• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.025 seconds

A Firm's Environmental Determinants Impacting the Information Security Management and the Moderating Effects of Regulatory Influence (정보보안관리에 영향을 미치는 기업환경요소와 규제자 영향의 조절효과)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.3
    • /
    • pp.79-94
    • /
    • 2012
  • According to the higher dependence of contemporary firms on data digitalization and the information technology, the role and importance of Information Security Management (ISM) is getting higher. Thus, there is a need to arrange proper procedure and a series of device within the organization in order to reduce diverse security risks, which take place from the inside and the outside of firm. In other words, prior examination for reinforcing recognition of ISM, and of a systematic performance method in the refined form is important. This study investigate the key variables influencing the ISM. Thus, this study suggests firm environmental factors that include four exogenous variables, market volatility, task interdependence, perceived benefits, and coordination mechanism affecting awareness of ISM. In addition, it proposes a concept of the ISM process with awareness, development, and performance, and examines the moderating effects of regulatory influence. The research model was tested by using Structural Equation Modeling, via SmartPLS 2.0 analysis on a sample collected from 186 employees in various industries. The research results provide the evidence that supports the tested hypotheses except significance of coordination mechanism. The implications of the findings suggest a new theoretical framework of the ISM and offers important solutions for the practical application guidelines.

Analysis on the effects of the Security Awareness on Knowledge Sharing Process : Focusing on National Defence Intranet (군 조직지식 공유과정에 보안의식이 미치는 영향 분석(국방인트라넷 활용중심))

  • Han, Gyu-Ha;Kim, Hyeon-Jeong;Chung, Do-Bum;Lee, Choong-C.
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.3
    • /
    • pp.139-156
    • /
    • 2009
  • This study reviewed influential factors on knowledge sharing and examined to verify how attitude and recognition serve toward security in knowledge-related activities. This two-part study will dedicate to diffusion of knowledge sharing in the ROK Army. The findings indicate that trust and computer self-efficacy are influential factors which cause increase in knowledge sharing intention. Friendly attitude of the members result in strengthening the knowledge sharing in National Defense Intranet. As a result, it could be inferred that organizational and systematic efforts are required to foster the knowledge sharing in the army and policy to induce members' friendly attitude toward security is in need as well.

An Empirical Study on Individual and Social Commerce Factors Impacting Shopping Value and Intention to Repurchase in Social Commerce and Moderating Effects of Perceived Security (소셜커머스의 쇼핑 가치와 재구매의도에 영향을 미치는 개인 및 소셜커머스 특성과 지각된 보안의 조절효과에 대한 연구)

  • Kim, Sanghyun;Park, HyunSun
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.31-53
    • /
    • 2013
  • Web 2.0 has affected existing e-commerce and created a new business model of e-commerce, known as social commerce. Social commerce is a subset of e-commerce using social network services and is emerging as an important platform due to increased popularity of social networking services. This study focuses on analyzing the factors that influence the shopping value and intention to repurchase of social commerce users. Based on prior researches, we develop a research model, including individual characteristics of social commerce users (Collectivism, Price Sensitivity, Impulse Buying) and social commerce characteristics (Cost saving, Product Variety, Shopping Convenience). Furthermore, this study proposed the moderating effect of Perceived Security and the relationship between shopping value and intention to repurchase. To empirically validate, the data were collected from 220 social commerce users. The results indicated that individual characteristics (collectivism, price sensitivity, impulse buying) were positively related to hedonic shopping value. In addition, social commerce characteristics (cost saving, shopping convenience) were positively related to utilitarian value. The shopping value(hedonic and utilitarian) had a significant influence on intention to repurchase. The moderating effects of perceived security also was significant. Lastly, the implications for theory and practice are discussed.

Factors Influencing on Behavior Intention for Mobile Commerce (모바일 커머스의 이용의도에 영향을 미치는 요인)

  • Chung, Kyung-Soo;Lee, Won-Bin
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.153-174
    • /
    • 2008
  • Mobile commerce is defined as any direct or indirect transaction conducted and facilitated through a wireless telecommunication network such as payment, ticketing, auction and mobile banking. Despite the importance of mobile commerce, there have not been so many academic studies on the unique characteristics of mobile commerce environments. In this study, our research model is developed based on TAM(Technology Acceptance Model) to investigate the user's technology acceptance process in mobile commerce environment. The factors, such as ubiquity, compatibility, perceived usefulness, perceived ease of use, cost, security, attitude and behavior intention for mobile commerce were selected from pier study in information systems area. The data for empirical analysis of the research model is collected online-questionnaire of 167 mobile commerce users in South Korea. The hypotheses were analyzed using SPSS 15.0 and AMOS 7.0. The results of our study show that: (1) compatibility, perceived usefulness and security had influences on the attitude whereas perceived ease of use and cost did not have any significant impact on the attitude, (2) compatibility influenced perceived usefulness whereas perceived ease of use did not, and finally (3) ubiquity, perceived usefulness and attitude had considerable influences on intention for mobile commerce. Therefore, practitioners should focus on enhancing security, quality of contents and services as well as offering what mobile commerce users want. The results of this study may useful for academicians and practitioners alike.

