• Title/Summary/Keyword: Information Security Attitude

Search Result 101, Processing Time 0.036 seconds

A Study of Comparison between Internet Banking and Mobile Banking by Extending the TAM (기술수용모형을 이용한 인터넷 뱅킹과 모바일 뱅킹 이용의 차이에 관한 연구)

  • Lee Dong-Hyun;Kwak Soo-Hwan;Hwang Kyu-Seung
    • Journal of Technology Innovation
    • /
    • v.14 no.1
    • /
    • pp.201-225
    • /
    • 2006
  • Technology Acceptance Model (TAM) considers perceived ease of use and perceived usefulness as the important determinants of user behavior regarding information technology. As an extension of TAM, this research examines perceived security as an additional determining variable to explain an individual's acceptance and use of mobile banking as well as internet banking. The results show that perceived ease of use does not affect the individual's attitude toward the use of mobile or internet banking, while perceived usefulness does. Furthermore, perceived security affects perceived usefulness in mobile banking, but not in internet banking. In addition, in mobile banking, perceived security is positively related to perceived usefulness, though perceived security is negatively related to attitude. Finally, the average scores of surveyed data for Internet banking are higher and significantly different than those for mobile banking.

  • PDF

Relationship of Information Technology User Personality, Security and Control (보안 및 통제와 정보기술 사용자의 성격의 관계)

  • Lee, Jang-Hyung;Kim, Jong-Won
    • The Journal of Information Systems
    • /
    • v.19 no.3
    • /
    • pp.1-12
    • /
    • 2010
  • Personality is comprehensive nature of the mood and attitude of people, most clearly revealed in the interaction with other people. This study is a analysis on personality type to information system security and control from financial institute employee. Based on 'The Big Five' personality model, this study develops hypothetical causal relationships of potential organization member's personality and their information system security and control. Research hypotheses are empirically tested with data collected from 901 employees. Results show that employees of high level security mind are the owner of conscientious and emotional stable personality and the employees of high level control mind are the owner of agreeable and emotional stable personality. Therefore the owner of agreeable and stable personality is higher security and control than others.

An Understanding of Impact of Security Countermeasures on Persistent Policy Compliance (보안 대책이 지속적 보안 정책 준수에 미치는 영향)

  • Park, Chul-Ju;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.23-35
    • /
    • 2012
  • The goal of this study is to identify factors that influence on the persistent information security compliance intention of employees. Antecedents suggested in research model are security awareness training and perceived effectiveness of information security policy. Research results show that security awareness training has a positive effect on persistent information security compliance intention as well as effectiveness of information security policy. While policy breadth, which is one of the effectiveness of information security policy, influences on persistent information security compliance attitude and intention, policy brevity does not effect on persistent information security compliance intention. Conclusions and implications are discussed.

Affective Response to Feelings of Password Fatigue by Password Change Requirements

  • Sang Cheol Park
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.603-623
    • /
    • 2023
  • While prior work has conducted individuals' password security behavior, there is a relatively neglect to examine individuals' affect and feelings of password fatigue in password change context. Therefore, this study explicated individuals' affective response to the feelings of password fatigue by drawing on several theoretical lens. Survey data collected from 267 users were used to test the model using partial least square analysis. This study found that feelings of password fatigue positively affected the negative password fatigue-induced affect, and also both the feelings of password fatigue and the negative password fatigue-induced affect were negatively related to attitude toward changing passwords, which in turn, leads to the intention to change passwords. Furthermore, this study found that shadow work recognition negatively moderated the relationship between attitude and behavioral intention. This study could offer a new theoretical perspective to understand an individual's security behavior and provide empirical evidences for practitioners in charge of IT security in organizations.

IoT Adoption by the Young Consumer: An Extended ASE Perspective

  • Arif Mahmud;Mohd Najwadi Yusoff;Mohd Heikal Husin
    • Asia pacific journal of information systems
    • /
    • v.32 no.4
    • /
    • pp.857-889
    • /
    • 2022
  • Home theft and burglary are prevalent in Dhaka city. Internet of things (IoT), in contrast, is commonly recognized as among the most advanced home security systems. However, the factors that attract young people to use IoT for household security have yet to be examined. Consequently, the purpose of this article is to validate the attitude-social influence-self-efficacy (ASE) model with personal innovativeness and perceived trust. We collected data from Dhaka citizens aged 15 to 24 using a purposive sample technique and 370 valid responses were chosen for the study. According to the analysis, all of our proposed hypotheses were found significant with a 73.6% variance. Furthermore, the effects of attitude and social influence were shown to be the highest and lowest, respectively, and trust and innovativeness were both nearly strong main predictors of ASE. Significantly, since this is one of the few studies in the technology adoption domain using this model, a solid foundation for IoT adoption for security purposes is established.

