• Title/Summary/Keyword: Security Motivation

Search Result 154, Processing Time 0.026 seconds

Designing a Micro-Learning-Based Learning Environment and Its Impact on Website Designing Skills and Achievement Motivation Among Secondary School Students

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.335-343
    • /
    • 2021
  • The study aimed to elucidate how to design a learning environment on the premise of micro-learning (ML) and investigate its impact on website designing skills and achievement motivation among secondary school students. Adopting the experimental approach, data were collected through an achievement test, a product evaluation form, and a test to gauge motivation for achievement. The sample was divided into two experimental groups. Results revealed statistically significant differences at 0.05≥α between the mean scores of the two groups that experienced ML, irrespective of the two modes of presenting the video in the pre-test and post-test, as for the test of websites design skills, product evaluation form, and achievement motivation test. Besides, there have been statistically significant differences at 0.05≥α between the mean scores of the first experimental group that had exposure to ML using the split-video presentation style and the scores of the second experimental group that underwent ML using continuous video presentation style in the post cognitive test of website design and management skills in favor of the group that had segmented-video-presentation ML. Another salient finding is the nonexistence of significant differences at 0.05≥α between the mean scores of the first experimental group that underwent segmented-video-presentation ML and the grades of the second experimental group that received ML with continuous video presentation style in the post-application of the product scorecard of websites designing skills and the motivation test. In light of these salient findings, the study recommended using ML in teaching computer courses at different educational stages in Saudi Arabia, training computer and information technology teachers to harness ML in their teaching and using ML in designing courses at all levels of education.

A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior (청소년의 개인정보보안 인식이 보안의도와 보안행동에 미치는 영향에 관한 연구)

  • Park, KyungA
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.4
    • /
    • pp.79-98
    • /
    • 2019
  • In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.

The Influence of Security Motivation and Organization Trust on Information Security Compliance: Focusing on Moderation Effects of Work Promotion Focus (정보보안 동기, 조직 신뢰가 정보보안 준수에 미치는 영향: 업무향상초점의 조절효과 분석)

  • Hwang, Inho;Hu, Sungho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • Investment of organization in information security is increasing, but information security threats within the organization are not decreasing. The purpose of this study is to suggest a direction to increase the information security compliance intention of employees. In detail, the study presents the positive effects of security motivation and organization trust on the information security compliance intention, and presents the moderating effect of work promotion focus. Research model and hypothesis verification are confirmed through structural equation modeling and the study conducted a questionnaire technique to the employees of the organization applying the information security policy for quantitative verification. As a result, information security punishment and value congruence had a positive affect on the compliance intention by mediating organization trust. In addition, work promotion focus had a moderating effect on the positive relationship between the precedent factors on the compliance intention. The research has academic and practical implications from the viewpoint of presenting the factors of the organization's efforts to improve the level of information security compliance by insiders.

A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied (조직원의 정보보안 정책 준수의도에 미치는 영향 연구: 계획된 행동이론, 공정성이론, 동기이론의 적용)

  • Hwang, In-Ho;Hu, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.225-236
    • /
    • 2018
  • Organizations continue to invest in the security of information technology as a means to be more competitive than others in their industry do. However, there is a relatively lack of interest in the information security compliance of employees who implement information security technologies and policies of organization. This study finds mechanisms for enhancing security compliance by applying theory of planned behavior, justice theory, and motivation theory in information security field. We use structural equation modeling to verify the research hypotheses, and conducted a survey on the employees of organization with information security policy. The results showed that organizational justice, sanction, and organizational identification affect the factors of the planned behavior theory and affect the employee's compliance intention. As a result, this research suggested directions for strategic approach for enhancing employee's compliance intention on organization's security policy.

The Study on the Role of Private Security in International Events (국제적 행사 경비와 민간경비의 역할에 관한 고찰)

  • Seo, Jin-Seok
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.179-210
    • /
    • 2002
  • Recently, the industry of private security needs to cope with system for specialization improvement to security business. Especially, private security will very important in various international events such as 2002 World Cup soccer game and so on. The analyses of this study have led to the following conclusions: First, the industry of private security must advance to trait by oneself. Second, it is needed that both public and private security must know about role-sharing between them on the basis of efficiency, and try to cooperate with each other for the events security. Third, it will educate and train their officials in professional techniques to events security. In addition, it should be expand to reserve manpower and for the motivation to security officials establish as minimum pay scale.

