首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
As internet technology and mobile applications increase in volume and complexity, malicious cyber-attacks are evolving, and as a result society is facing greater security risks in cyberspace more than ever before. This study has extended the published literature on cybersecurity by theoretically defining the conceptual domains of employees’ security behavior, and developed and tested operational measures to advance information security behavior research in the workplace. A conceptual framework is proposed and tested using survey results from 579 business managers and professionals. Structural equation modeling and ANOVA procedures are employed to test the proposed hypotheses. The results show that when employees are aware of their company’s information security policy and procedures, they are more competent to manage cybersecurity tasks than those who are not aware of their companies’ cybersecurity policies. The study also indicates that an organizational information security environment positively influences employees’ threat appraisal and coping appraisal abilities, which in turn, positively contribute to their cybersecurity compliance behavior.  相似文献   

2.
Employees’ non-compliance with organizational information security policy (ISP) when using informational resources has become the main reason for continuous security incidents. Drawing upon technology threat avoidance theory (TTAT) and social exchange theory (SET), our study investigates the influence of supervisor-subordinate guanxi (SSG) and organizational commitment in the information security management. Our hypotheses were tested using survey data from 235 Chinese government employees. Results not only confirm the direct effect of SSG on government employees’ ISP compliance but also suggest that SSG indirectly influences compliance behavior via the mediation of organizational commitment. Organizational commitment weakens the negative influence of perceived costs on compliance behavior and also weakens the positive effect of self-efficacy on employees’ ISP compliance. For low-commitment employees, the negative influence of perceived costs on compliance behavior is more significant than that of those with strong organizational commitment, and self-efficacy exerts a stronger effect on ISP compliance for low-commitment employees than it does for high-commitment employees. This study contributes to current literature on information systems (IS) by confirming the critical roles of SSG and organizational commitment in motivating employees’ compliance behavior.  相似文献   

3.
吴文聪 《情报杂志》2021,40(3):98-103
[目的/意义]自脱欧以来,英国面临着来自国际和国内的网络安全挑战,故此其构建了新的网络安全机制,即政府主导模式,对该模式的探究有助于进一步理解相关议题。[方法/过程]从政府主导模式的要素谈起,主要包括三方面:领先全球、国家网络安全中心和主动网络防御体系。[结果/结论]通过研究发现,该模式取得的成就主要包括各方资源有效整合、政府网络安全提升、应对网络事件能力加强和打击网络犯罪效率提高等;而缺陷与不足包括政府并未有效应对企业网络安全,绩效评估框架和监督机制缺乏等。因此,英国未来网络安全机制的发展需要继续发扬政府主导模式的优点,同时进一步完善其不足之处。  相似文献   

4.
Enterprise social media (ESM) is an emerging platform based on Web 2.0 that allows employees to communicate and collaborate. Despite its numerous opportunities and benefits, there is a growing awareness of the “dark side” of the improper use of ESM in organizations. However, the findings in this aspect remain fragmented in prior literature. Our study attempts to address this research gap by capturing the dark side of ESM’s misuse from a conflict-based perspective through a comprehensive literature review of existing literature. We systematically classify different conflicts in ESM’s use, their antecedents, and subsequent negative outcomes and propose specific measures to mitigate them. On these grounds, we develop a holistic conceptual framework to clarify the relationship between these research constructs. Our research indicates that the conflicts in ESM’s use are primarily caused by inappropriate use behavior, prompted by technical characteristics. In addition, we synthesize the negative outcomes of the conflicts with a focus on the individual level from both psychological and behavioral perspectives. Our paper identifies possible opportunities for future research and provides a useful basis to further investigate the dark side of ESM’s misuse. Employees and organizations can also use our conceptual framework to better understand the causes and consequences of conflicts in the use of ESM and develop corresponding measures to mitigate them.  相似文献   

