본 연구는 조직 구성원들의 정보보안 중요성 인식에 영향을 미치는 요인을 탐색하고자 한다. 이를 위해 예방 동기 이론을 근간으로 인지된 처벌 확신성, 인지된 대응 비용, 묵인이 인지된 정...
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A108012363
임명성 (삼육대학교)
2022
Korean
예방 동기 이론 ; 정보보안 ; 묵인 ; 처벌 ; 대응 비용 ; 인지된 중요성 ; Protection Motivation Theory ; Information Security ; Acquiescence ; Punishment ; Response Cost ; Perceived Importance
KCI등재
학술저널
283-295(13쪽)
0
0
상세조회0
다운로드국문 초록 (Abstract)
본 연구는 조직 구성원들의 정보보안 중요성 인식에 영향을 미치는 요인을 탐색하고자 한다. 이를 위해 예방 동기 이론을 근간으로 인지된 처벌 확신성, 인지된 대응 비용, 묵인이 인지된 정...
본 연구는 조직 구성원들의 정보보안 중요성 인식에 영향을 미치는 요인을 탐색하고자 한다. 이를 위해 예방 동기 이론을 근간으로 인지된 처벌 확신성, 인지된 대응 비용, 묵인이 인지된 정보보안 중요성 인식에 미치는 영향을 살펴보았다. 분석 결과는 다음과 같다. 첫째, 인지된 처벌 확신성은 정보보안 중요성 인식에 유의한 영향을 미치는 것으로 나타났다. 또한, 인지된 처벌 확신성은 묵인에 부정적 영향을 미치는 것으로 나타났다. 둘째, 대응 비용은 정보보안 중요성 인식에 긍정적 영향을 미치는 것으로 나타났다. 또한, 대응 비용은 묵인에 긍정적 영향을 미치는 것으로 나타났다. 마지막으로 묵인은 정보보안 인식 중요성에 부정적 영향을 미치는 것으로 나타났다. 따라서, 구성원들의 정보보안 중요성 인식을 위해서 보안 위반 행위에 확실한 처벌이 뒤따를 수 있다는 것을 인식시킬 필요가 있다. 동시에, 조직은 구성원들이 보안 행동을 수행하는 데 있어서 장해가 되는 요소들을 제거하는 시도도 해야 한다. 마지막으로, 조직의 보안에 관한 열린 소통이 가능하도록 해야 한다.
다국어 초록 (Multilingual Abstract)
This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that ar...
This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that are based on the protectiom motivation theory. As a result, we found followings. First, The perceived punishment certainty has a significant effect on the perceived importance of information security. Also, it influences a negative effect on acquiescence. Second, the response cost has a negative effect on the perceived importance of information security. In addition, the response cost positively effects on acquiescence. Finally, acquiescence negatively influences on the perceived importance of information security. The results show that, in order to increase the perceived importance of information security among employees, it is necessary to make them aware that a security violation can result in certain punishment. At the same time, organizations should also attempt to remove major obstacles accompanying security behaviors of employees. Finally, organizations encourage open communication relating to information security among employees.
