Responsive image
博碩士論文 etd-0619123-235840 詳細資訊
Title page for etd-0619123-235840
論文名稱
Title
從關係因應觀點探討員工資安政策相關行為
Exploring information security policy related behaviors from relationship coping perspective
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
70
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2023-06-14
繳交日期
Date of Submission
2023-07-19
關鍵字
Keywords
資訊安全政策、組織衝突、因應理論、資安教育訓練、組織正義、資訊安全意識
Information security policy, Organizational conflict, Coping theory, Information security education and training, Organizational justice, Information security awareness
統計
Statistics
本論文已被瀏覽 99 次,被下載 4
The thesis/dissertation has been browsed 99 times, has been downloaded 4 times.
中文摘要
近年來,企業組織數位化的程度逐漸提高,投入資安基礎建設的預算也隨之增加,然而,內控相關資安事件,並未隨著資安防護架構及技術的投入而減少。因此,本研究將以因應理論、資安訓練、組織正義與資安意識為基礎,配合問卷法,從組織成員角度出發,探索可能違反資安的影響因素,並在找出這些因素後提出對策,以減少資安事件的發生。
本研究採用便利抽樣法透過網路形式發放,問卷完整填寫回收數總計350份,使用統計軟體分析驗證,研究結果顯示資安訓練對於正向關係因應具正向影響,由驗證結果得知透過資安訓練,能提升組織成員正向因應組織資安規範。組織資安正義對於正向關係因應具有正向影響,組織成員對於組織資安正義有較高的感知程度時,會促使其在資安政策上採取正向因應的行為,回應組織的資安政策。正向關係因應對於資安順從行為具有正向影響,對於資安投機行為則有負向影響;組織成員對資安接受度較高,會順應組織的資安政策,反之則採取投機行為來規避自己在組織資安政策上的義務及責任。
Abstract
In recent years, the degree of digitalization of enterprise organizations has gradually increased, and the budget invested in information security infrastructure has also increased. However, information security incidents related to internal control have not decreased with the investment in information security protection structures and technologies. Therefore, this study will be based on coping theory, information security training, organizational justice and information security awareness, and with the questionnaire method, from the perspective of organizational members, to explore the factors that may violate information security, and to propose countermeasures after finding out these factors, in order to reduce the occurrence of information security incidents.
This study uses the convenience sampling method to distribute through the Internet. A total of 350 completed and returned questionnaires are used for analysis and verification using statistical software. The research results show that information security training has a positive impact on positive relationship responses. Security training can enhance organizational members to respond positively to organizational information security norms. Organizational information security justice has a positive impact on positive relational coping. When organizational members have a high degree of perception of organizational information security justice, it will prompt them to take positive responses to information security policies and respond to organizational information security policies. . Positive relational responses have a positive impact on information security obedience behavior, but have a negative impact on information security speculative behavior; organization members have a high degree of acceptance of information security, and will comply with the organization's information security policy; otherwise, they will take opportunistic behavior to avoid own obligations and responsibilities in the organization's information security policy.
目次 Table of Contents
論文審定書 i
致謝 ii
摘要 iii
Abstract iv
目錄 v
圖次 vii
表次 viii
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 2
第三節 研究流程 3
第二章 文獻探討 5
第一節 資訊安全政策 5
第二節 組織資安衝突 8
第三節 組織資安正義 9
第四節 因應理論 11
第三章 研究方法 16
第一節 研究模型 16
第二節 研究假說 16
第三節 操作型定義 21
第四節 研究設計 22
第四章 資料分析 27
第一節 樣本敍述與統計 27
第二節 衡量模型驗證 28
第三節 結構模型分析與假說驗證 38
第五章 結論與建議 41
第一節 研究結論與討論 41
第二節 研究貢獻 42
第三節 研究限制與未來方向 43
參考文獻 45
附錄 研究問卷 55
參考文獻 References
中文文獻
王宏仁. (2020). 【iThome 2020 資安大調查】企業為何防不了資安攻擊和威脅?. https://www.ithome.com.tw/article/139495
王宏仁. (2022a). 【iThome 2022 資安大調查(上) 資安投資趨勢】2022年企業資安投資力道多強?多少錢?. https://www.ithome.com.tw/article/152957
王宏仁. (2022b). 【iThome 2022 資安大調查(下)資安對策】企業更看重員工資安意識,積極嘗試多項新興資安技術. https://www.ithome.com.tw/article/153105
王宏仁. (2023). 【iThome大調查系列1:2023資安大調查】2023年企業資安投資多少錢?成長力道多強. https://www.ithome.com.tw/article/156845
余雅菁. (2013). 醫院員工壓力來源及因應策略之探討 亞洲大學]. 台中市. https://hdl.handle.net/11296/m8rm29
吳敏鳳. (1997). 臨床護理人員工作壓力與壓力因應之研究 國立中正大學]. 嘉義縣. https://hdl.handle.net/11296/gsbgca
吳琮璠, & 謝清佳. (2000). 資訊管理理論與實務.
