µ¥ÀÌÅͺ£À̽º ¿¬±¸È¸Áö(SIGDB)
ÇѱÛÁ¦¸ñ(Korean Title) |
Á¤º¸º¸¾È¿¡ ´ëÇÑ Àνİú Á¤º¸½Ã½ºÅÛ »ç¿ëÀǵµ°£ÀÇ »ó°ü µ¥ÀÌÅÍ ºÐ¼® |
¿µ¹®Á¦¸ñ(English Title) |
Data Analysis of the Relationship between the User¡¯s Perception about Information Security and the Intentions to Transact an Information System |
ÀúÀÚ(Author) |
±è¼öÇö
Soo-Hyun Kim
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 28 NO. 01 PP. 0109 ~ 0120 (2012. 04) |
Çѱ۳»¿ë (Korean Abstract) |
ÀÎÅÍ³Ý ¼îÇθô, Æ÷Å» À¥»çÀÌÆ®, ±â¾÷ À¥»çÀÌÆ® µî ÀÎÅͳݿ¡ ¿¬°áµÈ Á¤º¸½Ã½ºÅÛÀÇ ÀÌ¿ëÀÌ È°¹ßÇÏ°Ô ÀÌ·ç¾îÁö¸é¼ ¹ß»ýÇÏ°í ÀÖ´Â ¹®Á¦µé Áß Çϳª´Â ½Å·Ú ¹× Á¤º¸º¸¾È°ú °ü·ÃµÇ¾î ÀÖ´Ù. ÀÌ·¯ÇÑ Á¤º¸º¸¾È ¹®Á¦´Â Á¤º¸½Ã½ºÅÛÀÇ »ç¿ë¿¡ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ´Ù. º» ³í¹®¿¡¼´Â Á¤º¸º¸¾È ¹®Á¦°¡ Á¤º¸½Ã½ºÅÛÀÇ »ç¿ë¿¡ ¹ÌÄ¡´Â ¿µÇâÀ» ºÐ¼®Çϱâ À§ÇØ ±â¼ú¼ö¿ë¸ðÇüÀ» È°¿ëÇÏ°í »ç¿ëÀÚµéÀÌ ´À³¢´Â ±â¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ÇÁ¶óÀ̹ö½Ã º¸È£ µî ÀÎÁöµÈ º¸¾È¿äÀÎÀ» ÁÖ¿ä ¿ÜºÎº¯¼ö·Î µµÀÔÇÏ¿© È®ÀåµÈ ¸ðÇüÀ» Á¦½ÃÇÏ¿´´Ù. ¶ÇÇÑ È®ÀåµÈ ¸ðÇüÀ» ÀÎÅͳݿ¡ ¿¬°áµÈ Á¤º¸½Ã½ºÅÛÀÇ ÀÌ¿ëÀÚµéÀ» ´ë»óÀ¸·Î ½ÇÁõ ºÐ¼®ÇÏ¿´´Ù. ºÐ¼®°á°ú Á¤º¸º¸¾È ¿äÀÎÀº Á¤º¸½Ã½ºÅÛÀÇ ½Å·Ú¿¡ ¿µÇâÀ» ÁÖ°í ½Å·Ú´Â Á¤º¸½Ã½ºÅÛ »ç¿ëÀǵµ¿¡ ¿µÇâÀ» ¹ÌÄ¡´Â °ÍÀ¸·Î ³ªÅ¸³µ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
As the Internet-connected information systems increases, one of the problems happening between users and information systems such as Internet shopping-malls, portal sites, and corporate web sites is related with the information security issues. The information security issues are making an influence on the use of information systems. In this paper, we utilize TAM(Technology Acceptance Model) to analyze the effects of the user¡¯s perception about information security on the use of information systems, and propose the extended research model that includes four external variables such as confidentiality, integrity, authentication, and privacy. The extended model is tested with the survey data for users of Internet-connected information systems. The empirical paper proves that the perceived information security factors give positive effects to the trust and the intention to use. In addition, this paper indicates some managerial implications to increase the intention to use with respect to the information security.
|
Å°¿öµå(Keyword) |
Information Systems
Information Security
Confidentiality
Integrity
Authentication
Privacy
Trust
Intention to Use
Á¤º¸½Ã½ºÅÛ
Á¤º¸º¸¾È
±â¹Ð¼º
¹«°á¼º
ÀÎÁõ
ÇÁ¶óÀ̹ö½Ã
½Å·Ú
»ç¿ëÀǵµ
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|