• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.024 seconds

Determining Dimensions of Job Satisfaction among Employees: Evidence from Commercial Bank Industries in Bangladesh

  • Md. Sayed, UDDIN;Md. Atikur, RAHAMAN;Wasib Bin, LATIF
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.10 no.2
    • /
    • pp.195-201
    • /
    • 2023
  • Since the banking industry relies so heavily on strong customer-staff interactions, measuring employee job satisfaction has become a critical problem. To achieve benefits for both individuals and organizations, it is crucial to foster and ensure employee job satisfaction. The main objective of this study is to determine the influencing factors of employees' job satisfaction in commercial banks in Bangladesh. This study focused on some significant factors such as employee empowerment, job security, management support, and attractive compensation in an organization. In terms of research purpose, non-probability convenience sampling has been used, and the study is quantitative in nature. For data collection purposes, an online survey questionnaire was prepared based on previously published articles. The targeted population was the bank employees of commercial banks in Bangladesh where the final sample size was n = 200. For analyzing the collected data, SPSS 26.0 version has been used to test the study model and the proposed hypotheses. This study also shows that employee empowerment, job security, management support, and attractive compensation have positive and significant effects on employees' job satisfaction at the workplace. Finally, this study has offered some extraordinary directions and implications for future research on commercial bank authorities in Bangladesh.

A Study on Factors Influencing the Intention to Purchase Smart Home Products: Using Technological Trust as a Mediating Variable (스마트홈 제품 구매의도에 영향을 미치는 요인 분석 연구: 기술적 신뢰를 매개변수로)

  • Cho, Namjae;Li, HuiZi;Cheong, Eunjeong;Yu, Giseob
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.6
    • /
    • pp.23-43
    • /
    • 2021
  • This research is a study on smart homes products, which interest and research are being conducted, because of the recent development of the Internet of Things. Consumer's Purchase intention was set as a dependent variable, and technological trust was used as a mediating variable. We used Technology Acceptance Model as background theory. Perceived ease of use, Perceived usefulness, Security, and Brand were set as independent variables. The results of this study are as follows. First, it was found that perceived ease of use, perceived usefulness, and security significantly affected technological trust that consumers feel. Second, technological trust also had a significant effect on purchase intention, and it was found that perceived ease of use, perceived usefulness, and product security, excluding brands, had an indirect mediating effect on consumers' purchase intention through technological trust. This study is meaningful in that by conducting user-centered research, and results that are partially contrasted with existing studies are derived from increasing the interest of factors we used.

QRIS as a Drivers of Product Distribution Flows in Indonesia: Factors of Consumer Purchasing Behavior in the Use of Fintech Payments

  • Ariani BAKHITAH;Ricardo INDRA;Wandy HALIM;Vicky FERBIAN;Zinggara HIDAYAT
    • Journal of Distribution Science
    • /
    • v.21 no.12
    • /
    • pp.59-69
    • /
    • 2023
  • Purpose: Consumers can experience better service for distribution of products with payment technology such as QRIS (Quick Response Code Indonesian Standard) compared to conventional purchase methods. This research aims to determine the experience of QRIS service users in Indonesia. Perceived Usefulness, Ease of Use, and Perceived Security were independent factors. Behavioral Intention to Use is the dependent variable. Furthermore, Word of Mouth Attitude is an intervening variable. Research Design, Data, and Methodology: Involving active QRIS users in a survey-based quantitative study in Indonesia. A survey sample of 400 people was taken from data records of 30.87 million QRIS users in Indonesia. Data were analyzed using SEM-PLS. Results: Show that Perceived Usefulness and Perceived Ease of Use significantly impact Attitudes Word of Mouth, and Behavioral Intention to Use. This research also found that Behavioral Intention to Use does not significantly impact Perceived Security. Conclusion: QRIS, as a revolutionary innovation, offers faster payments than previous methods, with a payment time of no more than one minute. QRIS is seen as valuable, simple, and safe, disseminating information to the public and continuing to use QRIS. The implications of this research are very significant in accelerating the flow of distribution of goods and services and facilitating transactions.

Challenges in nuclear energy adoption: Why nuclear energy newcomer countries put nuclear power programs on hold?

