A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security

碩士 === 國防大學管理學院 === 資訊管理學系 === 99 === We analyze the causal relationships between a person’s awareness of information security and his/her final behaviors that may or may not violate the regulations about information security. This study is mainly based on two theories―one is of Reasoned Action and...

Full description

Bibliographic Details
Main Authors: Kao Tai Hsing, 高台興
Other Authors: Yen Lin Yin
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/09432646177346480981
Description
Summary:碩士 === 國防大學管理學院 === 資訊管理學系 === 99 === We analyze the causal relationships between a person’s awareness of information security and his/her final behaviors that may or may not violate the regulations about information security. This study is mainly based on two theories―one is of Reasoned Action and the other is of Planed Bebavior. We first design and pilot run a questionare whose questions measure the concepts and constructs related to two theories and conduct a survey on sampled military staff and then use SPSS and AMOS softwares to do Factor Analysis and Structural Equation Modeling to understand the influences of users’ information security awareness upon users’ behaviors related to information security. To deal with the differences between the awareness and the final behaviors, we can make practical suggestions upon the policies of information security. This study shows that the military staff’s behaviors about information security are closely related with their behavior intention which is influenced by their personal cognition and outside environments. By means of Structural Equation Modeling, we find that the most important factor that influces military staff’s behavior is whether they hold positive attitude about information security and that Subjective norm alone can directly influence the behaviors of information security. The reason for subjective norm’s significant influence is due to the severe punishments by the superintendent authorities if staffs violated the regulations of information security. The influence degree of behavior intenstion will decrease along with the imperative and restricted subjected norm.