參考文獻 |
[1] 林季謙:〈不同網路能力、人格特質與人際關係中小學生對網路成癮的影響〉,碩士論文,南華大學,民國94年。
[2] 張自健:〈高職校園景觀配置內涵之研究〉,博士論文,國立臺灣師範大學,民國92年。
[3] 葉明佳:〈從資訊-動機-行為技能模式探討N世代青年正確用藥行為〉,博士論文,國立政治大學,民國106年。
[4] 鄭冠駿:〈由溝通媒介的選擇,探討個人人格特質對於其溝通滿足之影響〉,博士論文,國立中央大學,民國94年。
[5] 畢恆達:〈環境心理學研究資料引介〉,《國立台灣大學建築與城鄉研究學報》,4,民國78年,115-136 頁。
[6] 李仁豪、鍾芯瑜:〈中文版簡式「五大人格量表」BFI 的發展〉,《測驗學刊》,67(4),民國109年,271-299頁。
[7] 黃堅厚:《人格心理學》,台北:心理出版社,民國88年。
[8] 趨勢科技:〈2022年度網路資安報告〉,2023 年 1 月 16 日,取自trendmicro.com。
[9] 內政部警政署:〈網路犯罪發生數統計〉,2023 年 1 月 16 日,取自https://www.npa.gov.tw/ch/app/analysis/list?module=analysis&id=18089。
[10] DATAREPORTAL:〈DIGITAL 2023: TAIWAN〉,2023 年 1 月 25 日,取自https://datareportal.com/reports/digital-2023-taiwan。
[11] International Telecommunication Union:〈Individuals using the Internet〉,2022 年 12 月 16 日,取自https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx。
[12] Albladi, S. M. and Weir, G. R. S. (2017). Personality traits and cyber-attack victimisation: Multiple mediation analysis. IEEE, 1-6.
[13] Aloul, F. A. (2011). The Need for Effective Information Security Awareness. Journal of Advances in Information Technology, 3, 176-183.
[14] Alshamrani, A., Myneni, S., Chowdhary, A., & Huang, D. (2019). A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Communications surveys and tutorials, 21(2), 1851-1877.
[15] Amichai-Hamburger, Y. (2002). Internet and personality. Computers in Human Behavior, 18(1), 1-10.
[16] Arthur, W. and W. Grazziano (1996). The five-factor model, conscientiousness, and driving accident involvement. Journal of Personality 64(3): 594-618
[17] Bandura A. Self-efficacy: toward a unifying theory of behavioral change. Psychol Rev. 1977 Mar;84(2):191-215.
[18] Bandura, A. (1986). The explanatory and predictive scope of self-efficacy theory. Journal of Social and Clinical Psychology, 4, 359-373.
[19] Bandura, A. (1989). Human Agency in Social Cognitive Theory. The American Psychologist, 44, 1175-1184.
[20] Barrick, M. R., Stewart, G. L., & Piotrowski, M. (2002). Personality and job performance: Test of the mediating effects of motivation among sales representatives. Journal of Applied Psychology, 87, 43-51.
[21] Belford, R. E. (2013). Review of Learning Theories: An Educational Perspective Journal of chemical education, 90(2), 150-151.
[22] Bonneau, J., Herley, C., van Oorschot, P. C., & Stajano, F. (2012). The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE Symposium on Security and Privacy, 553-567.
[23] Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly, 34(3).
[24] Butavicius, M., Parsons, K., Lillie, M., McCormac, A., Pattinson, M., & Calic, D. (2020). When believing in technology leads to poor cyber security: Development of a trust in technical controls scale. Computers & Security, 98-102.
[25] Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36-45.
[26] Cellar, D. F., Z. C. Nelson and C. M. Yoke (2001). The five factor model: Investigating the relationships between personality and accident involvement. Journal of Prevention & Intervention in the Community 22(1): 43-52.
[27] Chet, C., & Jeffrey, J. (2010). Analyzing the adoption of computer security utilizing the health belief model. Issues in information systems, 11(1), 286-291.
[28] Claar, C., & Johnson, J. (2010). Analysing the adoption of computer security utilizing the health belief model. Issues in Information Systems, 4(1), 286-291.
[29] Compeau, D. R., & Higgins, C. A. (1995). Computer Self-Efficacy: Development of a Measure and Initial Test. MIS Quarterly, 19(2), 189-211.
