淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-2706201210502800
中文論文名稱 從社會資本觀點探討員工組織承諾與資訊安全行為意圖
英文論文名稱 Encouraging information security behavioral intentions: A social capital perspective
校院名稱 淡江大學
系所名稱(中) 資訊管理學系碩士班
系所名稱(英) Department of Information Management
學年度 100
學期 2
出版年 101
研究生中文姓名 胡淯婷
研究生英文姓名 Yu-Ting Hu
學號 699630082
學位類別 碩士
語文別 中文
口試日期 2012-05-26
論文頁數 77頁
口試委員 指導教授-施盛寶
委員-楊明玉
委員-莊雅茹
中文關鍵字 社會資本  社會影響  組織承諾  資訊安全行為意圖 
英文關鍵字 Social capital  Social influence  Organizational commitment  Information security behavioral intention 
學科別分類 學科別社會科學管理學
學科別社會科學資訊科學
中文摘要 在資訊科技日益茁壯的環境下,資訊安全的重要性變得不可或缺,使得資訊系統的安全管理變得極為重要,長期以來組織一直使用安全技術來防範資訊安全威脅,但卻仍常發生資安的問題,因此,組織內使用者的資訊安全行為在資訊安全的研究上也獲得越來越多的關注,雖然組織訂定了資訊安全相關的政策規範,但是來自組織內部人員資訊安全的威脅卻一直存在,歸究其原因,儘管資訊安全行為的研究中,個人的行為已被認為是組織內的一個重要環節,卻仍缺乏關注社會因素的研究,社會資本常與社會影響及社會規範作為相關的概念進行探討,可視為社會因素的一種。因此,本研究透過社會資本的概念,來探討其是否能有效的提高員工的組織承諾,進而對資訊安全行為意圖有正向的影響。研究對象選自天下雜誌2011年500大服務業的企業,針對公司內部的資訊員工進行抽樣調查。研究結果發現結構性社會資本對於員工的組織承諾有顯著的影響,而員工的關係性及認知性社會資本也能夠影響員工組織承諾中的認同及內化,當員工的組織承諾越高,越能正向影響員工資訊安全行為的意圖。本研究認為公司應善加管理組織內的社會資本來強化員工對組織的承諾從而增加員工的資訊安全行為,避免組織陷於資訊安全的威脅中。
英文摘要 Along with the rapid development of information technology, the importance of information security has been indispensable, and the information system security management also has become extremely important. For a long time, organizations have been using security technology techniques to prevent information security threats, however, information security problems still occur. Therefore, the end users security behavior in the organization is getting more and more attention. Despite an acknowledgment of the importance of individual security behavior and the recent interests in behavioral security research, less attention has been paid to social factors. Social capital can be a kind of social factors, and was often discussed as the concepts with social capital, social influence and social norms. Draw on this, the study adopted the theoretical background of social capital to explore the effectiveness of the improvement of employees' organizational commitment, and eventually the effects on information security behavior intention. We collected 168 samples from IT professionals work in Taiwan based on the list of CommonWealth magazine in 2011. The results showed that structural social capital has positive effects on organizational commitment (i.e. compliance, identification, and internalization). Relational social capital and cognitive social capital have positive effects on identification and internalization. Organizational commitment enhanced information security behavior intention. This study concluded that organizations should manage the social capital to strengthen employees’ commitment and information security behavior. Academic and practical implications were also provide in this study.
論文目次 第1章 緒論 1
1.1. 研究背景與動機 1
1.2. 研究目的 4
第2章 文獻探討 6
2.1. 社會資本理論(Social capital theory) 6
2.2. 社會影響理論(Social influence theory) 12
2.3. 資訊安全行為意圖(Information security behavioral intentions) 16
第3章 研究模型與假說 22
3.1. 研究架構 22
3.2. 結構性社會資本與組織承諾 23
3.3. 關係性社會資本與組織承諾 25
3.4. 認知性社會資本與組織承諾 27
3.5. 組織承諾與資訊安全行為意圖 28
第4章 研究方法 32
4.1. 資料蒐集 32
4.2. 構念衡量 33
4.2.1. 結構性社會資本 33
4.2.2. 關係性社會資本 33
4.2.3. 認知性社會資本 34
4.2.4. 順從 35
4.2.5. 認同 35
4.2.6. 內化 36
4.2.7. 資訊安全行為意圖 37
第5章 資料分析與結果 38
5.1. 基本資料描述 38
5.2. 研究變項之敘述性統計分析 43
5.3. 測量工具之信效度檢定 43
5.3.1. 信度與因素分析 44
5.3.2. 效度 46
5.4. 結構模型之驗證 48
5.4.1. 結構模型整理小節 51
第6章 討論與建議 52
6.1. 研究結果 52
6.2. 學術上的貢獻 55
6.3. 管理上的意涵 56
6.4. 研究限制 57
6.5. 未來研究建議 58
中文參考文獻 59
英文參考文獻 59
附錄一 研究問卷 73



表目錄
表 2 1:社會資本的定義 7
表 2 2:資訊安全行為意圖分類 17
表 4 1:結構性社會資本衡量題項 33
表 4 2:關係性社會資本衡量題項 34
表 4 3:認知性社會資本衡量題項 34
表 4 4:順從衡量題項 35
表 4 5:認同衡量題項 36
表 4 6:內化衡量題項 36
表 4 7:資訊安全行為意圖衡量題項 37
表 5 1:基本資料統計數據 38
表 5 2:基本資料統計數據 39
表 5 3:基本資料統計數據 40
表 5 4:基本資料統計數據 42
表 5 5:研究變項之敘述性統計分析 43
表 5 6:各構念之間的因素分析 45
表 5 7:信度分析與變異萃取量 47
表 5 8:各構念之間的區別效度 47
表 5 9:假說檢定結果 51



圖目錄
圖 3 1 研究架構 22
圖 5 1 研究架構之路徑分析 50

參考文獻 中文參考文獻
1. 邱瑩青,2009,『資訊安全最大的威脅-人員安全』,資安人雜誌,第三十四期。
英文參考文獻
1. Adler, P.S., and Kwon, S.W. 2002. "Social Capital: Prospects for a New Concept," Academy of management review (27:1), pp 17-40.
