RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재

      정보보안 중요성 인식에 관한 연구 : 예방동기이론 관점에서

      한글로보기

      https://www.riss.kr/link?id=A108012363

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      국문 초록 (Abstract)

      본 연구는 조직 구성원들의 정보보안 중요성 인식에 영향을 미치는 요인을 탐색하고자 한다. 이를 위해 예방 동기 이론을 근간으로 인지된 처벌 확신성, 인지된 대응 비용, 묵인이 인지된 정...

      본 연구는 조직 구성원들의 정보보안 중요성 인식에 영향을 미치는 요인을 탐색하고자 한다. 이를 위해 예방 동기 이론을 근간으로 인지된 처벌 확신성, 인지된 대응 비용, 묵인이 인지된 정보보안 중요성 인식에 미치는 영향을 살펴보았다. 분석 결과는 다음과 같다. 첫째, 인지된 처벌 확신성은 정보보안 중요성 인식에 유의한 영향을 미치는 것으로 나타났다. 또한, 인지된 처벌 확신성은 묵인에 부정적 영향을 미치는 것으로 나타났다. 둘째, 대응 비용은 정보보안 중요성 인식에 긍정적 영향을 미치는 것으로 나타났다. 또한, 대응 비용은 묵인에 긍정적 영향을 미치는 것으로 나타났다. 마지막으로 묵인은 정보보안 인식 중요성에 부정적 영향을 미치는 것으로 나타났다. 따라서, 구성원들의 정보보안 중요성 인식을 위해서 보안 위반 행위에 확실한 처벌이 뒤따를 수 있다는 것을 인식시킬 필요가 있다. 동시에, 조직은 구성원들이 보안 행동을 수행하는 데 있어서 장해가 되는 요소들을 제거하는 시도도 해야 한다. 마지막으로, 조직의 보안에 관한 열린 소통이 가능하도록 해야 한다.

      더보기

      다국어 초록 (Multilingual Abstract)

      This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that ar...

      This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that are based on the protectiom motivation theory. As a result, we found followings. First, The perceived punishment certainty has a significant effect on the perceived importance of information security. Also, it influences a negative effect on acquiescence. Second, the response cost has a negative effect on the perceived importance of information security. In addition, the response cost positively effects on acquiescence. Finally, acquiescence negatively influences on the perceived importance of information security. The results show that, in order to increase the perceived importance of information security among employees, it is necessary to make them aware that a security violation can result in certain punishment. At the same time, organizations should also attempt to remove major obstacles accompanying security behaviors of employees. Finally, organizations encourage open communication relating to information security among employees.

      더보기

      목차 (Table of Contents)

      • 요약
      • Abstract
      • 1. 서론
      • 2. 문헌연구
      • 2.1 예방 동기 이론
      • 요약
      • Abstract
      • 1. 서론
      • 2. 문헌연구
      • 2.1 예방 동기 이론
      • 2.2 정보보안 중요성 인식
      • 3. 가설설정 및 연구모형
      • 3.1 인지된 처벌 확신
      • 3.2 인지된 대응 비용
      • 3.3 묵인
      • 4. 분석
      • 4.1 자료 수집
      • 4.2 측정모형 검정
      • 4.3 구조모형 검정
      • 5. 결론 및 논의
      • REFERENCES
      더보기

      참고문헌 (Reference)

      1 임명성, "유통과학분야에서 탐색적 연구를 위한 요인분석" 한국유통과학회 13 (13): 103-112, 2015

      2 임명성, "보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로" 한국융합학회 9 (9): 69-81, 2018

      3 Nik Thompson, "“Security begins at home”: Determinants of home computer and mobile device security behavior" Elsevier BV 70 : 376-391, 2017

      4 Magdalena Cismaru, "“Act on Climate Change”: An Application of Protection Motivation Theory" SAGE Publications 17 (17): 62-84, 2011

      5 Damien Arthur, "Who's afraid of that ad? Applying segmentation to the protection motivation model" Wiley 21 (21): 671-696, 2004