  • PDF

The Effect of Applying the X-ray Screening Ability Rating for Security Screening Persons in Incheon International Airport (인천국제공항 보안검색요원 X-ray 판독등급제 적용 효과)

  • Yung-Kil Lee;Jeong-Sun Baek;Dong-Min Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.733-739
    • /
    • 2023
  • The purpose of this study verify to the effect of applying the X-ray screening ability rating for security screening persons in Incheon International Airport. Data collected through a evaluation score of 1,034 security screening persons in Incheon International Airport. Data analysis performed using paired sample t-test. The research results found that it was a statistically significant difference pre-test and post-test applying the X-ray screening ability rating. In this article, we asserts that the X-ray screening ability rating is effective in improving the X-ray screening ability of security screening persons. This paper contribute to the academic expansion of motivation theory and self-determination theory. This study is valuable as a preemptive empirical research that provides practical implications about the application of X-ray screening ability rating for security screening persons.

Collaborative Consumption Motivation Factor Model under the Sharing Economy (공유경제 모형에서의 협력적 소비 영향요인)

  • Roh, Tae-Hyup;Choi, Hwa-Yeol
    • The Journal of Information Systems
    • /
    • v.27 no.2
    • /
    • pp.197-219
    • /
    • 2018
  • Purpose The purpose of this study is to examine what motivates users to adopt one of the emerging applications for collaborative consumption of sharing economy. Using the self-determination theory, motivation theory and TAM(Technology Acceptance Model) as the theoretical framework, this study illustrates important factors that influence adoption of collaborative consumption service. We develops the ICTs(Information and Communications Technologies) initiatives and motivation model to collaborative consumption. Design/methodology/approach This paper makes use of a quantitative methodology using survey questionnaire that allows for the measurement of the eight constructs(System Availability, Contents Quality, Design & Personalization, Security & Privacy, Emotional & Social Value, Economic Value, Attitude, Adoption & Consumption) contained in the hypothesized theoretical model on the basis of the prior literatures. Data collected from a sample of 227 respondents who have used the collaborative consumption services and provided the foundation for the examination of the proposed relationships in the model. Findings This study has the following implications for the users and providers of CC platforms and services. The ICTs initiatives (System Availability, Contents Quality, Design & Personalization, Security & Privacy) are the influential factors that motivate the emotional and social value to CC. On the other hand, The ICTs initiatives (System Availability, Contents Quality) are not very significant factors of economic value to CC. The empirical analysis result indicate that there are significant causal effect among emotional & social value, economic value, and adoption to CC. This study provides important theoretical implications for innovation adoption research through an empirical examination of the relationship between ICTs initiatives, motivation factors to collaborative consumption in the sharing economy.

Introduction to Leakage-Resilient Authenticated Key Exchange Protocols and Their Applications

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.207-217
    • /
    • 2008
  • Secure channels, indispensable to many applications, can be established by using an authenticated key exchange (AKE) protocol where the involving parties authenticate one another and then share authenticated session keys over insecure networks. In this paper, we introduce a new type of AKE protocols that are especially designed to minimize the damages caused by leakages of stored secrets. Such protocols are called Leakage-Resilient AKE (LR-AKE) protocols, whose motivation, design principles, several constructions, security analysis and applications are explained in detail.

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM) (조직구성원들의 정보보안행동에 미치는 영향: 보호동기이론(PMT)과 계획된 행동이론(TPB) 통합을 중심으로)

  • Jeong, hye in;Kim, seong jun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.145-163
    • /
    • 2018
  • Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.

The Impact of Skills Development on Employee Performance

  • Farid, Khemissi;Taher, Jouili
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.278-286
    • /
    • 2021
  • The aim of this paper is to examine the importance of skills development in the process of employee performance. As part of this research, we will seek to determine the nature and extent of skills development impact in improving employee performance. This research project is one of the new themes that some researchers have started in recent years. The novelty of this theme is the inclusion of the skill development factor. This factor is likely to have a positive impact on employee motivation and performance. Some of the factors already known to have an impact on employee performance, such as motivation, career development, training, and experience, will be adopted. It is assumed that the results of this research will have a positive impact on employee performance and employee retention.