• Title/Summary/Keyword: 사용자 의식

Search Result 189, Processing Time 0.029 seconds

패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인

  • Kim, Jong-Gi;Gang, Da-Yeon
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.959-965
    • /
    • 2007
  • 최근 정보시스템의 개방성과 접근성의 확대는 조직 내 외부로부터 보안위협을 증가시키고 있다. 일반적으로 정보시스템은 패스워드를 이용하여 사용자 인증과 자료의 접근을 제한하고 있으므로 패스워드의 선택은 정보보안에 있어서 매우 중요하다. 적절한 패스워드의 선택은 정보시스템의 오 남용 방지 및 불법적인 사용자의 제한 등의 보안효과를 가져올 것이다. 본 연구의 목적은 정보를 보호하기 위한 적절한 패스워드선택을 위한 사용자의 보안행위의도에 미치는 요인을 분석하는 것이다. 이를 위하여 정보시스템 사용자의 적절한 패스워드의 선택에 영향을 미치는 핵심적인 요인으로 위험분석 방법론을 토대로 한 위험을 활용한다. 또한 위험을 사용자의 보안의식과 패스워드 관리지침을 패스워드 선택의 태도에 영향을 미치는 요인으로 보고, 사용자의 적절한 패스워드의 보안행위의도를 TRA (Theory of Reasoned Action)를 기반으로 모형을 설계하였다. 본 연구를 분석한 결과 정보자산이 위험에 관련성이 없는 반면, 정보자산을 제외한 위협, 취약성, 위험, 사용자의 보안의식, 패스워드 보안상태, 보안행위의도는 요인간에 유의한 영향을 미치는 것으로 분석되었다.

  • PDF

사용자들의 "개인정보보호 의식" 어디까지 왔나

  • Korea Information Security Agency
    • 정보보호뉴스
    • /
    • s.130
    • /
    • pp.14-18
    • /
    • 2008
  • 범죄나 사고 소식을 접하는 대다수의 사람들은 자신이 직접적인 피해자가 아니라는 사실에 안도하면서도, 혹시 발생할 지 모르는 만약의 사태에 대비하곤 한다. 그런 의미에서 최근 언론매체를 통해 등장하는 개인정보보호 유출사고 소식에 대해 일반인들은 어떤 생각을 갖고 있을까. 또 각종 개인정보 유출 사건사고에 의한 간접 학습효과는 얼마나 될까. KISA가 남녀, 연령대별로 구분해 사용자의 개인정보보호 의식수준과 개인정보보호를 위한 실천 수준을 측정하기 위해 온라인 설문을 실시했다.

  • PDF

The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness (보안정책, 보안의식, 개인적 특성이 패스워드 보안효과에 미치는 영향)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.123-133
    • /
    • 2008
  • Information securiry is considered important due to the side effect generated from the expansion of information system and rapid increase of the use of internet. Nevertheless, we are getting unconscious of the importance of information security. The purpose of this research is to empirically analyze that the effects of security policies, security awareness and individual characteristics on password security effectiveness. Based on the analysis of research model using structural equation modeling technique, security policies were influencing individual characteristics and improving user's security awareness. Also individual characteristics and security awareness had positive impact on security effectiveness.

Advertising effects depending on picture types of the sights and Facebook user's public self-consciousness (페이스북 포스트의 여행지 사진유형과 사용자의 공적자기의식(public self-consciousness)에 따른 광고효과)

  • Park, Euna;Woo, Yeon-Hoo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.133-139
    • /
    • 2019
  • This study investigated what type of destination image on Facebook increases positive attitude towards the destination and desire to travel. More specifically, we hypothesized that Facebook user's public self-consciousness will moderate the advertising effect, so we tested the difference in attitude towards the destination and willingness to visit and recommend based on the type of destination image (presence/absence of a tourist in the image) and user's public self-consciousness (high/low). As a result, when a tourist was present in the photo, positive attitude toward destination was higher than when absent. In addition, the high public self-consciousness group showed greater attitude toward destination and higher willingness to visit and recommend than low public self-consciousness group when a tourist was present in the image. However, the low public self-consciousness group showed no difference depending on the presence of a tourist. This research not only is academically significant as it experimentally tested advertising effect depending on type of destination image and Facebook user's public self-consciousness, but also holds practical significance as it suggests advertisement method to consider consumer's predisposition.