李致皜. (2022). 探討資訊安全疲勞的成因與降低方法 國立中山大學]. 高雄市. https://hdl.handle.net/11296/x24b3y
林廷安. (2018). 心理抽離、壓力因應策略與工作延宕間關係之研究—以動機取向為調節變項 國立高雄師範大學]. 高雄市. https://hdl.handle.net/11296/a7e3mr
林芳瑜. (2013). 花蓮縣國民小學附設幼兒園教保服務人員工作壓力與因應策略之研究 國立東華大學]. 花蓮縣. https://hdl.handle.net/11296/qhkcy8
施皓馨. (2020). 不當督導對內勤工作者情緒勞動之影響-以政治技能與壓力因應為調節變項 國立臺灣師範大學]. 台北市. https://hdl.handle.net/11296/7tq43b
洪國興, 季延平, & 趙榮耀. (2006). 影響資訊安全關鍵因素之研究. 資訊管理研究 (6), 1-29.
徐淑如, 戴基峯, & 康晉維. (2021). 資訊安全政策的組織正義知覺對員工職場行為意圖之影響: 組織信任的中介效果. 電子商務學報, 23(2), 179-226.
高珮庭. (2012). 從嚇阻理論觀點探討員工資訊安全行為意圖 淡江大學]. 新北市. https://hdl.handle.net/11296/x42m3c
陳秀珍. (2007). 學前教育教師工作壓力與因應策略—以普通班的融合教育為例 國立臺中教育大學]. 台中市. https://hdl.handle.net/11296/5rf7ra
陳建丞. (2008). 員工知覺的組織支持與工作績效間的中介模型研究. 管理學報, 25(3), 309-331.
陳昭銘. (2006). 護理人員遵守資訊安全規範意向之研究-解構計劃行為理論觀點 國立中正大學]. 嘉義縣. https://hdl.handle.net/11296/w3acta
游立宇. (2018). 忍一時風平浪靜,退一步海闊天空?華人組織中的人際壓力因應 國立臺灣大學]. 台北市. https://hdl.handle.net/11296/atz7a3
黃宏偉. (2015). 探討員工心理擁有感對於資訊安全順從行為的影響 國立中山大學]. 高雄市. https://hdl.handle.net/11296/eu222y
楊子羚. (2014). 臺南市公立幼兒園教保員的工作壓力及其因應策略 國立嘉義大學]. 嘉義市. https://hdl.handle.net/11296/46b3pu
葉松輝. (2009). 人資從業人員角色知覺、知覺組織支持、專業承諾與職涯滿足關係之研究 國立高雄應用科技大學]. 高雄市. https://hdl.handle.net/11296/gn89qf
歐滄和. (1989). 高中學生校園人際壓力因應風格及有關因素之研究 國立臺灣師範大學]. 台北市. https://hdl.handle.net/11296/s98eey
蔡佩蓁. (2020). 組織資訊安全管理機制對員工濫用電腦行為影響之研究:以一般威嚇理論和理性選擇理論來探討 國立中山大學]. 高雄市. https://hdl.handle.net/11296/j94qu7
鄭佳容. (2012). 控制機制對員工資訊安全行為意圖影響之研究 淡江大學]. 新北市. https://hdl.handle.net/11296/nfmxj8
鄭鑫. (2020). 從中和技術角度探討員工資訊安全政策遵守意圖 國立中山大學]. 高雄市. https://hdl.handle.net/11296/74v5ky
羅正漢. (2021). 【iThome 2021企業資安大調查:資安挑戰】今年臺灣企業最關心的資安威脅是什麼?. https://www.ithome.com.tw/article/144236
趨勢科技股份有限公司. (2022).因應資安新局勢 趨勢科技 2021 年度網路資安報告.