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim;Jungyeon Sung;Daekil Kim;Dan J. Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.3
    • /
    • pp.156-175
    • /
    • 2017
  • The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

The attribution of the security guard failure and grope for efficient operational measures of security guard through the analysis of failures : propensity eduction of failure-factors of security guard and patterns of danger and injury (경호실패귀인과 실패사례 분석을 통한 효율적인 경호운용방안 모색 : 경호환경의 실패요인과 위해패턴 성향 도출)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.143-155
    • /
    • 2018
  • The purpose of this study is to extract the failure attributions to identify the failure factors of the security guards and to derive the risk factor factors through failure cases analysis. Failure attributions were prepared by using semi-structured questionnaires(17) and closed questionnaires(179) starting from the fully open questionnaires(8), and processed through SPSS 21.0 and AMOS 21.O statistical packages. As a result of summarizing the causal relationship between the failure attribution and the failure case (patrol failure pattern factor), In Park Jung-Hee's assassination, lack of experience(2), negative mind(1), lack of work ability(1), lack of experience(2), organizational non-system activeness(2), lack of awareness of mission(1) Failure(2), lack of consciousness(2), and 14 failure patterns were found. Aung-San National Cemetery explosion occurred in eight failure patterns including insecurity(1), negative mind(1), lack of work skills(2), lack of experience(2), individualism(1), There were eight failure patterns in the case of Mr. Yook Young-Su 's sniping, including insincerity(2), negative mind (1), lack of experience(2), lack of awareness of mission(2) and failure to share work(1).

  • PDF

A Framework of Factors Affecting ASP Effectiveness (ASP 효과에 영향을 미치는 요인)

  • Moon Yong-Eun
    • The Journal of Information Systems
    • /
    • v.15 no.2
    • /
    • pp.227-245
    • /
    • 2006
  • Several studies have investigated the success of ASP(Application Service Provider) from various perspectives. This study, thus, investigated factors affecting ASP effectiveness in various literature relevant ASP and outsourcing. By applying the basic ideas of the IS success model, this study proposes a research model of the factors affecting the success of ASP, in term of internal factors(Top Management Involvement, User Participation, IS Maturity) and external factors(Transaction Reliability, Service Reliability, System Trust Security). The proposed model is expected to help both researchers and practitioners extend their understanding of the success factors of the ASP effectiveness.

  • PDF

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

Effects of Perceived Autonomy Support on Intrinsic Motivation and Passion for Major students of Security Martial Arts (경호무도 전공자의 지각된 자율성지지가 내재적 동기 및 열정에 미치는 영향)

  • Yang, Jin-Young;Lim, Tae-Hee;Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.87-112
    • /
    • 2016
  • The purpose of this study was to investigate the influence of perceived autonomy support on intrinsic motivation and passion for major students of security martial arts. The subjects were selected 317 people to security martial arts majors universities in the metropolitan area extraction using a convenience sample. AS autonomy support, intrinsic motivation, and passion by research tools construct validity were utilized for statistical verification. Data were analyzed through descriptive statistics, frequency analysis, exploratory factors analysis, reliability analysis, correlation analysis using the SPSS 21.0 and confirmatory factors analysis and structural equation modeling(SEM) using AMOS 21.0. The results of this study were as follows. First, autonomy support of major students for security martial arts had a positive impact on intrinsic motivation. Second, autonomy support of major students for security martial arts had a positive impact on harmonious passion. Third, autonomy support of major students for security martial arts had a impact on obsessive passion. Forth, intrinsic motivation of major students for security martial arts had a positive impact on harmonious passion. Fifth, intrinsic motivation of major students for security martial arts had a negative impact on obsessive passion. The results of structural equation modeling showed that intrinsic motivation partially mediated the relationship between autonomy support and harmonious passion. And the relationships between autonomy support and obsessive passion were completely mediated by the intrinsic motivation.

  • PDF