상세검색
최근 검색어 전체 삭제
다국어입력
즐겨찾기0
154068.jpg
KCI등재 학술저널

정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구

Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy

DOI : 10.9716/KITS.2020.19.5.015
  • 46

This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

1. 서 론

2. 정보보호 관리체계(ISMS : Information Security Management Systems)

3. 적응구조화이론(AST : Adaptive Structuration Theory)

4. 전유(Appropriation) : FOA & COA

5. 연구모델

6. 분석 결과

7. 결론 및 시사점

참고문헌

로딩중