2. Ajzen, I. 1991. "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes (50:2), pp 179-211.
3. Anderson, C.L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp 613-643.
4. Ashforth, B.E., and Mael, F. 1989. "Social Identity Theory and the Organization," Academy of Management Review (14:1), pp 20-39.
5. Aycan, Z. 2000. "Cross-Cultural Industrial and Organizational Psychology," Journal of Cross-Cultural Psychology (31:1), pp 110-128.
6. Aytes, K., and Connolly, T. 2004. "Computer Security and Risky Computing Practices: A Rational Choice Perspective," Journal of Organizational and End User Computing (16:3), pp 22-40.
7. Bagozzi, R.P., and Lee, K.H. 2002. "Multiple Routes for Social Influence: The Role of Compliance, Internalization, and Social Identity," Social Psychology Quarterly (65:3), pp 226-247.
8. Bagozzi, R.P., and Yi, Y. 1988. "On the Evaluation of Structural Equation Models," Journal of the academy of Marketing Science (16:1), pp 74-94.
9. Baker, W.E. 1990. "Market Networks and Corporate Behavior," American Journal of Sociology (96:3), pp 589-625.
10. Baron, S., Field, J., and Schuller, T. 2000. Social Capital: Critical Perspectives. Oxford University Press, USA.
11. Baskerville, R. 1993. "Information Systems Security Design Methods: Implications for Information Systems Development," ACM Computing Surveys (CSUR) (25:4), pp 375-414.
12. Bearden, W.O., Netemeyer, R.G., and Teel, J.E. 1989. "Measurement of Consumer Susceptibility to Interpersonal Influence," Journal of Consumer Research (15:4), pp 473-481.
13. Becker, H.S. 1960. "Notes on the Concept of Commitment," American journal of sociology (66:1), pp 32-40.
14. Becker, T.E. 1992. "Foci and Bases of Commitment: Are They Distinctions Worth Making?," Academy of Management Journal (35:1), pp 232-244.
15. Belliveau, M.A., O'Reilly III, C.A., and Wade, J.B. 1996. "Social Capital at the Top: Effects of Social Similarity and Status on Ceo Compensation," Academy of Management Journal (39:6), pp 1568-1593.
16. Bergami, M., and Bagozzi, R.P. 2000. "Self‐Categorization, Affective Commitment and Group Self‐Esteem as Distinct Aspects of Social Identity in the Organization," British Journal of Social Psychology (39:4), pp 555-577.
17. Blanchard, A., and Horan, T. 1998. "Virtual Communities and Social Capital," Social Science Computer review (16:3), pp 293-307.
18. Bolino, M.C., Turnley, W.H., and Bloodgood, J.M. 2002. "Citizenship Behavior and the Creation of Social Capital in Organizations," Academy of Management Review (27:4), pp 505-522.
19. Bollen, K.A., and Stine, R.A. 1992. "Bootstrapping Goodness-of-Fit Measures in Structural Equation Models," Sociological Methods & Research (21:2), pp 205-229.
20. Boss, S.R., Kirsch, L.J., Angermeier, I., Shingler, R.A., and Boss, R.W. 2009. "If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security," European Journal of Information Systems (18:2), pp 151-164.
