• Title/Summary/Keyword: 정보보호의도

Search Result 188, Processing Time 0.021 seconds

A Study on Factors Affecting the Investment Intention of Information Security (정보보호 투자의도에 영향을 미치는 요인에 대한 연구)

  • Lee, Hong-Je;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1515-1525
    • /
    • 2018
  • Security threats in the 4th Industrial Revolution have expanded to the issue of safety, but the environment for information security of domestic companies is still at a low level. This study aims to propose policy implications by empirically analyzing factors affecting investment intention. We investigated the state of information security and protection behavior and expanded UTAUT to investigate correlations. The results showed that information assets affect facilitating conditions, and perceived and new concerns have impacts on social influence. Social influence affect experience and habits, but the impact on security investment intentions was rejected. Facilitation conditions, previous experiences and habits have great influences on investment intention, new service security investment intention. The influence of perceived and new concern are low or rejected. There are moderating effects between types of business, size, security organization, experience of infringement, security personnel ratio, and personal information collection. This study will help to establish policies for enhancing the level of information security.

An Empirical Study on Concern for Information Privacy for Smart Phone Users (스마트 폰 사용자들의 정보보호 염려도에 관한 실증연구)

  • Lee, Jaejung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.53-61
    • /
    • 2014
  • This research analyzed the relationship between CFIP and Intention to purchase under M-Commerce circumstances. First of all, CFIP had a negative influence on intention to purchase similar to E-Commerce. Secondly, we found privacy fundamentalist groups to react most sensitive to the degree of CFIP. Finally, Mobile experience did not have influence on the relationship between CFIP and Intention to purchase. This result is different from that of the E-Commerce Study. As such, it requires a more comprehensive research.

An Impact Analysis of Information Security Professional's Job Stress and Job Satisfaction to Turnover Intention: Moderation of Organizational Justice (정보보호인력의 직무스트레스와 직무만족이 이직의도에 미치는 영향분석: 조직공정성의 조절효과)

  • CHO, Jinhyun;Yoo, Jinho;Lim, Jong-In
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.143-161
    • /
    • 2019
  • The purpose of this study is to empirically verify the relationship of how job stress and job satisfaction of information security professionals affect turnover intention, a precursor of actual turnover. The moderation effect of organizational justice is also explored within these causal relationships. This empirical analysis used 150 responses from information security professionals within 4 different industries. The analysis result from survey responses shows that job stress increases turnover intention, and job satisfaction decreases turnover intention, and that interactional justice, a subordinate concept of organizational justice, has a negative moderating effect at the relationship between job stress and turnover intention. The moderating effect of interactional justice, which can reduce turnover intention with warm words from managers or colleagues even when information security professionals who respond to emergencies such massive incidents are with high job stress, is a piece of important knowledge for information security managers. To reduce voluntary turnover of information security professionals from the organizational perspective, making efforts to lower job stress and raise job satisfaction and interactional justice is necessary.

An Empirical Study on the factors for Information Protection Policy of Employee's Compliance Intention (정보보호정책 준수의도에 미치는 요인에 관한 경험적 연구)

  • Kwon, Jang-Kee;Lee, Joon-Taik
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.7-13
    • /
    • 2014
  • In recent years, according to the increasing of information security compliance, information security management system's requirements is not a matter of choice but an essential problem. In this respect, this research have an invention to survey what it will affect employees in compliance with the privacy policy antecedents and how to apply this information for the future, and to suggest ways to improve the employees' information security policy compliance intentions. In this paper, To investigate the factors affecting the degree of information security policy compliance using the structural equation of least squares (PLS Partial Least Square) in the confumatory level (confirmatory), the factor analysis of the primary factor analysis and secondary last. The results is that almost of influencing factors affect to the compliance with information security policies directly, but not affect self-efficacy.

  • PDF

Effects of Privacy Concern on Trust and Intention to Incremental Usage of Social Networking Systems (사회네트워크에서 인지된 개인정보보호 수준이 신뢰와 추가적 사용에 미치는 효과)

  • Caro, Glenn C.;Namn, Su-Hyeon;Kang, Shin-Cheol;Song, Hee-Seok
    • Journal of Digital Convergence
    • /
    • v.6 no.4
    • /
    • pp.123-135
    • /
    • 2008
  • 본 논문은 사회네트워크(social network system, SNS)에 대한 사용자의 추가적 사용의도를 개인정보보호의 관점에서 고찰하였다. SNS에서 사용자는 SNS의 운영 시스템과 사용자간 정보의 교류가 이루어지는 SNS사이트라는 서로 다른 두 주체와의 상호작용을 통하여 개인정보의 보호 정도를 인지하게 되고, 이러한 인지정도는 사회네트워크시스템과 SNS사이트에 대한 신뢰에 각각 영향을 미치고, 이 신뢰는 사용자의 사용의도를 증가시킨다는 연구모델을 설정하고 가설을 검정하였다. 주요 연구 결과는 SNS 시스템과 SNS 사이트에 대해 사용자가 인지하는 개인정보보호의 수준은 SNS시스템과 SNS사이트에 대한 신뢰 수준에 통계적으로 유의한 영향을 미치는 반면, 사용자의 추가적 사용의도는 단지 SNS 시스템의 신뢰에 의해서만 영향을 받는 것으로 나타났다.

