• Title/Summary/Keyword: Security Motivation

Search Result 154, Processing Time 0.023 seconds

The Effect of Selection Motivation of Security-related Department Students on NCS Curriculum and Career Decision (경호관련학과 학생들의 선택 동기가 NCS교육과정 및 진로결정에 미치는 영향 분석)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.159-166
    • /
    • 2018
  • The purpose of this study is to investigate the effect of selection motivation on the NCS curriculum and career decision of the students in security related department. The contents of the questionnaire consisted of "First, Motivation to select major, Second, NCS curriculum, Third, Career decision". In this study, Chronbach's Alpha coefficients were presented to analyze the reliability of variables and exploratory factors, and the Berimax method was performed. The AVE and CR values of the items were calculated to be 0.5 and 0.7, respectively. Therefore, it was analyzed that the Intensive feasibility of items were well-focused. As a result of the hypothesis test, the standardized coefficients were calculated as follows: 'Selective motivation ⇨ NCS curriculum' is 0.563, 'NCS curriculum ⇨ career decision' is 1.339. The relationship between the two hypotheses was found to be positive (+). In order to improve the career decision of students in security related departments, it seems necessary to raise the motivation of selection and to improve the satisfaction of NCS curriculum.

  • PDF

Features Of Psychological And Pedagogical Conditions For The Development Of Motivation Of Applicants For Higher Education

  • Chernova, Iryna;Vdovina, Olena;Dragomyretska, Olga;Khodykina, Yuliia;Medvedieva, Olha;Gvozdetska, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.82-86
    • /
    • 2021
  • The article analyzes the psychological and pedagogical scientific literature on the problem of motivation of students' educational activity, compiled and implemented a diagnostic research program, studied the system of conditions for the development of motivation for educational activity of students, compiled and implemented a program for the development of motivation for educational activity of students, highlighted the features of motivation for educational activity of students and conducted a comparative study analysis.

Information Security and Organizational Performance: Empirical Study of Korean Securities Industry

  • Kong, Heekyung;Jung, Suhyun;Lee, Insung;Yeon, Seung-Jun
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.428-437
    • /
    • 2015
  • This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

Effects of Gamification-Based Learning on Learners' Achievement Motivation at First-Grade Intermediate Level

  • Al-Sulami, Sami Ben Shamlan Bakhit
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.266-276
    • /
    • 2022
  • The study aimed to pinpoint the effects of an educational environment based on gamification on developing achievement motivation among first-grade intermediate students. Using an achievement motivation scale, the study adopted a quasi-experimental design with experimental and control groups. The sample consisted of 52 students selected randomly from the first-grade intermediate students. They were studying in public intermediate schools in Jeddah at the time of this study. They were divided into two groups. The control group (n=24 respondent), and the experimental group (n=28 respondent). The results showed statistically significant differences at the level α ≥ 0.05 between the mean scores of the experimental group and the control group in the posttest of the achievement motivation measurement in favor of the experimental group. The study recommended using gamification in designing computer curricula and courses across educational stages in Saudi Arabia. It also recommends training the computer and information technology teachers on using gamification in their teaching.

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

Information Security Importance Perception: Protection Motivation Theory Perpectives (정보보안 중요성 인식에 관한 연구: 예방동기이론 관점에서)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.283-295
    • /
    • 2022
  • This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that are based on the protectiom motivation theory. As a result, we found followings. First, The perceived punishment certainty has a significant effect on the perceived importance of information security. Also, it influences a negative effect on acquiescence. Second, the response cost has a negative effect on the perceived importance of information security. In addition, the response cost positively effects on acquiescence. Finally, acquiescence negatively influences on the perceived importance of information security. The results show that, in order to increase the perceived importance of information security among employees, it is necessary to make them aware that a security violation can result in certain punishment. At the same time, organizations should also attempt to remove major obstacles accompanying security behaviors of employees. Finally, organizations encourage open communication relating to information security among employees.

Detecting malicious behaviors in MMORPG by applying motivation theory (모티베이션 이론을 이용한 온라인 게임 내 부정행위 탐지)

  • Lee, Jae-hyuk;Kang, Sung Wook;Kim, Huy Kang
    • Journal of Korea Game Society
    • /
    • v.15 no.4
    • /
    • pp.69-78
    • /
    • 2015
  • As the online game industry has been growing rapidly, more and more malicious activities to gain economic benefits have been reported as well. Game bot is one of the biggest problems in the online game industry. So we proposed a bot detection method based on the ERG theory of motivation for the first time. Most of the previous studies focused on behavior-based detection by monitoring patterns of the specific actions. In this paper, we applied the motivation theory to analyze user behaviors on a real game dataset. The result shows that normal users in the game followed the ERG theory of motivation in the same way as it works in real world. But in the case of game bots, the theory could not be applied because the game bot has specific reasons, unlike normal game users. We applied the ERG theory to users to distinguish game bot users from normal users. We detected the game bot with high accuracy of 99.78% by applying the theory.

Measuring Students' Interaction in Distance Learning Through the Electronic Platform and its Impact on their Motivation to Learn During Covid-19 Crisis

  • Almaleki, Deyab A.;Alhajaji, Rahma A.;Alharbi, Malak A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.98-112
    • /
    • 2021
  • This study aimed at measuring students' interaction in distance education through the electronic platform among intermediate school students, by identifying the level of students' interaction in distance education and differences between them, as well as its impact on their motivation to learn. To achieve the aim of the study, two scales were designed for this purpose and were applied to a sample consisting of (268) individuals. The results showed that the level of students' interaction through the e-learning platform was at a high level. The results also showed that there was no statistically significant difference between the mean scores of males and females in the scale of students' interaction through the e-learning platform. There was no statistically significant difference between them in their motivation for distance learning via the online platform. There were also no statistically significant differences related to the grade variable in the level of interaction through the electronic platform and in the motivation to learn, while there was a positive statistically significant effect of interaction through the electronic platform on students' motivation to learn.

A Study on the Factors of Online Information Security Behavior Failure: Focused on the Elderly (중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로)

  • TIAN, YANG;Park, Minjung;Chai, Sangmi
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.51-74
    • /
    • 2020
  • Purpose Since the number of personal information breach incidents increased, many people have perceived the importance of personal information protection, in the recent. Especially, the number of personal information breach targeting middle-aged and elderly people rapidly increases. Therefore, the purpose of this study is to identify the factors which influence to fail of online information security behaviors among the elderly. Design/methodology/approach This study made a research model by adopting the factors deducted from the protection motivation theory. To analyze the research model, we conducted an online survey targeted on the elderly and middle ages users who have nations of Korean and Chinese respectively. Findings According to the empirical analysis result, we identified that only perceived severity and perceived vulnerability affected information security awareness. On contrast, it was also discovered that perceived barriers, self-efficacy, and response efficacy did not affect information security awareness. Additionally, the awareness of information security also did not affect information security behaviors. Middle-aged and elderly people with personal information protection education did more information security behaviors than people those who no education experiences. Korean middle-aged and elderly people with education significantly did more information protection behaviors than the people without the education.