21. Bourdieu, P. 1977. "Outline of a Theory of Practice." Cambridge and New York: Cambridge University Press
22. Bourdieu, P. 1985. The Forms of Capital. New York: Greenwood Press.
23. Bourdieu, P., and Wacquant, L.J.D. 1992. An Invitation to Reflexive Sociology. Chicago: University of Chicago Press.
24. Brehm, J., and Rahn, W. 1997. "Individual-Level Evidence for the Causes and Consequences of Social Capital," American journal of political science (41:3), pp 999-1023.
25. Buchanan, B. 1974. "Building Organizational Commitment: The Socialization of Managers in Work Organizations," Administrative Science Quarterly (19:4), pp 533-546.
26. Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly (34:3), pp 523-548.
27. Burt, R.S. 1992. Structural Holes: The Social Structure of Competition. Cambridge, MA: Harvard University Press.
28. Burt, R.S. 2000. The Network Structure of Social Capital. Greenwich: JAI Press.
29. Burt, R.S., Jannotta, J.E., and Mahoney, J.T. 1998. "Personality Correlates of Structural Holes," Social networks (20:1), pp 63-87.
30. Burud, S.L., and Tumolo, M. 2004. Leveraging the New Human Capital: Adaptive Strategies, Results Achieved, and Stories of Transformation. CA: Davies-Black Publishing.
31. Butler, J.K. 1991. "Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory," Journal of Management (17:3), pp 643-663.
32. Cavusoglu, H., and Raghunathan, S. 2004. "Economics of It Security Management: Four Improvements to Current Security Practices," Communications of the Association for Information Systems (14), pp 65-75.
33. Charng, H.W., Piliavin, J.A., and Callero, P.L. 1988. "Role Identity and Reasoned Action in the Prediction of Repeated Behavior," Social Psychology Quarterly (51:4), pp 303-317.
34. Cheung, C.M.K., and Lee, M.K.O. 2010. "A Theoretical Model of Intentional Social Action in Online Social Networks," Decision Support Systems (49:1), pp 24-30.
35. Chin. 1998a. "The Partial Least Squares Approach to Structural Equation Modeling," Modern Methods for Business Research), pp 295-336.
36. Chin, and Newsted, P.R. 1999. "Structural Equation Modeling Analysis with Small Samples Using Partial Least Squares," Statistical Strategies for Small Sample Research), pp 307-341.
37. Chin, W.W. 1998b. "The Partial Least Squares Approach to Structural Equation Modeling," Modern Methods for Business Research (295:2), pp 295-336.
38. Chiu, C.M., Hsu, M.H., and Wang, E.T.G. 2006. "Understanding Knowledge Sharing in Virtual Communities: An Integration of Social Capital and Social Cognitive Theories," Decision Support Systems (42:3), pp 1872-1888.
39. Chung, L.H., and Gibbons, P.T. 1997. "Corporate Entrepreneurship: The Roles of Ideology and Social Capital," Group & Organization Management (22:1), pp 10-30.
40. Cialdini, R.B., and Goldstein, N.J. 2004. "Social Influence: Compliance and Conformity," Annual Review of Psychology (55), pp 591-621.
41. Cicourel, A.V. 1974. Cognitive Sociology: Language and Meaning in Social Interaction. Harmondsworth, England: Penguin Books.
42. Coleman, J.S. 1988. "Social Capital in the Creation of Human Capital," American journal of sociology (94), pp 95-120.
43. Coleman, J.S. 1990. Foundations of Social Theory. Cambridge, MA: Harvard University Press.
44. Cropanzano, R., and Mitchell, M.S. 2005. "Social Exchange Theory: An Interdisciplinary Review," Journal of Management (31:6), pp 874-900.
45. D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research (20:1), pp 79-98.
46. D'Aubeterre, F., Singh, R., and Iyer, L. 2008. "Secure Activity Resource Coordination: Empirical Evidence of Enhanced Security Awareness in Designing Secure Business Processes," European Journal of Information Systems (17:5), pp 528-542.
47. Daniel, B., Schwier, R.A., and McCalla, G. 2003. "Social Capital in Virtual Learning Communities and Distributed Communities of Practice," Canadian Journal of Learning and Technology (29:3), pp 113-139.
48. Dholakia, U.M., Bagozzi, R.P., and Pearo, L.K. 2004. "A Social Influence Model of Consumer Participation in Network-and Small-Group-Based Virtual Communities," International Journal of Research in Marketing (21:3), pp 241-263.
49. Dwyer, P. 2007. "Measuring the Value of Electronic Word of Mouth and Its Impact in Consumer Communities," Journal of Interactive Marketing (21:2), pp 63-79.
50. Ellemers, N., Kortekaas, P., and Ouwekerk, J.W. 1999. "Self-Categorization, Commitment to the Group and Self-Esteem as Related but Distinct Aspects of Social Identity," European Journal of Social Psychology (29), pp 371-389.
