메뉴 건너뛰기
Library Notice
Institutional Access
If you certify, you can access the articles for free.
Check out your institutions.
ex)Hankuk University, Nuri Motors
Log in Register Help KOR
Subject

Influencing Factors for Compliance Intention of Information Security Policy
Recommendations
Search
Questions

정보보안 정책 준수 의도에 대한 영향요인

논문 기본 정보

Type
Academic journal
Author
Sang-Hoon Kim (광운대학교) Sun-Young Park (광운대학교)
Journal
Society for e-Business Studies The Journal of Society for e-Business Studies Vol.16 No.4 KCI Excellent Accredited Journal
Published
2011.11
Pages
33 - 51 (19page)

Usage

cover
📌
Topic
📖
Background
🔬
Method
🏆
Result
Influencing Factors for Compliance Intention of Information Security Policy
Ask AI
Recommendations
Search
Questions

Abstract· Keywords

Report Errors
This research derived the influencing factors for employees’ compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory.
To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted.
The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees? neutralization psychology to violate information security policy should be emphasized in the organizations.

Contents

초록
ABSTRACT
1. 서론
2. 정보보안 정책준수에 관한 이론적 고찰
3. 연구모형 및 가설
4. 변수의 조작적 정의 및 측정방법
5. 가설검증 및 결과분석
6. 결론
참고문헌
저자소개

References (39)

Add References

Related Authors

Frequently Viewed Together

Recently viewed articles

Comments(0)

0

Write first comments.

UCI(KEPA) : I410-ECN-0101-2013-566-001110714