Fig. 1 Research model
Fig. 2 Results of research model
Table 1 Demographic characteristics
Table 2 Measurement model analysis
Table 3 Determination Validity(AVE)
Table 4 Goodness of fit index
Table 5 Results of hypothesis testing
References
- Anderson, C. L. and Agarwal, R.(2010), "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol. 34, No. 3, pp. 613-643. https://doi.org/10.2307/25750694
- Bang, H. S. and Ju, J. K.(2013), "A Study on an Improvement in Korean Port Security Related Laws", Maritime Law Review, Vol. 25, No. 1, pp. 153-178.
- Berejikian, J. D.(2002), "A Cognitive Theory of Deterrence", Journal of Peace Research, Vol. 39, No. 2, pp. 165-183. https://doi.org/10.1177/0022343302039002002
- Bulgurcu, B., Cavusoglu, H. and Benbasat, I.(2010), Information Security policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness, MIS Quarterly, Vol. 34, No. 3, pp. 523-548. https://doi.org/10.2307/25750690
- Choi, N., Kim, D., Goo, J. and Whitmore, A.(2008), "Knowing is Doing: An Empirical Validation of the Relationship between Managerial Information Security Awareness and Action", Information Management and Computer Security, Vol. 16, No. 5, pp. 484-501. https://doi.org/10.1108/09685220810920558
- Choi, D. K., Song, M. S., Im, J. I. and Lee, K. H.(2015), "Study the role of information security personnel have on an organization's information security level", Korea Institute Of Information Security And Cryptology, Vol. 25, No. 1, pp. 197-209. https://doi.org/10.13089/JKIISC.2015.25.1.197
- Choi, Y. H.(2015), "The Effect of Organizational Culture on Organizational Commitment, Job Satisfaction, and Willingness to Comply with the Industrial Security Policies", The Korean Association of Police Science Review, Vol. 17, No. 6, pp. 343-366.
- Drevin, L., Kruger, H. A. and Steyn, T.(2007), "Value Focused Assessment of ICT Security Awareness in an Academic Environment", Computers and Security, Vol. 26, No. 1, pp. 36-43. https://doi.org/10.1016/j.cose.2006.10.006
- Jeong, W. L.(2012), "A Study on the Development of Analysis Model for Maritime Security Management", Journal of Navigation and Port Research, Vol. 36, No. 1, pp. 9-14. https://doi.org/10.5394/KINPR.2012.36.1.9
- Kang, J. Y.(2013), "A Study on the Systematized and Unified Plan of Port Logistics Security Management System", Journal of Law and Politics research, Vol. 13, No. 2, pp. 389-436.
- Kim, S. H. and Song, Y. M.(2011), "An Empirical Study on Motivational Factors Influencing Information Security Policy Com- pliance and Security Behavior of End-Users (Employees) in Organizations", The e-Business Studies, Vol. 12, No. 3, pp. 327-249. https://doi.org/10.15719/geba.12.3.201109.327
- Kim, S. Y., Choi, J. H. and Kim, C. H.(2009), A Study on Measures to Develop the Port Logistics Security Industry, Korea Maritime Institute.
- Kim, Y. J.(2015), "Key Determinants of Employees' Trust toward Information Security Management in an Organization",The Journal of Internet Electronic Commerce Resarch, Vol. 15, No. 4, pp. 247-264.
- Knapp, K. J., Marshall, T. E., Rainer, R. K. and Ford, F. N.(2005), Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness, White Paper, Information Systems Security Certification Consortium (ISC), 2.
- Ko, H. J.(2011), "A Study on the Implications and Trends of Logistics Security Assurance Programs for International Trade Facilitation", Korean Institute of Navigation and Port Research, Vol. 27, No. 2, pp. 333-354.
- Layton, T.(2005) ,Information Security Awareness: The Psychology Behind the Technology, Author House.
- Lee, H. G.(2009), "A Study on the Evaluation of the Information Security Level in Major Container Terminals", Journal of Navigation and Port Research, Vol. 33, No. 1, pp. 45-50.
- Lim. C. H.(2006), "Effective Information Protection Recognition Improvement Plan", Korea Institute Of Information Security And Cryptology , Vol. 16, No. 2, pp. 30-36.
- Ministry of Maritime Affairs and Fisheries (2013), Rules for the enforcement of the Act on the Security of International Navigation Ships and Port Facilities.
- Ministry of Maritime Affairs and Fisheries (2016), Prepare the basis for strengthening port security, such as the system for allowing ships to enter and leave.
- Park, M. K.(2007), "Study on Remodeling Korean Logistics Laws for Strengthening Integration and Adjustment Function of Logistics Policy", Journal of Korea Port Economic Association, Vol. 23, No. 2, pp. 63-86.
- Park, H. K.(2016), "Impact of Security Related Financial Investment on Port Performance through Relationship Management: Focused on Ports and Port Users", Korea Logistics Review , Vol. 26, No. 5, pp. 67-78. https://doi.org/10.17825/klr.2016.26.5.67
- Rogers, R. W.(1983) Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. In: Cacioppo, J. and Petty, R., Eds., Social Psychophysiology, Guilford Press, New York, pp. 153-177.
- Shim, W. H.(2011), "Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities", The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 53-73.
- Siponen, M. T.(2000), "A Conceptual Foundation for Organization Information Security Awareness", Information Management and Computer Security, Vol. 8, No. 1, pp. 31-41. https://doi.org/10.1108/09685220010371394
- Siponen, M., Pahnila, S. and Mahmood, M. A.(2010), "Compliance with Information Security Policies: An Empirical Investigation", Computer, Vol. 43, No. 2, pp. 64-71. https://doi.org/10.1109/MC.2010.35
- Stanton, J., Stam, K., Mastrangelo, P. and Jolton, J.(2005), "Analysis of End User Security Behaviors", Computers and Security, Vol. 24, No. 2, pp. 124-133. https://doi.org/10.1016/j.cose.2004.07.001
- Woo, S. H.(2012), "A Study on Security Capability of IDPS", The Institute of Electronics and Information Engineers-CI, Vol. 49, No. 4, pp. 9-15. https://doi.org/10.5573/ieek.2012.49.11.009
- Workman, M. and Gathegi, J.(2007), "Punishment and Ethics Deterrents: A Study of Insider Security Contravention", Journal of the American Society for Information Science and Technology, Vol. 58, No. 2, pp. 212-222. https://doi.org/10.1002/asi.20474