| 1 |
전자신문, "유통의 핵심과제 ‘신속⋅정확’ QR 코드로 둘 다 풀었다", pp. 18, 2011년 9월 26일. |
미소장 |
| 2 |
Computers in human behavior  |
미소장 |
| 3 |
The Impact of Technostress on Role Stress and Productivity  |
미소장 |
| 4 |
M. Tarafdar, Q. Tu, and T. S. Ragu-Nathan, "Impact of Technostress on End-User Satisfaction and Performance", Journal of Management Information Systems, Vol. 27, No. 3, pp. 303-334, Winter, 2010-11. |
미소장 |
| 5 |
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness  |
미소장 |
| 6 |
Protection motivation and deterrence: a framework for security policy compliance in organisations  |
미소장 |
| 7 |
M-S. Yim, "Towards an Understanding of the Persistent Ethical Behavior in IT Use, Dissertation", Graduate School of Business at the Sogang University, Aug. 2011. |
미소장 |
| 8 |
A holistic model of computer abuse within organizations  |
미소장 |
| 9 |
Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior  |
미소장 |
| 10 |
Technological stress: Psychophysiological symptoms in modern offices  |
미소장 |
| 11 |
Tempering technostress  |
미소장 |
| 12 |
P. E. Brillhart, "Technostress in the Workplace: Managing Stress in the Electronic Workplace", Journal of American Academy of Business, Vol. 5, No.1/2, pp. 302-307, Sep. 2004. |
미소장 |
| 13 |
Managing technostress: optimizing the use of computer technology.  |
미소장 |
| 14 |
The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation  |
미소장 |
| 15 |
Crossing to the dark side : examining creators, outcomes, and inhibitors of technostress  |
미소장 |
| 16 |
Computer-related technostress in China  |
미소장 |
| 17 |
L. S. Meyers, G. Gamst, and A. J. Guarino, "Applied Multivariate Research: Design and Interpretation", SAGE Publications, London, 2006. |
미소장 |
| 18 |
Exploratory Factor Analysis: A Users?Guide  |
미소장 |
| 19 |
Arcs of integration: an international study of supply chain strategies  |
미소장 |
| 20 |
Exploratory factor analysis revisited: How robust methods support the detection of hidden multivariate data structures in IS research  |
미소장 |
| 21 |
When is a correlation matrix appropriate for factor analysis? Some decision rules.  |
미소장 |
| 22 |
J. F. Hair, Jr., W. C. Black, B. J. Babin, and R. E. Anderson, "Multivariate Data Analysis, 7th ed., Upper Saddle River", NJ, PrenticeHall, 2010. |
미소장 |
| 23 |
J. C. Nunnally and I. H. Bernstein, "Psychometric Theory", 3rd ed, New York, NY : McGraw-hill, 1994. |
미소장 |
| 24 |
Common method biases in behavioral research: a critical review of the literature and recommended remedies.  |
미소장 |
| 25 |
Accounting for common method variance in cross-sectional research designs.  |
미소장 |
| 26 |
Evaluating Structural Equation Models with Unobservable Variables and Measurement Error  |
미소장 |
| 27 |
On assuring valid measures for theoretical models using survey data  |
미소장 |
| 28 |
Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research  |
미소장 |
| 29 |
Structural Equation Modeling and Regression: Guidelines for Research Practice  |
미소장 |
| 30 |
A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example  |
미소장 |
| 31 |
Assessing Construct Validity in Organizational Research  |
미소장 |