Summary: | 碩士 === 國立臺北大學 === 公共行政暨政策學系碩士在職專班 === 94 === To ensure an immaculate IT security, besides the hardware of IT configuration has to be technically reinforced, the government employees shall be trained and managed to intensively cognize the personal IT security in an effort to effectively strengthen the integrated IT security in the government organization. To look over back all local and foreign papers pertaining to IT security management, most of them placed the critical concern to the organizational field, including IT managerial system, policy, cultivation of the IT culture, risk management, control methods and inner audition, never touching the subject of personal cognition and behavior toward the IT security. As Mr. Wangler points out that the exploration of a personal cognized connotation will likely render an accurate prediction of latent intention or the behavior tendency deep in the psychological section (referred to Lee Chang Kuei, 1998:71) Basing on the planned behavior theory, this study is to explore the factors which will affect the personal cognition significantly toward IT security. This paper has collated the IT security management standards governing the IT cognition which have been long practiced in a variety of countries along with a great number of local expert comments and researcher’s practical experience which have therefore been transferred as the norm in conducting the IT security. This paper takes the government employees as the main study body and a questionnaire survey was carried out to find out the relationship between personal cognition and behavior of each government employee has ever faced and concluded the variation of [what shall] and [what shall not] each government employee has ever conducted.
This study concludes 7 solid cognition factors the government employee has ever practiced toward the IT security, namely object cognition, loss acceptance, positive faith, negative faith, standard faith, willingness, and self-efficacy, in which the personal willingness and initial are most important factors, the next crucial factors are positive cognition, the superior’s emphasis on the IT security and the personal executive capability to handle the IT security. In the IT security practice, the distance between the [what shall] and the [what shall not] is very short.
|