목차 (Table of Contents)
참고문헌 (Reference)
1 임명성, "유통과학분야에서 탐색적 연구를 위한 요인분석" 한국유통과학회 13 (13): 103-112, 2015
2 임명성, "보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로" 한국융합학회 9 (9): 69-81, 2018
3 Nik Thompson, "“Security begins at home”: Determinants of home computer and mobile device security behavior" Elsevier BV 70 : 376-391, 2017
4 Magdalena Cismaru, "“Act on Climate Change”: An Application of Protection Motivation Theory" SAGE Publications 17 (17): 62-84, 2011
5 Damien Arthur, "Who's afraid of that ad? Applying segmentation to the protection motivation model" Wiley 21 (21): 671-696, 2004
6 Joseph F. Hair, "When to use and how to report the results of PLS-SEM" Emerald 31 (31): 2-24, 2019
7 Scott R. Boss, "What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors" MIS Quarterly 39 (39): 837-864, 2015
8 René van Bavel, "Using protection motivation theory in the design of nudges to improve online security behavior" Elsevier BV 123 : 29-39, 2019
9 Hsin-yi Sandy Tsai, "Understanding online safety behaviors: A protection motivation theory perspective" Elsevier BV 59 : 138-150, 2016
10 Princely Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory" Elsevier BV 31 (31): 83-95, 2012
1 임명성, "유통과학분야에서 탐색적 연구를 위한 요인분석" 한국유통과학회 13 (13): 103-112, 2015
2 임명성, "보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로" 한국융합학회 9 (9): 69-81, 2018
3 Nik Thompson, "“Security begins at home”: Determinants of home computer and mobile device security behavior" Elsevier BV 70 : 376-391, 2017
4 Magdalena Cismaru, "“Act on Climate Change”: An Application of Protection Motivation Theory" SAGE Publications 17 (17): 62-84, 2011
5 Damien Arthur, "Who's afraid of that ad? Applying segmentation to the protection motivation model" Wiley 21 (21): 671-696, 2004
6 Joseph F. Hair, "When to use and how to report the results of PLS-SEM" Emerald 31 (31): 2-24, 2019
7 Scott R. Boss, "What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors" MIS Quarterly 39 (39): 837-864, 2015
8 René van Bavel, "Using protection motivation theory in the design of nudges to improve online security behavior" Elsevier BV 123 : 29-39, 2019
9 Hsin-yi Sandy Tsai, "Understanding online safety behaviors: A protection motivation theory perspective" Elsevier BV 59 : 138-150, 2016
10 Princely Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory" Elsevier BV 31 (31): 83-95, 2012
11 JUSTIN T. PICKETT, "TOWARD A BIFURCATED THEORY OF EMOTIONAL DETERRENCE" Wiley 56 (56): 27-58, 2017
12 R. W. Rogers, "Social Psychophysiology: A Sourcebook" Guilford 1983
13 K. Marett, "Social Networking Websites and Posting Personal Information : An Evaluation of Protection Motivation Theory" 3 (3): 170-188, 2011
14 Frank Pajares, "Self-Efficacy, Motivation Constructs, and Mathematics Performance of Entering Middle School Students" Elsevier BV 24 (24): 124-139, 1999
15 Michael Workman, "Security lapses and the omission of information security measures: A threat control model and empirical test" Elsevier BV 24 (24): 2799-2816, 2008
16 Sangmi Chai, "Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior" Informing Science Institute 2006
17 Jonathan Jackson, "Revisiting Risk Sensitivity in the Fear of Crime" SAGE Publications 48 (48): 513-537, 2011
18 Stephan B. Bruns, "Reporting errors and biases in published empirical findings: Evidence from innovation research" Elsevier BV 48 (48): 103796-, 2019
19 M.J. Bayarri, "Rejection odds and rejection ratios: A proposal for statistical practice in testing hypotheses" Elsevier BV 72 : 90-103, 2016
20 Kim Witte, "Putting the fear back into fear appeals: The extended parallel process model" Informa UK Limited 59 (59): 329-349, 1992
21 B. Nunnally, "Psychometric Theory" Oxford Univer Press 1994
22 James E Maddux, "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change" Elsevier BV 19 (19): 469-479, 1983
23 Tejaswini Herath, "Protection motivation and deterrence: a framework for security policy compliance in organisations" Informa UK Limited 18 (18): 106-125, 2009
24 R. B. Kline, "Principles and Practice of Structural Equation Modeling" Guilford Press 2005