5.
Public administrators, entrusted to develop public policy to manage the growing complexities of the IoT, face significant challenges. The challenges exist because of three reasons; First, there is a lack of policy direction. Second, user values related to cybersecurity are not well understood. Third, there is a lack of clarity as to how IoT public policy should be developed. In this paper we argue that new IoT policy should be guided by key stakeholder values (i.e. what users think to be important). We utilize the Public Value Forum to elicit public values to inform decision-making surrounding IoT policy by public administrators, conceptually informed by Rational choice theory. We use a five-phase process to introduce the decision context (i.e. the policy problem), define fundamental objectives, rank these objectives, identify value-based trade-offs between them and construct a multi-attribute utility model. The findings indicate several key themes for IoT security from the citizens themselves and decision-making administrators in diverse public agencies developing IoT cybersecurity public policy.  相似文献   

6.
This paper examines how personal investment influence the use of multi-factor authentication (MFA) for securing online accounts. We draw from the Protection Motivation Theory (PMT) that accounts for intrapersonal factors that increase one’s understanding of their threat and coping mechanisms and, subsequently, their motivation to protect such investments. We integrate size of investment – the amount of time, effort, and other personal resources that an individual has put into their online account. Based on PMT’s framework, we develop a research model that examines the influence of investment size as an information source that initiates and builds threat and coping appraisals. The model is tested with a survey of 263 responses, and the result shows that investment size influences threat and coping appraisals, which in turn increases MFA protection motivation and use. These results highlight the importance of eliciting individuals’ personal investments in order to improve their protective security behaviors.  相似文献   

7.
户外运动参与者安全防范意识调查分析——以泉州为例   总被引:1,自引:0,他引:1  
吴耿安 《未来与发展》2010,(9):40-42,53
文章采用问卷调查法了解户外运动的隐患成因和户外运动爱好者的安全意识、知识与技能状态等进行调查,并通过简易统计对问项进行分析。研究发现户外运动参与者的安全防范意识较高,但如何从意识层次上升到行为层次是真正提高户外运动的安全性的关键。  相似文献   

8.
This study theorizes two information systems (IS) use behaviors associated with individuals’ behavioral intention of mobile health (mHealth) services. Emergency use refers to individuals’ use of IS in emergency situations. Routine use refers to individuals’ use of IS on a basis. We adopt motivation theory as our overarching theoretical lens through which we investigate the influence of individuals’ different motivation incentives on their emergency and routine use intentions of mHealth services. We also investigate the influences of technological and psychological antecedents on extrinsic and intrinsic motivations. Based on data collected from 241 participants, we find that perceived usefulness enhances people’s emergency and routine use intentions of mHealth services and that perceived enjoyment positively influences routine use intention. In addition, we find that perceived source credibility, perceived service availability, and perceived diagnosticity influence perceived usefulness (extrinsic motivation), whereas perceived autonomy, perceived competence, perceived relatedness, and curiosity affect perceived enjoyment (intrinsic motivation). This research offers insights for IS literature regarding mHealth emergency and routine use behaviors.  相似文献   

9.
The frequent occurrence of security incidents in ride-sharing is a challenge for the survival of IT-enabled ride-sharing platforms. Passengers’ protective behavior is an effective means to alleviate this issue, with benefits to both the passengers and the platforms. This study explores the mechanisms of passengers’ protective behavior in the ride-sharing context by combining protection motivation theory (PMT) and usage situation theory. We test our hypotheses using data (n = 346) collected from a field survey based on a real scenario. The findings reveal that PMT and usage situation theory work well to explain passengers’ protective behavior during ride-sharing. This study explains the motivation behind passengers’ protective behavior in the ride-sharing context, extends the contents of PMT by exploring its antecedents, and extends the contents of usage situation theory by introducing a new dimension. Our findings can help ride-sharing platforms take appropriate strategies to improve passengers’ protective behavior.  相似文献   

10.
姜欣 《软科学》2012,26(5):41-44
在费尔德斯坦模型的基础上,利用生命周期效用最大化理论,从个人效用最大化和全社会效用最大化这两个角度出发,建立符合我国国情的最优社会保障支出模型。根据模型求解出最优的社会保障支出水平的公式,以我国1990~2009年的数据为样本,对其进行测算和分析,得出我国最优的社会保障支出水平为29.84%,我国现行的社会保障支出水平处在较低水平的结论。  相似文献   