https://www.trendmicro.com/content/dam/trendmicro/global/zh_tw/security-intelligence/threat-report/report/2021_Annual-Cybersecurity-Roundup-Report_TC.pdf
趨勢科技股份有限公司. (2023).資安報告與年度預測(中文版).
https://www.trendmicro.com/zh_tw/security-intelligence/threat-report.html?modal=717c3d
鐘義承. (2012). 以資訊安全為基礎建構會計相關從業人員資訊科技接受模型-以雲端運算為例 國立中正大學]. 嘉義縣. https://hdl.handle.net/11296/5bhb6a

英文文獻
Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248.
Adams, J. S. (1965). Inequity in social exchange. In Advances in experimental social psychology (Vol. 2, pp. 267-299). Elsevier.
Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. Springer.
Ajzen, I. Fishbein, M.(1980): Understanding attitudes and predicting social behavior. Englewood.
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological review, 84(2), 191.
Becker, J. M., Klein, K., & Wetzels, M. (2012). Hierarchical latent variable models in PLS-SEM: guidelines for using reflective-formative type models. Long range planning, 45(5-6), 359-394.
Bies, R. J., & Moag, J. S. (1986). Interactional justice: The management or moral outrage. Research in Organizational Behavior, 9, 289-319.
Billings, A. G., & Moos, R. H. (1981). The role of coping responses and social resources in attenuating the stress of life events. Journal of behavioral medicine, 4(2), 139-157.
Blau, P. M. (1964). Exchange and power in social life. Piscataway. In: NJ: Transaction Publishers.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 523-548.
Cavusoglu, H., Cavusoglu, H., Son, J., & Benbasat, I. (2009). Information security control resources in organizations: A multidimensional view and their key drivers. working paper, Sauder School of Business, University of British Columbia.
Charles, J., Goetz, C., & Scott, R. (1981). Principles of Relational Contracts. Virginia Law Review, 67(6), 1089-1150.
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern methods for business research, 295(2), 295-336.
Cohen, J., Cohen, P., West, S. G., & Aiken, L. S. (2013). Applied multiple regression/correlation analysis for the behavioral sciences. Routledge.
Coleman, J. S. (1986). Social theory, social research, and a theory of action. American journal of Sociology, 91(6), 1309-1335.
Colquitt, J. A., & Rodell, J. B. (2015). Measuring justice and fairness.
Cram, W. A., Proudfoot, J. G., & D’arcy, J. (2017). Organizational information security policies: a review and research framework. European Journal of Information Systems, 26, 605-641.
Cram, W. A., Wiener, M., Tarafdar, M., & Benlian, A. (2020). Algorithmic Controls and their Implications for Gig Worker Well-being and Behavior. ICIS,
Cropanzano, R., Byrne, Z. S., Bobocel, D. R., & Rupp, D. E. (2001). Moral virtues, fairness heuristics, social entities, and other denizens of organizational justice. Journal of vocational behavior, 58(2), 164-209.
D’Arcy, J., & Greene, G. (2014). Security culture and the employment relationship as drivers of employees’ security compliance. Information Management & Computer Security, 22(5), 474-489.
DeLongis, A., & O’Brien, T. (1990). An interpersonal framework for stress and coping: An application to the families of Alzheimer's patients.
Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British journal of management, 17(4), 263-282.
Eisenberger, R., Cummings, J., Armeli, S., & Lynch, P. (1997). Perceived organizational support, discretionary treatment, and job satisfaction. Journal of applied psychology, 82(5), 812.
Eisenberger, R., Huntington, R., Hutchison, S., & Sowa, D. (1986). Perceived organizational support. Journal of applied psychology, 71(3), 500.
Erdogan, B., Kraimer, M. L., & Liden, R. C. (2004). Work value congruence and intrinsic career success: The compensatory roles of leader‐member exchange and perceived organizational support. Personnel psychology, 57(2), 305-332.