  • Philseo Kim;Hanna Yasmine;Man-Sung Yim;Sunil S. Chirayath
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1234-1243
    • /
    • 2024
  • The pressing need to mitigate greenhouse gas emissions has stimulated a renewed interest in nuclear energy worldwide. However, while numerous countries have shown interest in nuclear power over the course of history, many of them have not continued their pursuit and chosen to defer or abandon their peaceful nuclear power projects. Scrapping a national nuclear power program after making initial efforts implies significant challenges in such a course or a waste of national resources. Therefore, this study aims to identify the crucial factors that influence a country's decision to terminate or hold off its peaceful nuclear power programs. Our empirical analyses demonstrate that major nuclear accidents and leadership changes are significant factors that lead countries to terminate or defer their nuclear power programs. Additionally, we highlight that domestic politics (democracy), lack of military alliance with major nuclear suppliers, low electricity demand, and national energy security environments (energy import, crude oil price) can hamper a country's possibility of regaining interest in a nuclear power program after it has been scrapped, suspended, or deferred. The findings of this study have significant implications for policymakers and stakeholders in the energy sector as they strive to balance the competing demands of energy security, and environmental sustainability.

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Factors Affecting Infant-Mother Attachment (영아-어머니간 상호작용 측면에서 애착에 영향을 미치는 요인 연구)

  • Kim, Seung Kyoung;Kang, Mun Hee
    • Korean Journal of Child Studies
    • /
    • v.20 no.2
    • /
    • pp.139-150
    • /
    • 1999
  • This study focused on the temperament of infants and on maternal sensitivity in the investigation of the factors which affect infant-mother attachment. The 67 infant-mother pairs were divided into two groups on the basis of attachment security scores. Results showed a relationship between infant-mother attachment and temperament. There was also a relationship between maternal sensitivity and infant temperament. Factors most strongly affecting infant-mother attachment were infant's sociability, mother's emotion, and mother's satisfaction with the degree of infant's sociability.

  • PDF

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

A Study on Mitigation of Information Security Related Work Stress (정보보안 관련 업무 스트레스 완화에 대한 연구)

  • Hwang, Inho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.9
    • /
    • pp.123-135
    • /
    • 2020
  • Recently organizations are implementing strict security policies and technologies to minimize security incidents. However, strict information security can cause work stress of employees and can make it difficult to achieve security goals. The purpose of this study is to present the preconditions for mitigating the negative impact of security-related work stress. We conducted a questionnaire survey of employees working in the financial industry and secured a total of 266 samples. The test of the research hypothesis was carried out by structural equation modeling. As a result, work stress had a negative effect on compliance intention, and value congruence reduced work stress. Also, security feedback had a moderating effect on the relationship between research factors. The results have theoretical and practical implications for mitigating work stress of employees.

Food Security in Households of People Living With Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome: A Cross-sectional Study in a Subdivision of Darjeeling District, West Bengal

  • Dasgupta, Pallabi;Bhattacherjee, Sharmistha;Das, Dilip Kumar
    • Journal of Preventive Medicine and Public Health
    • /
    • v.49 no.4
    • /
    • pp.240-248
    • /
    • 2016
  • Objectives: Human immunodeficiency virus (HIV)/acquired immunodeficiency syndrome (AIDS) adversely impacts food security in households of people living with HIV/AIDS (PLWHA). Little research has focused on food insecurity among PLWHA in India. The purpose of this study was to identify the prevalence of and factors relating to food security in households of PLWHA in the Siliguri subdivision of Darjeeling, West Bengal, India. Methods: A cross-sectional community-based study was carried out among 173 PLWHA residing in Siliguri and registered at the Anti-retroviral Therapy Centre of North Bengal Medical College & Hospital. Data was collected at the household level with interviews of PLWHA using a food security survey instrument. We analyzed the associations using logistic regression. Results: The prevalence of household food security among the participants was 50.9% (88/173). Five years or more of schooling, higher socioeconomic class and males were found to be significantly associated with a higher likelihood of food security. A later stage of the disease and the presence of other family members with HIV/AIDS were significantly associated with a lower likelihood of food security. The major coping strategies to deal with food insecurity in the acute phase HIV infection included borrowing money (56.1%), followed by spousal support, loans from microfinance institutions, banks, or money lenders, borrowing food, or selling agricultural products. Conclusions: The present study revealed that only about half of households with PLWHA were food secure. Prior interventions relating to periods of food and economic crisis as well as strategies for sustaining food security and economic status are needed in this area.