Summary: | 碩士 === 華梵大學 === 資訊管理學系碩士班 === 98 === This study explores the following topics for references of the futures authorities in making guidelines of information security. How should futures enterprises intensify information security? How applicable are the related rules and regulations? What difficulties do futures enterprises face with the information security issues and what should they improve when executing the related guidelines of information security? What are the factors which make futures workers comply with the information security standards?
In order to find out the important factors of futures workers’ compliance with the information security standards for the Futures Trading System, this research surveys the bibliographies, collects futures workers’ opinions by questionnaires, and expands the aspects of protection motivation and cognition after the practical observation, based on the Theory of Planned Behavior and the Protection Motivation. The statistics and analysis, such as, basic data, item analysis, analysis of reliability and validity, and factor analysis, are progressed after the questionnaire survey and sample material collecting.
The result shows that the most important factors: “usefulness”, “auditing operation”, “punishment effect”, “threat evaluation” and “simplicity” , positively influence the protection motivation of futures workers and their willing compliance with the information security standards. It also shows that when the standards are simpler, the will of compliance increases relatively. The study suggests the information security standards should be made simple, clear and according to the practical operation. Moreover, the authorities should make the internal auditing operation standards. In order to enhance futures workers’ will of compliance and create a beneficial environment for the authorities, futures enterprises and workers, futures enterprises should strengthen educational guidance for the internal information security standards and strictly execute the operation of auditing and information security.
|