Endler, N. S., & Parker, J. D. (1990). State and trait anxiety, depression and coping styles. Australian Journal of Psychology, 42(2), 207-220.
Flint, D., Haley, L. M., & McNally, J. J. (2012). Dimensionality of organizational justice in a call center context. Psychological reports, 110(2), 677-693.
Folger, R. G., & Cropanzano, R. (1998). Organizational justice and human resource management (Vol. 7). Sage.
Folkman, S., Lazarus, R. S., Dunkel-Schetter, C., DeLongis, A., & Gruen, R. J. (1986). Dynamics of a stressful encounter: cognitive appraisal, coping, and encounter outcomes. Journal of personality and social psychology, 50(5), 992.
Folkman, S., & Moskowitz, J. T. (2004). Coping: Pitfalls and promise. Annu. Rev. Psychol., 55, 745-774.
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. In: Sage Publications Sage CA: Los Angeles, CA.
Gmelch, W. H. (1988). EDUCATORS'RESPONSE TO STRESS: TOWARDS A COPING TAXONOMY. Journal of educational administration.
Goetz, C. J., & Scott, R. E. (1981). Principles of relational contracts. Va. L. Rev., 67, 1089.
Gouldner, A. W. (1960). The norm of reciprocity: A preliminary statement. American sociological review, 161-178.
Gray, J., & Strake, F. (1991). Organizational Behavior-Concepts and Applications Columbus Bell and Howell Company,(1984) Hanson. EM Educational Administration and Organizational Behavior (3rd ed), Boston: Allynard Bacon.
Greenberg, J. (1993). Stealing in the name of justice: Informational and interpersonal moderators of theft reactions to underpayment inequity. Organizational behavior and human decision processes, 54(1), 81-103.
Greenberg, J., & Cropanzano, R. (1993). The social side of fairness: Interpersonal and informational classes of organizational justice. Justice in the Workplace: Approaching Fairness in Human Resource Management; Cropanzano, R., Ed.
Griesinger, D. W. (1990). The human side of economic organization. Academy of Management Review, 15(3), 478-499.
Gundlach, G. T., Achrol, R. S., & Mentzer, J. T. (1995). The structure of commitment in exchange. Journal of marketing, 59(1), 78-92.
Hackman, J. R., & Oldham, G. R. (1976). Motivation through the design of work: Test of a theory. Organizational behavior and human performance, 16(2), 250-279.
Haeussinger, F., & Kranz, J. (2013). Information security awareness: Its antecedents and mediating effects on security compliant behavior.
Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing theory and Practice, 19(2), 139-152.
Hanifan, L. J. (1920). The Community Center. Boston: Silver, Burdett & Company. In.
Holahan, C. J., Moos, R. H., Holahan, C. K., & Brennan, P. L. (1997). Social context, coping strategies, and depressive symptoms: an expanded model with cardiac patients. Journal of personality and social psychology, 72(4), 918.
Homans, G. C. (1950). Te human group. In: New York: Harcourt, Brace & World.
Homans, G. C. (1958). Social behavior as exchange. American journal of Sociology, 63(6), 597-606.
Huang, K.-Y. (2021). Coping with organizational information technology events: A perceived organizational support and relationship-focused coping perspective.
Hwang, I., & Ahn, S. (2019). The Effect of organizational justice on information security-related role stress and negative behaviors. 한국컴퓨터정보학회논문지, 24(11), 87-98.
Im, G. P., & Baskerville, R. L. (2005). A longitudinal study of information system threat categories: the enduring problem of human error. ACM SIGMIS Database:
Jacobs, J. B. (1979). A preliminary model of particularistic ties in Chinese political alliances: Kan-ch'ing and Kuan-hsi in a rural Taiwanese township. The China Quarterly, 78, 237-273.
Jehn, K. A. (1997). A qualitative analysis of conflict types and dimensions in organizational groups. Administrative science quarterly, 530-557.
Jehn, K. A., & Mannix, E. A. (2001). The dynamic nature of conflict: A longitudinal study of intragroup conflict and group performance. Academy of management journal, 44(2), 238-251.