Empirical Investigation of User Behavior for Financial Mydata: The Moderating Effects of Organizational Information Transparency and Data Security Policy (금융마이데이터 사용자 행동에 관한 실증 연구: 기관정보투명성, 데이터 보안정책의 조절효과)

  • Sohn, Chang Yong;Park, Hyun Sun;Kim, Sang Hyun
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.85-116
    • /
    • 2023
  • Purpose The importance of data as a key resource of the intelligence revolution is being highlighted, among all those phenomena MyData is attracting attention as a key concept by organizations and individuals that eventually leads the data economy. In this regard, this study was started to contribute to the successful settlement and continuous growth of the domestic MyData industry, which has just entered the system. Design/methodology/approach To develop and test all proposed casual relationships within the research model, we used the Value-Attitude-Behavior(VAB) model as a basic framework. A total of 385 copies were used for the final analysis, and for SPSS 25.0, MS-Excel 2016, and AMOS 24.0 to summarize respondent demographic characteristics, measurement model, and structural model. Findings Findings show that all proposed hypotheses were supported with the exception of the moderating effect of organizational information transparency between data controllability and perceived value, and between data controllability and attitude toward MyData service.

How Do We Manage the Information Security Workforce of the Administrative Agencies? (행정기관의 정보보호 담당인력을 어떻게 관리할 것인가?)

  • Jun, Hyo-Jung;Kim, Tae-Sung;Park, Ki Tae
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.55-66
    • /
    • 2019
  • The career development of information security workforce affiliated in administrative department is very different from workforce affiliated in private companies. Their career development attempts are made not by voluntary motivation but by involuntary job movement by the principle of internal relocation. So they are not directly linked to monetary compensation or advancement. Due to the nature of the organization, their work attitude is very passive and there is little intention to turnover. They do not need professionalism, but they must be retrained according to the law. In this paper, we investigate and analyze the roles and responsibilities of information security workforce of each administrative department. And we do questionnaire survey to find out current roles and responsibilities of them will not affect the demand for retraining. Through these research, we would like to discuss how to manage information security workforce affiliated in administrative departments.

Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey

  • Al-Amri, Bayan O;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.245-251
    • /
    • 2021
  • This work aims to focus on the current features and characteristics of Human Element and Artificial intelligence (AI), ask some questions about future information security, and whether we can avoid human errors by improving machine learning and AI or invest in human knowledge more and work them both together in the best way possible? This work represents several related research results on human behavior towards information security, specified with elements and factors like knowledge and attitude, and how much are they invested for ISA (information security awareness), then presenting some of the latest studies on AI and their contributions to further improvements, making the field more securely advanced, we aim to open a new type of thinking in the cybersecurity field and we wish our suggestions of utilizing each point of strengths in both human attributions in software security and the existence of a well-built AI are going to make better future software security.

An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise (보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.69-81
    • /
    • 2018
  • The ultimate intention of this research is to identify the factors that have a significant effect on the perceived importance of information security as the antecedent of intention to information security policy compliance. We found that the effectiveness of information security training program did not have statistically significant effect on the perceived cost of policy compliance. Second, the effectiveness of information security policy has significant influence on the perceived cost of policy compliance. Third, perceived vulnerability has a significant effect on the perceived cost of policy compliance. Fourth, perceived cost of policy compliance has a significant effect on perceived importance of information security. Fifth, supervisor's attitude toward information security silence has a significant effect on employee silent behavior towards information security. Sixth, communication opportunities towards information security has a significant influence on employee silent behavior towards information security. Finally, it was shown that employee silent behavior towards information security had a significant influence on the perceived importance of information security.

Formation of a Person's Value Attitude to the Worldview Using Information Technologies

  • Yakymenko, Svitlana;Drobin, Andrii;Fatych, Mariia;Dira, Nadiia;Terenko, Olena;Zakharevych, Mykola;Chychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.183-190
    • /
    • 2022
  • The article analyzes the features of the formation of a person's value attitude to the worldview by means of information technologies. The present considers it necessary to form a person's value attitude to the perception of the world by means of information technologies. The explosive development of information and telecommunications technologies has become a determining factor in the development of modern society, which is called the information or Global Information Society. It is not yet fully formed, and we are all participants in the development of the Global Information Society. The article considers the basics of a harmonious worldview of a person, which is the basis for the formation of outlook ideas, views, knowledge, beliefs about the surrounding world, which determine the place and role and motivate actions in relation to the surrounding reality through the prism of value orientations. Worldview is considered as an integrity of relatively stable schemes, behaviors, feelings, thinking, vision of the surrounding world, inherent in an individual child, ethno-cultural and socio-cultural groups. The concept of "worldview" as a component of the multi-level structure of the individual's outlook is defined. The features that characterize a person's perception of the world are revealed. The main educational value of information technologies in the formation of a person's value attitude to the perception of the world is highlighted, which consists in the fact that they allow you to create an immeasurable brighter multi-sensory interactive learning environment with almost unlimited potential opportunities that fall at the disposal of both the teacher and the student. The trend of forming a person's value attitude to the perception of the world is clearly developing in the direction of mixed learning as a process that creates a comfortable information educational environment, communication systems that provide all the necessary educational information. The approach to student development by means of the educational environment and the formation, while in the person of a value attitude to the perception of the world by means of Information Technologies, has many pedagogical advantages, which is considered in the article.