An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination

碩士 === 國立臺北商業技術學院 === 商學研究所 === 95 === Nowadays, enterprises used information technology frequently which increased organizations dependence on information technology, and made information technology more important. The information security events happened recently reminded people of the importance...

Full description

Bibliographic Details
Main Authors: Wei-tsung Liu, 劉維宗
Other Authors: Jenn Tang
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/01703606495826726615
id ndltd-TW-095NTB00318012
record_format oai_dc
spelling ndltd-TW-095NTB003180122016-05-25T04:14:21Z http://ndltd.ncl.edu.tw/handle/01703606495826726615 An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination 資訊安全成熟度之校園實證研究–科技接受模式與組織協調觀點 Wei-tsung Liu 劉維宗 碩士 國立臺北商業技術學院 商學研究所 95 Nowadays, enterprises used information technology frequently which increased organizations dependence on information technology, and made information technology more important. The information security events happened recently reminded people of the importance of information security. Therefore, making information security maturity advanced, preventing information security events from being happened again, making quick responses and minimizing the loss were the most important things that organizations had to deal with. Most of previous studies of information security management focused on information security management and evaluation, but there were no methods for making information security maturity advanced and no analyses of factors that influenced on information security maturity. We had little information from previous studies if there would be conflict because of members of the organizations had different information security acceptance, and then, this conflict would influence on making, actualizing and preserving the information security policy. Meanwhile, we also have little information if information security policy would influence on coordination mechanism and information security maturity, and the conflicts among organization members would influence on the coordination mechanism, and then influenced on information security maturity. We focused on information security and used technology acceptance model to deduce the acceptance of information security. And we used the perspective of coordination mechanism to see how coordination influenced on information security maturity. We used Likert type six-point scale in this study and used a survey questionnaire by mail and e-mail to investigate information and non-information departments of colleges and universities in Taiwan. Among 138 contacts by mail, a total of 38 valid questionnaires were retrieved. Among 176 contacts by email, a total of 203 valid questionnaires were retrieved. We used Lisrel 8.54 to do path analysis, and found that both of information acceptance differences and conflicts among members would influence on the information security policy made by organization, meanwhile, they also influenced on the organization coordination systems. Information security maturity would be influenced by the organization coordination system and information security policy. Information security acceptance did not show a significant correlation with conflicts among the members. But according to the results of interviews, we found that information security acceptance also influenced on organization conflicts in user’s view. Furthermore, we provided some information security management related points in helping organization information security maturity advanced and also provided some references for further studies. Jenn Tang 唐震 2007 學位論文 ; thesis 88 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺北商業技術學院 === 商學研究所 === 95 === Nowadays, enterprises used information technology frequently which increased organizations dependence on information technology, and made information technology more important. The information security events happened recently reminded people of the importance of information security. Therefore, making information security maturity advanced, preventing information security events from being happened again, making quick responses and minimizing the loss were the most important things that organizations had to deal with. Most of previous studies of information security management focused on information security management and evaluation, but there were no methods for making information security maturity advanced and no analyses of factors that influenced on information security maturity. We had little information from previous studies if there would be conflict because of members of the organizations had different information security acceptance, and then, this conflict would influence on making, actualizing and preserving the information security policy. Meanwhile, we also have little information if information security policy would influence on coordination mechanism and information security maturity, and the conflicts among organization members would influence on the coordination mechanism, and then influenced on information security maturity. We focused on information security and used technology acceptance model to deduce the acceptance of information security. And we used the perspective of coordination mechanism to see how coordination influenced on information security maturity. We used Likert type six-point scale in this study and used a survey questionnaire by mail and e-mail to investigate information and non-information departments of colleges and universities in Taiwan. Among 138 contacts by mail, a total of 38 valid questionnaires were retrieved. Among 176 contacts by email, a total of 203 valid questionnaires were retrieved. We used Lisrel 8.54 to do path analysis, and found that both of information acceptance differences and conflicts among members would influence on the information security policy made by organization, meanwhile, they also influenced on the organization coordination systems. Information security maturity would be influenced by the organization coordination system and information security policy. Information security acceptance did not show a significant correlation with conflicts among the members. But according to the results of interviews, we found that information security acceptance also influenced on organization conflicts in user’s view. Furthermore, we provided some information security management related points in helping organization information security maturity advanced and also provided some references for further studies.
author2 Jenn Tang
author_facet Jenn Tang
Wei-tsung Liu
劉維宗
author Wei-tsung Liu
劉維宗
spellingShingle Wei-tsung Liu
劉維宗
An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination
author_sort Wei-tsung Liu
title An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination
title_short An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination
title_full An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination
title_fullStr An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination
title_full_unstemmed An emperical study in campus of information security maturity – the perspective of TAM model and organizational coordination
title_sort emperical study in campus of information security maturity – the perspective of tam model and organizational coordination
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/01703606495826726615
work_keys_str_mv AT weitsungliu anempericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination
AT liúwéizōng anempericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination
AT weitsungliu zīxùnānquánchéngshúdùzhīxiàoyuánshízhèngyánjiūkējìjiēshòumóshìyǔzǔzhīxiédiàoguāndiǎn
AT liúwéizōng zīxùnānquánchéngshúdùzhīxiàoyuánshízhèngyánjiūkējìjiēshòumóshìyǔzǔzhīxiédiàoguāndiǎn
AT weitsungliu empericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination
AT liúwéizōng empericalstudyincampusofinformationsecuritymaturitytheperspectiveoftammodelandorganizationalcoordination
_version_ 1718281673663053824