A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security
碩士 === 國防大學管理學院 === 資訊管理學系 === 99 === We analyze the causal relationships between a person’s awareness of information security and his/her final behaviors that may or may not violate the regulations about information security. This study is mainly based on two theories―one is of Reasoned Action and...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09432646177346480981 |
id |
ndltd-TW-099NDMC1654040 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NDMC16540402015-10-13T19:06:37Z http://ndltd.ncl.edu.tw/handle/09432646177346480981 A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security 國軍人員資訊安全認知與行為之研究 Kao Tai Hsing 高台興 碩士 國防大學管理學院 資訊管理學系 99 We analyze the causal relationships between a person’s awareness of information security and his/her final behaviors that may or may not violate the regulations about information security. This study is mainly based on two theories―one is of Reasoned Action and the other is of Planed Bebavior. We first design and pilot run a questionare whose questions measure the concepts and constructs related to two theories and conduct a survey on sampled military staff and then use SPSS and AMOS softwares to do Factor Analysis and Structural Equation Modeling to understand the influences of users’ information security awareness upon users’ behaviors related to information security. To deal with the differences between the awareness and the final behaviors, we can make practical suggestions upon the policies of information security. This study shows that the military staff’s behaviors about information security are closely related with their behavior intention which is influenced by their personal cognition and outside environments. By means of Structural Equation Modeling, we find that the most important factor that influces military staff’s behavior is whether they hold positive attitude about information security and that Subjective norm alone can directly influence the behaviors of information security. The reason for subjective norm’s significant influence is due to the severe punishments by the superintendent authorities if staffs violated the regulations of information security. The influence degree of behavior intenstion will decrease along with the imperative and restricted subjected norm. Yen Lin Yin 尹延齡 2010 學位論文 ; thesis 145 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學管理學院 === 資訊管理學系 === 99 === We analyze the causal relationships between a person’s awareness of information security and his/her final behaviors that may or may not violate the regulations about information security. This study is mainly based on two theories―one is of Reasoned Action and the other is of Planed Bebavior. We first design and pilot run a questionare whose questions measure the concepts and constructs related to two theories and conduct a survey on sampled military staff and then use SPSS and AMOS softwares to do Factor Analysis and Structural Equation Modeling to understand the influences of users’ information security awareness upon users’ behaviors related to information security. To deal with the differences between the awareness and the final behaviors, we can make practical suggestions upon the policies of information security.
This study shows that the military staff’s behaviors about information security are closely related with their behavior intention which is influenced by their personal cognition and outside environments. By means of Structural Equation Modeling, we find that the most important factor that influces military staff’s behavior is whether they hold positive attitude about information security and that Subjective norm alone can directly influence the behaviors of information security. The reason for subjective norm’s significant influence is due to the severe punishments by the superintendent authorities if staffs violated the regulations of information security. The influence degree of behavior intenstion will decrease along with the imperative and restricted subjected norm.
|
author2 |
Yen Lin Yin |
author_facet |
Yen Lin Yin Kao Tai Hsing 高台興 |
author |
Kao Tai Hsing 高台興 |
spellingShingle |
Kao Tai Hsing 高台興 A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security |
author_sort |
Kao Tai Hsing |
title |
A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security |
title_short |
A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security |
title_full |
A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security |
title_fullStr |
A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security |
title_full_unstemmed |
A Study on the Military Staff’s Cognitions and Behaviors Toward Information Security |
title_sort |
study on the military staff’s cognitions and behaviors toward information security |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/09432646177346480981 |
work_keys_str_mv |
AT kaotaihsing astudyonthemilitarystaffscognitionsandbehaviorstowardinformationsecurity AT gāotáixìng astudyonthemilitarystaffscognitionsandbehaviorstowardinformationsecurity AT kaotaihsing guójūnrényuánzīxùnānquánrènzhīyǔxíngwèizhīyánjiū AT gāotáixìng guójūnrényuánzīxùnānquánrènzhīyǔxíngwèizhīyánjiū AT kaotaihsing studyonthemilitarystaffscognitionsandbehaviorstowardinformationsecurity AT gāotáixìng studyonthemilitarystaffscognitionsandbehaviorstowardinformationsecurity |
_version_ |
1718040579746562048 |