍台國
關鍵字(中) 資訊安全氣候
心理所有權
資訊安全政策順從意圖
場理論
關鍵字(英) information security climate
psychological ownership
information security policy compliance intention
field theory
第三語言關鍵字
學科別分類
中文摘要
隨著資訊科技的日益普及,使得資訊安全管理議題逐漸受到重視。目前在資訊安全政策順從方面的研究主要著重在一般嚇阻理論、保護動機理論來探討員工的資訊安全行為,但是這些研究以組織規範、個人行為動機觀點為考量,沒有注意到員工個人內心層面的影響。因此本研究以企業組織內的員工為研究對象,運用場理論的觀點,結合背景因素中的資訊安全氣候,以及個人因素中的心理所有權,探討其對組織承諾的影響,進而討論對資訊安全政策順從意圖的影響效果。本研究對象為天下雜誌的服務業行業別排名,以電信、資訊(通訊、IC通路)、資訊設備銷售與服務、建設等具有實行資訊安全政策的企業組織員工,以網路問卷和紙本問卷的方式來調查。研究結果發現,資訊安全氣候會顯著影響組織承諾中的情感承諾、持續承諾、規範承諾,也會顯著影響心理所有權和資訊安全政策順從意圖,而心理所有權會顯著影響組織承諾中的情感承諾、持續承諾與規範承諾,組織承諾中的規範承諾會顯著影響資訊安全政策順從意圖,同時,心理所有權也顯著影響資訊安全政策順從意圖;組織承諾中的情感承諾、持續承諾並沒有顯著影響資訊安全政策順從意圖。因此,本研究認為,藉由增加組織的資訊安全氣候可以提升員工心理所有權,進一步促進員工的組織承諾,來增加資訊安全政策順從意圖。
英文摘要
With the rapid development of information technology, information security management issues are more and more important. Currently, information security policy compliance research mainly investigates information security behaviors of employees from general deterrence theory and protection motivation theory lens. However, these studies focus on the discussions of security specifications of organization and the motivations of individual’s behavior but omit the influences of psychological factors on employee’s information security policy compliance. To fill this gap, based on the field theory, we considered information security climate as background factors and psychological ownership as personal factors, this study investigated employees in the service industry in Taiwan to explore the impacts of information security climate and psychological ownership on organizational commitment and information security policy compliance intentions. The survey employed web questionnaires and hard copied questionnaires to increase response rate. The results showed that the information security climate significantly impacted affective commitment, continuance commitment, and normative commitment. It also significantly affected psychological ownership and information security policy compliance intention. Psychological ownership significantly impacted affective commitment, continuance commitment, normative commitment, and information security policy compliance intention. The normative commitment significantly impacted information security policy compliance intention. Affective commitment and continuance commitment had no significant effects on information security policy compliance intention. In sum, this study suggests that information security climate and psychological ownership can promote organizational commitment of employees, and thereby increase the information security policy compliance intention.
第三語言摘要
論文目次
目錄
 第一章 緒論	1
1.1	研究背景與動機	1
1.2	研究目的	7
 第二章 文獻探討	8
2.1	資訊安全政策順從(Information security policy compliance)	8
2.2	組織承諾(Organization commitment)	21