51. Ellinger, A.E., Musgrove, C.F., Ellinger, A.D., Bachrach, D.G., Elmadağ Baş, A.B., and Wang, Y.-L. 2012. "Influences of Organizational Investments in Social Capital on Service Employee Commitment and Performance," Journal of Business Research).
52. Ernst, Y., and Young, L.L.P. 2002. Global Information Security Survey. UK: Presentation Services.
53. Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. MA: Addison-Wesley.
54. Fornell, C., and Bookstein, F. 1982. "Two Structural Equation Models: Ltsrei, and Pls Applied to Consumer Exit-Voice Theory," Journal of Marketing Research), pp 28-64.
55. Fornell, C., and Larcker, D.F. 1981. "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of marketing research (18:1), pp 39-50.
56. Friedkin, N.E. 1998. A Structural Theory of Social Influence. Cambridge: Cambridge University Press.
57. Fukuyama, F. 1995. Trust: The Social Virtues and the Creation of Prosperity. New York: Free Press.
58. Fukuyama, F. 1997. "Social Capital and the Modern Capitalist Economy: Creating a High Trust Workplace," Stern Business Magazine (4:1), pp 4-17.
59. Furnell, S. 2008. "End-User Security Culture: A Lesson That Will Never Be Learnt?," Computer Fraud & Security (2008:4), pp 6-9.
60. Gabbay, S.M., and Zuckerman, E.W. 1998. "Social Capital and Opportunity in Corporate R&D: The Contingent Effect of Contact Density on Mobility Expectations," Social science research (27:2), pp 189-217.
61. Gefen, D., Straub, D.W., and Boudreau, M.C. 2000. "Structural Equation Modeling and Regression: Guidelines for Research Practice," Communication of the Association for Information Systems (7:4), pp 1-79.
62. Ghoshal, S., Barlett, C.A., and Moran, P. 1999. "A New Manifesto for Management," Sloan Management Review (40:3), pp 9-20.
63. Goodhue, D., and Straub, D. 1991. "Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security," Information & Management (20:1), pp 13-27.
64. Granovetter, M. 1985. "Economic Action and Social Structure: The Problem of Embeddedness," American journal of sociology (91:3), pp 481-510.
65. Granovetter, M.S. 1992. "Problems of Explanation in Economic Sociology," in: Networks and organizations: Structure, form, and action. Boston: Harvard Business School Pres, pp. 25-56.
66. Hakansson, H., and Snehota, I. 1995. Developing Relationships in Business Networks. London: Routledge.
67. Hansen, M.T. 1999. "The Search-Transfer Problem: The Role of Weak Ties in Sharing Knowledge across Organization Subunits," Administrative Science Quarterly (44:1), pp 82-111.
68. Hanson, B., and Östergren, P.O. 1987. "Different Social Network and Social Support Characteristics, Nervous Problems and Insomnia: Theoretical and Methodological Aspects on Some Results from the Population Study [] Men Born in 1914', Malmö, Sweden," Social Science & Medicine (25:7), pp 849-859.
69. Hargadon, A., and Sutton, R.I. 1997. "Technology Brokering and Innovation in a Product Development Firm," Administrative science quarterly (42:4), pp 716-749.
70. He, W., Qiao, Q., and Wei, K.-K. 2009. "Social Relationship and Its Role in Knowledge Management Systems Usage," Information & Management (46:3), pp 175-180.
71. Hechter, M. 1987. Principles of Group Solidarity. Berkeley: University of California Press.
72. Herath, T., and Rao, H. 2009a. "Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness," Decision Support Systems (47:2), pp 154-165.
73. Herath, T., and Rao, H.R. 2009b. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations," European Journal of Information Systems (18:2), pp 106-125.
74. Hitt, M.A., and Ireland, R.D. 2002. "The Essence of Strategic Leadership: Managing Human and Social Capital," Journal of Leadership & Organizational Studies (9:1), pp 3-14.
75. Hoegl, M., and Gemuenden, H.G. 2001. "Teamwork Quality and the Success of Innovative Projects: A Theoretical Concept and Empirical Evidence," Organization Science (12:4), pp 435-449.
76. Hogg, M.A., and Reid, S.A. 2006. "Social Identity, Self-Categorization, and the Communication of Group Norms," Communication Theory (16:1), pp 7-30.
77. Hogg, M.A., Terry, D.J., and White, K.M. 1995. "A Tale of Two Theories: A Critical Comparison of Identity Theory with Social Identity Theory," Social Psychology Quarterly (58:4), pp 255-269.
78. Horvat, E.M.N., Weininger, E.B., and Lareau, A. 2003. "From Social Ties to Social Capital: Class Differences in the Relations between Schools and Parent Networks," American Educational Research Journal (40:2), pp 319-351.
79. Hosmer, L.T. 1995. "Trust: The Connecting Link between Organizational Theory and Philosophical Ethics," Academy of management review (20:2), pp 379-403.
