A Study on Military Personnel''s Intention to Information Security Management Systems Implementation
碩士 === 健行科技大學 === 資訊管理系碩士班 === 105 === In recent years, network technology development very fast so that improve human quality of life and efficiency of the work, but military department in order to keep basic force and grow working efficiency that information system depend will be more important, h...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/h93ehu |
id |
ndltd-TW-105CYU05399001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105CYU053990012019-05-16T00:15:14Z http://ndltd.ncl.edu.tw/handle/h93ehu A Study on Military Personnel''s Intention to Information Security Management Systems Implementation 軍事單位人員對資訊安全管理系統導入意向之研究 Jen-Yuan Weng 翁仁遠 碩士 健行科技大學 資訊管理系碩士班 105 In recent years, network technology development very fast so that improve human quality of life and efficiency of the work, but military department in order to keep basic force and grow working efficiency that information system depend will be more important, however derivative the information security issue will serious a threat to military department. A person working in military department like army, employ, trainees, business trip man and construction contractor etc. They maybe become high risk group that direct or indirect get military information. How to guarantee that important defense information don’t encounter people with bad intention with Steal, destroy and gather is even more a major challenge topic on this moment. Although Ministry of National Defence(R.O.C) was publish ”Information Security Policy of the Military” in 2010 and according to ISO/IEC27001 international standard included Information security management system; However, breach of information security provision event always happened so this study will select some military department related person to investigate and find out which factors will affect people intentions of obey information security specifications. This research utilize” Decomposed Theory of Planned Behavior” to discuss soldier obey information security behavior intentions that influence factor and send questionnaires to survey and data analysis. The results proved: (1) Perceptual usefulness and compatibility have a positive effect on behavioral attitudes; (2) Supervisors and peers have a positive impact on subjective norms; (3) Self-efficacy and resource-driven conditions have a positive effect on perceived behavioral control; (4) Behavioral attitudes and perceived behavioral controls have a positive impact on military units'' compliance with information security norms. Beside, survey results found out that approximately 8% people insufficient information security cogitation or unclear what is in information security provision, it is suggested that import Information security management system authentication and increase information security education and propaganda, intensify people security consciousness so that people will grow information security provision intentions be strengthened, meanwhile, violate information security provisions probability will be effective reduce. Jie-Cheng chen 陳皆成 2017 學位論文 ; thesis 67 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 健行科技大學 === 資訊管理系碩士班 === 105 === In recent years, network technology development very fast so that improve human quality of life and efficiency of the work, but military department in order to keep basic force and grow working efficiency that information system depend will be more important, however derivative the information security issue will serious a threat to military department. A person working in military department like army, employ, trainees, business trip man and construction contractor etc. They maybe become high risk group that direct or indirect get military information. How to guarantee that important defense information don’t encounter people with bad intention with Steal, destroy and gather is even more a major challenge topic on this moment.
Although Ministry of National Defence(R.O.C) was publish ”Information Security Policy of the Military” in 2010 and according to ISO/IEC27001 international standard included Information security management system; However, breach of information security provision event always happened so this study will select some military department related person to investigate and find out which factors will affect people intentions of obey information security specifications. This research utilize” Decomposed Theory of Planned Behavior” to discuss soldier obey information security behavior intentions that influence factor and send questionnaires to survey and data analysis.
The results proved: (1) Perceptual usefulness and compatibility have a positive effect on behavioral attitudes; (2) Supervisors and peers have a positive impact on subjective norms; (3) Self-efficacy and resource-driven conditions have a positive effect on perceived behavioral control; (4) Behavioral attitudes and perceived behavioral controls have a positive impact on military units'' compliance with information security norms.
Beside, survey results found out that approximately 8% people insufficient information security cogitation or unclear what is in information security provision, it is suggested that import Information security management system authentication and increase information security education and propaganda, intensify people security consciousness so that people will grow information security provision intentions be strengthened, meanwhile, violate information security provisions probability will be effective reduce.
|
author2 |
Jie-Cheng chen |
author_facet |
Jie-Cheng chen Jen-Yuan Weng 翁仁遠 |
author |
Jen-Yuan Weng 翁仁遠 |
spellingShingle |
Jen-Yuan Weng 翁仁遠 A Study on Military Personnel''s Intention to Information Security Management Systems Implementation |
author_sort |
Jen-Yuan Weng |
title |
A Study on Military Personnel''s Intention to Information Security Management Systems Implementation |
title_short |
A Study on Military Personnel''s Intention to Information Security Management Systems Implementation |
title_full |
A Study on Military Personnel''s Intention to Information Security Management Systems Implementation |
title_fullStr |
A Study on Military Personnel''s Intention to Information Security Management Systems Implementation |
title_full_unstemmed |
A Study on Military Personnel''s Intention to Information Security Management Systems Implementation |
title_sort |
study on military personnel''s intention to information security management systems implementation |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/h93ehu |
work_keys_str_mv |
AT jenyuanweng astudyonmilitarypersonnelaposapossintentiontoinformationsecuritymanagementsystemsimplementation AT wēngrényuǎn astudyonmilitarypersonnelaposapossintentiontoinformationsecuritymanagementsystemsimplementation AT jenyuanweng jūnshìdānwèirényuánduìzīxùnānquánguǎnlǐxìtǒngdǎorùyìxiàngzhīyánjiū AT wēngrényuǎn jūnshìdānwèirényuánduìzīxùnānquánguǎnlǐxìtǒngdǎorùyìxiàngzhīyánjiū AT jenyuanweng studyonmilitarypersonnelaposapossintentiontoinformationsecuritymanagementsystemsimplementation AT wēngrényuǎn studyonmilitarypersonnelaposapossintentiontoinformationsecuritymanagementsystemsimplementation |
_version_ |
1719162719582552064 |