透過您的圖書館登入
IP:3.145.186.6
  • 學位論文

資安威脅對企業使用資安防護硬體意圖之影響

The Impact of Security Threat on Enterprises' Intention to Use Security Protection Hardware

指導教授 : 蕭瑞祥

摘要


資安防護硬體是企業面臨資安威脅網路攻擊、駭客入侵與破壞事件的首要防線,企業需要有效的安全防護機制,能擁有集中管理網路資訊安全政策及網路進出流量記錄的設備,來執行資安管控,資安防護硬體無疑是保護企業內部網路安全最有效的防護機制。 本研究以恐懼訴求模型,資安認知及資安威脅為主軸,並加入知覺品質,來探討企業因外部的資安威脅、內部的資安認知與資訊人員對資安防護硬體的知覺品質感知,以及企業周遭的社會影響力,是否為影響企業使用資安防護硬體意圖的影響因素。 研究成果顯示在資安威脅已經存在的情況下,企業使用資安防護硬體的行為意圖會受知覺品質的正向影響,而外在環境因素社會影響力同樣對企業的使用意圖亦為正向影響。本研究貢獻在於增加對企業資安防護硬體使用行為意圖脈絡影響因素的理解並作為未來研究方向的基礎。

並列摘要


Security protection hardware is the primary line of defense for companies facing security threats, cyber-attacks, hacker intrusions, and sabotage. Enterprises need an effective security protection mechanism that can have centralized management of network information security policies and network entry and exit traffic records to perform security management and control. Information security hardware is undoubtedly the most effective protection mechanism for protecting the internal network security of an enterprise. This study takes the fear appeal model, security awareness and security threats as the main axis, and adds perceptual quality to do research. To explore whether the company's external security threats, internal security awareness and information personnel's perception of the quality of security protection hardware, and the social influence around the company are the factors that affect the company's intention to use security protection hardware. The research results show that in the case of security threats already existing, the behavioral intention of enterprises to use security protection hardware will be positively affected by the perceived quality. The social influence of external environmental factors also has a positive impact on the use intentions of enterprises. The contribution of this research is to increase the understanding of the influencing factors of the intention of the enterprise's information security hardware use behavior and serve as the basis for future research directions.

參考文獻


[1]Boudriga, N. (2009). Security of mobile communications: Auerbach Publications.
[2]Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
[3]De Hoog, N., Stroebe, W., & De Wit, J. B. (2005). The impact of fear appeals on processing and acceptance of action recommendations. Personality and social psychology bulletin, 31(1), 24-33.
[4]Engel, J., Blackwell, R., & Miniard, P. (1995). Consumer Behavior. 8th, Forth Worth: Dryden Press, Texas.
[5]Fornell, C.R., & Larcker, D.F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, Journal of Marketing Research, 18(1), 39-50.

延伸閱讀