Kim, S. H., Yang, K. H., & Park, S. (2014). An integrative behavioral model of information security policy compliance. The Scientific World Journal, 2014.
Klein, J. G., Smith, N. C., & John, A. (2004). Why we boycott: Consumer motivations for boycott participation. Journal of marketing, 68(3), 92-109.
Kotter, J., & Schlesinger, L. (1979). Choosing strategies for change. Harvard business review, 57(2), 106-114.
Kotter, J. P., & Schlesinger, L. A. (1979). Choosing strategies for change.
Kramer, B. J. (1993). Expanding the conceptualization of caregiver coping: The importance of relationship-focused coping strategies. Family relations, 383-391.
LaGaipa, J. J. (1977). Interpersonal attraction and social exchange. Theory and practice in interpersonal attraction, 129-164.
Lazarus, R. S., & Folkman, S. (1984). Stress, appraisal, and coping. Springer publishing company.
Lazarus R. S.,Folkman, S. (1986). Dynamics of a stressful encounter : cognitive appraisal, coping and encounter outcomes. Journal of Personalityand Social Psychology, 50 (5), 992-1003.
Lazarus, R. S., & Launier, R. (1978). Stress-related transactions between person and environment. In Perspectives in interactional psychology (pp. 287-327). Boston, MA: Springer US.
Lebek, B., Uffen, J., Neumann, M., Hohler, B., & H. Breitner, M. (2014). Information security awareness and behavior: a theory-based literature review. Management Research Review, 37(12), 1049-1092.
Li, H., Sarathy, R., Zhang, J., & Luo, X. (2014). Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Information Systems Journal, 24(6), 479-502.
Loe, T. W., Ferrell, L., & Mansfield, P. (2000). A review of empirical studies assessing ethical decision making in business. Journal of business ethics, 25, 185-204.
Lowry, P. B., & Moody, G. D. (2015). Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. Information Systems Journal, 25(5), 433-463.
Lowry, P. B., Posey, C., Roberts, T. L., & Bennett, R. J. (2014). Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse. Journal of business ethics, 121, 385-401.
Masten, S. E. (1988). Equity, opportunism, and the design of contractual relations. Journal of Institutional and Theoretical Economics (JITE)/Zeitschrift für die gesamte Staatswissenschaft, 144(1), 180-195.
McFarland, W. P. (1992). Counselors teaching peaceful conflict resolution. Journal of Counseling & development, 71(1), 18-21.
Moorman, R. H. (1991). Relationship between organizational justice and organizational citizenship behaviors: Do fairness perceptions influence employee citizenship? Journal of applied psychology, 76(6), 845.
Moos, R. H., & Schaefer, J. A. (1993). Coping resources and processes: Current concepts and measures.
Morgan, R. M., & Hunt, S. D. (1994). The commitment-trust theory of relationship marketing. Journal of marketing, 58(3), 20-38.
Nahapiet, J., & Ghoshal, S. (1998). Social capital, intellectual capital, and the organizational advantage. Academy of Management Review, 23(2), 242-266.
Nelson, D. L., & Simmons, B. L. (2003). Health psychology and work stress: A more positive approach.
Niemimaa, E. (2016). Crafting an information security policy: Insights from an ethnographic study. Proceedings of the 37th International Conference on Information Systems, Dublin, Ireland.
Nist (2010). information security policy. https://csrc.nist.gov/glossary/term/information_security_policy
Noe, R. A., & Schmitt, N. (1986). The influence of trainee attitudes on training effectiveness: Test of a model. Personnel psychology, 39(3), 497-523.
Noe, R. A. (1999). Employee training & development. Irvin, McGraw-Hill.
Nunnally, J. (1994). Psychometric theory. (No Title).
Nyamajiwa, B. (2000). Communication in negotiation. Harare: University of Zimbabwe.
Nye, F. I. (1979). Choice, exchange, and the family. Contemporary theories about the family: research-based theories/edited by Wesley R. Burr...[et al.].
O’Brien, T. B., & DeLongis, A. (1997). Coping with chronic stress: An interpersonal perspective. Coping with chronic stress, 161-190.
O’Brien, T. B., & DeLongis, A. (1996). The interactional context of problem‐, emotion‐, and relationship‐focused coping: the role of the big five personality factors. Journal of personality, 64(4), 775-813.