2.3	資訊安全氣候(Information security climate)	27
2.4	心理所有權(Psychological ownership)	31
2.4.1	心理所有權的定義	31
2.4.2	心理所有權的決定因子	32
2.5	場理論(Field theory)	34
 第三章 研究假說	36
3.1	研究架構	36
3.2	研究假說	38
3.2.1	資訊安全氣候與心理所有權	38
3.2.2	資訊安全氣候與組織承諾	39
3.2.3	資訊安全氣候與資訊安全政策順從意圖	41
3.2.4	心理所有權與組織承諾	42
3.2.5	心理所有權與資訊安全政策順從意圖	45
3.2.6	組織承諾與資訊安全政策順從意圖	46
 第四章 研究方法	49
4.1	資料蒐集	49
4.2	構念衡量	50
4.2.1	高階管理注意	50
4.2.2	安全政策	51
4.2.3	安全強化	52
4.2.4	安全認知計畫	52
4.2.5	心理所有權	53
4.2.6	情感承諾	54
4.2.7	持續承諾	54
4.2.8	規範承諾	55
4.2.9	資訊安全政策順從意圖	56
4.3	前測結果	57
 第五章 資料分析與結果	58
5.1	資料分析方法	58
5.2	基本資料之敘述性統計分析	59
5.3	信度與效度分析	61
5.4	結構模型分析	67
5.5	資料分析結果	69
 第六章 討論與建議	70
6.1	研究結果	70
6.1.1	資訊安全氣候對心理所有權的關係	70
6.1.2	資訊安全氣候對組織承諾的關係	71
6.1.3	資訊安全氣候對資訊安全政策順從意圖的關係	71
6.1.4	心理所有權對組織承諾的關係	72
6.1.5	心理所有權對資訊安全政策順從意圖的關係	72
6.1.6	組織承諾對資訊安全政策順從意圖的關係	72
6.2	學術上的貢獻	73
6.3	管理上的意涵	74
6.4	研究限制	75
6.5	未來研究建議	76
參考文獻	78
附錄	89

 
表目錄
表 2-1:以組織要求、規範觀點為基礎的順從資訊安全政策實證研究	8
表 2-2:以背景因素觀點為基礎的順從資訊安全政策實證研究	10
表 2-3:以個人因素觀點為基礎的順從資訊安全政策實證研究	11
表 2-4:結合組織要求、規範與個人因素觀點為基礎的順從資訊安全政策實證研究	15
表 2-5:組織承諾多維度類型研究分類	22
表 2-6:以組織承諾探討資訊安全的相關研究	25
表 2-7:安全氣候與資安氣候維度	28
表 4-1:高階管理注意衡量題項	50
表 4-2:安全政策衡量題項	51
表 4-3:安全強化衡量題項	52
表 4-4:安全認知計畫衡量題項	52
表 4-5:心理所有權衡量題項	53
表 4-6:情感承諾衡量題項	54
表 4-7:持續承諾衡量題項	55
表 4-8:規範承諾衡量題項	55
表 4-9:資訊安全政策順從意圖衡量題項	56
表 4-10:前測信度分析	57
表 5-1:公司基本資料統計數據(N=336)	59
表 5-2:個人基本資料統計數據(N=336)	60
表 5-3:信度分析表	62
表 5-4:收斂效度分析表	63
表 5-5:區別效度分析表	66
表 5-6:假說檢定結果	69

 
圖目錄
圖 3-1:本研究模型	37
圖 5-1:研究模型之路徑分析	68
參考文獻
參考文獻
中文部分
[1] 	天下雜誌,2013,『服務業行業別排名』,天下雜誌-第522期
[2] 	竺培梁譯,Kurt Lewin 著,2007,拓樸心理學原理,臺北市,飛鴻國際行銷股份有限公司。

英文部分

[1] 	Ahuja, M. K., & Thatcher, J. B. 2005. " Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use." MIS Quarterly, (29:3), pp. 427-459. 
[2] 	Ajzen, I. 1991. " The theory of planned behavior." Organizational Behavior and Human Decision Processes, (50:2), pp. 179-211. 
[3] 	Allen, N. J., & Meyer, J. P. 1990. " The measurement and antecedents of affective, continuance and normative commitment to the organization." Journal of Occupational Psychology, (63:1), pp. 1-18. 
[4] 	Anderson, C. L., & Agarwal, R. 2010. " Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions." MIS Quarterly, (34:3), pp. 613-643. 
[5] 	Angle, H. L., & Perry, J. L. 1981. " An empirical assessment of organizational commitment and organizational effectiveness." Administrative Science Quarterly, (26:1), pp. 1-14. 
[6] 	Aronson, D. W., Timothy, R. M., & Akert, 2010, Social Psychology. Prentice Hall, Upper Saddle River, NJ.2010
[7] 	Australian, G. 2012. Cyber Crime & Security Survey Report. Center for Internet Safety
[8] 	Avey, J. B., Avolio, B. J., Crossley, C. D., & Luthans, F. 2009. " Psychological ownership: Theoretical extensions, measurement and relation to work outcomes." Journal of Organizational Behavior, (30:2), pp. 173-191. 
