An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination
碩士 === 國立臺北商業技術學院 === 商學研究所 === 95 === Nowadays, enterprises used information technology frequently which increased organizations dependence on information technology, and made information technology more important. The information security events happened recently reminded people of the importance...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/01703606495826726615 |
id |
ndltd-TW-095NTB00318012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NTB003180122016-05-25T04:14:21Z http://ndltd.ncl.edu.tw/handle/01703606495826726615 An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination 資訊安全成熟度之校園實證研究–科技接受模式與組織協調觀點 Wei-tsung Liu 劉維宗 碩士 國立臺北商業技術學院 商學研究所 95 Nowadays, enterprises used information technology frequently which increased organizations dependence on information technology, and made information technology more important. The information security events happened recently reminded people of the importance of information security. Therefore, making information security maturity advanced, preventing information security events from being happened again, making quick responses and minimizing the loss were the most important things that organizations had to deal with. Most of previous studies of information security management focused on information security management and evaluation, but there were no methods for making information security maturity advanced and no analyses of factors that influenced on information security maturity. We had little information from previous studies if there would be conflict because of members of the organizations had different information security acceptance, and then, this conflict would influence on making, actualizing and preserving the information security policy. Meanwhile, we also have little information if information security policy would influence on coordination mechanism and information security maturity, and the conflicts among organization members would influence on the coordination mechanism, and then influenced on information security maturity. We focused on information security and used technology acceptance model to deduce the acceptance of information security. And we used the perspective of coordination mechanism to see how coordination influenced on information security maturity. We used Likert type six-point scale in this study and used a survey questionnaire by mail and e-mail to investigate information and non-information departments of colleges and universities in Taiwan. Among 138 contacts by mail, a total of 38 valid questionnaires were retrieved. Among 176 contacts by email, a total of 203 valid questionnaires were retrieved. We used Lisrel 8.54 to do path analysis, and found that both of information acceptance differences and conflicts among members would influence on the information security policy made by organization, meanwhile, they also influenced on the organization coordination systems. Information security maturity would be influenced by the organization coordination system and information security policy. Information security acceptance did not show a significant correlation with conflicts among the members. But according to the results of interviews, we found that information security acceptance also influenced on organization conflicts in user’s view. Furthermore, we provided some information security management related points in helping organization information security maturity advanced and also provided some references for further studies. Jenn Tang 唐震 2007 學位論文 ; thesis 88 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺北商業技術學院 === 商學研究所 === 95 === Nowadays, enterprises used information technology frequently which increased organizations dependence on information technology, and made information technology more important. The information security events happened recently reminded people of the importance of information security. Therefore, making information security maturity advanced, preventing information security events from being happened again, making quick responses and minimizing the loss were the most important things that organizations had to deal with. Most of previous studies of information security management focused on information security management and evaluation, but there were no methods for making information security maturity advanced and no analyses of factors that influenced on information security maturity. We had little information from previous studies if there would be conflict because of members of the organizations had different information security acceptance, and then, this conflict would influence on making, actualizing and preserving the information security policy. Meanwhile, we also have little information if information security policy would influence on coordination mechanism and information security maturity, and the conflicts among organization members would influence on the coordination mechanism, and then influenced on information security maturity. We focused on information security and used technology acceptance model to deduce the acceptance of information security. And we used the perspective of coordination mechanism to see how coordination influenced on information security maturity. We used Likert type six-point scale in this study and used a survey questionnaire by mail and e-mail to investigate information and non-information departments of colleges and universities in Taiwan. Among 138 contacts by mail, a total of 38 valid questionnaires were retrieved. Among 176 contacts by email, a total of 203 valid questionnaires were retrieved. We used Lisrel 8.54 to do path analysis, and found that both of information acceptance differences and conflicts among members would influence on the information security policy made by organization, meanwhile, they also influenced on the organization coordination systems. Information security maturity would be influenced by the organization coordination system and information security policy. Information security acceptance did not show a significant correlation with conflicts among the members. But according to the results of interviews, we found that information security acceptance also influenced on organization conflicts in user’s view. Furthermore, we provided some information security management related points in helping organization information security maturity advanced and also provided some references for further studies.
|
author2 |
Jenn Tang |
author_facet |
Jenn Tang Wei-tsung Liu 劉維宗 |
author |
Wei-tsung Liu 劉維宗 |
spellingShingle |
Wei-tsung Liu 劉維宗 An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination |
author_sort |
Wei-tsung Liu |
title |
An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination |
title_short |
An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination |
title_full |
An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination |
title_fullStr |
An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination |
title_full_unstemmed |
An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination |
title_sort |
emperical study in campus of information security maturity – the perspective of tam model and organizational coordination |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/01703606495826726615 |
work_keys_str_mv |
AT weitsungliu anempericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination AT liúwéizōng anempericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination AT weitsungliu zīxùnānquánchéngshúdùzhīxiàoyuánshízhèngyánjiūkējìjiēshòumóshìyǔzǔzhīxiédiàoguāndiǎn AT liúwéizōng zīxùnānquánchéngshúdùzhīxiàoyuánshízhèngyánjiūkējìjiēshòumóshìyǔzǔzhīxiédiàoguāndiǎn AT weitsungliu empericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination AT liúwéizōng empericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination |
_version_ |
1718281673663053824 |