透過您的圖書館登入
IP:3.129.13.201
  • 期刊

資訊安全政策實施對資訊安全文化與資訊安全有效性影響之研究

A Study of the Effect of Implementing Information Security Policy on Information Security Culture and Information Security Effectiveness in an Organization

摘要


隨著組織對資訊化依賴程度愈深,所面對的資訊安全威脅就愈多。組織除了擁有資訊安全技術外更須要一套資訊安全政策供組織有一致的管理標準來遵循。然而許多組織已建立資訊安全政策,還是難以避免許多資訊安全事件發生,究其原因是輕忽安全管理重要性的組織文化。本研究將探討資訊安全政策實施的管理活動與建立資訊安全文化之關係與影響性。針對國內大型企業的資訊主管進行問卷調查並使用結構方程模型進行資料分析。研究結果顯示: 1. 資訊安全教育與宣導、高階主管支持、違反資訊安全規範懲處對資訊安全文化有正向顯著的影響。 2. 資訊安全文化對知覺資訊安全有效性有正向顯著影響。 3. 資訊安全政策維護對制訂資訊安全政策文件有顯著的影響。

並列摘要


Organizations nowadays rely highly on the information technology to achieve its daily operation demand. Due to the continual occurrence of many information security incidents, the protection of information systems is a major problem faced by organization. For an organization's information security, it is not only a technical issue but also a management issue. The application of an IS security policy is one of the major mechanisms employed by IS security management. The purpose of this study is to explore the effect of implementing an information security policy on information security culture and information security effectiveness in promoting the activities about information security policy. According to the large business ranking of top 1000 by China Credit Information Service, Ltd., we conducted a questionnaire survey of the MIS department manager. Structural Equations Modeling (SEM) was applied to analyze the data and the main findings of the study are as follows. 1. The implementation of an information security policy has positive impacts on information security culture. 2. Information security culture has positive impacts on perceived information security effectiveness. 3. The maintenance of an information security policy has positive impacts on making the documents of information security policy.

參考文獻


林妙雀(2005)。企業之智慧資本與分享組織文化對組織管理績效影響之實證研究。管理評論。24(1),55-81。
(ISO ISO/IEC 27001:2005, International Organization for Standardization, Switzerland, 2005.).
Adams, J. S.,Tashchian, A.,Shore, T. H.(2001).Codes of Ethics as Signals for Ethical Behavior.Journal of Business Ethics.29(3),199-211.
Allen, B.(1968).Danger Ahead! Safeguard Your Computer.Harvard Business Review.46(6),97-101.
Andress, M.,Fonseca, B.(2000).Manage People to Protect Data.InfoWorld.22(46),48-.

被引用紀錄


Kuo, J. H. (2014). 雲端運算資訊安全之研究 [doctoral dissertation, Chang Jung Chrisian University]. Airiti Library. https://doi.org/10.6833/CJCU.2014.00001
李俊安(2015)。威權組織人員採用智慧型手機之行為意圖研究〔碩士論文,國立屏東科技大學〕。華藝線上圖書館。https://doi.org/10.6346/NPUST.2015.00173
賴冠華(2015)。資訊安全管理之探討 -以A公司在兩岸建構為例〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0412201512042972
沈國榮(2016)。影響企業員工對個人資料保護不同態度之研究〔碩士論文,國立中正大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201614072620
謝勝文(2016)。瞭解遵守資訊政策意圖:處罰、社會影響、價值認知及安全風氣〔碩士論文,國立中正大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201614063666

延伸閱讀