[30] Cooper, J. A., Moriarty, F., Ryan, C., Smith, S. M., Bennett, K., Fahey, T., Wallace, E., Cahir, C., Williams, D., Teeling, M., & Hughes, C. M. (2016). Potentially inappropriate prescribing in two populations with differing socio-economic profiles: a cross-sectional database study using the PROMPT criteria. Eur J Clin Pharmacol, 72(5), 583-591.
[31] Costa, P., & McCrae, R. (1992). Neo PI-R professional manual. Psychological Assessment Resources, 396.
[32] Costa , P., McCrae, Robert (2008). The Revised NEO Personality Inventory (NEO-PI-R). In The SAGE handbook of personality theory and assessment, Vol 2: Personality measurement and testing., 179-198.
[33] Costa, P. T., Jr., & McCrae, R. R. (1987). Neuroticism, somatic complaints, and disease: is the bark worse than the bite? J Pers, 55(2), 299-316.
[34] Costa, P. T., & McCrae, R. R. (1986). Cross-sectional studies of personality in a national sample: I. Development and validation of survey measures. Psychology and Aging, 1, 140-143.
[35] DeYoung, C. G., Quilty, L. C., & Peterson, J. B. (2007). Between facets and domains: 10 aspects of the Big Five. Journal of Personality and Social Psychology, 93, 880-896.
[36] Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: the role of national cultural differences. Information systems journal (Oxford, England), 19(4), 391-412.
[37] Edwards, J. R. (2001). Multidimensional Constructs in Organizational Behavior Research: An Integrative Analytical Framework. Organizational research methods, 4(2), 144-192.
[38] Falk, R. F., & Miller, N. B. (1992). A primer for soft modeling. Akron, Ohio: University of Akron Press.
[39] Farooq, A., Jeske, D., & Isoaho, J. (2019). Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model. 238-252.
[40] Fisher, & Fisher. (1994). Changing AIDS-Risk Behavior. Advances in consumer research, 21.
[41] Fisher, F. (1992). Changing AIDS-risk behavior. Psychological Bulletin, 111, 455-474.
[42] Fisher, J. D., Fisher, W. A., Amico, K. R., & Harman, J. J. (2006). An information-motivation-behavioral skills model of adherence to antiretroviral therapy. Health Psychol, 25(4), 462-473.
[43] Fisher, J. D., Fisher, W. A., Bryan, A. D., & Misovich, S. J. (2002). Information-motivation-behavioral skills model-based HIV risk behavior change intervention for inner-city high school youth. Health Psychol, 21(2), 177-186.
[44] Fisher, W., Fisher, J., & Harman, J. (2009).The Information‐Motivation‐Behavioral Skills Model: A General Social Psychological Approach to Understanding and Promoting Health Behavior. Social Psychological Foundations of Health and Illness, 82-106.
[45] Fisher, W. A., Williams, S. S., Fisher, J. D., & Malloy, T. E. (1999). Understanding AIDS Risk Behavior Among Sexually Active Urban Adolescents: An Empirical Test of the Information–Motivation–Behavioral Skills Model. AIDS and Behavior, 3(1), 13-23.
[46] Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variabiles and neasurement error: Algebra and Statistics. Journal of marketing research, 18(3), 382-388.
[47] Frydenberg, M., & Lorenz, B. (2020). Lizards in the Street! Introducing Cybersecurity Awareness in a Digital Literacy Context. Information systems education journal, 18(4), 33-34.
[48] Frydenberg, M., & Press, L. (2010). From Computer Literacy to Web 2.0 Literacy: Teaching and Learning Information Technology Concepts Using Web 2.0 Tools. Proceedings of the Information Systems Education Conference, ISECON, 8.
[49] Funder, D. C. (2001). Personality. Annual Review of Psychology. 52(1), 197-221.
[50] Furnham, A., & Fudge, C. (2008). The Five Factor model of personality and sales performance. Journal of Individual Differences, 29, 11-16.
[51] Garg, V., & Camp, J. (2012). End User Perception of Online Risk under Uncertainty. 45th Hawaii International Conference on System Sciences, 3278-3287.
[52] Goldberg, L. R. (1990). An alternative description of personality: The Big-Five factor structure. Journal of Personality and Social Psychology, 59, 1216-1229.
[53] Gratian, M., Bandi, S., Cukier, M., Dykstra, J., & Ginther, A. (2018). Correlating human traits and cyber security behavior intentions. Computers & Security, 73, 345-358.
[54] Hadlington, L. (2018). Employees attitude towards cyber security and risky online behaviours: An empirical assessment in the United Kingdom. International Journal of Cyber Criminology, 12, 269-281.
