• Title/Summary/Keyword: perceived risk of security

Search Result 90, Processing Time 0.03 seconds

The Impact of Cognitive Factors of IS Security Risk Management(ISM) on Awareness and Intention to Develop ISM (보안관리 인지 요인이 조직의 정보시스템 보안위험관리에 대한 인식 및 개발의지에 미치는 영향)

  • Kim, Sanghyun;Song, Youngmi
    • Information Systems Review
    • /
    • v.14 no.2
    • /
    • pp.21-46
    • /
    • 2012
  • Organizations that make widely use of information technologies can be more efficient. But, the dependence of information technologies leads to an increase in threat of security. This is the reason why organizations are investing in security risk management (SRM) which is designed to protect of information assets. Noting a lack of empirical research in SRM, we investigate the key factors having a direct effect on performance of SRM. Particularly, this study focused on identifying factors influencing awareness of SRM and Intention to develop SRM in Organization. Based on relevant literature review, six motivating factors, including Behavior for Security Management, Compliance with Security Policy, perceived Benefits, Perceived Sacrifice, Social Pressure, Experience of Security Risks, were initially identified. The results indicated that most perception factors were positively related to Organization's intention to develop SRM and awareness of SRM, which then had positive impact on performance of SRM. But Perceived Sacrifice was not significantly related to two variables which is Organization's intention to develop SRM and awareness of SRM.

  • PDF

Analysis of Risk Factors for Patient Safety Management (환자안전 관리를 위한 위험요인 분석)

  • Ahn, Sung-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.12 no.3
    • /
    • pp.373-384
    • /
    • 2006
  • Purpose: This is a pilot study to identify patient safety risk factors and strategies for patient safety management perceived by nurses. Methods: Data were collected and analyzed with an open questionnaire from April to May 2005, targeted on 100 nurses working in two hospitals. The issues were 'what are risk factors for patients, nurses, and other medical practitioners? How do they prevent with the aftermath of risk factors, causes of incidents?' For data analysis, types and frequency of risk factors were worked out, using the Australian Incident Monitoring System Taxonomy. Results: The types of patient safety risk factor perceived by nurses were as follows ; therapeutic devices or equipment, infrastructure and services (29.5%), nosocomial infections (16.3%), clinical processes or procedures (15.4%), behavior, human performance, violence, aggression, security and safety (12.2%), therapeutic agents (9.7%), injuries and pressure ulcers (8.7%), logistics, organization, documentation, and infrastructure technology (5.6%). Strategies for patient safety included training of prevention of infection, education about safety management for patients and medical professionals, establishment of reporting system, culture of care, pre-elimination of risk factors, cooperative system among employees, and sharing information. Conclusion: These results will be used to provide evidences for patient safety management and educational program.

  • PDF

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

A Study on the Determinants of Attitude toward and Intention to Use Mobile Shopping through Fashion Apps -Comparisons of Gender and Age Group Differences- (패션 앱을 이용한 모바일 쇼핑 태도 및 사용의도 영향요인 연구 -성별과 연령집단별 차이 비교-)

  • Sung, Heewon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.37 no.7
    • /
    • pp.1000-1014
    • /
    • 2013
  • This study identifies the determinants that influence attitude toward and the intention to use mobile shopping services through fashion applications (apps) based on the technology acceptance model. In addition, gender and age group differences were examined. Data were collected from subjects who have used smartphone fashion related apps; subsequently, a total of 327 data were analyzed. About 46% of respondents were males, with a mean age of 34.4 years that ranged from 20 to 49 years old. Multiple regression models were developed based on the research model. Perceived usefulness, perceived ease of use, perceived enjoyment, perceived risks (security risk and quality risk), fashion involvement, and fashion app attributes (product attributes and service attributes) were employed as predictors of attitudes towards mobile shopping. Attitudes towards mobile shopping and subjective norms with the aforementioned variables measured the intention to use. Attitudes towards mobile shopping were predicted by perceived enjoyment, perceived usefulness, and service attributes. Attitudes toward mobile shopping and subjective norms were the most important predictors of the intention to use. Gender differences were found in that service attributes were significant for attitudes towards mobile shopping only in the male model. Age differences were also found and perceived usefulness was the most important predictor of attitudes toward mobile shopping among those in their 20's; however, perceived enjoyment was the most important among those in their 30's and 40's. Quality risk was only significant to explain intention to use among those in their 40's. The findings of this study are useful to understand the possibility of the adoption of mobile shopping though fashion apps and provide basic insight into market segmentation.

