• Title/Summary/Keyword: Influencing Factors in the Security

Search Result 195, Processing Time 0.032 seconds

A Study on the Effects of Influencing Factors in the Security Environment of Military Organizational Members on Information Security Stress and Security Compliance Behavior Intention (군(軍) 조직구성원의 보안환경 영향요인이 보안 스트레스와 보안준수행동에 미치는 영향 연구)

  • Park, Eui Cheon;Jeon, Ki Seok
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.93-104
    • /
    • 2021
  • Today, due to the development of the 4th industrial revolution such as artificial intelligence, the security threat of the military organization is increasing. A study that can contribute to complying with military security is needed by studying the effects of influence factors occurring in this changing or newly emerging security environment on information security stress and security compliance behavior intention. In previous studies, task overload, task complexity, task uncertainty, and task conflict were extracted among environmental influencing factors that cause security stress. We empirically analyzed how these influencing factors affect security stress and whether they play a mediating role in security stress. As a result of the analysis, it was analyzed that the security stress was affected in the order of task overload, task conflict, and task uncertainty. Information security stress did not significantly affect security compliance behavior intention, but it was found to mediate the effect of task overload on security compliance behavior intention. This causes information security stress due to heavy security work in the military organization, which ultimately leads to lower security compliance behavior. Therefore, the security policy to manage this situation should be promoted first.

Study on factors influencing adoption of information security policies (정보보호정책 도입에 영향을 미치는 요인에 관한 연구)

  • Han Yeong-Gu;Choe Myeong-Gil;Kim Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.636-639
    • /
    • 2004
  • Information security keeps enterprises information from the unintended disclose, modification and destruction and plays important roles especially in enterprise owing Internet based information systems. This study recognizes the importance of information security policy, analyzes factors influencing adoption of information security policy, and provides the factors for enterprises utilize them.

  • PDF

A Study for Influencing Factors of Organizational Performance: The Perspective of the Mediating Effect of Information Security Maturity Level (조직성과에 미치는 영향요인에 관한 연구: 정보보호 성숙도의 매개효과를 중심으로)

  • Park, Jeong Kuk;Kim, Injai
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.99-125
    • /
    • 2014
  • Internet environment and innovative ICT(information and communication technology) have brought about big changes to our lifestyle and industrial structure. In spite of the convenience of Internet, various cyber incidents such as malicious code infection, personal information leakage, smishing(sms + phishing), and pharming have frequently occurred. Information security must be recognized as a key and compulsory element for surviving in a global economy. Strategic roles of information security have recently been increasing, but effective implementation of information security is still a major challenge to organizations. Our study examines the influencing factors of information security and investigates the causal relationship between information security maturity level and organizational performance through an empirical survey. According to the results of our study, personal, organizational, technical, and social factors affect organizations's information security maturity level altogether. This result suggests that when dealing with security issues, the holistic and multi-disciplinary approaches should be required. In addition, there is a causal relationship between information security maturity level and organizational performance, and organizations aim to establish the efficient and effective ways to enhance information security maturity level on the basis of the results of this study.

A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password (패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.

Factors Influencing User's Satisfaction in ChatGPT Use: Mediating Effect of Reliability (ChatGPT 사용 만족도에 미치는 영향 요인: 신뢰성의 매개효과)

  • Ki Ho Park;Jun Hu Li
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.99-116
    • /
    • 2024
  • Recently, interest in ChatGPT has been increasing. This study investigated the factors influencing the satisfaction of users using ChatGPT service, a chatbot system based on artificial intelligence technology. This paper empirically analyzed causality between the four major factors of service quality, system quality, information quality, and security as independent variables and user satisfaction of ChatGPT as dependent variable. In addition, the mediating effect of reliability between the independent variables and user's satisfaction was analyzed. As a result of this research, except for information quality, among the quality factors, security and reliability had a positive causality with use satisfaction. Reliability played a mediating role between quality factors, security, and user satisfaction. However, among quality factors, the mediating effect of reliability between service quality and user's satisfaction was not significant. In conclusion, in order to increase user satisfaction with new technology-based services, it is important to create trust among users. The research results sought to emphasize the importance of user trust in establishing development and operation strategies for artificial intelligence systems, including ChatGPT.

