RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        개인간 신뢰형성 과정에서 미디어의 역할에 관한 연구

        오진욱(Jinwouk Oh),조남재(Namjae Cho) 한국경영과학회 2016 經營 科學 Vol.33 No.2

        Trust is formed from the day-to-day and persistent interaction relationship. The trust demands more and more at the age of uncertainty. Human beings are using media interaction. The area of communication with media is extended to virtual space. The purpose of this study is to qualitatively explain trust building process in virtual team by media using. In the pursuit of this purpose, we executed in-depth interview with the person who have experience communicating by media with a man of a complete stranger. They experienced the trust building process. Interview data were analyzed by a Structured Coding Techniques. The derived seven categories were reconstructed in consideration of the cause-and-effect relationship and the flow of events. We have discovered a new trust model that was the result from communication by a media using. The model presented is very useful to Individuals who need a new trust building relationship with stranger or virtual team member.

      • KCI등재

        정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로

        오진욱(Jinwouk Oh),백승익(Seung Ik Baek) 한국IT서비스학회 2020 한국IT서비스학회지 Vol.19 No.5

        This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