首页> 外文学位 >Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies.
【24h】

Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies.

机译:评估用户计算机的自我效能,网络安全对策意识以及网络安全技能在政府机构中对计算机滥用意图的作用。

获取原文
获取原文并翻译 | 示例

摘要

Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common welfare of citizens since more and more terrorists are using cyberterrorism to target critical infrastructures (e.g., transportation, telecommunications, power, nuclear plants, water supply, banking) to coerce the targeted government and its people to accomplish their political objectives. Cyberwar is another major concern that nations around the world are struggling to get ready to fight. It has been found that intentional and unintentional users' misuse of information systems (IS) resources represents about 50% to 75% of cybersecurity threats and vulnerabilities to organizations. Computer Crime and Security Survey revealed that nearly 60% of security breaches occurred from inside the organization by users.;Computer users are one of the weakest links in the information systems security chain, because users seem to have very limited or no knowledge of user computer self-efficacy (CSE), cybersecurity countermeasures awareness (CCA), and cybersecurity skills (CS). Users' CSE, CCA, and CS play an important role in users' computer misuse intention (CMI). CMI can be categorized as unauthorized access, use, disruption, modification, disclosure, inspection, recording, or destruction of information system data. This dissertation used a survey to empirically assess users' CSE, CCA, CS, and computer misuse intention (CMI) at government agencies. This study used Partial Least Square (PLS) technique to measure the fit of a theoretical model that includes seven independent latent variables (CSE, UAS-P, UAS-T, UAC-M, CCS, CIS, & CAS) and their influences on the dependent variable CMI. Also, PLS was used to examine if the six control variables (age, gender, job function, education level, length of working in the organization, & military status such as veteran) had any significant impact on CMI.;This study included data collected from 185 employees of a local and state transportation agency from a large metropolitan in the northeastern United States. Participants received an email invitation to take the Web-based survey. PLS was used to test the four research hypotheses. The results of the PLS model showed that UAC-M and CIS were significant contributors (p <.05) to CMI. UAC-M was a significant contributor (p <.05) to CCS. UAS-P was a significant contributor (p <.05) to CAS. CSE was the most significant contributor (p < .001) to CCS, while it did not show a significance contribution towards CMI. It can be concluded that UAC-M and CIS play a significant role on CMI. This investigation contributes to the IS and cybersecurity practice by providing valuable information that can be used by government agencies in an effort to significantly reduce computer users' abuse, while increasing productivity and effectiveness.
机译:网络安全威胁和漏洞给全世界的政府和组织造成了巨大的财务损失。网络安全犯罪分子每年利用银行用户滥用计算机造成的漏洞从银行窃取超过10亿美元。网络安全漏洞威胁着公民的共同利益,因为越来越多的恐怖分子利用网络恐怖主义来瞄准关键基础设施(例如交通,电信,电力,核电站,供水,银行)以强迫目标政府及其人民完成其政治使命目标。网络战是世界各国正在为战斗做好准备的另一个主要问题。已经发现,有意和无意的用户滥用信息系统(IS)资源约占组织的网络安全威胁和漏洞的50%至75%。计算机犯罪和安全调查显示,近60%的安全漏洞是由用户在组织内部发生的;计算机用户是信息系统安全链中最薄弱的环节之一,因为用户似乎对用户计算机的了解非常有限或根本不了解自我效能(CSE),网络安全对策意识(CCA)和网络安全技能(CS)。用户的CSE,CCA和CS在用户的计算机滥用意图(CMI)中起着重要作用。 CMI可以归类为信息系统数据的未授权访问,使用,破坏,修改,披露,检查,记录或破坏。本文通过调查对政府机构用户的CSE,CCA,CS和计算机滥用意向(CMI)进行了实证评估。这项研究使用偏最小二乘(PLS)技术来测量包含七个独立潜在变量(CSE,UAS-P,UAS-T,UAC-M,CCS,CIS和CAS)的理论模型的拟合度,以及它们对因变量CMI。此外,PLS还用于检查六个控制变量(年龄,性别,工作职能,教育程度,在组织工作的时间以及退伍军人的军事地位)是否对CMI有重大影响。来自美国东北部某大城市的本地和州交通运输机构的185名员工。参与者收到了一封电子邮件邀请,以进行基于Web的调查。 PLS用于检验这四个研究假设。 PLS模型的结果表明,UAC-M和CIS是CMI的重要贡献者(p <.05)。 UAC-M是CCS的重要贡献者(p <.05)。 UAS-P是CAS的重要贡献者(p <.05)。 CSE是CCS的最大贡献者(p <.001),但对CMI没有显着贡献。可以得出结论,UAC-M和CIS在CMI中起着重要作用。这项调查通过提供有价值的信息供政府机构使用,以期显着减少计算机用户的滥用,同时提高生产力和效率,从而为IS和网络安全实践做出了贡献。

著录项

  • 作者

    Choi, Min Suk.;

  • 作者单位

    Nova Southeastern University.;

  • 授予单位 Nova Southeastern University.;
  • 学科 Information Technology.;Computer Science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 104 p.
  • 总页数 104
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号