• Title/Summary/Keyword: Perceived Information Security

Search Result 247, Processing Time 0.02 seconds

Impacts of Success Factors of Information System on Trust of Security of Casino Information System and Job Satisfaction (정보시스템 성공요인이 카지노정보시스템의 보안신뢰와 직무만족에 미치는 영향)

  • Lee, Dae-Kun;Kim, Yong-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.81-98
    • /
    • 2015
  • This study explores performance factors of a casino information system for foreigners, empirically examines the causal relation between these factors and business performances through organizational trust and job satisfaction and suggests a plan to develop such a information system. We found that information quality positively impacted on perception of information security, but negatively on job satisfaction; system quality positively did on security reliability, but negatively on job satisfaction; service quality positively did on trust in information security and job satisfaction; lastly security reliability positively did on job satisfaction. We found that information quality, system quality and service quality would affect perceived information security and job satisfaction.

A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System (정보보호관리체계(ISMS) 항목의 중요도 인식과 투자의 우선순위 비교 연구)

  • Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.919-929
    • /
    • 2014
  • Recently, organizational efforts to adopt ISMS(Information Security Management System) have been increasingly mandated and demanded due to the rising threat and the heavier cost of security failure. However there is a serious gap between awareness and investment of information security in a company, hence it is very important for the company to control effectively a variety of information security threats within a tight budget. To phase the ISMS, this study suggests the priorities based on evaluating the Importance of 13 areas for the ISMS by the information security experts and then we attempt to see the difference between importance and investment through the assessment of the actual investment in each area. The research findings show that intrusion incident handling is most important and IT disaster recovery is the area that is invested the most. Then, information security areas with the considerable difference between priorities of importance and investment are cryptography control, information security policies, education and training on information security and personnel security. The study results are expected to be used in making a decision for the effective investment of information security when companies with a limited budget are considering to introduce ISMS or operating it.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

IoT Makes Life Simpler: How to Improve the Chinese Consumer's Intention to Use of LG HomNet Smart Home

  • Xiangdong Shen;Xi Chen;Yuting Jiang;Haixin Ji
    • Journal of Korea Trade
    • /
    • v.26 no.8
    • /
    • pp.1-20
    • /
    • 2022
  • Purpose - The paper aims to develop the theory of TAM and perceived risk through a more comprehensive and rigorous understanding of the influencing factors of the consumer's adoption of LG HomNet smart home from the perspective of trade-offs. Design/methodology - Based on the TAM and perceived risk theory, combined with the individual characteristics of consumers in the context of information technology as the external factors of the technology acceptance model, this paper constructs a theoretical model of the factors affecting the use intention of the consumer. It was empirically tested by using SEM, and survey data was collected from 458 respondents. Findings - The research results show that 9 hypotheses of the research model are supported and have reliable prediction accuracy. Consumers' perceived interest, perceived connectivity and perceived controllability have a significant positive impact on their intention to use. In addition, this paper also confirmed the mediating effect of perceived usefulness and perceived ease of use. Originality/value - Consumers are very concerned about gains and losses. Low-level performance risks, security risks, and financial risks will drive the consumer to have a stronger intention to use, and financial risks have the strongest impact. This research provides a useful implication and guidance for smart home equipment manufacturers and service providers in product and service innovation and marketing and promotion strategies.

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

Reading Strategies among Saudi EFL Students

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.131-136
    • /
    • 2022
  • This study was initially conducted to explore Saudi students' use of reading strategies and their relationship to their reading comprehension level. The study employed quantitative methods to obtain information about Saudi students' perceived use of reading strategies and their comprehension levels. The results showed that EFL learners in Saudi Arabia use planning strategies more than attending strategies and evaluating strategies. Saudi students also perceived the environment as the most critical factor affecting their reading comprehension. There was no significant relationship between Saudi EFL learners' comprehension level and their use of reading strategies. Finally, gender differences favoring female learners were evident in almost all analyses conducted in the current study. Significant differences were found favoring female students in overall strategy use, comprehension level, and the use of evaluating strategies.

An Analysis of the Factors Influencing the Satisfaction and Intention of Job Information Websites (취업정보 웹사이트의 만족도와 이용의도에 미치는 영향요인 분석)

  • Chang, Rosa;Kim, Seonghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.2
    • /
    • pp.127-148
    • /
    • 2018
  • This study defined the influence of the quality of job information websites and of user characteristic factors on the user satisfaction and on the intention of the use thereof based on the technical acceptance model to activate research on job information or job information websites in the category of Library and Information Science, amid studies on the Fourth Industrial Revolution in various disciplines emerging. 230 users experienced in job information websites were surveyed. The surveyed data were analyzed by applying the structural equation model. The results are as follows. Accuracy, security, self-efficacy, the perceived easiness of use had a positive effect on the perceived usefulness. Up-to-dateness, self-efficacy, individual innovation had a significant effect on the perceived easiness of use. The perceived usefulness and the perceived easiness of use had a positive effect on user satisfaction, and the user satisfaction had a significant effect on the intention of use.

An Empirical Study on Practical Use of U-Services through RFID in University (대학에서 RFID를 통한 u-서비스의 활용에 관한 실증연구)

  • Lee, Sang-Shik;Bae, Sun-Mi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.207-215
    • /
    • 2006
  • In this paper, we attempt to investigate the factors influencing usage and acceptance of ubiquitous services in campus, based on the Technology Acceptance Model(TAM). This study conceptualizes and develops three dimensions of u-Services, such as real time service, information security, customization service, and tests the relationship among u-Services, perceived usefulness and perceived ease of use, and intention to use. Data were collected from 162 respondents in K-University and research model was tested using multiple regression analysis. As a consequence, this study found that customization service is an important factor which is influenced to perceived usefulness and perceived ease of use.

  • PDF

An Empirical Study on the Impact of Cryptocurrency Value Characteristics on Investment Intention : Focusing on the Value-based Adoption Model (VAM) (암호화폐 가치 특성이 투자 의도에 미치는 영향에 관한 실증적 연구 : 가치 기반 수용모델을 중심으로)

  • Kim Sangil;Seo Jaeseok;Kim Jeongwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.141-157
    • /
    • 2024
  • This study examines the impact of cryptocurrency value characteristics on cryptocurrency investment intention. Stock craze and information provided through various media, including YouTube, play an essential role in helping investors recognize the value of cryptocurrency and develop positive investment intentions. In this study, we applied the Value-Based Adoption Model (VAM) to verify the relationship between cryptocurrency value characteristics and investment intention. We surveyed 500 cryptocurrency investors to assess network externalities, awareness, compatibility, cost benefits (fees), technicality, security, perceived value, and investment intentions. SEM (Structural Equation Modeling) using AMOS 26.0 was used for data analysis. Results show that network externalities, awareness, compatibility, cost benefits (fees), security, and perceived value significantly impact investment intention. This study provides insights that help investors accurately perceive cryptocurrencies and develop strategies to increase investment intentions. It also contributes to improving investors' decision-making ability. This comprehensive approach will foster the growth of the cryptocurrency market and strengthen investor confidence.