      6 Joseph F. Hair, "When to use and how to report the results of PLS-SEM" Emerald 31 (31): 2-24, 2019

      7 Scott R. Boss, "What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors" MIS Quarterly 39 (39): 837-864, 2015

      8 René van Bavel, "Using protection motivation theory in the design of nudges to improve online security behavior" Elsevier BV 123 : 29-39, 2019

      9 Hsin-yi Sandy Tsai, "Understanding online safety behaviors: A protection motivation theory perspective" Elsevier BV 59 : 138-150, 2016

      10 Princely Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory" Elsevier BV 31 (31): 83-95, 2012

      1 임명성, "유통과학분야에서 탐색적 연구를 위한 요인분석" 한국유통과학회 13 (13): 103-112, 2015

      2 임명성, "보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로" 한국융합학회 9 (9): 69-81, 2018

      3 Nik Thompson, "“Security begins at home”: Determinants of home computer and mobile device security behavior" Elsevier BV 70 : 376-391, 2017

      4 Magdalena Cismaru, "“Act on Climate Change”: An Application of Protection Motivation Theory" SAGE Publications 17 (17): 62-84, 2011

      5 Damien Arthur, "Who's afraid of that ad? Applying segmentation to the protection motivation model" Wiley 21 (21): 671-696, 2004

      6 Joseph F. Hair, "When to use and how to report the results of PLS-SEM" Emerald 31 (31): 2-24, 2019

      7 Scott R. Boss, "What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors" MIS Quarterly 39 (39): 837-864, 2015

      8 René van Bavel, "Using protection motivation theory in the design of nudges to improve online security behavior" Elsevier BV 123 : 29-39, 2019

      9 Hsin-yi Sandy Tsai, "Understanding online safety behaviors: A protection motivation theory perspective" Elsevier BV 59 : 138-150, 2016

      10 Princely Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory" Elsevier BV 31 (31): 83-95, 2012

      11 JUSTIN T. PICKETT, "TOWARD A BIFURCATED THEORY OF EMOTIONAL DETERRENCE" Wiley 56 (56): 27-58, 2017

      12 R. W. Rogers, "Social Psychophysiology: A Sourcebook" Guilford 1983

      13 K. Marett, "Social Networking Websites and Posting Personal Information : An Evaluation of Protection Motivation Theory" 3 (3): 170-188, 2011

      14 Frank Pajares, "Self-Efficacy, Motivation Constructs, and Mathematics Performance of Entering Middle School Students" Elsevier BV 24 (24): 124-139, 1999

      15 Michael Workman, "Security lapses and the omission of information security measures: A threat control model and empirical test" Elsevier BV 24 (24): 2799-2816, 2008

      16 Sangmi Chai, "Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior" Informing Science Institute 2006

      17 Jonathan Jackson, "Revisiting Risk Sensitivity in the Fear of Crime" SAGE Publications 48 (48): 513-537, 2011

      18 Stephan B. Bruns, "Reporting errors and biases in published empirical findings: Evidence from innovation research" Elsevier BV 48 (48): 103796-, 2019

      19 M.J. Bayarri, "Rejection odds and rejection ratios: A proposal for statistical practice in testing hypotheses" Elsevier BV 72 : 90-103, 2016

      20 Kim Witte, "Putting the fear back into fear appeals: The extended parallel process model" Informa UK Limited 59 (59): 329-349, 1992

      21 B. Nunnally, "Psychometric Theory" Oxford Univer Press 1994

      22 James E Maddux, "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change" Elsevier BV 19 (19): 469-479, 1983

      23 Tejaswini Herath, "Protection motivation and deterrence: a framework for security policy compliance in organisations" Informa UK Limited 18 (18): 106-125, 2009

      24 R. B. Kline, "Principles and Practice of Structural Equation Modeling" Guilford Press 2005

      25 SARAH MILNE, "Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory" Wiley 30 (30): 106-143, 2000

      26 Sean Patrick Roche, "Perceived Control, Severity, Certainty, and Emotional Fear: Testing an Expanded Model of Deterrence" SAGE Publications 57 (57): 493-531, 2019

