跳到主要內容

臺灣博碩士論文加值系統

(44.200.27.215) 您好!臺灣時間:2024/04/24 16:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:沈建村
研究生(外文):Shen,Chien-Tsun
論文名稱:企業員工採用雲端服務遵守資訊安全議題之研究
論文名稱(外文):Investigation of the employee to use cloud services complying with Information Security
指導教授:吳英隆吳英隆引用關係
指導教授(外文):Wu,Ing-Long
口試委員:陳建亮吳英隆阮金聲
口試委員(外文):Chen,Jian-LiangWu,Ing-LongROAN, JIN-SHENG
口試日期:2017-07-31
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊管理學系碩士在職專班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:79
中文關鍵詞:雲端服務資訊安全個人創新嚇阻效用組織公民行為
外文關鍵詞:Cloud serviceInformation SecurityPersonal InnovationDeterrenceOrganizational Citizenship Behavior
相關次數:
  • 被引用被引用:0
  • 點閱點閱:324
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:1
雲端服務是一種新型態的運作模式及應用服務,企業員工有效採用雲端服務將替企業節省許多營運成本。隨著企業對雲端服務的倚賴程度愈深,所面對的資訊安全威脅就愈多。企業員工個人在採用雲端服務時對於是否遵守資訊安全規範之行為,對企業保護資訊安全之控制來說具有重大影響。
本研究整合技術、組織及個人觀點,從員工採用的雲端服務模式、組織規模、嚇阻效用、組織公民行為及個人創新等方面,來探討企業員工採用雲端服務遵守資訊安全的意向。瞭解員工在採用雲端服務時,遵守資訊安全之考量與行為,藉以提供企業在制定相關資訊安全規範及政策之參考。
本研究結果顯示,在技術構面中,雲端服務與遵守資訊安全意向具有正向影響;在組織構面中,組織規模與遵守資訊安全意向具有正向影響,及嚇阻效用與遵守資訊安全意向具有正向影響;個人構面中,個人創新與遵守資訊安全意向具有正向影響,及組織公民行為與遵守資訊安全意向具有正向影響。
Cloud service is a new type of operation and application, it could be saving a lot of operating costs for enterprise. As the cloud service is used by the enterprise, the more information security threats are faced. Employee has a significant affection on the compliance with information security practices and the control of corporate information security.
This research integrates the technical, organizational and personal views to explore the intentions of employees using cloud services to comply with information security from organizational scale, deterrent effect, personal innovation and organizational citizenship behavior. Understand the use of cloud services by employees to comply with information security considerations and behavior, in order to provide enterprises in the development of relevant information security norms and policy reference.
The results of this study show that the use of cloud services in the technical structure of the surface will positively affect the compliance of information security practices of the employee. Organizational scale and deterrent effect will positively affect compliance with information security the intention of the will in the organizational structure of the surface. Organizational citizenship behavior will positively affect compliance with information security the intention of the will in the personal structure of the surface.
第一章 緒論
第一節 研究背景與動機
第二節 研究目的與研究問題
第三節 研究流程
第二章 文獻探討
第一節 雲端服務
第二節 資訊安全
第三節 個人創新
第四節 嚇阻效用
第五節 組織公民行為
第六節 組織規模
第三章 研究方法
第一節 研究架構
第二節 研究假說推導與建立
第三節 變數之操作型定義與衡量
第四節 研究設計
第四章 資料分析
第一節 問卷發放與回收
第二節 信度與效度分析
第三節 結構方程模式分析
第五章 研究結論與討論
第一節 研究結論
第二節 研究貢獻
第三節 研究限制
第四節 未來研究建議
參考文獻
附錄:研究問卷
中文部分
林祝興、張明信(2009)。資訊安全導論。台北:旗標。
周金燕(2013)。人格特質與組織公民行為對資訊安全認知之影響-以新北市區公所為例。世新大學行政管理學系碩士學位論文,未出版,台北市。
張春興、林清山(1983)。教育心理學。東華書局。
葉忠達、林文政、梁綺華譯(1997)。組織行為,台中:滄海書局。
劉彥廷譯(1995)。管理組織行為。台北:台灣西書出版社。
蕭瑞祥、羅雅萍、鄭哲斌(2012)。非營利組織資訊科技能力對資訊安全認知影響之研究。電腦稽核期刋,第 25 期, 57-71。

英文部分
Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28 (3), 557-582.