[9] 	Avey, J. B., Wernsing, T. S., & Palanski, M. E. 2012. " Exploring the process of ethical leadership: The mediating role of employee voice and psychological ownership." Journal of Business Ethics, (107:1), pp. 21-34. 
[10] 	Beaglehole, E., 1932, Property: A Study in Social Psychology. New York: Macmillan.
[11] 	Becker, H. S. 1960. " Notes on the concept of commitment." American Journal of Sociology, (66:1), pp. 32-40. 
[12] 	Belk, R. W. 1988. " Possessions and the extended self." Journal of Consumer Research, (15:2), pp. 139-168. 
[13] 	Bernhard, F., & O'Driscoll, M. P. 2011. " Psychological ownership in small family-owned businesses: Leadership style and nonfamily-employees’ work attitudes and behaviors." Group & Organization Management, (36:3), pp. 345-384. 
[14] 	Bernstein, P., 1976, Workplace Democratization: Its Internal Dynamics: Kent, OH: Kent State University Press.
[15] 	Bingham, J. B., Mitchell, B. W., Bishop, D. G., & Allen, N. J. 2013. " Working for a higher purpose: A theoretical framework for commitment to organization-sponsored causes." Human Resource Management Review, (23:2), pp. 174-189. 
[16] 	Bollen, K. A., & Stine, R. A. 1992. " Bootstrapping goodness-of-fit measures in structural equation models." Sociological Methods & Research, (21:2), pp. 205-229. 
[17] 	Bosak, J., Coetsee, W. J., & Cullinane, S.-J. 2013. " Safety climate dimensions as predictors for risk behavior." Accident Analysis & Prevention, (55:0), pp. 256-264. 
[18] 	Brown, R. B. 1996. " Organizational commitment: Clarifying the concept and simplifying the existing construct typology." Journal of Vocational Behavior, (49:3), pp. 230-251. 
[19] 	Brown, T. 1989. What will it take to win? Industry Week
[20] 	Bulgurcu, B., Cavusoglu, H., & Benbasat, I. 2010. " Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness." MIS Quarterly, (34:3), pp. 523-548. 
[21] 	Burnes, B. 2004. " Kurt Lewin and the planned approach to change: A re‐appraisal." Journal of Management Studies, (41:6), pp. 977-1002. 
[22] 	C.M. Ringle, & S.Wende, A. W., 2005, SmartPLS 2.0(M3) beta. Hamburg
[23] 	Campbell, J. P., 1971, Organizational Climate: Its Measurement and Relationship to Work Group Performance. Washington D.C: Paper presented at the Annual meeting of the American Psychological Association
[24] 	Chan, M., Woon, I., & Kankanhalli, A. 2005. " Perceptions of information security in the workplace: Linking information security climate to compliant behavior." Journal of Information Privacy & Security, (1:3), pp. 18-41. 
[25] 	Chatterjee, D., Grewal, R., & Sambamurthy, V. 2002. " Shaping up for e-commerce: Institutional enablers of the organizational assimilation of web technologies." MIS Quarterly, (26:2), pp. 65-89. 
[26] 	Chen, Y., Ramamurthy, K. R., & Wen, K.-w. 2012. " Organizations' information security policy compliance: Stick or carrot approach?." Journal of Management Information Systems, (29:3), pp. 157-188. 
[27] 	Chin, W. W., 1998, The Partial Least Squares Approach to Structural Equation Modeling. Lawrence Erlbaum Associates, New York
[28] 	Clarke, S. 2006. " Safety climate in an automobile manufacturing plant:The effects of work environment, job communication and safety attitudes on accidents and unsafe behaviour." Personnel Review, (35:4), pp. 413-430. 
[29] 	Cooper, M. D., & Phillips, R. A. 2004. " Exploratory analysis of the safety climate and safety behavior relationship." Journal of Safety Research, (35:5), pp. 497-512. 
[30] 	Cullen, J. B., Victor, B., & Bronson, J. W. 1993. " The ethical climate questionnaire: An assessment of its development and validity." Psychological Reports, (73:2), pp. 667-674. 
[31] 	D'Arcy, J., Hovav, A., & Galletta, D. 2009. " User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach." Information Systems Research, (20:1), pp. 79-98. 