80. Hu, Q., Hart, P., and Cooke, D. 2006. "The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective," 39th Annual Hawaii International Conference, Los Alamitos, CA: IEEE Computer Society, pp. 127a-127a.
81. Huysman, M., and Wulf, V. 2006. "It to Support Knowledge Sharing in Communities: Towards a Social Capital Analysis," Journal of Information Technology (21:1), pp 40-51.
82. Jaworski, B.J. 1988. "Toward a Theory of Marketing Control: Environmental Context, Control Types, and Consequences," Journal of Marketing (52:3), pp 23-39.
83. Johnston, A.C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:3), pp 549-566.
84. Kaasa, A. 2009. "Effects of Different Dimensions of Social Capital on Innovative Activity: Evidence from Europe at the Regional Level," Technovation (29:3), pp 218-233.
85. Kale, P., Singh, H., and Perlmutter, H. 2000. "Learning and Protection of Proprietary Assets in Strategic Alliances: Building Relational Capital," Strategic Management Journal (21:3), pp 217-237.
86. Kankanhalli, A., Tan, B.C.Y., and Wei, K.K. 2005. "Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation," MIS Quarterly (29:1), pp 113-143.
87. Kay, A. 2006. "Social Capital, the Social Economy and Community Development," Community Development Journal (41:2), pp 160-173.
88. Kelman, H.C. 1958. "Compliance, Identification, and Internalization: Three Processes of Attitude Change," Journal of Conflict Resolution (2:1), pp 51-60.
89. Kelman, H.C. 1961. "Processes of Opinion Change," Public opinion quarterly (25:1), p 57.
90. Kelman, H.C. 1974. Social Influence and Linkages between the Individual and the Social System: Further Thoughts on the Processes of Compliance, Identification, and Internalization. Aldine, Chicago, IL: Perspectives on social power.
91. Kelman, H.C. 2006. "Interests, Relationships, Identities: Three Central Issues for Individuals and Groups in Negotiating Their Social Environment," Annual Review of Psychology (57), pp 1-26.
92. Kirsch, L.J. 2004. "Deploying Common Systems Globally: The Dynamics of Control," Information Systems Research (15:4), pp 374-395.
93. Kirsch, L.J., Ko, D.G., and Haney, M.H. 2010. "Investigating the Antecedents of Team-Based Clan Control: Adding Social Capital as a Predictor," Organization Science (21:2), pp 469-489.
94. Kirsch, L.J., Sambamurthy, V., Ko, D.G., and Purvis, R.L. 2002. "Controlling Information Systems Development Projects: The View from the Client," Management Science (48:4), pp 484-498.
95. Knoke, D. 1999. Organizational Networks and Corporate Social Capital. Boston: Kluwer.
96. Krackhardt, D. 1994. "Graph Theoretical Dimensions of Informal Organizations," Computational organization theory (89:112), pp 123-140.
97. Kraemer, S., Carayon, P., and Clem, J. 2009. "Human and Organizational Factors in Computer and Information Security: Pathways to Vulnerabilities," Computers & Security (28:7), pp 509-520.
98. Kritzinger, E., and Smith, E. 2008. "Information Security Management: An Information Security Retrieval and Awareness Model for Industry," Computers & Security (27:5-6), pp 224-231.
99. Lam, Y.L.J. 2001. "Toward Reconceptualizing Organizational Learning: A Multidimensional Interpretation," International Journal of Educational Management (15:5), pp 212-219.
100. Lambrinoudakis, C., Gritzalis, S., Dridi, F., and Pernul, G. 2003. "Security Requirements for E-Government Services: A Methodological Approach for Developing a Common Pki-Based Security Policy," Computer Communications (26:16), pp 1873-1883.
101. Leana, C.R., and Pil, F.K. 2006. "Social Capital and Organizational Performance: Evidence from Urban Public Schools," Organization Science (17:3), pp 353-366.
102. Lee, S.M., Lee, S.G., and Yoo, S. 2004. "An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories," Information & Management (41:6), pp 707-718.
103. Lee, Y., and Larsen, K.R. 2009. "Threat or Coping Appraisal: Determinants of Smb Executives’ Decision to Adopt Anti-Malware Software," European Journal of Information Systems (18:2), pp 177-187.
104. Lesser, E.L. 2000. Leveraging Social Capital in Organizations. Woburn, MA: Butterworth Heinemann.
105. Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. "Sources of Influence on Beliefs About Information Technology Use: An Empirical Study of Knowledge Workers," MIS Quarterly (27:4), pp 657-678.
106. Li, D., Browne, G.J., and Chau, P.Y.K. 2006. "An Empirical Investigation of Web Site Use Using a Commitment‐Based Model," Decision Sciences (37:3), pp 427-444.
107. Lin, C.P. 2011. "Modeling Job Effectiveness and Its Antecedents from a Social Capital Perspective: A Survey of Virtual Teams within Business Organizations," Computers in Human Behavior (27:2), pp 915-923.