Agarwal, R., &Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9 (2) 204–215.
Agarwal, R., & R. Prasad, J. (1999). Are individual differences germane to the acceptance of new information technologies. Decision Sciences, 30 (2)361–391.
Agarwal, R., Sambamurthy V., & Stair, R.M. (2000). Research report: the evolving relationship between general and specific computer self-efficacy—an empirical assessment. Information Systems Research, 11 (4) 418–430.
Alam, S. S. (2009). Adoption of internet in Malaysian SMEs. Journal of Small Business and Enterprise Development, 16 (2): 240-255.
Aiwu Shi, Youfu Xia, & Haiyan Zhan. (2010). Applying cloud computing in financial service industry. Intelligent Control and Information Processing (ICICIP). International Conference on, 579-583.
Andrews, D. A., & Bonta, J. (2010). The psychology of criminal conduct (5th). New Providence, NJ: LexisNexis Matthew Bender.
Barry, D. K. (2012). Web Services, Service-oriented Architectures, and Cloud Computing: The Savvy Manager's Guide. Access Online via Elsevier.
Bateman, T., & Organ, D. (1983). Job satisfaction and the good soldier: The relationship between affect and employee "citizenship". Academy of Management Journal,26, 587-595.
Beatty, R. C., Shim, J. P., & Jones, M. C. (2001). Factors influencing corporate web site adoption: a time-based assessment. Information & Management, 38 (6): 337-354.
Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A study of infrastructure as a service (IAAS). International Journal of engineering and information Technology, 2(1), 60-63.
Bradford, M., & Florin, J. (2003). Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems. International Journal of Accounting Information Systems, 4 (3): 205-225.
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.
Che, J., et al. (2011). Study on the Security Models and Strategies of Cloud Computing. Procedia Engineering, 23, 586-593.
Christauskas, C., & Miseviciene, R. (2012). Cloud–Computing Based Accounting for Small to Medium Sized Business. Engineering Economics, 23 (1), 14-21.
D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79-98.
Davidson, E., D, Pai. (2004), Making sense of technological frames: Promise, Progress, and Potential. IFIP Working Group 8.2 Conference, UK: Manchester.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13 (3): 319-340.
Ercan, T. (2010). Effective use of cloud computing in educational institutions. Procedia Social and Behavioral Sciences, 2(2), 938-942.
Ferreira, O., & Moreira, F. (2012). Cloud computing implementation level in Portuguese companies. Procedia Technology, 5, 491-499.
Fishbein, M., & Ajzen, I. (1975), Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley.
Flynn, L.R., & Goldsmith, R.E. (1993) A validation of the Goldsmith and Hofacker innovativeness scale. Educational and Psychological Measurement, 53 (4) 1105–1116.
Gallivan, M.J. (2003). The influence of software developers' creative style on their attitudes to and assimilation of a software process innovation. Information Management, 40 (5) 443–465.
George, J. M., & Brief, A. P. (1992). Feeling good-doing good: a conceptual analysis of the mood at work-organizational spontaneity relationship. Psychological bulletin, 112(2), 310.
Goodburn, M. A., & Hill, S. (2010). The cloud transforms business. Financial Executive, 26(10), 34-39.
Grover, V. (1993). An empirically derived model for the adoption of customer-based interorganizational systems. Decision Sciences, 24 (3): 603-640.
Han, Y. (2010). On the clouds: A new way of computing. Information Technology & Libraries, 29(2), 87-92.
Hooper, C., Martini, B., & Choo, K. K. R. (2013). Cloud computing and its implications for cybercrime investigations in Australia. Computer Law & Security Review, 29(2), 152-163.
Huth, P.K. (1988). Extended deterrence and the prevention of war. Yale University Press New Haven.
Ichikawa, K., Yada, K., & Washio, T. (2010). Development of data mining platform MUSASHI towards service computing. Granular Computing. IEEE International Conference, 235-240.
Jun, L., & Jun, W. (2011). Cloud computing based solution to decision making. Procedia Engineering, 15, 1822-1826.
Katz, D. (1964). The motivation bases of organizational behavior. Behavioral Science, 9, 131-133.
Katz, D., & Kahn,R.L. (1978). The social psychology of organizations.
Khoumbati, K., Themistocleous, M., & Irani, Z. (2006). Evaluating the adoption of enterprise application integration in health-care organizations. Journal of Management Information Systems, 22 (4): 69-108.
