• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.026 seconds

Cognitive Bias and Information Security Research: Research Trends and Opportunities

  • Park, Jongpil;Oh, Chang-Gyu
    • Asia pacific journal of information systems
    • /
    • v.26 no.2
    • /
    • pp.290-298
    • /
    • 2016
  • Human cognition and decision-making related to information systems (IS) is a major area of interest in IS research. Among these areas, cognitive bias rooted in behavioral economics is gaining considerable attention from researchers. In the present study, we identify the role of cognitive biases and discuss how they shape the information security behavior. We also seek research opportunities to provide directions and implications for future research.

A Longitudinal Study on the Effect of e-Commerce Technology Characteristics and Personal Value on Purchasing Behavior by Importance of Information Protection (전자상거래 기술특성과 개인가치가 정보보호 중요성에 의한 구매행동에 미치는 영향에 대한 종단적 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.159-171
    • /
    • 2017
  • The purpose of this study is to investigate the effects of e - commerce technology characteristics and personal values on purchasing behavior by information security importance. The results of the empirical study that examined the university students in 2006 and 2016 are as follows. First, personal value is centered on personal values, such as self - esteem and self - esteem in 2006. In 2016, however, personal values such as self - fulfillment and personal relationship with others are important. Transactional ease and product service serve as the main value of the fun and pleasure of life, but the sense of accomplishment as the core value of information protection. Second, the technical characteristics of e-commerce are as follows. In terms of ease of transaction and product service, technology characteristics are simplified and directly effected over time. On the other hand, information protection works very closely with individual value, There was a strong tendency to enjoy benefits. Especially in 2006, if you want to enjoy transactional convenience through transaction information security or benefit from product service, it has been changed to recognize the importance of information security through payment in 2016.

Factors Influencing on Behavior Intention for Mobile Commerce (모바일 커머스의 이용의도에 영향을 미치는 요인)

  • Chung, Kyung-Soo;Lee, Won-Bin
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.153-174
    • /
    • 2008
  • Mobile commerce is defined as any direct or indirect transaction conducted and facilitated through a wireless telecommunication network such as payment, ticketing, auction and mobile banking. Despite the importance of mobile commerce, there have not been so many academic studies on the unique characteristics of mobile commerce environments. In this study, our research model is developed based on TAM(Technology Acceptance Model) to investigate the user's technology acceptance process in mobile commerce environment. The factors, such as ubiquity, compatibility, perceived usefulness, perceived ease of use, cost, security, attitude and behavior intention for mobile commerce were selected from pier study in information systems area. The data for empirical analysis of the research model is collected online-questionnaire of 167 mobile commerce users in South Korea. The hypotheses were analyzed using SPSS 15.0 and AMOS 7.0. The results of our study show that: (1) compatibility, perceived usefulness and security had influences on the attitude whereas perceived ease of use and cost did not have any significant impact on the attitude, (2) compatibility influenced perceived usefulness whereas perceived ease of use did not, and finally (3) ubiquity, perceived usefulness and attitude had considerable influences on intention for mobile commerce. Therefore, practitioners should focus on enhancing security, quality of contents and services as well as offering what mobile commerce users want. The results of this study may useful for academicians and practitioners alike.

Causes and Countermeasures on the Hate Crime (증오 범죄의 원인과 대책)

  • Kim, Seung-bong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.47-55
    • /
    • 2022
  • Hate crimes should be viewed as a social problem, not a personal crime, and a preventive system should be established to have an acceptance system for people who can engage in antisocial behavior outside of the social integrated value norms. In particular, in order to reduce tragic hate crimes, society and the government should actively work to resolve polarization, and personality education linked to families, schools, and society should be provided, and policies to establish social safety network such as social security systems should be prepared. In addition, it is necessary to switch to a society in which principles are emphasized, and a society that cares for the weak rather than the strong, rather than the expedient policy of words.

Network Abnormal Behavior Analysis System (네트워크 악성행위 분석시스템)

  • Choi, Sunoh;Choi, Yangseo;Lee, Jonghoon;Lee, Jooyoung;Kirn, Jonghyun;Kim, Ikkyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.189-190
    • /
    • 2016
  • 요즘 사이버 공격이 많이 발생함에 따라 기존의 디지털 포렌식 뿐만 아니라 네트워크 트래픽을 수집해서 사이버 공격을 분석하는 네트워크 포렌식에 대한 연구가 많이 수행되고 있다. 그러나 네트워크 포렌식을 수행하기 위해서는 여러가지 어려움이 존재한다. 이러한 문제를 해결하기 위하여 우리는 이 논문에서 네트워크 악성행위를 분석하기 위한 시스템 및 방법을 제안한다.

A Study on the Factors of Online Information Security Behavior Failure: Focused on the Elderly (중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로)

  • TIAN, YANG;Park, Minjung;Chai, Sangmi
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.51-74
    • /
    • 2020
  • Purpose Since the number of personal information breach incidents increased, many people have perceived the importance of personal information protection, in the recent. Especially, the number of personal information breach targeting middle-aged and elderly people rapidly increases. Therefore, the purpose of this study is to identify the factors which influence to fail of online information security behaviors among the elderly. Design/methodology/approach This study made a research model by adopting the factors deducted from the protection motivation theory. To analyze the research model, we conducted an online survey targeted on the elderly and middle ages users who have nations of Korean and Chinese respectively. Findings According to the empirical analysis result, we identified that only perceived severity and perceived vulnerability affected information security awareness. On contrast, it was also discovered that perceived barriers, self-efficacy, and response efficacy did not affect information security awareness. Additionally, the awareness of information security also did not affect information security behaviors. Middle-aged and elderly people with personal information protection education did more information security behaviors than people those who no education experiences. Korean middle-aged and elderly people with education significantly did more information protection behaviors than the people without the education.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey

  • Al-Amri, Bayan O;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.245-251
    • /
    • 2021
  • This work aims to focus on the current features and characteristics of Human Element and Artificial intelligence (AI), ask some questions about future information security, and whether we can avoid human errors by improving machine learning and AI or invest in human knowledge more and work them both together in the best way possible? This work represents several related research results on human behavior towards information security, specified with elements and factors like knowledge and attitude, and how much are they invested for ISA (information security awareness), then presenting some of the latest studies on AI and their contributions to further improvements, making the field more securely advanced, we aim to open a new type of thinking in the cybersecurity field and we wish our suggestions of utilizing each point of strengths in both human attributions in software security and the existence of a well-built AI are going to make better future software security.

The structural relationships between organizational ethical, job satisfaction and organizational citizenship behavior of private security guards (민간경비원의 조직윤리, 직무만족 및 조직시민행동의 구조적 관계)

  • Kim, Young-Hyun;Park, Kill-Jun
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.59-85
    • /
    • 2015
  • The purpose of this study is to establish the structural relationship among organizational ethical climate, job satisfaction, and organizational citizenship behavior. It was intended for the private security guards who work in the security companies in Seoul and Gyeonggi from Jan. 1st, 2014 to Apr. 1st, 2014 to achieve the purpose like this. Purposive sampling was used as the sampling method according to this and sampling of 400 persons was done. However, the samples of 372 persons were finally used in the analysis through the process to check faithless answers, double answers, and abnormal data. The collected data was analyzed according to the purpose of the study by utilizing STATA 13.0 and AMOS 17.0. And for statistic techniques, frequency analysis, descriptive analysis, multivariate normality, confirmatory factor analysis(CFA), Pearson's correlation analysis, and structural equation model analysis were carried out. The conclusion gotten from this study through the data analyses according to the methods and procedure like this is as follow: First, organizational ethical climate has found to have the positive effect on job satisfaction(Non-standard $B=1.427^{***}$). That is, it can be interpreted that organizational ethical climate positively affects superiors, fellow employees, pay, current duties, and chances of promotion. Second, job satisfaction has found not to have the significant effect on organizational citizenship behavior. That is, it can be interpreted that job satisfaction does not affect altruism, conscience, and participation behavior. Third, organizational ethical climate has found to have the positive effect on organizational citizenship behavior (Non-standard $B=.361^{***}$). That is, it can be interpreted that organizational ethical climate positively affects altruism, conscience, and participation behavior. Fourth, the relationship between organizational ethical climate and organizational citizens has found that there is no any indirect effect in the bootstrapping estimation result to establish the indirect effect of job satisfaction. Fifth, the relationship between organizational ethical climate and job satisfaction has found that there are the moderating effects in the analytical result of the moderating effects of person-organization fit. That is, the effects of organizational ethical climate on job satisfaction have found that the groups with higher person-organization fit are more positive than those with lower person-organization fit. Sixth, the relationship between job satisfaction and organizational citizenship behavior has found that there are moderating effects in the analytical result of person-organization fit. That is, the effects of job satisfaction on organizational citizenship behavior have found that the groups with higher person-organization fit are more positive than those with lower person-organization fit.

  • PDF

China's Assertive Diplomacy and East Asian Security (중국의 공세적 대외행태와 동아시아 안보)

  • Han, Seok-Hee
    • Strategy21
    • /
    • s.33
    • /
    • pp.37-64
    • /
    • 2014
  • The year 2010 has been regarded as a year of China's assertive diplomacy. A series of China's behavior--including China's critical reaction to the U.S. for its sales of weapons to Taiwan, the Dalai Lama's visit to President Obama, China's arbitrary designation of 'core interests' over the South China Sea, China's inordinate reactions to the sinking of the Cheonan and Yeonpyeong bombardment, and China's activities in the Senkaku/Diaoyu island areas--has served as the witnesses to China's assertive diplomacy in 2010. The major causes of China's assertive diplomacy can be summed up by three factors: potential power transition from U.S. to China; emerging China's nationalism; and the recession of the Tao Guang Yang Hui as a diplomatic principle. But a majority of Western sinologists claim that China's assertive diplomacy is defensive in terms of its character. China's neighboring states, however, perceive its assertive diplomacy as diplomatic threat. Due to these states' geographical proximity and capability gaps with China, these neighbors experience difficulties in coping with China's behavior. In particular, China's coercive economic diplomacy, in which China tends to manipulate the neighbors' economic dependency on China for its diplomatic leverage, is a case in point for China's assertive diplomacy. China's assertiveness seems to be continued even after the inauguration of Xi Jinping government. Although the Xi government's diplomatic rhetorics in "New Type of Great Power Relationship" and the "Convention for Neighboring States Policy" sound friendly and cooperative, its subsequent behavior, like unilateral announcement of Chinese Air Defense Identification Zone (CADIZ), does not conform with its rhetoric. Overall, China's assertiveness has been consolidated as a fashion of its diplomacy, and it is likely to continue in its relations with neighbors. As a neighboring state, the ROK should approach to it with more balanced attitude. In addition, it needs to find out a new diplomatic leverage to deal with China in accordance with its security environment, in which China plays a growing role.