عنوان مقاله

 شخصیت، نگرش و نیت: پیش‌بینی پذیرش اولیه رفتار امنیت اطلاعات



خرید نسخه پاورپوینت این مقاله


خرید نسخه ورد این مقاله



 

فهرست مطالب

مقدمه

پیش زمینه نظری

فرضیه های پژوهشی

روش ها

نتایج

نتیجه گیری





بخشی از مقاله

 نگرش 

پس از تئوری Fishbein و Ajzenn Seminal  از  منطق عمل،  بسیاری از مطالعات رفتاری از نگرش برای تشریح نیت رفتاری استفاده‌کردند. در زمینه سیستم اطلاعاتی، این زیرساخت‌های تئوریکی به  پیش‌بینی نیت رفتاری سازگار  و استفاده از انواع تکنولوژی‌های اطلاعاتی  بسط یافته است. مدل پذیرش تکنولوژی (TAM)، یکی از گسترده‌ترین مدل‌های پذیرفته ‌شده و بکار رفته  در این زمینه است، که از دو متغییر مستقل تشکیل‌شده‌است: سودمندی‌درک‌شده (PU) و سهولت استفاده درک‌شده (PEOU).





خرید نسخه پاورپوینت این مقاله


خرید نسخه ورد این مقاله



 

کلمات کلیدی: 

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior Jordan Shropshire a , Merrill Warkentin b,* , Shwadhin Sharma b a University of South Alabama, School of Computing, 150 Jaguar Drive, Mobile, AL 36688-7274, USA b Mississippi State University, College of Business, P.O. Box 9581, Mississippi State, MS 39762-9581, USA article info Article history: Received 23 July 2014 Received in revised form 22 September 2014 Accepted 3 January 2015 Available online 12 January 2015 Keywords: Attitudes Intention Personality Information security behavior Conscientiousness Agreeableness abstract Investigations of computer user behavior become especially important when behaviors like security software adoption affect organizational information resource security, but adoption antecedents remain elusive. Technology adoption studies typically predict behavioral outcomes by investigating the relationship between attitudes and intentions, though intention may not be the best predictor of actual behavior. Personality constructs have recently been found to explain even more variance in behavior, thus providing insights into user behavior. This research incorporates conscientiousness and agreeableness into a conceptual model of security software use. Attitudinal constructs perceived ease of use and perceived usefulness were linked with behavioral intent, while the relationship between intent and actual use was found to be moderated by conscientiousness and agreeableness. The results that the moderating effect of personality greatly increases the amount of variance explained in actual use. © 2015 Elsevier Ltd. All rights reserved. 1. Introduction Why do some well-meaning computer users practice safe computing habits, while others do not, despite the intentions to do so? As early as the 12th Century, Saint Bernard of Clairvaux noted that good intentions do not always lead to positive actions (basis for the adage that “the road to hell is paved with good intentions”). It is common for individual computer users, despite knowing that their individual information resources are at risk, to fail to act on their intentions to practice safe computing behavior. (Safe behaviors include frequently changing passwords, archiving important data, scanning for malware, avoiding opening suspect emails, etc.) It is imperative that employees and others follow the intent to adopt secure technologies (such as anti-virus and antispyware software) with actual usage behavior (Furnell et al., 2007), but such follow-through is not universal. People within organizations, despite having the intention to comply with information security policies, are still considered to be the weakest link in defense against the existing information security as their actual security behavior may differ from the intended behavior (Han et al., 2008; Guo et al., 2011; Capelli et al., 2006; Vroom and Solms, 2004). These “trusted agents” inside the firewall may have the intention to comply with the organization's policy. However, there is a good probability that * Corresponding author. Tel.: þ1 662 325 1955; fax: þ1 662 325 8651. E-mail address: m.warkentin@msstate.edu (M. Warkentin). Available online at www.sciencedirect.com ScienceDirect journal homepage: www.elsevier.com/locate/cose computers & security 49 (2015) 177 e191 http://dx.doi.org/10.1016/j.cose.2015.01.002 0167-4048/© 2015 Elsevier Ltd. All rights reserved.