Browse > Article
http://dx.doi.org/10.5394/KINPR.2012.36.3.261

Factors Affecting the Information Security Awareness and Perceived Information Security Risk of Employees of Port Companies  

Chang, Myung-Hee (Division of Shipping Management, Korea Maritime University)
Kang, Da-Yeon (Department of Shipping Management, Graduate School of Korea Maritime University)
Abstract
The purpose of the present study is to empirically examine factors that affect the information security awareness and perceived information security risk of employees of port companies. In particular, in order to identify factors that affect the perceived information security risks, we investigated the relation of assets, threats, and vulnerabilities to it, using the risk analysis methodology. With A total of 252 valid questionnaires, we also performed the structural equation modeling analysis using AMOS. It was found that first, there was no meaningful relationship between the information assets and the perceived information security risk in the case of employees of port companies. Second, threats and vulnerabilities turned out to have positive influences on the perceived information security risk. Finally, there was a positive relationship not only between the information security awareness and the information security education, but also between the information security awareness and the intention of information security. However, there was no meaningful relationship between the information security concern and the information security awareness.
Keywords
Employee of Port Companies; Information Security Awareness; Perceived Information Security Risk; Information Security Intention; Threat; Vulnerabilities;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 McCoy, C and Fowler, R.T.(2004), "You are the Key to Security :Establishing a Successful Security Awareness Program", ACM SIGUCCS Conference, No.32, pp .346-349.
2 NIST(2001), Security Self-Assessment Guide for Information Technology Systems. Special Publication 800-26.
3 NIST(2002), Risk Management Guide for Information Technology Systems. Special Publication 800-30.
4 Nosworthy, J. D.(2000), "Implementing Information Security in the 21st Century-Do You Have the Balancing Factors?", Computers & Security, Vol.19, No.4, pp. 337-347.   DOI   ScienceOn
5 Petrova, K., Sinclair, R.(2003), "Expanding the Understanding: Transactions and Security Awareness for Business Students", New Zealand Journal of Applied Computing and Information Technology, Vol.7, No.1, pp. 82-88.
6 Pounder, C.(2003), "Security with Unfortunate Side Effects", Computers & Security, Vol.22, No.2, pp. 115-118.   DOI   ScienceOn
7 Rainer, R., Snyder, C. and Carr, H.(1991), "Risk Analysis for Information Technology", Journal of Management Information System, Vol.8, No.1, pp. 129-147.   DOI
8 Rezgui, Y. and Marks, A.(2008), "Information Security Awareness in Higher Education: an Exploratory Study", Computers & Security, Vol.27, No.7, pp. 241-253.   DOI   ScienceOn
9 Ronald, C., Curtis, C. and Aaron, J.(2007), "Phishing for User Security Awareness", Computer & Security, Vol.26, pp. 73-80.   DOI   ScienceOn
10 Spurling, P.(1995), "Promoting Security Awareness and Commitment", Information Management & Computer Security, Vol.3, No.2, pp. 20-26.
11 Straub, D. and Nance, W.(1990), "Discovering and Disciplining Computer Abuse in Organizations: A Field Study", MIS Quarterly, Vol.14, No.1, pp. 45-60.   DOI   ScienceOn
12 White, S.(1998), "Open Problems in Computer Virus Research", Virus Bulletin Conference, Oct 22.
13 홍일유, 이종삼(2000), "국내기업의 정보시스템 보안위협 인식에 관한 연구", 경영학회지 27권 2-1호, pp. 157-185.
14 Broderick, J.S.(2001), "Information Security Management -When Should it be Managed?", Information Security Technical Report, Vol.6, No.3, pp. 12-18.
15 BSI(2005), Code of Practices for Information Security Management. London: British Standards Institution.
16 Choi, N., Kim, D and Whitmore, A.(2008), "Knowing is Doing", Information Management & Computer Security, Vol.16, No.5, pp. 484-501.   DOI   ScienceOn
17 Finne, T.(1998), "A Conceptual Framework for Information Security Management", Computers & Security, Vol.17, No.4, pp. 303-307.   DOI   ScienceOn
18 CMU/SEI(1999), Operationally Critical Threat, Asset, Vulnerability Evaluation(OCTAVE) Framework, Ver. 1.0, CMU/SEI-99-TR-017. Carnegie Mellon University/ Software Engineering Institute, June.
19 CSE(1996), Guide to Security Risk Management for IT Systems, Communications Security Establishment, Government of Canada.
20 Dhillon, G. and Backhouse, J.(2000), "Information System Security Management in the New Millennium", Communications of the ACM, Vol.43, No.7, pp. 125-128.   DOI   ScienceOn
21 Haller, S. C(2002), "PRIVACY: WHAT Every Manager Should Know", The Information Management Journal, Vol.36, No.3, pp. 33-44.
22 Hawkins, S., Yen, D.C. and Chou, D.C.(2000), "Awareness and Challenges of Internet Security", Information Management & Computer Security, Vol. 8, No.3, pp. 131-143.   DOI   ScienceOn
23 ISO/IEC(2005), Guideline for the Management of IT Security(GMITS), International Organization for Standardization/International Electrotechnical Commission.
24 Loch, K.D., Carr, H.H. and Warkentin, M.E.(1992), "Threats to Information Systems: Today's Reality, Yesterday's Understanding", MIS Quarterly, Vol.16, No.2, pp. 173-186.   DOI   ScienceOn
25 문용은, 박유진(2002), "IS 아웃소싱의 위험과 아웃소싱의 정도에 관한 연구", 정보시스템 연구 11권 1호, pp. 1-28.
26 김수엽, 최종희, 김찬호(2009), 항만물류보안산업의 발전방안 연구, 한국해양수산개발원
27 김정덕(2000), ISO 정보기술 보안관리지침 표준화동향, 한국정보보호진흥원
28 노순동(2004), "기업체의 효율적인 보안관리 모델", 산업보안논총 창간호, pp. 79-101.
29 박준경, 김범수, 조성우(2011), "기업 정보보호 활동을 위한 조직 구성원들의 태도와 주요 영향 요인", 경영학연구 40 권 4호, pp. 955-985.
30 엄정호(2003), "정보시스템의 체계적인 위험관리를 위한 실용적인 위험감소 방법론에 관한 연구", 정보처리학회논문지 10권 C호, pp. 125-132.
31 이문구(2004), "정보시스템 보안관리를 위한 위험분석 방법론", 전자공학회논문지 41권 6호, pp. 13-22.
32 이민섭(2003) "정규학교에서의 정보보호 교육 강화 방안", 정보보호학회지 13권 6호, pp. 67-78.
33 이재원, 류형근, 안정흠(2010), "국내물류기업의 물류보안 인식에 관한 연구", 한국항해항만학회지 34권 1호, pp. 45-50.
34 이홍걸(2009), "주요 컨테이너 터미널의 정보보호 수준 평가에 관한 연구", 한국항해항만학회지 33권 10호, pp. 735-742.
35 임채호(2006) "효과적인 정보보호인식제고방안", 정보보호학회지 16권 2호, pp. 30-36.
36 정우리(2012), "해상보안관리 분석모델 개발에 관한 연구", 한국항해항만학회지 36권 1호, pp. 9-14.
37 정보통신부(2010), 국가정보보호백서