Patchen, M. (1970). Participation, achievement, and involvement on the job.
Pearlin, L. I., & Schooler, C. (1978). The structure of coping. Journal of health and social behavior, 2-21.
Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of management, 12(4), 531-544.
Posey, C., Bennett, B., Roberts, T., & Lowry, P. B. (2011). When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24-47.
Rafferty, A. E., & Griffin, M. A. (2006). Perceptions of organizational change: a stress and coping perspective. Journal of applied psychology, 91(5), 1154.
Rahim, M. A., & Magner, N. R. (1995). Confirmatory factor analysis of the styles of handling interpersonal conflict: First-order factor model and its invariance across groups. Journal of applied psychology, 80(1), 122.
Reeser, C., & Loper, M. (1978). Management: The key to organizational effectiveness. Glenview, Illinois: Scott Foresman & Company.
Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers & security, 28(8), 816-826.
Rheingold, H. (1993). A slice of life in my virtual community. Global networks: Computers and international communication, 57-80.
Rhoades, L., Eisenberger, R., & Armeli, S. (2001). Affective commitment to the organization: the contribution of perceived organizational support. Journal of applied psychology, 86(5), 825.
Rousseau, D. (1995). Psychological contracts in organizations: Understanding written and unwritten agreements. Sage publications.
Scholtz, T., Byrnes, F., & Heiser, J. (2006). Best practices and common problems for information security programs. In: Gartner.
Schweizerische, S. (2013). Information technology-Security techniques-Information security management systems-Requirements. ISO/IEC International Standards Organization.
Selye, H. (1976). Stress without distress (pp. 137-146). In: Springer US.
Simons, T., Pelled, L. H., & Smith, K. A. (1999). Making use of difference: Diversity, debate, and decision comprehensiveness in top management teams. Academy of management journal, 42(6), 662-673.
Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41.
Son, J. Y. (2011). Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Information & Management, 48(7), 296-302.
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS quarterly, 441-469.
Straub Jr, D. W. (1990). Effective IS security: An empirical study. Information systems research, 1(3), 255-276.
Thibaut, J. W., & Walker, L. (1975). Procedural justice: A psychological analysis. (No Title).
Thomas, K. W., & Schmidt, W. H. (1976). A survey of managerial interests with respect to conflict. Academy of Management journal, 19(2), 315-318.
Verderber, R. F., & Verderber, K. (1997). Inter-Act: Using Interpersonal Communication Skills (Wadsworth Series in Speech Communication). In: Wadsworth Pub Co.
Verizon. (2022). 2022 Data Breach Investigation Report (DBIR).
https://www.verizon.com/business/resources/reports/2022/dbir/2022-dbir-data-breach-investigations-report.pdf
Wall Jr, J. A., & Callister, R. R. (1995). Conflict and its management. Journal of management, 21(3), 515-558.
Waring, E. M., Tillman, M. P., Frelick, L., Russell, L., & Weisz, G. (1980). Concepts of intimacy in the general population. Journal of Nervous and Mental Disease.
Wathne, K. H., & Heide, J. B. (2000). Opportunism in interfirm relationships: Forms, outcomes, and solutions. Journal of marketing, 64(4), 36-51.
Watson, D., & Hubbard, B. (1996). Adaptational style and dispositional structure: Coping in the context of the Five‐Factor model. Journal of personality, 64(4), 737-774.
Wells, W. D., & Tigert, D. J. (1971). Activities, interests and opinions. Journal of advertising research, 11(4), 27-35.
Williamson, O. E. (1985). The economic institutions of capitalism. New York: Free Press. In: Douglas.
Willison, R., & Warkentin, M. (2009). Motivations for employee computer crime: understanding and addressing workplace disgruntlement through the application of organisational justice. In: Institut for Informatik, Handelshøjskolen i København.
Willison, R., & Warkentin, M. (2013). Beyond deterrence: An expanded view of employee computer abuse. MIS quarterly, 1-20.
Zafar, H., & Clark, J. G. (2009). Current state of information security research in IS. Communications of the Association for Information Systems, 24(1), 34.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:開放下載的時間 available 2026-07-19
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 2026-07-19

QR Code