博碩士論文 110423034 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:36 、訪客IP:13.59.205.157
姓名 林欣慧(Hsin-Hui Lin)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 個人網路安全行為影響因素之探討
(Exploration of Factors Influencing Individual Internet Security Behaviors)
相關論文
★ 技術商品銷售之技術人員關鍵職能探討★ 資訊委外之承包商能力、信任及溝通與委外成效關係之個案研究
★ 兵工技術軍官職能需求分析-以某軍事工廠為例★ 不同楷模學習模式對VB程式語言學習之影響
★ 影響採購「網路資料中心產品」因素之探討★ 資訊人員績效評估之研究—以陸軍某資訊單位為例
★ 高職資料處理科學生網路成癮相關因素及其影響之探討★ 資訊服務委外對資訊部門及人員之衝擊-某大型外商公司之個案研究
★ 二次導入ERP系統之研究-以某個案公司為例★ 資料倉儲於證券產業應用之個案研究
★ 影響消費者採用創新數位產品之因素---以整合式手機為例★ 企業合併下資訊系統整合過程之個案研究
★ 資料倉儲系統建置之個案研究★ 電子表單系統導入之探討 - 以 A 公司為例
★ 企業資訊安全機制導入與評估–以H公司為例★ 從人力網站探討國內資訊人力現況–以104銀行資料為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2028-7-1以後開放)
摘要(中) 現今資訊世代使用網路人口日增,網路安全成為當代必須面對的議題,故本研究藉由資訊 - 動機 - 行為技巧模型 ( IMB 模型 ) ,探討網路安全知識、網路安全態度、社會環境、資訊自我效能、人格特質等因素與網路安全行為的關係。並將上述因素納入 IMB 模型作為主要架構,模型的「資訊」構念以網路安全知識做測量,「動機」以社會認知理論提出的個人與社會環境動機衡量,「行為技巧」則以資訊自我效能做界定,並探討五大人格特質對於網路安全行為的影響。本研究共發展13條假說,並採網路問卷調查收集資料,共獲得526份有效問卷,採偏最小平方法 ( Partial Least Square ) 檢視各項假說是否成立。
研究結果顯示,網路安全知識對資訊自我效能與網路安全行為有正向影響;網路安全態度對網路安全知識、資訊自我效能與網路安全行為有正向影響;社會環境對網路安全知識、資訊自我效能與網路安全行為有正向影響;資訊自我效能對網路安全有正向影響;人格特質的嚴謹性對網路安全行為有正向影響,年齡與網路安全行為有顯著負向關係,而教育程度高低與網路安全行為有顯著正向關係。
根據本研究所得結果,建議未來網路安全行為的探討可以 IMB 模型作為架構,納入其他因素以探究其他促進個人實踐網路安全行為的因素。此外,本研究亦針對不顯著之假說提出可能的解釋,並提出研究過程中的限制以及對未來研究方向的建議。本研究貢獻是證實藉由 IMB 模型能有效預測網路安全行為,呼應行為技巧是影響行為的關鍵中介變數,並納入社會認知理論及人格特質更深入探討影響個人網路安全行為的因素。

關鍵詞:資訊 - 動機 - 行為技巧模型、網路安全知識、資訊自我效能、人格特質、網路安全行為
摘要(英) As the number of internet users increases in this generation, internet security has become an issue. We examine whether the Information-Motivation-Behavioral Skills (IMB) Model could predict individual internet security behaviors. Using the IMB model, data collected from 526 samples on their internet security knowledge (information variable of IMB), personal attitude toward internet security and environmental factors (motivation variable of IMB), self-efficacy in information with internet security measures (behavioral skills variable of IMB), and internet security behavior (outcome variable of IMB). And there are three personality traits, e.g., agreeableness, openness to experience, and conscientiousness, are tested in this study.
The results of this study show that almost all hypotheses have positive effects on internet security behaviors; age has a positive impact on individual internet security behaviors; and education level has a negative influence on cybersecurity behaviors. And an analysis conducted with Partial Least Square (PLS) confirmed that the IMB model was a suitable model to predict individual internet security behaviors. The findings suggest that the internet security behaviors of individuals can be improved by enhancing individual internet security knowledge, motivation, and self-efficacy in information, supporting the use of the IMB model and in combination with existing predictors in this study. According to the research findings, this paper proposes managerial implications and future research directions.