108. Lin, C.P., and Bhattacherjee, A. 2009. "Understanding Online Social Support and Its Antecedents: A Socio-Cognitive Model," The Social Science Journal (46:4), pp 724-737.
109. Lin, N. 2001. Social Capital: A Theory of Social Structure and Action. UK: Cambridge University Press.
110. Lin, S.C., and Huang, Y.M. 2005. "The Role of Social Capital in the Relationship between Human Capital and Career Mobility: Moderator or Mediator?," Journal of Intellectual Capital (6:2), pp 191-205.
111. Lou, H., Luo, W., and Strong, D. 2000. "Perceived Critical Mass Effect on Groupware Acceptance," European Journal of Information Systems (9:2), pp 91-103.
112. Mak, B.L., and Sockel, H. 2001. "A Confirmatory Factor Analysis of Is Employee Motivation and Retention," Information & Management (38:5), pp 265-276.
113. Malhotra, Y., and Galletta, D. 2005. "A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior," Journal of Management Information Systems (22:1), pp 117-151.
114. Markus, H.R., and Kitayama, S. 1991. "Culture and the Self: Implications for Cognition, Emotion, and Motivation," Psychological Review (98:2), pp 224-253.
115. McGuire, W.J. 1985. "Attitudes and Attitude Change," The Handbook of Social Psychology (3:2), pp 233-349.
116. Merton, R.K. 1968. Social Theory and Social Structure. New York: Free Press.
117. Meyer, J.P., and Allen, N.J. 1991. "A Three-Component Conceptualization of Organizational Commitment," Human resource management review (1:1), pp 61-89.
118. Meyer, J.P., Stanley, D.J., Herscovitch, L., and Topolnytsky, L. 2002. "Affective, Continuance, and Normative Commitment to the Organization: A Meta-Analysis of Antecedents, Correlates, and Consequences," Journal of vocational behavior (61:1), pp 20-52.
119. Moran, P. 2005. "Structural Vs. Relational Embeddedness: Social Capital and Managerial Performance," Strategic Management Journal (26:12), pp 1129-1151.
120. Mouw, T. 2006. "Estimating the Causal Effect of Social Capital: A Review of Recent Research," Annu. Rev. Sociol. (32), pp 79-102.
121. Mowday, R.T., Porter, L.W., and Steers, R.M. 1982. Employee-Organization Linkages: The Psychology of Commitment, Absenteeism, and Turnover. New York: Academic Press
122. Mowday, R.T., Steers, R.M., and Porter, L.W. 1979. "The Measurement of Organizational Commitment," Journal of Vocational Behavior (14:2), pp 224-247.
123. Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance, A. 2009. "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study," European Journal of Information Systems (18:2), pp 126-139.
124. Nahapiet, J., and Ghoshal, S. 1998. "Social Capital, Intellectual Capital, and the Organizational Advantage," The Academy of Management Review (23:2), pp 242-266.
125. Ng, B.Y., Kankanhalli, A., and Xu, Y.C. 2009. "Studying Users' Computer Security Behavior: A Health Belief Perspective," Decision Support Systems (46:4), pp 815-825.
126. Nunnally, J., and Bernstein, I. 1994. Assessment of Reliability. New York: McGraw-Hill, Inc.
127. O'Reilly, C.A., and Chatman, J. 1986. "Organizational Commitment and Psychological Attachment: The Effects of Compliance, Identification, and Internalization on Prosocial Behavior," Journal of applied psychology (71:3), p 492.
128. Obst, P., and White, K. 2005. "Three-Dimensional Strength of Identification across Group Memberships: A Confirmatory Factor Analysis," Self and Identity (4:1), pp 69-80.
129. Onyx, J., and Bullen, P. 2000. "Measuring Social Capital in Five Communities," The Journal of Applied Behavioral Science (36:1), pp 23-42.
130. Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Employees' Behavior Towards Is Security Policy Compliance," 40th Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society, pp. 156b-156b.
131. Pearce, J.L., and Randel, A.E. 2004. "Expectations of Organizational Mobility, Workplace Social Inclusion, and Employee Job Performance," Journal of Organizational Behavior (25:1), pp 81-98.
132. Pennar, K. 1997. "The Ties That Lead to Prosperity: The Economic Value of Social Bonds Is Only Beginning to Be Measured," Business Week (15), pp 153-155.
133. Pennings, J.M., and Lee, K. 1999. Social Capital of Organization: Conceptualization, Level of Analysis, and Performance Implications. Norwell: Cambridge University Press.
134. Pfleeger, S.L., Predd, J.B., Hunker, J., and Bulford, C. 2010. "Insiders Behaving Badly: Addressing Bad Actors and Their Actions," Information Forensics and Security, IEEE Transactions on (5:1), pp 169-179.