11.
The purpose of this research is to consider how trust in and perceived risk of a mobile marketplace impact a consumer before installing a mobile application. In particular, trust is considered from the perspective of institutionalized trust, where consumers faced with ignorance rely on institutionalized mechanisms for personal safety. A bidirectional research model is presented based on trust and perceived risk as antecedents to the intent to install a mobile application. Data is collected from a survey of 214 participants and is analyzed using structural equation modeling. Results suggest that institutional loyalty plays a significant role in consumers’ intent to install mobile apps. Trust and its antecedent, security, had strong significant positive relationships with the intention to install mobile apps, while risk and its antecedent, privacy, had weak and insignificant relationships. The bidirectional model’s relationship between trust and risk was also insignificant in both directions, further suggesting that perception of risk is an insignificant factor in the intent to install mobile apps.  相似文献   

12.
During a crisis such as COVID-19, governments ask citizens to adopt various precautionary behaviours, such as using a voluntary proximity tracing application (PTA) for smartphones. However, the willingness of individual citizens to use such an app is crucial. Crisis decision theory can be used to better understand how individuals assess the severity of the crisis and how they decide whether or not to adopt the precautionary behaviour. We propose a research model to examine the direct influence of perceived crisis severity on intention to use the technology, as well as the indirect impact via PTAs’ benefits for citizens. Exploratory and confirmatory factor analyses confirm the two dimensions of the benefits, namely personal and societal benefits. We used PLS-MGA to evaluate our research model. The results confirm the influence of the perceived severity of COVID-19 on the intention to use the PTA, as well as the mediating effects of personal and societal benefits on this relationship. Our findings contribute to the technology adoption literature and showcase the use of crisis decision theory in the field of information systems.  相似文献   

13.
The purpose of this study is to investigate the behavioral intention to adopt internet banking (IB) by individuals under the influence of user espoused cultural values in Fiji. A conceptual framework is developed by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) model, incorporating customer satisfaction and perceived risk constructs and cultural moderators of individualism and uncertainty avoidance. This research adopts a quantitative approach and collects data from 530 respondents. The proposed model is tested using structural equation modelling. The empirical results obtained suggest that IB adoption is positively influenced by the levels of performance expectancy, effort expectancy, social influence and facilitating conditions while perceived risk negatively influences IB usage intention. IB intention was found to positively impact usage behavior which ultimately impacts customer satisfaction. This study also reveals that uncertainty avoidance dampens the influence of performance expectancy and facilitating conditions on IB adoption intention. The study highlights the importance of individual’s cultural values in promoting IB adoption. It contributes to the literature by extending and testing a comprehensive research model to better understand IB behavior.  相似文献   

14.
Although smart service systems have received increasing attention in information systems research, their affordances and constraints processes are less studied. In this study, we draw on interpretive case study methodology and technology affordances and constraints theory to investigate a smart service system use for seaport security in Ghana. With insights from the case of Ghana, we introduce an affordance constraints process as a framework to complement the existing affordance actualisation process framework in information systems. Thus, this study contributes to affordance theory with a new constraints process. The study’s findings show that smart service systems for seaport security afford autonomous access control, real-time security monitoring, and autonomous data capturing for analytics and reporting. However, such affordances can be constrained by power and internet outages, limited storage capacity, and device breakdowns. From these findings, we discuss implications for theory, research, and practice as well as limitations and directions for future research.  相似文献   

15.
The purpose of this research is to explore the factors that influence a consumer before installing a mobile application. A research model is created based on perceived risk, trust, perceived benefit, and intent to install. Seven antecedents of trust and risk include perceived security, perceived reputation, application characteristics, familiarity, desensitization, consumer disposition to trust, and consumer disposition to risk. Partial least squares (PLS) is used to test the research model. Only significant antecedents are retained and a new research model is created, which includes the antecedents of perceived security and familiarity. Results show that consumers that perceive more security have greater trust and reduced perceived risk. Furthermore, consumers that feel more familiar with finding, purchasing, downloading, and installing applications have greater trust and reduced perceived risk. More than half (R2=.505) of the variability in the intention to install an app is explained.  相似文献   