A Study on User's Value Consciousness toward Products and Patterns of Design Evaluation (제품에 대한 사용자의 가치의식에 따른 디자인 평가의 유형에 관한 연구)

  • Shong, Chang-Ho;Choi, Myoung-Sik
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.255-268
    • /
    • 2006
  • This study raised a question about 'how user's psychological value consciousness influences design evaluation and evaluated 14 product samples. Three main categories were chosen to be analyzed; product evaluation by step, value consciousness toward products, and creation of shape image and design evaluation. In order to obtain results, four research hypotheses were established a and case study was conducted as part of 'conclusive research' for verification. 120 university students in their 20s majoring in product design were chosen as testees in a bid to increase the accuracy of data. With data collected, the whole flow was analyzed by simple tabulation and further analysis was carried out in three evaluation items. An analysis method was mainly quantitative, focusing on multivariate analysis like factor analysis, cluster analysis, etc. The empirical analysis of this study was verified at P<.05 significance level and SPSSWIN 12.0 program was used for statistic process. As a result, four conclusions were gained regarding 'user's value consciousness toward products and pattern of design evaluation'.

  • PDF

The Study of Online Piracy Protection -Focusing on Punishment and Moral Obligation- (인터넷 저작권 침해 보호에 관한 연구 -저작권 침해에 대한 처벌 및 윤리의식을 중심으로-)

  • Park, Joo Yeon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.145-151
    • /
    • 2013
  • As the Internet is widely used worldwide, digital asset on the internet becomes to be critical to protect from illegal copying and piracy which is an unlawful action that download or upload copyrighted materials from the Internet without having a right to use them from the copyright owners. Such an illegal and unethical behavior are pervading and becoming a big concern in many industries and business sectors over the world. This study examines the effect of the user's perception for piracy regulation and moral obligation on online piracy intention. Therefore, the purpose of this study is to see the different effect of regulation and moral obligation on piracy attitude and intention so as to suggest an effective method of piracy protection and to bring an attention on moral and ethical education for online piracy. The result of this study showed both punishment and moral obligation toward online piracy are significantly associated with users' attitude on piracy, indicating that higher level of punishment severity as well as moral obligation lead to decrease piracy attitude. This research also revealed that the level of users' moral obligation has a stronger relationship with piracy attitude than punishment.

Development of Education Learning Program for AES Cryptography Algorithm (AES 암호 알고리즘 교육용 학습 프로그램 개발)

  • Lee, Dong-Bum;Jeong, Myeong-Soo;Kwak, Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.4
    • /
    • pp.53-61
    • /
    • 2011
  • Recently, the importance of information security is emphasized in IT related field. The agency related to information security implements the policies to emphasize the security and protection of the privacy. However, the issue in many companies and users is that awareness of security is still poor. Therefore, in this paper, we develope the learning program for AES(advanced encryption standard) block cipher, to raise the awareness of security. Also, wish to cause interest about AES cipher because user confirms process that is encryption/decryption through program of this paper directly and prove awareness about information security.

  • PDF

A Study on the Observation Method of Interaction between Users and Products - With Emphasis on the Video Ethnography of Driver Environment - (사용자-제품 간 인터랙션의 관찰 조사 체계에 관한 연구 - 운전자 환경에서의 비디오 관찰법을 중심으로 -)

  • Kim, Gang-Min;Pan, Young-Hwan;Jeong, Ji-Hong
    • Journal of the HCI Society of Korea
    • /
    • v.4 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • User-centered design aims to develop device naturally without the interference of user' s conscious and unconscious behavior. Accordingly, designers need to understand their user's requirements, observe user behavior and interaction in the real environment. However, existing observations suggested a vast range of analysis system and observation techniques which are often ambiguous to the designers. Therefore, this research is aimed to propose an observation system for collecting data from user's behavior. In order to do so, we define the components and behavior level within the context of driving.

  • PDF

Drivers for Trust and Continuous Usage Intention on OTP: Perceived Security, Security Awareness, and User Experience (OTP에 대한 신뢰 및 재사용의도의 결정요인: 인지된 보안성, 보안의식 및 사용자경험을 중심으로)

  • Yun, Hae-Jung;Jang, Jae-Bin;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.163-173
    • /
    • 2010
  • PKI(Public Key Infrastructure)-based information certification technology has some limitations to be universally applied to mobile banking services, using smart phones, since PKI is dependent on the specific kind of web browser, Internet Explorer. OTP(One Time Password) is considered to be a substitute or complementary service of PKI, but it still shows low acceptance rate. Therefore, in this research, we analyze why OTP has not been very popular, and provide useful implications of making OTP more extensively and frequently used in the mobile environment. Perceived security of OTP was set as a higher-order construct of integrity, confidentiality, authentication, and non-repudiation. Research findings show that security awareness and perceived security of OTP is positively associated, and the relationship between perceived security and trust on OTP is statistically significant. Also, trust is positively related to intention to use OTP continuously.