  • PDF

상용 및 공개 소프트웨어 의도적 보안약점 동향

  • Lee, Hyunho;Lee, Eunyoung;Ahn, Joonseon
    • Review of KIISC
    • /
    • v.26 no.1
    • /
    • pp.9-19
    • /
    • 2016
  • 프로그램 개발단계에서 개발자의 실수로 인한 소스코드 내의 보안약점을 제거하여 정보시스템의 안전성을 강화하려는 노력이 이루어지고 있는 가운데, 의도적으로 삽입된 악의적인 보안 약점에 대한 대응의 필요성이 증가하고 있다. 본 논문에서는 상용 및 공개 소프트웨어의 의도적 보안약점에 의한 침해 사례 및 관련 취약점의 주요 형태와 모바일 앱의 의도적 보안약점 개요 및 관련 사례를 기술한다. 이를 통하여 의도적 보안약점에 대한 개괄적 내용을 제시하고 이에 대한 대응방안을 모색하고자 한다.

Information Security Professionals' Turnover Intention and Its Causes (정보보호 전문인력의 직무전환 의도와 전환사유)

  • Yoo, Hye-Won;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.95-104
    • /
    • 2010
  • As the information security industry has developed and its proportion in the national economy has increased, the demand for the information security manpower also has expanded. With the frequent turnovers of the information security professionals within the industry and between other industries, it is essential to investigate the causes of turnovers for the efficient human resource management and furthermore the sustainable growth of the industry. This study aims to analyze the factors affecting the information security professionals' turnover intention. We reviewed related researches to select the turnover causes that affect the turnover intention and tested the relationships between the turnover causes and the turnover intention. Human resource managers can use the results of this study to maximize the performance of the organization through the reasonable turnover management of information security professionals.

The Influence of Sanctions and Protection Motivation on the Intention of Compliance with Information Security Policies: Based on Parameter of Subjective Norm (제재 및 보호동기와 정보보호정책 준수 의도에 관한 연구: 주관적 규범을 매개로)

  • Shin, Hyuk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.47-58
    • /
    • 2019
  • This study applied the Theory of Reasoned Action by Fishbein & Ajzen(1975) as the grounded theory and adopt sanctions of the General Deterrent Theory and protection motivation of the Protection Motivation Theory as the antecedents to discuss the theoretical factors and the cases of application in the field of information security. Then, it adopted subjective norm, a variable of the Theory of Reasoned Action, as a parameter to analyze the causality of sanctions, perceived vulnerability, response cost, and self-efficacy with the intention to follow the information security policies. As a result, all of the antecedents except for sanctions had causality with the intention and subjective norm proved its mediating effect as a parameter between the antecedents and the intention.

Exploring the Relationship between the Level of News Usage on Influenza A(H1N1) and Media Users' Behavioral Intention toward Personal and Public Health Protection: Focusing on Protection Motivation Theory (신종플루 뉴스 이용 정도가 개인 및 공중에 대한 건강보호 행위의도에 미치는 영향에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Yeo-Ra
    • Korean journal of communication and information
    • /
    • v.51
    • /
    • pp.5-25
    • /
    • 2010
  • The purpose of this research examined the relationship between the level of news usage on Influenza A(H1N1) and media users' behavioral intention toward health protection. Specifically, the study investigated causal relationships among exposure of media information on Influenza A(H1N1) as an independent variable, psychological protection motivation factors such as perceived severity, vulnerability, response efficacy, & self-efficacy as mediated variables and behavioral intention on personal and public health protection as dependent variables using structure equation model analysis. Self-reported questionnaires were administrated to 460 college students. The result indicated the followings. First, the level of news usage on Influenza A(H1N1) was not statistically significant on influencing behavioral intention toward personal and public health protection. Second, perceived severity, vulnerability, and self-efficacy were significant variables on behavioral intention toward personal health protection whereas perceived vulnerability and response efficacy were significant on public health protection. The function among factors in protection motivation theory is dependent upon whom protected from illness.

  • PDF

Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory (온라인 환경에서 프라이버시 행동의도에 미치는 영향 - 보호동기이론을 중심으로 -)

  • Kim, Jongki;Kim, Sanghee
    • Informatization Policy
    • /
    • v.20 no.3
    • /
    • pp.63-85
    • /
    • 2013
  • Drawing on Protection Motivation Theory(PMT), this study attempts to clarify antecedents that influence the intention to protect individuals' privacy on the Internet. Protection motivation forms through individuals' cognitive appeal involving threat and efficacy. Then protection motivation causes privacy behavioral change. Protection motivation factors are established privacy trust and privacy risk, which are related to privacy attitude and belief. This proposed model is empirically analyzed by utilizing structural equation analysis(SEM). According to the result of the empirical analysis, it is founded that almost paths have statistically significant explanatory power except path from efficacy to privacy risk and path from privacy trust to privacy behavioral intention. This study shows powerful evidence of antecedent factors based on protection motivation of individuals' privacy behavioral intention in online environment.

  • PDF