Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects

碩士 === 銘傳大學 === 資訊管理學系碩士在職專班 === 100 === As many studies concluded: in 2008, 43% of the companies in small to medium range were having problems with information security that caused by the computer abuse from employees. Then in 2010, it rose to 58% of the small companies whereas more surprisingly,...

Full description

Bibliographic Details
Main Authors: Sung-Nan Lin, 林松南
Other Authors: Yih-Ping Cheng
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/08450717501749713432
id ndltd-TW-100MCU05396004
record_format oai_dc
spelling ndltd-TW-100MCU053960042015-10-13T21:56:04Z http://ndltd.ncl.edu.tw/handle/08450717501749713432 Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects 影響員工電腦濫用行為意圖之研究 Sung-Nan Lin 林松南 碩士 銘傳大學 資訊管理學系碩士在職專班 100 As many studies concluded: in 2008, 43% of the companies in small to medium range were having problems with information security that caused by the computer abuse from employees. Then in 2010, it rose to 58% of the small companies whereas more surprisingly, 74% of the large scaled enterprises encountered the same problems. These figures showed that even though most companies tried to implement the latest technology to enhance their information security system, and also launched the formal regulations for employees’ follow up, still these companies failed to achieve their goals. In the past days, most companies focused on leveling up the computer technology and also setting up stricter rules for the employees; however, fewer have really looked into the psychological status of their employees. It is doubtless to say that people always mean the most uncontrollable factor of any security program. Companies are able to upgrade their information system technologically and to give more rules or rectifications to employees’ proceeding; however, could these companies understand and then correct employees’ mindset at the same time?! I studied as based on the theory of planned behavior, and then I moved further by the theory of criminal psychology and sorted through its different angles, i.e., the techniques of neutralization, general deterrence theory and the fear appeals theory, so to present new views explaining the situations and reasons with employees, who missed to follow suit by companies’ prohibition rules and therefore caused the computer abuse. This report used the SPSS 18 and AMOS 18 for analysis, and accordingly worked out the construction pattern as well as the routes connecting all the assumptions’ results inside the pattern. This report summarized that all the existing theories present the reasons for employees’ behavior intentions and the effects come along. Among these theories the techniques of neutralization and the fear appeals theory spoke of the most influence, then the general deterrence theory while theory of planned behavior for the least. In practice, besides making rules, companies must advocate the stop of computer abuse and set up the education plan for employees, so to eventually build up the culture of employees’ truly understanding and alertness that it’s important for everyone to maintain the company’s information security. Such culture once built and reinforced by the leaders and coworkers’ daily follow up, will effectively eliminate the risk for computer abuse within the companies, and as a result the companies are empowered to move under the right directions. Yih-Ping Cheng 鄭毅萍 2012 學位論文 ; thesis 140 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 銘傳大學 === 資訊管理學系碩士在職專班 === 100 === As many studies concluded: in 2008, 43% of the companies in small to medium range were having problems with information security that caused by the computer abuse from employees. Then in 2010, it rose to 58% of the small companies whereas more surprisingly, 74% of the large scaled enterprises encountered the same problems. These figures showed that even though most companies tried to implement the latest technology to enhance their information security system, and also launched the formal regulations for employees’ follow up, still these companies failed to achieve their goals. In the past days, most companies focused on leveling up the computer technology and also setting up stricter rules for the employees; however, fewer have really looked into the psychological status of their employees. It is doubtless to say that people always mean the most uncontrollable factor of any security program. Companies are able to upgrade their information system technologically and to give more rules or rectifications to employees’ proceeding; however, could these companies understand and then correct employees’ mindset at the same time?! I studied as based on the theory of planned behavior, and then I moved further by the theory of criminal psychology and sorted through its different angles, i.e., the techniques of neutralization, general deterrence theory and the fear appeals theory, so to present new views explaining the situations and reasons with employees, who missed to follow suit by companies’ prohibition rules and therefore caused the computer abuse. This report used the SPSS 18 and AMOS 18 for analysis, and accordingly worked out the construction pattern as well as the routes connecting all the assumptions’ results inside the pattern. This report summarized that all the existing theories present the reasons for employees’ behavior intentions and the effects come along. Among these theories the techniques of neutralization and the fear appeals theory spoke of the most influence, then the general deterrence theory while theory of planned behavior for the least. In practice, besides making rules, companies must advocate the stop of computer abuse and set up the education plan for employees, so to eventually build up the culture of employees’ truly understanding and alertness that it’s important for everyone to maintain the company’s information security. Such culture once built and reinforced by the leaders and coworkers’ daily follow up, will effectively eliminate the risk for computer abuse within the companies, and as a result the companies are empowered to move under the right directions.
author2 Yih-Ping Cheng
author_facet Yih-Ping Cheng
Sung-Nan Lin
林松南
author Sung-Nan Lin
林松南
spellingShingle Sung-Nan Lin
林松南
Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects
author_sort Sung-Nan Lin
title Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects
title_short Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects
title_full Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects
title_fullStr Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects
title_full_unstemmed Analyzing the Behavior Intentions of Employees on Computer Abuse and the Effects
title_sort analyzing the behavior intentions of employees on computer abuse and the effects
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/08450717501749713432
work_keys_str_mv AT sungnanlin analyzingthebehaviorintentionsofemployeesoncomputerabuseandtheeffects
AT línsōngnán analyzingthebehaviorintentionsofemployeesoncomputerabuseandtheeffects
AT sungnanlin yǐngxiǎngyuángōngdiànnǎolànyòngxíngwèiyìtúzhīyánjiū
AT línsōngnán yǐngxiǎngyuángōngdiànnǎolànyòngxíngwèiyìtúzhīyánjiū
_version_ 1718070675400294400