Lertwongsatien, C., & Wongpinunwatana, N. (2003). E-commerce adoption in Thailand: an empirical study of small and medium enterprises (SMEs). Journal of Global Information Technology Management, 6 (3): 67-83.
Lin, A., & Chen, N. C. (2012). Cloud computing as an innovation: Perception, attitude, and adoption. International Journal of Information Management, 32(6), 533-540.
Li, C., & Deng, Z. (2011). Value of Cloud Computing by the View of Information Resources. International Conference on Network Computing and Information Security, 108-112.
Li, H., Sarathy, R., Zhang, J., & Luo, X. (2014).Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Information Systems Journal, 24(6), 479-502.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing-The business perspective. Decision Support Systems, 51(1), 176-189.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (draft).NIST special publication, 800(145), 7.
Midgley, D.F., & Dowling, G.R. (2011). Innovativeness: the concept and its measurement. Consumer Research, 4 (4) (1978) 229–242.
Miller, H.G., & Veiga, J. (2009). Cloud Computing: Will Commodity Services Benefit Users Long Term. IEEE Journal IT Professional, Vol. 11, Issue 6, 57-59.
Mohammed, S., & Fiaidhi, J. (2010). Ubiquitous Health and Medical Informatics: The Ubiquity 2.0 Trend and Beyond. Medical Information Science Reference, ISBN, 978-1.
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2 (3): 192-222.
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw Von Solms,Steven Furnell, Norjihan Abdul Ghani,Tutut Herawan.(2015). Information security conscious care behaviour formation in organizations, 65-78.
Nagin, D.S. (1998). Criminal deterrence research at the outset of the twenty-first century. Crime and Justice, 23, 1-42.
Orlikowski, W.J., Robey, D. (1991). Information Technology and the Structuring of Organizations, Information Systems Research, Vol. 2, 2: 143-169.
Paquette,S., Jaeger, P.T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245-253.
Peace, A. G., Galletta, D. F., & Thong, J. Y. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153-178.
Plouffe, C. R., Hulland, J. S., & Vandenbosch, M. (2001). Research report: richness versus parsimony in modeling technology adoption decisions - understanding merchant adoption of a smart card-based payment system. Information Systems Research, 12 (2): 208-222.
Premkumar, G., Ramamurthy, K., & Nilakanta, S. (1994). Implementation of electronic data interchange: An innovation diffusion perspective. Journal of Management Information Systems, 11 (2):157-186.
Premkumar, G., Ramamurthy, K. (1995).The role of interorganizational and organizational factors on the decision mode of adoption of interorganizational systems. Decision Science,26 (3):303-336.
Premkumar, G., & Roberts, M. (1999). Adoption of new information technologies in rural small businesses. Omega, Vol. 27, No. 4, pp. 467-484.
Premkumar, G., & Roberts, M. (1999). Adoption of new information technologies in rural small businesses. Omega, 27 (4): 467-484.
Pogarsky, G., Piquero, A. R., & Paternoster, R. (2004). Modeling change in perceptions about sanction threats:The neglected linkage in deterrence theory. Journal of QuantitativeCcriminology, 20(4), 343-369.
Rogers, E. M. (1995). Diffusion of innovations. New York: The Free Press.
Rogers, E. M. (2003). Diffusion of Innovations, 5th Edition. New York: Free Press.
Rogers, M.E. (2005). Diffusion of Innovations, Fifth ed, NY: Free Press, New York.
Rosenthal,A., Mork,P., Li, M.H., Stanford, J., Koester, D., & Reynolds, P. et al.(2010). Cloud computing: A new business paradigm for biomedical information sharing. Journal of Biomedical Informatics, 43(2), 342-353.
Ruan, K., Carthy, J., Kechadi, T., & Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation, 10(1), 34-43.
Smith, C.A., Organ, D.W., & Near, J.P. (1983). Organizational citizenship behavior: Its nature and antecedents. Journal of Applied Psychology, 68,653-663.
Soliman, K. S., & Janz, B. D. (2004). An exploratory study to identify the critical factors affecting the decision to establish Internet-based interorganizational information systems. Information & Management, 41 (6): 697-706.
Straub, D.W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255-276.
Sultan, N. (2010). Cloud computing for education: A new dawn. International Journal of Information Management, 30(2), 109-116.