16.
为确定在使用信息系统进行操作决策的过程中,用户对何种目标框架的安全提示更为遵从,在对安全提示情境进行界定和分类的基础上,以系统用户为对象,设计E-prime情境实验并运用后测问卷分析方法,采用“接收刺激—大脑反应—动作响应”(S—O—R)模式分析用户从接受刺激到作出反应的全过程,研究不同目标框架下用户遵从意愿的差异性。研究发现:较之于负性目标框架,正性目标框架的安全提示更能增强用户的遵从意愿,且不同性别用户在正性目标框架下的遵从意愿程度不同;而在不同学历水平的个体差异下,框架效应的作用无差异。基于此,提出根据用户的性别差异设计不同信息描述的安全提示,同时保证内容表述的可理解性和可遵从性等对策建议,以促进信息系统安全提示完善、增强用户的遵从意愿。  相似文献   

17.
This paper presents a research model aimed to investigate the impact of organizational climate, motivational drivers, and empowering leadership on behavioral intention formation in knowledge sharing. A research model has been developed by integrating several knowledge management studies having in-focus behavioral intention formation in knowledge sharing. The hypotheses are tested on data collected from 873 employees from public and private sector organizations from Serbia’s province of Vojvodina, using partial least square structural modeling technique and SmartPLS software. Findings suggest that organizational climate with prominent dimensions of fairness, innovativeness and affiliation, empowering leadership, sense of self-worth, and altruism significantly influence individuals’ knowledge-sharing attitude, intention, and behavior thus confirming the theory of reasoned action. Results obtained in this research expand and deepen findings reported in previous studies and enable a comprehensive framework for understanding the influence of some organizational variables on employees’ tendencies to be engaged in knowledge sharing.  相似文献   

18.
      科技安全是新时代科技工作的重大任务之一。现有研究数量较少,又缺乏国外经验借鉴,使得维护国家科技安全成为一个“无人区”,跨过“无人区”需要方向指引。本文研读了与科技安全相关的所有文献,分析了研究的总体情况,归纳整理了研究的具体成果,结合其他信息,对研究及实践的现状及存在的问题进行了总结,展望了中国科技安全研究及实践需解决的关键问题。本研究呈现的中国科技安全研究及实践图景,可为认识中国科技安全研究的历史、研究及实践的现状和未来方向设置提供参考。  相似文献   

19.
Information resources are becoming increasingly important to individuals and organizations, and ensuring their security is a major concern. While research in information security has adopted primarily a quantitative method to determine how and how much to invest in security, most decision makers rely on non-quantitative methods for this purpose, thereby introducing a considerable amount of as yet unexplained subjective judgment to the problem. We use a behavioral decision making approach to investigate factors causing possible inefficiencies of security spending decisions. Decision makers in our experiment performed a series of economic games featuring the key characteristics of a typical security problem. We found several biases in investment decisions. For budgeting their investment between major classes of security measures, decision makers demonstrated a strong bias toward investing in preventive measures rather than in detection and response measures, even though the task was designed to yield the same return on investment for both classes of measures. We term this phenomenon the “Prevention Bias.” Decision makers also reacted to security threats when the risk was so small that no investment was economically justified. For higher levels of risk that warranted some security investment, decision makers showed a strong tendency to overinvest. Theoretical and practical implications of the findings are discussed.  相似文献   

20.
本文将同侪影响引入在线创新社区的用户行为研究中,从广度和深度两方面考察同侪影响对用户贡献行为的影响,并分析感知收益的中介作用。研究以小米社区MIUI功能与讨论区的创意集市板块为对象构建S-O-R模型,采用6567名用户发布的8830条创意、5.26万条评论和收到的103.36万条评论数据,利用Mplus8.1分析检验,结果发现:同侪影响广度与深度均有利于促进用户贡献行为,综合收益在同侪影响广度、深度与用户贡献行为间起正向中介效应,情感收益仅在同侪影响广度、深度与主动贡献行为间起正向中介效应,而认知收益则在同侪影响深度与反应贡献行为间起负向中介效应。研究拓展了在线网络情境下知识管理与社会学领域的交叉研究,并为在线创新社区社交网络和知识管理提供重要启示。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号