[32] 	Dirks, K. T., Cummings, L. L., & Pierce, J. L., 1996, Psychological Ownership in Organizations: Conditions Under Which Individuals Promote and Resist Change: Greenwich, CT: JAI Press
[33] 	Dittmar, H., 1992, The Social Psychology of Material Possessions:To Have is to be. New York:St. Martin's Press
[34] 	Dov, Z. 2008. " Safety climate and beyond: A multi-level multi-climate framework." Safety Science, (46:3), pp. 376-387. 
[35] 	Elie-dit-cosaque, C., Pallud, J., & Kalika, M. 2012. " The Influence of Individual, contextual, and social factors on perceived behavioral control of information technology: A field theory approach." Journal of Management Information Systems, (28:3), pp. 201-234. 
[36] 	Erkmen, T., & Esen, E. 2012. " The mediating role of psychological ownership on the relationship between internal locus of control and organizational commitment." International Journal of Business and Management Studies, (4:2), pp. 171-185. 
[37] 	Ernst&Young. 2012. Building Trust - Information Security In a Borderless World
[38] 	Etzioni, A. 1991. " The Socio-Economics of Property." Journal of social behavior and personality, (6:6), pp. 465-468. 
[39] 	Fornell, C., & Larcker, D. F. 1981. " Evaluating structural equation models with unobservable variables and measurement error." Journal of Marketing Research, (18:1), pp. 39-50. 
[40] 	Forrester, R. 2013. The Forrester Wave: Information Security Consulting Services. Forrester Research
[41] 	Fugas, C. S., Silva, S. A., & Melia, J. L. 2012. " Another look at safety climate and safety behavior: Deepening the cognitive and social mediator mechanisms." Accident Analysis & Prevention, (45:0), pp. 468-477. 
[42] 	Furby, L. 1978. " Possession in humans: An exploratory study of its meaning and motivation." Social Behavior and Personality, (6:1), pp. 49-65. 
[43] 	Goel, S., & Chengalur-Smith, I. S. N. 2010. " Metrics for characterizing the form of security policies." The Journal of Strategic Information Systems, (19:4), pp. 281-295. 
[44] 	Goldenhar, L. M., Williams, L. J., & Swanson, N. G. 2003. " Modelling relationships between job stressors and injury and near-miss outcomes for construction labourers." Work & Stress, (17:3), pp. 218-240. 
[45] 	Goo, J., Yim, M.-S., & Kim, D. J., 2013 "A path way to successful management of individual intention to security compliance: A role of organizational security climate," Rochester, pp. 1-24.
[46] 	Gormley, D. K., & Kennerly, S. 2010. " Influence of work role and perceptions of climate on faculty organizational commitment." Journal of Professional Nursing, (26:2), pp. 108-115. 
[47] 	Gouldner, A. W. 1960. " The norm of reciprocity: A preliminary statement." American Sociological Review, (25:2), pp. 161-178. 
[48] 	Griffin, M. A., & Neal, A. 2000. " Perceptions of safety at work: A framework for linking safety climate to safety performance, knowledge, and motivation." Journal of Occupational Health Psychology, (5:3), pp. 347-358. 
[49] 	Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. 2011. " Understanding nonmalicious security violations in the workplace: A composite behavior model." Journal of Management Information Systems, (28:2), pp. 203-236. 
[50] 	Hair, J. F., Ringle, C. M., & Sarstedt, M. 2011. " PLS-SEM: Indeed a silver bullet." The Journal of Marketing Theory and Practice, (19:2), pp. 139-152. 
[51] 	Hall, E., 1966, Distances in Man: The Hidden Dimension. Garden City, New York: Double Day
[52] 	Hayes, B. E., Perander, J., Smecko, T., & Trask, J. 1998. " Measuring perceptions of workplace safety: Development and validation of the work safety scale." Journal of Safety Research, (29:3), pp. 145-161. 
[53] 	Hazari, S., Hargrave, W., & Clenney, B. 2008. " An empirical investigation of factors influencing information security behavior." Journal of Information Privacy & Security, (4:4), pp. 3-20. 
[54] 	Herath, T., & Rao, H. R. 2009a. " Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness." Decision Support Systems, (47:2), pp. 154-165. 