      27 Daniel Russo, "PLS-SEM for Software Engineering Research" Association for Computing Machinery (ACM) 54 (54): 1-38, 2021

      28 Matthew S. Thiese, "P value interpretations and considerations" AME Publishing Company 8 (8): E928-E931, 2016

      29 Elena Paoletti, "Ozone exposure and stomatal sluggishness in different plant physiognomic classes" Elsevier BV 158 (158): 2664-2671, 2010

      30 Anthony Vance, "Motivating IS security compliance: Insights from Habit and Protection Motivation Theory" Elsevier BV 49 (49): 190-198, 2012

      31 George W. Burruss, "Modeling Individual Defiance of COVID-19 Pandemic Mitigation Strategies: Insights From the Expanded Model of Deterrence and Protection Motivation Theory" SAGE Publications 48 (48): 1317-1338, 2021

      32 D. Dang-Pham, "Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal" 2015

      33 Waldo Rocha Flores, "Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture" Elsevier BV 43 : 90-110, 2014

      34 Jiyoung Kim, "Hope, fear, and consumer behavioral change amid COVID‐19: Application of protection motivation theory" Wiley 46 (46): 558-574, 2021

      35 Sea-Jin Chang, "From the Editors: Common method variance in international business research" Springer Science and Business Media LLC 41 (41): 178-184, 2010

      36 Mark Warr, "Fear of victimization and sensitivity to risk" Springer Science and Business Media LLC 3 (3): 29-46, 1987

      37 Claes Fornell, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error" SAGE Publications 18 (18): 39-50, 1981

      38 Tejaswini Herath, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness" Elsevier BV 47 (47): 154-165, 2009

      39 Michael Knoll, "Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates" Springer Science and Business Media LLC 113 (113): 349-362, 2012

      40 R. C. Hollinger, "Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft" 62 (62): 398-418, 1983

      41 Ekin K. Pellegrini, "Construct Equivalence across Groups: An Unexplored Issue in Mentoring Research" SAGE Publications 65 (65): 323-335, 2005

      42 Christie M. Fuller, "Common methods variance detection in business research" Elsevier BV 69 (69): 3192-3198, 2016

      43 E Dincelli, "Can Privacy and Security be Friends? A Cultural Fraemwork to Differentiate Security and Privacy Behaviors on Online Social Networks" 4011-4020, 2017

      44 T. Chenoweth, "Application of Protection Motivation Theory to Adoption of Protective Technologies" 1-10, 2009

      45 Atreyi Kankanhalli, "An integrative study of information systems security effectiveness" Elsevier BV 23 (23): 139-154, 2003

      46 Robert Crossler, "An Extended Perspective on Individual Security Behaviors" Association for Computing Machinery (ACM) 45 (45): 51-71, 2014

      47 Vincent Cho, "A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy" Informa UK Limited 12 (12): 659-673, 2017

      48 Ronald W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change1" Informa UK Limited 91 (91): 93-114, 1975

      49 I. M. Y. Woon, "A Protection Motivation Theory Approach to Home Wireless Security" 367-380, 2005

      50 Teodor Sommestad, "A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour" IGI Global 9 (9): 26-46, 2015

      51 DONNA L. FLOYD, "A Meta-Analysis of Research on Protection Motivation Theory" Wiley 30 (30): 407-429, 2000

      52 Dennis D. Boos, "P-Value Precision and Reproducibility" Informa UK Limited 65 (65): 213-221, 2011

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2025 평가예정 신규평가 신청대상 (신규평가)
      2022-06-01 평가 등재학술지 취소
      2019-01-01 평가 등재학술지 유지 (계속평가) KCI등재
      2016-01-01 평가 등재학술지 선정 (계속평가) KCI등재
      2014-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 5.85 5.85 0
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0 0 0 0.76
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