首页> 外文OA文献 >Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies
【2h】

Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies

机译:评估用户计算机自我效能,网络安全对策意识以及网络安全技能在政府机构对计算机滥用意图中的作用

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank usersu27 computer misuse. Cybersecurity breaches are threatening the common welfare of citizens since more and more terrorists are using cyberterrorism to target critical infrastructures (e.g., transportation, telecommunications, power, nuclear plants, water supply, banking) to coerce the targeted government and its people to accomplish their political objectives. Cyberwar is another major concern that nations around the world are struggling to get ready to fight. It has been found that intentional and unintentional usersu27 misuse of information systems (IS) resources represents about 50% to 75% of cybersecurity threats and vulnerabilities to organizations. Computer Crime and Security Survey revealed that nearly 60% of security breaches occurred from inside the organization by users.Computer users are one of the weakest links in the information systems security chain, because users seem to have very limited or no knowledge of user computer self-efficacy (CSE), cybersecurity countermeasures awareness (CCA), and cybersecurity skills (CS). Usersu27 CSE, CCA, and CS play an important role in usersu27 computer misuse intention (CMI). CMI can be categorized as unauthorized access, use, disruption, modification, disclosure, inspection, recording, or destruction of information system data. This dissertation used a survey to empirically assess usersu27 CSE, CCA, CS, and computer misuse intention (CMI) at government agencies. This study used Partial Least Square (PLS) technique to measure the fit of a theoretical model that includes seven independent latent variables (CSE, UAS-P, UAS-T, UAC-M, CCS, CIS, u26 CAS) and their influences on the dependent variable CMI. Also, PLS was used to examine if the six control variables (age, gender, job function, education level, length of working in the organization, u26 military status such as veteran) had any significant impact on CMI.This study included data collected from 185 employees of a local and state transportation agency from a large metropolitan in the northeastern United States. Participants received an email invitation to take the Web-based survey. PLS was used to test the four research hypotheses. The results of the PLS model showed that UAC-M and CIS were significant contributors (p
机译:网络安全威胁和漏洞给全世界的政府和组织造成了巨大的财务损失。网络安全犯罪分子每年利用银行用户滥用计算机造成的漏洞从银行窃取超过10亿美元。网络安全漏洞威胁着公民的共同利益,因为越来越多的恐怖分子利用网络恐怖主义来瞄准关键基础设施(例如交通,电信,电力,核电站,供水,银行)以强迫目标政府及其人民完成其政治使命目标。网络战是世界各国正在为战斗做好准备的另一个主要问题。已经发现,有意和无意的用户滥用信息系统(IS)资源占组织的网络安全威胁和漏洞的大约50%至75%。计算机犯罪和安全调查显示,将近60%的安全漏洞是由用户在组织内部发生的。计算机用户是信息系统安全链中最薄弱的环节之一,因为用户似乎对用户的计算机自我知之甚少或一无所知效能(CSE),网络安全对策意识(CCA)和网络安全技能(CS)。用户 CSE,CCA和CS在用户计算机滥用意图(CMI)中起着重要作用。 CMI可以归类为信息系统数据的未授权访问,使用,破坏,修改,披露,检查,记录或破坏。本文通过调查对政府机构的用户CSE,CCA,CS和计算机滥用意图(CMI)进行了实证评估。这项研究使用偏最小二乘(PLS)技术来测量包含七个独立潜在变量(CSE,UAS-P,UAS-T,UAC-M,CCS,CIS, u26 CAS)及其影响的理论模型的拟合度在因变量CMI上。此外,PLS还用于检查六个控制变量(年龄,性别,工作职能,教育程度,在组织工作的时间,退伍军人的军事地位)是否对CMI有显着影响。本研究包括收集的数据来自美国东北部某大城市的本地和州交通运输机构的185名员工。参与者收到了一封电子邮件邀请,以进行基于Web的调查。 PLS用于检验这四个研究假设。 PLS模型的结果表明,UAC-M和CIS是重要的贡献者(p

著录项

  • 作者

    Choi Min Suk;

  • 作者单位
  • 年度 2013
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号