透過您的圖書館登入
IP:3.149.254.35
  • 學位論文

資安威脅對使用者持續使用資安防護軟體意圖的影響

The Impact of Security Threats on Users’ Continuing Use of Information Security Software Intentions

指導教授 : 吳錦波

摘要


現代社會以大量資訊設備與連結的網路為基礎,建構出能夠快速大量交換資訊的現代生活面貌。從中創造出各種新興經濟模式並產生龐大利益,但也衍生出透過網路攻擊個人或組織的新型犯罪模式。個人使用者面對資安威脅持續存在的情況下,其態度與反應的情況又是如何? 本研究針對資安威脅是否影響使用者持續使用資安防護軟體意圖進行研究,透從恐懼訴求的角度將存在的資安威脅作為驅動知覺有用性的主要成分,用以探討資安威脅以及使用者身邊的社會影響力,分析來自威脅與來自社會的影響是否成為對使用者持續使用意圖的影響因素。 研究成果顯示資安威脅的存在確實對使用者的知覺有用性有正向影響,而社會影響力同樣對使用者的持續使用意圖亦為正向影響,但影響使用者最大因素來自於資安防護軟體使用滿意度。本研究貢獻在於增加對使用者資安防護軟體意圖脈絡影響因素的理解並作為未來研究方向的基礎。

並列摘要


Modern society which is based on a huge numbers of information devices and connected with networks that can quickly and massively exchange information. It creates a variety of emerging economic models and generates huge benefits, but it also derives new type of criminal models that attack individuals or organizations through the Internet. What is the attitude and reaction of individual users when facing the continued threat of security? This study aims to investigate whether external threats affect the user’s intention to continue using the security software, and from the perspective of fear appeal, the existing security threat is used as the main component to drive the perceived usefulness to explore external threats and users. Also analyzes influences from society have become influential factors for users’ continuous use intentions or not The results show that the existence of an security threat does have a positive effect on the user's perceived usefulness, while the social influence also has a positive effect on the user's continuous use intention. However, the biggest factor affecting the user comes from the security software's satisfaction. The contribution of this research is to increase the understanding of the influencing factors of the user's network security protection software and to serve as a basis for future research.

參考文獻


[1] Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:https://doi.org/10.1016/0749-5978(91)90020-T
[2] Anderson, C. L., & Agarwal, R. (2010). Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Quarterly, 34(3), 613-643. doi:10.2307/25750694
[3] Anderson, E. W., & Sullivan, M. W. (1993). The Antecedents and Consequences of Customer Satisfaction for Firms. Marketing Science, 12(2), 125-143.
[4] Bargh, J. A., & McKenna, K. Y. A. (2004). The Internet and Social Life. Annual Review of Psychology, 55(1), 573-590. doi:10.1146/annurev.psych.55.090902.141922
[5] Baskerville, R. (1993). “Information Systems Security Design Methods: Implications for Information Systems Development” (Vol. 25).

延伸閱讀