A Cross-National Study on the Determinants of Trust in Internet Shopping Mall : Focusing on Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 국가 간 비교 연구 : 한국.중국 이용자를 대상으로)

  • Jung, Chul-Ho;Chung, Young-Su
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.321-349
    • /
    • 2007
  • The objective of this study is to investigate factors influencing trust on internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on the literature reviews, this study employs six factors in two groups of influencing factors, web-site characteristics and individual characteristics as key determinants of trust in internet shopping mall. Analysis of 470 responses (Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following: In terms of the relationship between web-site characteristics factors and the trust, the results showed clear differences between Korean and Chinese samples. For the Korean samples, transaction security and interactivity were the only significant influencing factors. For the Chinese samples, perceived reputation and perceived size were the only significant factors. In terms of individual characteristics factors, the influencing factors were found identical for the samples. Both propensity to trust and familiarity were significant factors in both Korean and Chinese samples. Based on the findings, managerial implications are discussed in building user trust in internet shopping mall in Korean and Chinese market.

  • PDF

An Empirical Study on the Determinants of Trust in Internet Shopping Mall : A Comparison of Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 실증연구 : 한국.중국 이용자 비교 분석)

  • Jung, Chul-Ho;Chung, Young-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.2
    • /
    • pp.71-96
    • /
    • 2007
  • The objectives of this study are to investigate factors influencing trust on internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on the literature reviews, this study employs six factors in two groups of influencing factors, web-site characteristics and individual characteristics as key determinants of trust in internet shopping mall. Analysis of 470 responses(Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following: In terms of the relationship between web-site characteristics factors and the trust, the results showed significant differences between Korean and Chinese samples. For the Korean samples, transaction security and interactivity were the only significant influencing factors. For the Chinese samples, perceived reputation and perceived size were the only significant factors. In terms of individual characteristics factors, the influencing factors were found identical for the samples. Both propensity to trust and familarity were significant factors in both Korean and Chinese samples. Based on the findings, managerial implications are discussed in building user trust in internet shopping mall in Korean and Chinese market.

  • PDF

A study on the socio-economic study on the characteristics and oral health of national basic livelihood security (우리나라 국민기초생활수급자의 사회경제적인 특성과 구강건강에 관한 연구)

  • Kim, Chang-Suk
    • Journal of Korean society of Dental Hygiene
    • /
    • v.13 no.6
    • /
    • pp.995-1004
    • /
    • 2013
  • Objectives : The purpose of the study is to provide basic data for oral health promotion in national basic livelihood security. Methods : The data were extracted from the 4th National Health and Nutrition Survey (2007-2009) in Korea. The data were analyzed using SPSS 18.0. to $x^2$-test and CSGLM. Results : 1. The subjects were not able to receive dental treatment because of the financial difficulty. 2. The infuencing factors of DMFT include gender (p<0.05), type of health insurance (p<0.05), membership for private health insurance (p<0.05), frequency of toothbrushing (p<0.05), use of oral hygiene products (p<0.01), smoking (p<0.05), drinking (p<0.05). The influencing factors of CPI include gender (p<0.01) and smoking (p<0.05). The influencing factors of fixed bridge include age (p<0.05), income (p<0.05) and use of accessory oral hygiene products (p<0.05). The influencing factors of fixed bridge include age (p<0.001), income (p<0.01), education (p<0.001), type of health insurance (p<0.001), membership for private health insurance (p<0.001), frequency of toothbrushing (p<0.01), use of oral hygiene products (p<0.01), and drinking (p<0.05). Conclusions : It is necessary to provide oral health care and health promotion to the recipients of National basic livelihood security. The government must give them better quality of dental health care in the near future.

The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness (정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로)

  • Kim Jong-Ki;Jeon Jin-Hwan;Lim Ho-Seob
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

An Empirical Study on Factors Affecting the Maturity of Information Security Policy (정보보호정책의 성숙도에 영향을 미치는 요인에 관한 연구)

  • Choi, Myeong-Gil;Hwang, Won-Joo;Kim, Myoung-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.131-142
    • /
    • 2008
  • Enterprises accomplish their missions through obtaining and managing information. The unintended disclose of enterprises' sensitive information causes serious damage to enterprises, resulting in disruptive management. For effective security of enterprises, information security management systems and information security policy owing clear goals should be firmly established. This study analyzes factors influencing maturity of information security policy and gives important hints to execute information security policy.