Browse > Article

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM)  

Jeong, hye in (한국IT서비스산업협회)
Kim, seong jun (남서울대학교대학원 빅데이터산업보안학과)
Publication Information
Korean Security Journal / v., no.56, 2018 , pp. 145-163 More about this Journal
Abstract
Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.
Keywords
Organization; Organization of information security act;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Bae, J. K., & Kwon, D. S. (2011). Self-crystalline factors impact on the degree of acceptance microblogging service research. Vol. 24, No. 5 (XIV No. 88).
2 Gang, Y. B., Hwang, H. U., Kim, K. B., Son, G. U., & No, B. N. (2014). Physical memory analysis technology for detecting malware. Privacy Journal, 24(1), 39-44.
3 Gim, G. Y., & Nag, W. S. (2000). According to the indicators quantify information security vulnerability assessment: Information weighted assets law. The Korea Institute of Information Security Engineering, 10(1), 51-62.
4 Kim, H. D., Kim, K. H., & Ha, J. C. (2013). GOOSE protocol development environment Snort-based intrusion detection system in the. Privacy Journal, 23(6), 1181-1190.
5 Kim, H. S., & Jeong, H. C. (2000). Relationship with the organization's information security organization, information security awareness and the level of research. Journal of Information Technology and Database, 7(2), 117-134.
6 Kim, I. H., Lee, G. H., & Park, J. H. (2010). Corporate information security issues and direction. Information Security Association, 20(1), 13-18.
7 Kim, J. G. (2013). Also impact on privacy in the online environment act. the information policy. Article 20, No. 3.
8 Kim, Y. H., Moon, J. W., Hwang, S. H., & Jang, H. B. (2014). Study on the ICT outsourcing security management environment. Information Security Engineering, 24(1), 23-31.
9 Park, C. W. (2014). A Study on the Privacy act on the Internet - Focusing on the protection motivation theory. Journal of Internet Computing and Services, 15(2), 59-71.   DOI
10 Park, H. I. (2009). Research Information Security Survey Results Analysis for increased security. Journal of Integrated Conference, 1-7.
11 Park, J. H. (2009). Research on Private Security for the Psychological Stability of a Client. Journal-German Korean Security Guidelines, 18, 55-72.