135. Pirouz, D.M. 2006. "An Overview of Partial Least Squares," Retrieved May (27), p 2011.
136. Porter, L.W., Steers, R.M., Mowday, R.T., and Boulian, P.V. 1974. "Organizational Commitment, Job Satisfaction, and Turnover among Psychiatric Technicians," Journal of applied psychology (59:5), pp 603-609.
137. Portes, A. 1998. "Social Capital: Its Origins and Applications in Modern Sociology," Annual Review of Sociology (24:1), pp 1-24.
138. Postmes, T., Haslam, S.A., and Swaab, R.I. 2005. "Social Influence in Small Groups: An Interactive Model of Social Identity Formation," European Review of Social Psychology (16:1), pp 1-42.
139. Putnam, R.D. 1993. "The Prosperous Community: Social Capital and Public Life," American Prospect (13), pp 35-42.
140. Putnam, R.D. 1995. "Bowling Alone: America’s Declining Social Capital," Journal of democracy (6:1), pp 65-78.
141. Putnam, R.D. 2000. Bowling Alone: The Collapse and Revival of American Community. New York: Simon & Schuster.
142. Ringle, C., Wende, S., and Will, A. 2005. "Smartpls Version 2.0." Hamburg, Germany: Institute for Operations Management and Organization at the University of Hamburg.
143. Robert Jr, L.P., Dennis, A.R., and Ahuja, M.K. 2008. "Social Capital and Knowledge Integration in Digitally Enabled Teams," Information Systems Research (19:3), pp 314-334.
144. Rosenthal, E. 1997. "Social Networks and Team Performance," Team Performance Management (3:4), pp 288-294.
145. Sasse, M.A., Brostoff, S., and Weirich, D. 2001. "Transforming the ‘Weakest Link’ - a Human/Computer Interaction Approach to Usable and Effective Security," BT Technology Journal (19:3), pp 122-131.
146. Schwepker, C.H., and Hartline, M.D. 2005. "Managing the Ethical Climate of Customer-Contact Service Employees," Journal of Service Research (7:4), pp 377-397.
147. Scott, J. 1991. "Social Network Analysis: A Handbook ". London UK: Sage
148. Seibert, S.E., Kraimer, M.L., and Liden, R.C. 2001. "A Social Capital Theory of Career Success," Academy of Management Journal (44:2), pp 219-237.
149. Settoon, R.P., Bennett, N., and Liden, R.C. 1996. "Social Exchange in Organizations: Perceived Organizational Support, Leader–Member Exchange, and Employee Reciprocity," Journal of Applied Psychology (81:3), pp 219-227.
150. Sheldon, M.E. 1971. "Investments and Involvements as Mechanisms Producing Commitment to the Organization," Administrative Science Quarterly (16:2), pp 143-150.
151. Shub, A.N., and Stonebraker, P.W. 2009. "The Human Impact on Supply Chains: Evaluating the Importance of "Soft" Areas on Integration and Performance," Supply Chain Management: An International Journal (14:1), pp 31-40.
152. Sinkula, J.M., Baker, W.E., and Noordewier, T. 1997. "A Framework for Market-Based Organizational Learning: Linking Values, Knowledge, and Behavior," Journal of the Academy of Marketing Science (25:4), pp 305-318.
153. Siponen, M., and Vance, A. 2010. "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly (34:3), pp 487-502.
154. Siponen, M., Willison, R., and Baskerville, R. 2008. "Power and Practice in Information Systems Security Research," International Conference on Information Systems 2008 Proceedings, p. 26.
155. Siponen, M.T. 2000a. "A Conceptual Foundation for Organizational Information Security Awareness," Information Management & Computer Security (8:1), pp 31-41.
156. Siponen, M.T. 2000b. "Critical Analysis of Different Approaches to Minimizing User-Related Faults in Information Systems Security: Implications for Research and Practice," Information Management & Computer Security (8:5), pp 197-209.
157. Siponen, M.T. 2005a. "Analysis of Modern Is Security Development Approaches: Towards the Next Generation of Social and Adaptable Iss Methods," Information and organization (15:4), pp 339-375.
158. Siponen, M.T. 2005b. "An Analysis of the Traditional Is Security Approaches: Implications for Research and Practice," European Journal of Information Systems (14:3), pp 303-315.
159. Son, J., and Lin, N. 2008. "Social Capital and Civic Action: A Network-Based Approach," Social science research (37:1), pp 330-349.
160. Spears, J.L., and Barki, H. 2010. "User Participation in Information Systems Security Risk Management," MIS Quarterly (34:3), pp 503-522.
161. St-Onge, S. 2000. "Variables Influencing the Perceived Relationship between Performance and Pay in a Merit Pay Environment," Journal of Business and Psychology (14:3), pp 459-479.