[55] Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a Silver Bullet. Journal of marketing theory and practice. 19(2), 139-152.
[56] Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review. 31(1), 2-24.
[57] Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414-433.
[58] Halevi, T., Lewis, J., & Memon, N. (2013). A pilot study of cyber security and privacy related behavior and personality traits. WWW ′13 Companion International World Wide Web Conference,
[59] He, W., Yuan, X., & Tian, X. (2014). The Self-Efficacy Variable in Behavioral Information Security Research. Proceedings - 2nd International Conference on Enterprise Systems, ES 2014, 28-32.
[60] Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135.
[61] Hong, Y., & Furnell, S. (2021). Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications, 57, 102.
[62] Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95.
[63] Interpol. (2017). “ Counter the threat of terrorism. ”
[64] Jeske, D., & van Schaik, P. (2017). Familiarity with Internet threats: Beyond awareness. Computers & Security, 66, 129-141.
[65] Jin-Hee, C., Hasan, C., & Oltramari, A. (2016). Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).
[66] John, O. P., Naumann, L. P., & Soto, C. J. (2008). Paradigm shift to the integrative Big Five trait taxonomy: History, measurement, and conceptual issues. In Handbook of personality: Theory and research, 3rd ed, 114-158.
[67] John, O. P., & Srivastava, S. (1999). The Big Five Trait taxonomy: History,measurement, and theoretical perspectives. In L. A. Pervin & O. P. John (Eds.).Handbook of personality: Theory and research, 102–138.
[68] Kim, W., Jeong, O.-R., Kim, C., & So, J. (2011). The dark side of the Internet: Attacks, costs and responses. Information systems (Oxford), 36(3), 675-705.
[69] Kinzie, M. B., & Delcourt, M. A. B. (1991). Computer Technologies in Teacher Education: The Measurement of Attitudes and Self-Efficacy. American Education Research Association (AERA).
[70] Korotkov, D., & Hannah, T. E. (2004). The Five-Factor Model of Personality: Strengths and limitations in predicting health status, sick-role and illness behaviour. Personality and Individual Differences, 36, 187-199.
[71] Korzaan, M., & Boswell, K. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48, 15-24.
[72] Kruger, H., Drevin, L., & Steyn, T. (2010). A vocabulary test to assess information security awareness. Information Management & Computer Security, 18(5), 316-327.
[73] Lehto, M. (2019). Cyber security competencies -cyber security education and research in Finnish universities. The 14th European Conference on Information Warfare and Security, 2-3.
[74] Liao, H., & Chuang, A. (2004). A Multilevel Investigation of Factors Influencing Employee Service Performance and Customer Outcomes. Academy of Management Journal, 47, 41-58.
[75] Lodi-Smith, J., & Roberts, B. W. (2007). Social investment and personality: a meta-analysis of the relationship of personality traits to investment in work, family, religion, and volunteerism. Pers Soc Psychol Rev, 11(1), 68-86.
[76] Ma, Q., & Liu, L. (2005). The Role of Internet Self-Efficacy in the Acceptance of Web-Based Electronic Medical Records. Journal of Organizational and End User Computing, 17(1), 38-57.
[77] Matt, C., & Peckelsen, P. (2016). Sweet Idleness, but Why? How Cognitive Factors and Personality Traits Affect Privacy-Protective Behavior. 2016 49th Hawaii International Conference on System Sciences (HICSS).
[78] Mayberry, L. S., & Osborn, C. Y. (2014). Family involvement is helpful and harmful to patients’ self-care and glycemic control. Patient Education and Counseling, 97, 418-425.
[79] McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual differences and Information Security Awareness. Computers in Human Behavior, 69, 151-156.
[80] Mount, M. K., & Barrick, M. R. (1998). Five reasons why the "Big Five" article has been frequently cited. Personnel Psychology, 51(4), 849–857.
[81] Ng, B.-Y., Kankanhalli, A., & Xu, Y. (2009). Studying users′ computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825.
[82] Ng, B.-Y., & Rahim, M. (2005). A Socio-Behavioral Study of Home Computer Users′ Intention to Practice Security. Pacific Asia Conference on Information Systems.
[83] Näsi, M., Oksanen, A., Keipi, T., & Räsänen, P. (2015). Cybercrime victimization among young people: a multi-nation study. Journal of Scandinavian Studies in Criminology and Crime Prevention, 16(2), 203-210.