[55] 	Herath, T., & Rao, H. R. 2009b. " Protection motivation and deterrence: A framework for security policy compliance in organisations." European Journal of Information Systems, (18:2), pp. 106-125. 
[56] 	Hernandez, M. 2012. " Toward an understanding of the psychology of stewardship." Academy of Management Review, (37:2), pp. 172-193. 
[57] 	Hofmann, D. A., & Stetzer, A. 1996. " A cross-level investigation of factors influencing unsafe behaviors and accidents." Personnel Psychology, (49:2), pp. 307-339. 
[58] 	Hu, Q., Dinev, T., Hart, P., & Cooke, D. 2012. " Managing employee compliance with information security policies: The critical role of top management and organizational culture." Decision Sciences, (43:4), pp. 615-659. 
[59] 	Ifinedo, P. 2012. " Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory." Computers & Security, (31:1), pp. 83-95. 
[60] 	Ifinedo, P. 2014. " Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition." Information & Management, (51:1), pp. 69-79. 
[61] 	Isaacs, S. 1933. Social development in young children:A study of beginnings
[62] 	Jaros, S. J. 1997. " An assessment of Meyer and Allen's (1991) three-component model of organizational commitment and turnover intentions." Journal of Vocational Behavior, (51:3), pp. 319-337. 
[63] 	Jaros, S. J., Jermier, J. M., Koehler, J. W., & Sincich, T. 1993. " Effects of continuance, affective, and moral commitment on the withdrawal process: An evaluation of eight structural equation models." Academy of Management Journal, (36:5), pp. 951-995. 
[64] 	Johnson, S. E. 2007. " The predictive validity of safety climate." Journal of Safety Research, (38:5), pp. 511-521. 
[65] 	Kasser, T., & Ryan, R. M. 1993. " A dark side of the American dream: Correlates of financial success as a central life aspiration." Journal of Personality and Social Psychology, (65:2), pp. 410-422. 
[66] 	Kline, L. W., & France, C. 1899. " The psychology of ownership." The Pedagogical Seminary, (6:4), pp. 421-470. 
[67] 	Knapp, K. J., Marshall, T. E., Rainer, R. K., & Ford, F. N. 2006. " Information security: Management's effect on culture and policy." Information Management & Computer Security, (14:1), pp. 24-36. 
[68] 	Kumar, N., Scheer, L. K., & Steenkamp, I.-B. E. M. 1995. " The effects of perceived interdependence on dealer attitudes." Journal of Marketing Research, (32:3), pp. 348-356. 
[69] 	Leonard-Barton, D., & Deschamps, I. 1988. " Managerial influence in the implementation of new technology." Management Science, (34:10), pp. 1252-1265. 
[70] 	Lewin, K. 1939. " Field theory and experiment in social psychology: Concepts and methods." American Journal of Sociology, pp. 868-896. 
[71] 	Lewin, K., 1946, Behavior and Development as a Function of the Total Situation. Washington: DC: American Sociological Association
[72] 	Lewin, K., 1997, Resolving Social Conflicts and Field Theory in Social Science. Washington DC: American Psychological Association
[73] 	Li, D., Browne, G. J., & Chau, P. Y. K. 2006. " An empirical investigation of web site use using a commitment-based model." Decision Sciences, (37:3), pp. 427-444. 
[74] 	Li, H., Zhang, J., & Sarathy, R. 2010. " Understanding compliance with internet use policy from the perspective of rational choice theory." Decision Support Systems, (48:4), pp. 635-645. 
[75] 	Linn Van, D., & Pierce, J. L. 2004. " Psychological ownership and feelings of possession: Three field studies predicting employee attitudes and organizational citizenship behavior." Journal of Organizational Behavior, (25:4), pp. 439-459. 
[76] 	Locke, J., 1690, Two Treatises of Government. London, UK: Awnsham Churchill
[77] 	Mathieu, J. E., & Zajac, D. M. 1990. " A review and meta-analysis of the antecedents, correlates, and consequences of organizational commitment." Psychological Bulletin, (108:2), pp. 171-194. 
[78] 	Mayer, R. C., & Schoorman, F. D. 1992. " Predicting participation and production outcomes through a two-dimensional model of organizational commitment." The Academy of Management Journal, (35:3), pp. 671-684. 