Keywords: IMB model, Internet Security Knowledge, Self-efficacy in Information, Personality Traits, Internet Security Behaviors
關鍵字(中) ★ 資訊 - 動機 - 行為技巧模型
★ 網路安全知識
★ 資訊自我效能
★ 人格特質
★ 網路安全行為
關鍵字(英) ★ IMB Model
★ Internet Security Knowledge
★ Self-efficacy in Information
★ Personality Traits
★ Internet Security Behaviors
論文目次 摘要 …………………………ii
Abstract …………………………iii
誌 謝 …………………………iv
圖目錄 …………………………vii
表目錄 …………………………viii
第一章 緒論 …………………………1
1.1 研究背景和動機 …………………………1
1.2研究目的 …………………………3
1.3論文架構與研究流程 …………………………4
第二章 文獻探討 …………………………6
2.1 IMB模型 …………………………6
2.1.1 資訊 ( Information ) …………………………7
2.1.2動機 ( Motivation ) …………………………10
2.1.3 行為技巧 ( Behavioral Skills ) …………………………13
2.1.4 行為 ( Behavior ) …………………………15
2.2人格特質與網路安全行為 …………………………16
2.2.1宜人性 …………………………18
2.2.2經驗開放性 …………………………19
2.2.3嚴謹性 …………………………19
第三章 研究方法 …………………………20
3.1 研究假說與模型 …………………………20
3.2變數定義與問卷發展 …………………………21
3.2.1前測 …………………………22
3.3問卷設計 …………………………22
3.3.1依變數:網路安全行為 ( CSB ) …………………………23
3.3.2自變數 …………………………23
3.3.3控制變項:人口統計變數 …………………………24
3.4正式測量:資料與樣本收集 …………………………24
3.5資料分析方法 …………………………25
第四章 資料分析 …………………………26
4.1樣本結構及特徵分析 …………………………26
4.2測量模型分析 …………………………27
4.3結構模型分析 …………………………31
4.4人口統計變項分析 …………………………35
第五章 結論與建議 …………………………38
5.1結論 …………………………38
5.1.1研究貢獻 …………………………39
5.1.2理論意涵 …………………………40
5.2管理意涵 …………………………41
5.3研究限制與未來發展 …………………………43
參考文獻 …………………………45
附錄 …………………………56
附錄一 …………………………56
附錄二 …………………………57
參考文獻 [1] 林季謙:〈不同網路能力、人格特質與人際關係中小學生對網路成癮的影響〉,碩士論文,南華大學,民國94年。
[2] 張自健:〈高職校園景觀配置內涵之研究〉,博士論文,國立臺灣師範大學,民國92年。
[3] 葉明佳:〈從資訊-動機-行為技能模式探討N世代青年正確用藥行為〉,博士論文,國立政治大學,民國106年。
[4] 鄭冠駿:〈由溝通媒介的選擇,探討個人人格特質對於其溝通滿足之影響〉,博士論文,國立中央大學,民國94年。
[5] 畢恆達:〈環境心理學研究資料引介〉,《國立台灣大學建築與城鄉研究學報》,4,民國78年,115-136 頁。
[6] 李仁豪、鍾芯瑜:〈中文版簡式「五大人格量表」BFI 的發展〉,《測驗學刊》,67(4),民國109年,271-299頁。
[7] 黃堅厚:《人格心理學》,台北:心理出版社,民國88年。
[8] 趨勢科技:〈2022年度網路資安報告〉,2023 年 1 月 16 日,取自trendmicro.com。
[9] 內政部警政署:〈網路犯罪發生數統計〉,2023 年 1 月 16 日,取自https://www.npa.gov.tw/ch/app/analysis/list?module=analysis&id=18089。
[10] DATAREPORTAL:〈DIGITAL 2023: TAIWAN〉,2023 年 1 月 25 日,取自https://datareportal.com/reports/digital-2023-taiwan。
[11] International Telecommunication Union:〈Individuals using the Internet〉,2022 年 12 月 16 日,取自https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx。
[12] Albladi, S. M. and Weir, G. R. S. (2017). Personality traits and cyber-attack victimisation: Multiple mediation analysis. IEEE, 1-6.
[13] Aloul, F. A. (2011). The Need for Effective Information Security Awareness. Journal of Advances in Information Technology, 3, 176-183.
[14] Alshamrani, A., Myneni, S., Chowdhary, A., & Huang, D. (2019). A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Communications surveys and tutorials, 21(2), 1851-1877.