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim;Jungyeon Sung;Daekil Kim;Dan J. Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.3
    • /
    • pp.156-175
    • /
    • 2017
  • The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

Factors to Affect Acceptance of Open Banking from Information Security Perspectives (정보보호 관점에서의 오픈뱅킹 수용도에 대한 영향요인)

  • Go, Jeunghyeun;Lee, Woonboo
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.63-81
    • /
    • 2021
  • Joint financial network of Korea Financial Telecommunications and Clearings Institute, which is an essential facility with a natural monopoly, maintained its closedness as monopoly/public utility model, but it has evolved in the form of open banking in order to obtain domestic fintech competitiveness in the rapidly changing digital financial ecosystem such as the acceleration of Big Blur. In accordance with digital transformation strategy of financial institutions, various ICT companies are actively participating in the financial industries, which has been exclusive to banks, through the link technology called Open API. For this reason, there has been a significant change in the financial service supply chain in which ICT companies participate as users. The level of security in the financial service supply chain is determined based on the weakest part of the individual components according to the law of minimum. In addition, there is a perceived risk of personal information and financial information leakage among the main factors that affect users' intention to accept services, and appropriate protective measures against perceived security risks can be a catalyst, which increases the acceptance of open banking. Therefore, this is a study on factors affecting the introduction of open banking to achieve financial innovation by developing an open banking security control model for financial institutions, as a protective measures to user organizations, from the perspectives of cyber financial security and customer information protection, respectively, and surveying financial security experts. It is expected, from this study, that effective information protection measures will be derived to protect the rights and interests of financial customers and will help promote open banking.

Effects of Biased Awareness of Security Policies on Security Compliance Behavior (보안정책에 대한 편향적 사고가 보안준수 행동에 미치는 영향)

  • Heo, Jun;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.1
    • /
    • pp.63-75
    • /
    • 2020
  • From the perspective of compliance with security policies by members of the organization, which is a major cause of security incidents, this study presented biased thinking as factors that affect compliance with security policies and verified the following: First, the impact of biased thinking on security policies on compliance with security policies is verified. Second, the participation of management, perceived risk, education and punishment of management will verify the adjustment effect of increasing or decreasing biased thinking. Finally, we have verified that compliance attitudes have a significant impact on compliance behavior. To this end, 157 people were surveyed, statistical analysis of research models and structural equations, and conformity analysis were conducted. Studies have shown that biased thinking has a negative effect on the attitude of compliance with information security. In addition, it was analyzed that the attitude of compliance with information security policy increases policy compliance behavior. On the other hand, the higher the perceived risk of information security, the lower the bias was the adjustment effect, but management's participation, education and punishment were found to have no adjustment effect.

Evaluation of Functional Ability and Nutritional Risk according to Self-Rated Health (SRH) of the Elderly in Seoul and Kyunggi-do (서울 및 경기지역 노인의 건강자가평가에 따른 기능적 건강 및 영양위험 평가)

  • Choi, Yoon-Jung;Park, Yu-Sin;Kim, Chan;Jang, Yu-Kyung
    • Journal of Nutrition and Health
    • /
    • v.37 no.3
    • /
    • pp.223-235
    • /
    • 2004
  • A functional ability and adequate nutritional status are the major determinants of health status, Self-rated health (SRH) is a worldwide method to assess health status and it is recognized as a predictor of morbidity and mortality in the elderly, This study was designed to evaluate the functional ability and nutritional risk according to SRH in the elderly. Four hundred nine free-living elderly people (118 male, 291 female), aged $\geq$ 65 years were interviewed by trained interviewers using structured questionnaires including demographic information, SRH, anthropometric measurements, functional ability, general health status, and nutritional risk. SRH was divided into three status such as “Good”, “Moderate” and “Poor” status. And all the data were analyzed by oneway ANOVA, spearman correlation, and x$^2$ analysis using SPSS 9.0 version at p 〈 0.05. Of all the subjects, 48.9% perceived their health status as “poor”, and their functional abilities (activities of daily living, instrumental activities of daily living) were more impaired than their counterparts (“good” and “moderate”). Poor self-rated health was also related to: a higher prevalence of illnesses (p 〈 0,001) especially in hypertension, arthritis. Self-rated health was significantly related to food security (p 〈 0.001), food enjoyment (p 〈 0.001) ,and nutritional knowledge (p = 0.0 13). Also NSI checklist total score was the highest in “poor” health status (p 〈 0.001). Better self-rated health was related to better food security, and better food enjoyment. However, smoking, alcoholic intake, exercise, eating behaviors, and demographic characteristics were not significantly different among the three SRH status. SRH was closely related to chronic diseases, functional ability, and nutritional risk in the elderly. Therefore, public health strategies for the elderly should be focused on the elderly who are “poor” in SRH, to improve nutritional status and functional ability, and to reduce risk factors of chronic diseases.