25 SARAH MILNE, "Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory" Wiley 30 (30): 106-143, 2000
26 Sean Patrick Roche, "Perceived Control, Severity, Certainty, and Emotional Fear: Testing an Expanded Model of Deterrence" SAGE Publications 57 (57): 493-531, 2019
27 Daniel Russo, "PLS-SEM for Software Engineering Research" Association for Computing Machinery (ACM) 54 (54): 1-38, 2021
28 Matthew S. Thiese, "P value interpretations and considerations" AME Publishing Company 8 (8): E928-E931, 2016
29 Elena Paoletti, "Ozone exposure and stomatal sluggishness in different plant physiognomic classes" Elsevier BV 158 (158): 2664-2671, 2010
30 Anthony Vance, "Motivating IS security compliance: Insights from Habit and Protection Motivation Theory" Elsevier BV 49 (49): 190-198, 2012
31 George W. Burruss, "Modeling Individual Defiance of COVID-19 Pandemic Mitigation Strategies: Insights From the Expanded Model of Deterrence and Protection Motivation Theory" SAGE Publications 48 (48): 1317-1338, 2021
32 D. Dang-Pham, "Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal" 2015
33 Waldo Rocha Flores, "Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture" Elsevier BV 43 : 90-110, 2014
34 Jiyoung Kim, "Hope, fear, and consumer behavioral change amid COVID‐19: Application of protection motivation theory" Wiley 46 (46): 558-574, 2021
35 Sea-Jin Chang, "From the Editors: Common method variance in international business research" Springer Science and Business Media LLC 41 (41): 178-184, 2010
36 Mark Warr, "Fear of victimization and sensitivity to risk" Springer Science and Business Media LLC 3 (3): 29-46, 1987
37 Claes Fornell, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error" SAGE Publications 18 (18): 39-50, 1981
38 Tejaswini Herath, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness" Elsevier BV 47 (47): 154-165, 2009
39 Michael Knoll, "Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates" Springer Science and Business Media LLC 113 (113): 349-362, 2012
40 R. C. Hollinger, "Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft" 62 (62): 398-418, 1983
41 Ekin K. Pellegrini, "Construct Equivalence across Groups: An Unexplored Issue in Mentoring Research" SAGE Publications 65 (65): 323-335, 2005
42 Christie M. Fuller, "Common methods variance detection in business research" Elsevier BV 69 (69): 3192-3198, 2016
43 E Dincelli, "Can Privacy and Security be Friends? A Cultural Fraemwork to Differentiate Security and Privacy Behaviors on Online Social Networks" 4011-4020, 2017
44 T. Chenoweth, "Application of Protection Motivation Theory to Adoption of Protective Technologies" 1-10, 2009
45 Atreyi Kankanhalli, "An integrative study of information systems security effectiveness" Elsevier BV 23 (23): 139-154, 2003
46 Robert Crossler, "An Extended Perspective on Individual Security Behaviors" Association for Computing Machinery (ACM) 45 (45): 51-71, 2014
47 Vincent Cho, "A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy" Informa UK Limited 12 (12): 659-673, 2017
48 Ronald W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change1" Informa UK Limited 91 (91): 93-114, 1975
49 I. M. Y. Woon, "A Protection Motivation Theory Approach to Home Wireless Security" 367-380, 2005
50 Teodor Sommestad, "A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour" IGI Global 9 (9): 26-46, 2015
51 DONNA L. FLOYD, "A Meta-Analysis of Research on Protection Motivation Theory" Wiley 30 (30): 407-429, 2000
52 Dennis D. Boos, "P-Value Precision and Reproducibility" Informa UK Limited 65 (65): 213-221, 2011
산림교육전문가를 위한 심리학 기반 자연탐구역량 교육과정 개발
국내 간호학생 성격관련 연구 문헌고찰 : MBTI를 중심으로
졸업학년 간호대학생의 자기관리역량과 그릿이 취업준비행동에 미치는 융합연구
대학생의 양성평등의식이 결혼관 및 자녀관에 미치는 영향
학술지 이력
연월일 | 이력구분 | 이력상세 | 등재구분 |
---|---|---|---|
2025 | 평가예정 | 신규평가 신청대상 (신규평가) | |
2022-06-01 | 평가 | 등재학술지 취소 | |
2019-01-01 | 평가 | 등재학술지 유지 (계속평가) | |
2016-01-01 | 평가 | 등재학술지 선정 (계속평가) | |
2014-01-01 | 평가 | 등재후보학술지 선정 (신규평가) |
학술지 인용정보
기준연도 | WOS-KCI 통합IF(2년) | KCIF(2년) | KCIF(3년) |
---|---|---|---|
2016 | 5.85 | 5.85 | 0 |
KCIF(4년) | KCIF(5년) | 중심성지수(3년) | 즉시성지수 |
0 | 0 | 0 | 0.76 |