[84] Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R. T., & Whitty, M. (2014). Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Security and Privacy Workshops.
[85] Pervin, L. A. (1996). The science of personality. N.Y.: Wiley.
[86] Phillips, J. G., Butt, S., & Blaszczynski, A. (2006). Personality and Self-Reported Use of Mobile Phones for Games. Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society, 9(6), 753-758.
[87] Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users′ information security practice behavior. Computers & Security, 28(8), 816-826.
[88] Rocha Flores, W., Holm, H., Svensson, G., & Ericsson, G. (2014). Using phishing experiments and scenario-based surveys to understand security behaviours in practice. Information Management & Computer Security, 22(4), 393-406.
[89] Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of applied psychology, 88(5), 879-903.
[90] Söllner, M., Bitzer, P., Janson, A., & Leimeister, J. M. (2018). Process is King: Evaluating the Performance of Technology-mediated Learning in Vocational Software Training. Journal of information technology, 33(3), 233-253.
[91] Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the ′weakest link′ - A human/computer interaction approach to usable and effective security. BT technology journal, 19(3), 122-131.
[92] Saucier, G., & Goldberg, L. R. (2003). The structure of personality attributes. Personality and work: Reconsidering the role of personality in organizations, 1-29.
[93] Schunk, D. H., Meece, J. L., & Pintrich, P. R. (2014). Motivation in education: Theory,research, and applications (4th ed.). Pearson Education.
[94] Seacat, J. D., & Northrup, D. (2010). An information–motivation–behavioral skills assessment of curbside recycling behavior. Journal of Environmental Psychology, 30, 393-401.
[95] Shappie, A., Dawson, C., & Debb, S. (2019). Personality as a Predictor of Cybersecurity Behavior. Psychology of Popular Media Culture, 9.
[96] Shmueli, G., & Koppius, O. R. (2011). Predictive Analytics in Information Systems Research. MIS Quarterly, 35(3), 553-572.
[97] Shropshire, J., Warkentin, M., Johnston, A., & Schmidt, M. (2006). Personality and IT security: An application of the five-factor model. 12th Americas Conference on Information Systems ( AMCIS ).
[98] Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers & Security, 49, 177-191.
[99] Safa, Nader & Furnell, Steven. (2015). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.
[100] Taylor, S., Todd, P.A (1995). Understanding Information Technology Usage: A Test of Competing Models. Inf. Syst. Res. 6, 144–176.
[101] Thompson, N., McGill, T. J., & Wang, X. (2017). Security begins at home: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376-391.
[102] Tsai, H.-y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138-150.
[103] Uffen, J., Guhr, N., & Breitner, M. H. (2012). Personality traits and information security management : An empirical study. Computer Science, Business
[104] Vamos, C. A., Thompson, E. L., Avendano, M., Daley, E. M., Quinonez, R. B., & Boggess, K. (2015). Oral health promotion interventions during pregnancy: a systematic review. Community Dent Oral Epidemiol, 43(5), 385-396.
[105] Van Dijk, J. A. G. M., & Deursen, A. J. A. M. (2014). Digital skills, unlocking the Information society. Digital Education and Learning (DEAL).
[106] Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & management, 49(3-4), 190-198.
[107] Woon, I.M.Y.,Tan, G.W.,Low, R.T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems 26th International Conference on Information Systems, 367-380.
[108] Zaphiris, P., & Ioannou, A. (2018). Stenmap: Framework for Evaluating Cybersecurity-Related Skills Based on Computer Simulations. Springer International Publishing AG., Vol. 10925, 492-504.
[109] Zhao, X., Lynch Jr, J. G., & Chen, Q. (2010). Reconsidering Baron and Kenny: Myths and truths about mediation analysis. Journal of Consumer Research, 37(2), 197-206.
[110] Zhu, C., Cai, Y., Ma, J., Li, N., Zhu, J., He, Y., Redmon, P., & Qiao, Y. (2013). Predictors of intention to smoke among junior high school students in Shanghai, China: An empirical test of the information-motivation-behavioral skills (IMB) model. PloS one, 8(11), 80.
[111] Zimet, G.D., Dahlem, N.W., Zimet, S.G., Farley, G.K (1988). The Multidimensional scale of perceived social support. Personal, 52, 30–41.
[112] Zwilling, M., Klien, G., Lesjak, D., Wiechetek, L., Çetin, F., & Basım, N. (2022). Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. Journal of Computer Information Systems, 62, 82-97. |