[79] 	Mayhew, M. G., Ashkanasy, N. M., Bramble, T., & Gardner, J. 2007. " A study of the antecedents and consequences of psychological ownership in organizational settings." The Journal of Social Psychology, (147:5), pp. 477-500. 
[80] 	McIntyre, N., Srivastava, A., & Fuller, J. A. 2009. " The relationship of locus of control and motives with psychological ownership in organizations." Journal of Managerial Issues, (21:3), pp. 383-401. 
[81] 	Meyer, J. P., & N.J., 1997, Commitment in the Workplace: Theory Research and Application. Thousand Oaks, CA: Sage
[82] 	Meyer, J. P., & Allen, N. J. 1991. " A three-component conceptualization of organizational commitment." Human Resource Management Review, (1:1), pp. 61-89. 
[83] 	Meyer, J. P., & Herscovitch, L. 2001. " Commitment in the workplace: Toward a general model." Human Resource Management Review, (11:3), pp. 299-326. 
[84] 	Meyer, J. P., & Parfyonova, N. M. 2010. " Normative commitment in the workplace: A theoretical analysis and re-conceptualization." Human Resource Management Review, (20:4), pp. 283-294. 
[85] 	Morrow, S. L., McGonagle, A. K., Dove-Steinkamp, M. L., Walker Jr, C. T., Marmet, M., & Barnes-Farrell, J. L. 2010. " Relationships between psychological safety climate facets and safety behavior in the rail industry: A dominance analysis." Accident Analysis & Prevention, (42:5), pp. 1460-1467. 
[86] 	Mowday, R., Steers, R., & Porter, L. 1982. Employee-organizational linkages: The psychology of commitment, turnover and absenteeism
[87] 	Mowday, R. T. 1998. " Reflections on the study and relevance of organizational commitment." Human Resource Management Review, (8:4), pp. 387-401. 
[88] 	Mowday, R. T., Steers, R. M., & Porter, L. W. 1979. " The measurement of organizational commitment." Journal of Vocational Behavior, (14:2), pp. 224-247. 
[89] 	Neal, A., & Griffin, M. A. 2006. " A study of the lagged relationships among safety climate, safety motivation, safety behavior, and accidents at the individual and group levels." Journal of Applied Psychology, (91:4), pp. 946-953. 
[90] 	Norris-Watts, C., & Levy, P. E. 2004. " The mediating role of affective commitment in the relation of the feedback environment to work outcomes." Journal of Vocational Behavior, (65:3), pp. 351-365. 
[91] 	Nunnally, J., 1978, Assessment of Reliability. McGraw-Hill: New York
[92] 	O'Reilly, C. 2002. " The Wrong Kind of 'Ownership'," [Article]. Across the Board, (39:5), pp. 19-20. 
[93] 	O'Reilly, C. A., & Chatman, J. 1986. " Organizational commitment and psychological attachment: The effects of compliance, identification, and internalization on prosocial behavior." Journal of applied psychology, (71:3), pp. 492-499. 
[94] 	O’driscoll, M. P., Pierce, J. L., & Coghlan, A.-M. 2006. " The psychology of ownership work environment structure, organizational commitment, and citizenship behaviors." Group & Organization Management, (31:3), pp. 388-416. 
[95] 	Olzer, H., Yilmaz, A., & Ozler, A. 2008. " Psychological ownership: An empirical study on its antecedents and impacts upon organizational behaviors." Problems and Perspecfives in Management, (6:3), pp. 38-47. 
[96] 	Pahnila, S., Siponen, M., & Mahmood, A., 2007 "Employees' behavior towards IS security policy compliance," Paper presented at the in Proceedings of the 40th Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 156-166.
[97] 	Penley, L. E., & Gould, S. 1988. " Etzioni's model of organizational involvement: A perspective for understanding commitment to organizations." Journal of Organizational Behavior, (9:1), pp. 43-59. 
[98] 	Pierce, J. L., Kostova, T., & Dirks, K. T. 2001. " Toward a theory of psychological ownership in organizations." Academy of Management Review, (26:2), pp. 298-310. 
[99] 	Pierce, J. L., Kostova, T., & Dirks, K. T. 2003. " The state of psychological ownership: Integrating and extending a century of research." Review of General Psychology, (7:1), pp. 84-107. 
