Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Heeyoung | - |
dc.contributor.author | Young, Kang Ju | - |
dc.date.issued | 2021-01-01 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36719 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85105075721&origin=inward | - |
dc.description.abstract | In order to strengthen information security, practical solutions to reduce information security stress are needed because the motivation of the members of the organization who use it is needed to work properly. Therefore, this study attempts to suggest the key factors that can enhance security while reducing the information security stress of organization members. To this end, based on the theory of protection motivation, trust and security stress in information security policies are set as mediating factors to explain changes in security reinforcement behavior, and risk, efficacy, and reaction costs of cyberattacks are considered as prerequisites. Our study suggests a solution to the security reinforcement problem by analyzing the factors that influence the behavior of organization members that can raise the protection motivation of the organization members. | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Cyber-attacks | - |
dc.subject.mesh | Information security policies | - |
dc.subject.mesh | Practical solutions | - |
dc.subject.mesh | Protection motivation theory | - |
dc.subject.mesh | Security enhancements | - |
dc.subject.mesh | Trust and security | - |
dc.title | Practical Approach of Security Enhancement Method based on the Protection Motivation Theory | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2021.1.29. ~ 2021.1.30. | - |
dc.citation.conferenceName | 21st ACIS International Semi-Virtual Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2021 | - |
dc.citation.edition | Proceedings - 2021 21st ACIS International Semi-Virtual Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2021 | - |
dc.citation.endPage | 97 | - |
dc.citation.startPage | 96 | - |
dc.citation.title | Proceedings - 2021 21st ACIS International Semi-Virtual Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2021 | - |
dc.identifier.bibliographicCitation | Proceedings - 2021 21st ACIS International Semi-Virtual Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2021, pp.96-97 | - |
dc.identifier.doi | 10.1109/snpdwinter52325.2021.00028 | - |
dc.identifier.scopusid | 2-s2.0-85105075721 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9403428 | - |
dc.subject.keyword | protection motivation theory | - |
dc.subject.keyword | security enhancements | - |
dc.subject.keyword | security stress | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Strategy and Management | - |
dc.subject.subarea | Artificial Intelligence | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Hardware and Architecture | - |
dc.subject.subarea | Software | - |
dc.subject.subarea | Information Systems and Management | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.