The Research of How IT Professionals Disclose Confidential Information Through Sharing Knowledge on Social Media

碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 107 === In the prevalence of the new generation Internet, the use of social media has undergone tremendous changes, A large amount of information and sharing behaviors are circulating in the process of network environment. It is more convenient to obtain rich infor...

Full description

Bibliographic Details
Main Authors: CHEN, CHIEN-CHIH, 陳建智
Other Authors: WU, REI-YAO
Format: Others
Language:zh-TW
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/4ydvea
Description
Summary:碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 107 === In the prevalence of the new generation Internet, the use of social media has undergone tremendous changes, A large amount of information and sharing behaviors are circulating in the process of network environment. It is more convenient to obtain rich information, but it also implies the problem of important information leakage. Therefore, the situation that “Social media sharing knowledge causes leakage” has gradually attracted attention among business managers and IT staff. This research was done by collecting relevant literatures, integrated the willingness of IT personnel to share knowledges in the online community environment. This study used the compromise risk factor and the influence factors as the infrastructure base, then invites information security experts to exchange of experiences in an focus discussion to set the charting standard and then used the hierarchical analysis method to analyze the ratio of the key factors, thereby obtaining the findings as the risk of leakage in the online information sharing; A reference guidelines for risk prevention strategies and directions was created. From this research, we know that the most important factor in the security incidents that caused the leak is the "network usage behavior". It can be seen that the network usage behavior has a very important impact. It cases were caused mostly by IT users’ overconfident, careless use of unsafe softwares and hardware, or the reluctance to purchase related software and hardware protection equipment due to price concerns, are the main causes of information sharing and leaks.