[100] 	Pierce, J. L., O'Driscoll, M. P., & Coghlan, A.-M. 2004. " Work environment structure and psychological ownership: The mediating effects of control." The Journal of Social Psychology, (144:5), pp. 507-534. 
[101] 	Pierce, J. L., Rubenfeld, S. A., & Morgan, S. 1991. " Employee ownership: A conceptual model of process and effects." Academy of Management Review, (16:1), pp. 121-144. 
[102] 	Porteous, J. D. 1976. " Home: The territorial core." Geographical Review, (66:4), pp. 383-390. 
[103] 	Pousette, A., Larsson, S., & Torner, M. 2008. " Safety climate cross-validation, strength and prediction of safety behaviour." Safety Science, (46:3), pp. 398-404. 
[104] 	Purvis, R. L., Sambamurthy, V., & Zmud, R. W. 2001. " The assimilation of knowledge platforms in organizations: An empirical investigation." Organization Science, (12:2), pp. 117-135. 
[105] 	Randall, D. M. 1987. " Commitment and the organization: The organization man revisited." Academy of Management. The Academy of Management Review, (12:3), pp. 460-471. 
[106] 	Reichers, A. E., & Schneider, B., 1990, Organizational Climate and Culture:An Evolution of Constructs 
[107] 	Rochberg-Halton, E. W. 1980. Cultural signs and urban adaptation: The meaning of cherished household possessions. Dissertation Abstracts International
[108] 	Rousseau, D. M. 1985. " Issues of level in organizational research: Multi-level and cross-level perspectives." Research in Organizational Behavior, (7:1), pp. 1-37. 
[109] 	Salancik, G. R., & Pfeffer, J. 1980. " Effects of ownership and performance on executive tenure in US corporations." Academy of Management Journal, (23:4), pp. 653-664. 
[110] 	Sands, J. 2002. Is employee ownership key to future success. Design Week
[111] 	Sasse, M. A., Brostoff, S., & Weirich, D. 2001. " Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security." BT Technology Journal, (19:3), pp. 122-131. 
[112] 	Schwepker Jr, C. H. 2001. " Ethical climate's relationship to job satisfaction, organizational commitment, and turnover intention in the salesforce." Journal of Business Research, (54:1), pp. 39-52. 
[113] 	Sieger, P., Bernhard, F., & Frey, U. 2011. " Affective commitment and job satisfaction among non-family employees: Investigating the roles of justice perceptions and psychological ownership." Journal of Family Business Strategy, (2:2), pp. 78-89. 
[114] 	Siponen, M., Adam Mahmood, M., & Pahnila, S. 2014. " Employees’ adherence to information security policies: An exploratory field study." Information & Management, (51:2), pp. 217-224. 
[115] 	Siponen, M., Pahnila, S., & Mahmood, A., 2006 "Factors influencing protection motivation and IS security policy compliance," Paper presented at the Innovations in Information Technology, pp. 1-5.
[116] 	Siponen, M., Pahnila, S., & Mahmood, A., 2007, Employees’ adherence to information security policies: An empirical study: H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, Boston: Springer
[117] 	Siponen, M., Pahnila, S., & Mahmood, M. A. 2010. " Compliance with information security policies: An empirical investigation." Computer, (43:2), pp. 64-71. 
[118] 	Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. 2014. " Variables influencing information security policy compliance: A systematic review of quantitative studies ". Information Management & Computer Security, (22:1), pp. 42-75. 
[119] 	Son, J.-Y. 2011. " Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies." Information & Management, (48:7), pp. 296-302. 
[120] 	Spiekermann, S., Korunovska, J., & Bauer, C. Psychology of ownership and asset defense: Why people value their personal information beyond privacy. Paper presented at the International Conference on Inforamtion Systems(ICIS 2012), Oriando Florida, USA. 2012.
[121] 	Stanton, J. M., Stam, K. R., Guzman, I., & Caledra, C., 2003 "Examining the linkage between organizational commitment and information security," Paper presented at the In IEEE Systems, Man, and Cybernetics Conference Washington DC, USA, pp. 2501-2506.
[122] 	Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. 2005. " Analysis of end user security behaviors." Computers & Security, (24:2), pp. 124-133. 
