Acknowledgement
Supported by : 세종대학교
References
- 중국 SI 시장 현황보고서, 한국소프트웨어진흥원, 마켓리서치팀, 2003.
- Anderson, J. and Gerbing, "Structural equation modeling in practice:A review and recommended two-step approach", Psychological Bulletin, Vol.1033(1988), pp.411-423.
- Choudhury, V. and Sabherwal, "Portfolios of control in outsourced software development projects", Information Systems Research, Vol.14, No.3(2003), pp.291-314. https://doi.org/10.1287/isre.14.3.291.16563
- Cook, T. D. and Campbell, Boston, MA: Houghton Mifflin, 1979.
- Hair, J. F., T. Anderson, and T. Grablowsky, OK; PPC Books, 1979.
- Henderson, J. C. and Lee, "Managing I/S design teams:a control theories perspective", Management Science, Vol.38(1992), pp.757-777. https://doi.org/10.1287/mnsc.38.6.757
- ITGI(IT Governance Institute), Information Systems Audit and Control Association, 2007.
- Jaworski, B. J., "Toward a theory of marketing control:Environmental context, control types, and consequences", Journal of Marketing, Vol.52(1988), pp.23-39. https://doi.org/10.2307/1251447
- Jiang, J. J., Klein, and Carr, "Measuring Information Systems Quality:SERVQUAL from the Other Side", MIS Quarterly, Vol. 262(2002), pp.145-166.
- Joreskog, K. G. and Sorbom, 2nd ed., SPSS Inc., 1989.
- Kettinger, W. J. and Lee, "Zones of tolerance: Alternative scales for measuring information systems service quality", MIS Quarterly, Vol.29, No.4(2005), pp.607-623. https://doi.org/10.2307/25148702
- Kirsch, L. J., "Deploying common systems globally:The dynamics of control", Information Systems Research, Vol.154(2004), pp.374-395.
- Kirsch, L. J., "Portfolios of control modes and IS project management", Information Systems Research, Vol.83(1997), pp.215-239.
- Lee, S., Han, and Kym, "The impact of EDI controls on EDI implementation", International Journal of Electronic Commerce, Vol. 24(1998), pp.71-98.
- Lee, S. M., Lee, and Yoo, "An integrative model of computer abuse based on social control and general deterrence theories", Information and Management, Vol.41(2004), pp.707-718. https://doi.org/10.1016/j.im.2003.08.008
- Lee, Y. and Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communication of the ACM, Vol.488 (2005), pp.72-78.
- Markus, M. L. and J. Pfeffer, "Power and the design and implementation of accounting and control systems", Accounting, Organizations and Society, Vol.82, No.3(1983), pp.205-218.
- Merchant, K. A., "The design of the corporate budgeting system:Influences on managerial behavior and performance", Accounting Review, Vol.56(1981), pp.813-829.
- Nidumolu, S. R. and Subramni, "The matrix of control:Combining process and structure approaches to managing software development", Journal of Management Information Systems, Vol.203(2003), pp.159-196.
- Nunnally, J. C., Psychometric Theory, New York:McGraw-Hill, 1978.
- Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Alternative scales for measuring service quality:A comparative assessment based on psychometric and diagnostic criteria", Journal of Retailing, Vol.70, No.3(1994), pp.201-230. https://doi.org/10.1016/0022-4359(94)90033-7
- Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "Refinement and reassessment of the SERVQUAL scale", Journal of Retailing Vol.67(1991), pp.420-450.
- Parasuraman, A., V. A. Zeithaml, and L. L. Berry, "A conceptual model of service quality and its implications for future research", Journal of Marketing, Vol.49(1985), pp.41-50.
- Piccoli, G. and B. Ives, "Trust and the unintended effects of behavior control in virtual teams", MIS Quarterly, Vol.27, No.3 (2003), pp.365-395. https://doi.org/10.2307/30036538
- Simons, R., "The role of management control systems in creating competitive advantage: New perspectives", Accounting, Organizations and Society, Vol.15, No.1/2(1990), pp.127-143. https://doi.org/10.1016/0361-3682(90)90018-P
- Siponen, T. M., "On the role of human mortality in information system security:From the problems of descriptivism to nondescriptive foundations", Information Resources Management Journal, Vol.14, No.4 (2001), pp.15-23.
- Suh, B. and I. Han, "The impact of customer trust and perception of security control on the acceptance of electronic commerce", International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.135-161.
- Weber, R., Information Systems Control and Audit, Prentice Hall Inc., Upper Saddle River, New Jersey, 1999.
- Werts, C. E., R. L. Linn, and K. G. Jöreskog, "Interclass reliability estimates:Testing structural assumptions", Educational and Psychological Measurement, Vol.34(1974), pp. 25-33. https://doi.org/10.1177/001316447403400104
- Whitman, M. E., "In defense of the realm:Understanding the threats to information security", International Journal of Information Management, Vol.24(2004), pp.43-57. https://doi.org/10.1016/j.ijinfomgt.2003.12.003
- Yeh, Q.-J. and A. J.-T. Chang, "Threats and countermeasures for information system security:A cross-industry study", Information and Management, Vol.44, No.5 (2007), p.491.