Sultan, N. (2013). Cloud computing: A democratizing force. International Journal of Information Management, 33(5), 810-815.
Taylor, N.J. (2007). Public grid computing participation: an exploratory study of determinants. Information Management, 44 (1) 12–21.
Tak, B. C., Urgaonkar, B., & Sivasubramaniam, A. (2013). Cloudy with a Chance of Cost Savings. Parallel and Distributed Systems, IEEE Transactions, 24(6), 1223-1233.
Thatcher, J.B., Loughry, M.L., Lim, J., & McKnight, D.H. (2007). Internet anxiety: an empirical study of the effects of personality, beliefs, and social support. Information Management, 44 (4) 353–363.
Thomson, K. L., & Von Solms, R. (2005). Information security obedience: a definition. Computers & Security, 24(1), 69-75.
Thong, J.Y.L. (1999). An integrated model of information systems adoption in small businesses. Journal of Management Information Systems, 15 (4) 187–214.
To, P. L., Liao, C., Chiang, J. C., Shih, M. L., & Chang, C. Y. (2008). An empirical investigation of the factors affecting the adoption of instant messaging in organizations. Computer Standards & Interfaces, 30 (3): 148-156.
Tornatzky, L. G., & K. J. Klein. (1982). Innovation characteristics and innovation adoption-implementation:a meta-analysis of findings. IEEE Transactions on Engineering Management, EM-29 (1): 28-45.
Tyler, T.R., & Huo, Y.J. (2002). Trust in the law: Encouraging public cooperation with the police and courts. Russell Sage Foundation (Vol. 5).
VanDenHaag, E. (1975). Punishing criminals: Basic Books New York.
Van Slyke, C., Lou, H., Belanger, F., & Sridhar,V. (2010). The influence of culture on consumer-oriented electronic commerce adoption. Journal of Electronic Commerce Research, 11 (1): 30-40.
Vijayasarathy, L. R. (2004). Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model. Information & Management, 41 (6): 747-762.
Williams, L.J., & Anderson, S.E.(1991). Job Satisafaction and Organizational Commitment as Predictors of Organizational Citizenship Behavior and In-Role Behaviors. Journal of Management, 17, 601-617.
Wu, I. L., & Chuang, C. H. (2010). Examining the diffusion of electronic supply chain management with external antecedents and firm performance: a multi-stage analysis. Decision Support Systems, 50 (1): 103-115.
Wu, I.L, Li, J.Y., & Fu, C.Y. (2001). The adoption of mobile healthcare by hospital's professionals: An integrative perspective. Decision Support Systems, 587-596.
Xinlei Wang & Yubo Tan. (2010). Application of cloud computing in the health information system. Computer Application and System Modeling. International Conference, 1 V1-179-V1-182.
Yen, H. R., Li, E. Y., & Niehoff, B. P. (2008). Do organizational citizenship behaviors lead to information system success: Testing the mediation effects of integration climate and project management. Information & management, 45(6), 394-402.
Yi, M.Y., Jackson, J.D., Park, J.S., & Probst, J.C. (2006). Understanding information technology acceptance by individual professionals: toward an integrative view. Information Management, 43 (3) 350–363.
Yongquan Yang, Zhiqiang Wei, Dongning Jia, Yanping Cong, & Ruobing Shan. (2010). A cloud architecture based on smart home. Education Technology and Computer Science, 2, 440-443.
Zhu, K., Dong, S., Sean Xin, X., & Kraemer, K. L. (2006). Innovation diffusion in global contexts: determinants of post-adoption digital transformation of European companies. European Journal of Information Systems, 15 (6): 601-617.

網路資料
1. 電腦科技電子報,第173期(2012)不可不知的雲端運算資安問題。擷取日期:2016年12月17日,取自:
http://www.syscom.com.tw/ePaper_Content_EPArticledetail.aspx?id=185&EPID=173&j=2&HeaderName=%E8%B3%87%E5%AE%89%E5%89%8D%E5%93%A8%E7%AB%99。
2. 資策會MIC研究報告,(2013年8月29日)全球雲端運算資訊安全趨勢。擷取日期:2016年12月17日,取自:
http://www.mic.iii.org.tw/aisp/reports/reportdetail_register.asp?docid=3027&rtype=freereport。
3. 維基百科,自由的百科全書。擷取日期:2016年12月17日,取自:
https://zh.wikipedia.org/wiki/Google。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top