[123] 	Staw, B. M., & Boettger, R. D. 1990. " Task revision: A neglected form of work performance." Academy of Management Journal, (33:3), pp. 534. 
[124] 	Swailes, S. 2002. " Organizational commitment: A critique of the construct and measures." International Journal of Management Reviews, (4:2), pp. 155-178. 
[125] 	Symantec, & Ponemon, I. 2013. Cost of Data Breach Study: Global Analysis. Symantec & Ponemon Institute
[126] 	Vance, A., Siponen, M., & Pahnila, S. 2012. " Motivating IS security compliance: Insights from habit and protection motivation theory." Information & Management, (49, pp. 190-198. 
[127] 	Vandewalle, D., Van Dyne, L., & Kostova, T. 1995. " Psychological ownership: An empirical examination of its consequences." Group & Organization Management, (20:2), pp. 210-226. 
[128] 	Venkatesh, V., & Bala, H. 2008. " Technology acceptance model 3 and a research agenda on interventions." Decision Sciences, (39:2), pp. 273-315. 
[129] 	Verizon, B. S. 2013. 2013 Data Breach Investigations Report. Verizon Business Systems
[130] 	Vroom, C., & von Solms, R. 2004. " Towards information security behavioural compliance." Computers & Security, (23:3), pp. 191-198. 
[131] 	Wagner, S. H., Parker, C. P., & Christiansen, N. D. 2003. " Employees that think and act like owners: Effects of ownership beliefs and behaviors on organizational effectiveness." Personnel Psychology, (56:4), pp. 847-871. 
[132] 	Webb, T. L., & Sheeran, P. 2006. " Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence." Psychological Bulletin, (132:2), pp. 249-268. 
[133] 	Wiener, Y. 1982. " Commitment in organizations: A normative view." Academy of Management. The Academy of Management Review, (7:3), pp. 418-428. 
[134] 	Williams, L. J., & Anderson, S. E. 1991. " Job satisfaction and organizational commitment as predictors of organizational citizenship and in-role behaviors." Journal of Management, (17:3), pp. 601-617. 
[135] 	Wilpert, B., 1991 "Property, ownership, and participation: on the growing contradictions between legal and psychological concepts," Paper presented at the International handbook of participation in organizations: For the study of organizational democracy, co-operation, and self management, New York: Oxford University Press, pp. 149-164.
[136] 	Wirth, O., & Sigurdsson, S. O. 2008. " When workplace safety depends on behavior change: Topics for behavioral safety research." Journal of Safety Research, (39:6), pp. 589-598. 
[137] 	Zin, S. M., & Ismail, F. 2012. " Employers’ behavioural safety compliance factors toward occupational, safety and health improvement in the construction industry." Procedia - Social and Behavioral Sciences, (36:0), pp. 742-751. 
[138] 	Zmud, R. W. 1979. " Individual differences and MIS success: A review of the empirical literature." Management Science, (25:10), pp. 966-979. 
[139] 	Zohar, D. 1980. " Safety climate in industrial organizations: Theoretical and applied implications." Journal of Applied Psychology, (65:1), pp. 96-102. 
[140] 	Zohar, D. 2010. " Thirty years of safety climate research: Reflections and future directions." Accident Analysis & Prevention, (42:5), pp. 1517-1522. 
[141] 	Zohar, D., Huang, Y.-h., Lee, J., & Robertson, M. 2014. " A mediation model linking dispatcher leadership and work ownership with safety climate as predictors of truck driver safety performance." Accident Analysis & Prevention, (62:0), pp. 17-25. 
[142] 	Zohar, D., & Luria, G. 2004. " Climate as a social-cognitive construction of supervisory safety practices: Scripts as proxy of behavior patterns." Journal of Applied Psychology, (89:2), pp. 322-333. 
[143]    Zohar, D., & Luria, G. 2005. " A multilevel model of safety climate: 
    Cross-level relationships between organization and group-level climates." 
    Journal of Applied Psychology, (90:4), pp. 616-628.
論文全文使用權限
校內
紙本論文於授權書繳交後5年公開
同意電子論文全文授權校園內公開
校內電子論文於授權書繳交後5年公開
校外
同意授權
校外電子論文於授權書繳交後5年公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信