A Study of the Development of Information Security Awareness Scale

碩士 === 淡江大學 === 資訊管理學系碩士班 === 94 === Today enterprises and organizations in the world depend on Information Technology more and more, which arouses managers thinking highly of the issues on Information Security. Presently, more and more enterprises and organizations start to bring in some standards...

Full description

Bibliographic Details
Main Authors: Ming-Yu Tsao, 曹明玉
Other Authors: Ruey-Shiang Shaw
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/55937449924997239593
id ndltd-TW-094TKU05396019
record_format oai_dc
spelling ndltd-TW-094TKU053960192016-06-01T04:14:22Z http://ndltd.ncl.edu.tw/handle/55937449924997239593 A Study of the Development of Information Security Awareness Scale 資訊安全認知評量表之研究 Ming-Yu Tsao 曹明玉 碩士 淡江大學 資訊管理學系碩士班 94 Today enterprises and organizations in the world depend on Information Technology more and more, which arouses managers thinking highly of the issues on Information Security. Presently, more and more enterprises and organizations start to bring in some standards or systems of Information Security. No matter of BS7799, COBIT and so on, are based on “organization” to examine the Confidentiality, Integrity, and Availability of Information Security. However, many Information Security incidents still emerge in an endless stream, most of which result from the internal staffs’ intentional or unintentional actions. References for Information Security nowadays are deficient of the notion taking “people” as a threshold into consideration, and few are researching the level of Information Security Awareness of the personnel in the enterprise the scale and improve it. Regarding twenty-six concepts of “ABC’s of Information Technology Security” of NIST Special Publication 800-16 as the basis of the development of Information Security Awareness Scale, it measures them whether people have the knowledge of basic significance of the concepts of Information Security, and meanwhile verifies the applicability of this scale. After a series of steps in designing the scale such as questionnaires design, Delphi Method development, first-edition of the scale establishment, and domestic experts survey and interview, we, together with four different units, proceed to analyze and probe, verifying the scale’s availability from the testes’ reaction to understand his or her discrepancy on Information Security knowledge. After verify, this research reveals as follows. (1) Were the staff taking training on Information Security related, his or her Information Security knowledge level would have difference to some extent, and different trainings would have different influence on the staff. Therefore, the high-ranking managers must take his or her subordinates’ knowledge level on this aspect seriously. (2) Mark off the level to three diverse ranks, low, middle, and high. The organization could be aimed at the middle-below grades to go forward another phase of advocacy and reinforcement, or being as the training materials. (3) Analyze the degree of difficulty of the scale. Were we in the future testing based on this scale, we could also choose different level questionnaire to make tests. And most of the supplementary questions on individual interview with experts are in the middle level which conforms to the availability. Since being lack of references in this aspect, the scale is used to measure staffs in the department the level of Information Security Awareness and supports the basis to do Information Security Training in the future. And it is able to verify people the degree of effects after they have taken some training of Information Security. Ruey-Shiang Shaw 蕭瑞祥 2006 學位論文 ; thesis 122 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 淡江大學 === 資訊管理學系碩士班 === 94 === Today enterprises and organizations in the world depend on Information Technology more and more, which arouses managers thinking highly of the issues on Information Security. Presently, more and more enterprises and organizations start to bring in some standards or systems of Information Security. No matter of BS7799, COBIT and so on, are based on “organization” to examine the Confidentiality, Integrity, and Availability of Information Security. However, many Information Security incidents still emerge in an endless stream, most of which result from the internal staffs’ intentional or unintentional actions. References for Information Security nowadays are deficient of the notion taking “people” as a threshold into consideration, and few are researching the level of Information Security Awareness of the personnel in the enterprise the scale and improve it. Regarding twenty-six concepts of “ABC’s of Information Technology Security” of NIST Special Publication 800-16 as the basis of the development of Information Security Awareness Scale, it measures them whether people have the knowledge of basic significance of the concepts of Information Security, and meanwhile verifies the applicability of this scale. After a series of steps in designing the scale such as questionnaires design, Delphi Method development, first-edition of the scale establishment, and domestic experts survey and interview, we, together with four different units, proceed to analyze and probe, verifying the scale’s availability from the testes’ reaction to understand his or her discrepancy on Information Security knowledge. After verify, this research reveals as follows. (1) Were the staff taking training on Information Security related, his or her Information Security knowledge level would have difference to some extent, and different trainings would have different influence on the staff. Therefore, the high-ranking managers must take his or her subordinates’ knowledge level on this aspect seriously. (2) Mark off the level to three diverse ranks, low, middle, and high. The organization could be aimed at the middle-below grades to go forward another phase of advocacy and reinforcement, or being as the training materials. (3) Analyze the degree of difficulty of the scale. Were we in the future testing based on this scale, we could also choose different level questionnaire to make tests. And most of the supplementary questions on individual interview with experts are in the middle level which conforms to the availability. Since being lack of references in this aspect, the scale is used to measure staffs in the department the level of Information Security Awareness and supports the basis to do Information Security Training in the future. And it is able to verify people the degree of effects after they have taken some training of Information Security.
author2 Ruey-Shiang Shaw
author_facet Ruey-Shiang Shaw
Ming-Yu Tsao
曹明玉
author Ming-Yu Tsao
曹明玉
spellingShingle Ming-Yu Tsao
曹明玉
A Study of the Development of Information Security Awareness Scale
author_sort Ming-Yu Tsao
title A Study of the Development of Information Security Awareness Scale
title_short A Study of the Development of Information Security Awareness Scale
title_full A Study of the Development of Information Security Awareness Scale
title_fullStr A Study of the Development of Information Security Awareness Scale
title_full_unstemmed A Study of the Development of Information Security Awareness Scale
title_sort study of the development of information security awareness scale
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/55937449924997239593
work_keys_str_mv AT mingyutsao astudyofthedevelopmentofinformationsecurityawarenessscale
AT cáomíngyù astudyofthedevelopmentofinformationsecurityawarenessscale
AT mingyutsao zīxùnānquánrènzhīpíngliàngbiǎozhīyánjiū
AT cáomíngyù zīxùnānquánrènzhīpíngliàngbiǎozhīyánjiū
AT mingyutsao studyofthedevelopmentofinformationsecurityawarenessscale
AT cáomíngyù studyofthedevelopmentofinformationsecurityawarenessscale
_version_ 1718287544464965632