162. Stanton, J.M., Mastrangelo, P.R., Stam, K.R., and Jolton, J. 2004. "Behavioral Information Security: Two End User Survey Studies of Motivation and Security Practices," Proceedings of the Tenth America's Conference on Information Systems,, New York.
163. Stanton, J.M., Stam, K.R., Guzman, I., and Caledra, C. 2003. "Examining the Linkage between Organizational Commitment and Information Security," EEE Systems, Man, and Cybernetics Conference, Washington, DC, USA: IEEE, pp. 2501-2506 vol. 2503.
164. Stanton, J.M., Stam, K.R., Mastrangelo, P., and Jolton, J. 2005. "Analysis of End User Security Behaviors," Computers & Security (24:2), pp 124-133.
165. Steers, R.M. 1977. "Antecedents and Outcomes of Organizational Commitment," Administrative science quarterly (22:1), pp 46-56.
166. Stolle, D., and Rochon, T.R. 1998. "Are All Associations Alike? Member Diversity, Associational Type, and the Creation of Social Capital," American Behavioral Scientist (42:1), pp 47-65.
167. Straub, D.W., and Welke, R.J. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp 441-469.
168. Szreter, S., and Woolcock, M. 2004. "Health by Association? Social Capital, Social Theory, and the Political Economy of Public Health," International Journal of Epidemiology (33:4), pp 650-667.
169. Tichy, N.M., Tushman, M.L., and Fombrun, C. 1979. "Social Network Analysis for Organizations," Academy of Management Review (4:4), pp 507-519.
170. Tiwana, A., and Mclean, E.R. 2003. "Expertise Integration and Creativity in Information Systems Development," Journal of Management Information Systems (22:1), pp 13-43.
171. Tsai, W., and Ghoshal, S. 1998. "Social Capital and Value Creation: The Role of Intrafirm Networks," Academy of Management Journal (41:4), pp 464-476.
172. Ulivieri, F. 2005. "Trust across Disciplines." Rome: Institute of Cognitive Sciences and Technology.
173. van den Hooff, B., and Huysman, M. 2009. "Managing Knowledge Sharing: Emergent and Engineering Approaches," Information & Management (46:1), pp 1-8.
174. Van der Gaag, M., and Webber, M. 2008. Measurement of Individual Social Capital. New York, USA.: F&N Boekservices.
175. Vandenberg, R.J., Self, R.M., and Seo, J.H. 1994. "A Critical Examination of the Internalization, Identification, and Compliance Commitment Measures," Journal of Management (20:1), pp 123-140.
176. Venkatesh, V., and Davis, F.D. 2000. "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science (46:2), pp 186-204.
177. Venkatesh, V., Morris, M.G., Davis, G.B., and Davis, F.D. 2003. "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly (27:3), pp 425-478.
178. Villarroel, R., Fernández-Medina, E., and Piattini, M. 2005. "Secure Information Systems Development - a Survey and Comparison," Computers & Security (24:4), pp 308-321.
179. Vroom, C., and Von Solms, R. 2004. "Towards Information Security Behavioural Compliance," Computers and Security (23:3), pp 191-198.
180. Wasko, M.M.L., and Faraj, S. 2005. "Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice," MIS Quarterly (29:1), pp 35-57.
181. Wasserman, S., and Faust, K. 1994. "Social Network Analysis: Methods and Applications." Cambridge University Press New York.
182. Watson, G.W., and Papamarcos, S.D. 2002. "Social Capital and Organizational Commitment," Journal of Business and Psychology (16:4), pp 537-552.
183. Webb, T.L., and Sheeran, P. 2006. "Does Changing Behavioral Intentions Engender Behavior Change? A Meta-Analysis of the Experimental Evidence," Psychological Bulletin (132:2), pp 249-268.
184. Whitman, M.E. 2004. "In Defense of the Realm: Understanding the Threats to Information Security," International Journal of Information Management (24:1), pp 43-57.
185. Wiener, Y. 1982. "Commitment in Organizations: A Normative View," Academy of management review (7:3), pp 418-428.
186. Wiener, Y., and Vardi, Y. 1980. "Relationships between Job, Organization, and Career Commitments and Work Outcomes--an Integrative Approach," Organizational Behavior and Human Performance (26:1), pp 81-96.
187. Wood, W. 2000. "Attitude Change: Persuasion and Social Influence," Annual Review of Psychology (51:1), pp 539-570.
188. Woolcock, M. 1998. "Social Capital and Economic Development: Toward a Theoretical Synthesis and Policy Framework," Theory and Society (27:2), pp 151-208.
189. Workman, M., Bommer, W., and Straub, D. 2008. "Security Lapses and the Omission of Information Security Measures: An Empirical Test of the Threat Control Model," Journal of Computers in Human Behavior (24:6), pp 2799-2816.


論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2017-06-28公開。
  • 同意授權瀏覽/列印電子全文服務,於2017-06-28起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信