[15] Amichai-Hamburger, Y. (2002). Internet and personality. Computers in Human Behavior, 18(1), 1-10.
[16] Arthur, W. and W. Grazziano (1996). The five-factor model, conscientiousness, and driving accident involvement. Journal of Personality 64(3): 594-618
[17] Bandura A. Self-efficacy: toward a unifying theory of behavioral change. Psychol Rev. 1977 Mar;84(2):191-215.
[18] Bandura, A. (1986). The explanatory and predictive scope of self-efficacy theory. Journal of Social and Clinical Psychology, 4, 359-373.
[19] Bandura, A. (1989). Human Agency in Social Cognitive Theory. The American Psychologist, 44, 1175-1184.
[20] Barrick, M. R., Stewart, G. L., & Piotrowski, M. (2002). Personality and job performance: Test of the mediating effects of motivation among sales representatives. Journal of Applied Psychology, 87, 43-51.
[21] Belford, R. E. (2013). Review of Learning Theories: An Educational Perspective Journal of chemical education, 90(2), 150-151.
[22] Bonneau, J., Herley, C., van Oorschot, P. C., & Stajano, F. (2012). The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE Symposium on Security and Privacy, 553-567.
[23] Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly, 34(3).
[24] Butavicius, M., Parsons, K., Lillie, M., McCormac, A., Pattinson, M., & Calic, D. (2020). When believing in technology leads to poor cyber security: Development of a trust in technical controls scale. Computers & Security, 98-102.
[25] Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36-45.
[26] Cellar, D. F., Z. C. Nelson and C. M. Yoke (2001). The five factor model: Investigating the relationships between personality and accident involvement. Journal of Prevention & Intervention in the Community 22(1): 43-52.
[27] Chet, C., & Jeffrey, J. (2010). Analyzing the adoption of computer security utilizing the health belief model. Issues in information systems, 11(1), 286-291.
[28] Claar, C., & Johnson, J. (2010). Analysing the adoption of computer security utilizing the health belief model. Issues in Information Systems, 4(1), 286-291.
[29] Compeau, D. R., & Higgins, C. A. (1995). Computer Self-Efficacy: Development of a Measure and Initial Test. MIS Quarterly, 19(2), 189-211.
[30] Cooper, J. A., Moriarty, F., Ryan, C., Smith, S. M., Bennett, K., Fahey, T., Wallace, E., Cahir, C., Williams, D., Teeling, M., & Hughes, C. M. (2016). Potentially inappropriate prescribing in two populations with differing socio-economic profiles: a cross-sectional database study using the PROMPT criteria. Eur J Clin Pharmacol, 72(5), 583-591.
[31] Costa, P., & McCrae, R. (1992). Neo PI-R professional manual. Psychological Assessment Resources, 396.
[32] Costa , P., McCrae, Robert (2008). The Revised NEO Personality Inventory (NEO-PI-R). In The SAGE handbook of personality theory and assessment, Vol 2: Personality measurement and testing., 179-198.
[33] Costa, P. T., Jr., & McCrae, R. R. (1987). Neuroticism, somatic complaints, and disease: is the bark worse than the bite? J Pers, 55(2), 299-316.
[34] Costa, P. T., & McCrae, R. R. (1986). Cross-sectional studies of personality in a national sample: I. Development and validation of survey measures. Psychology and Aging, 1, 140-143.
[35] DeYoung, C. G., Quilty, L. C., & Peterson, J. B. (2007). Between facets and domains: 10 aspects of the Big Five. Journal of Personality and Social Psychology, 93, 880-896.
[36] Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: the role of national cultural differences. Information systems journal (Oxford, England), 19(4), 391-412.
[37] Edwards, J. R. (2001). Multidimensional Constructs in Organizational Behavior Research: An Integrative Analytical Framework. Organizational research methods, 4(2), 144-192.
[38] Falk, R. F., & Miller, N. B. (1992). A primer for soft modeling. Akron, Ohio: University of Akron Press.
[39] Farooq, A., Jeske, D., & Isoaho, J. (2019). Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model. 238-252.
[40] Fisher, & Fisher. (1994). Changing AIDS-Risk Behavior. Advances in consumer research, 21.
[41] Fisher, F. (1992). Changing AIDS-risk behavior. Psychological Bulletin, 111, 455-474.
[42] Fisher, J. D., Fisher, W. A., Amico, K. R., & Harman, J. J. (2006). An information-motivation-behavioral skills model of adherence to antiretroviral therapy. Health Psychol, 25(4), 462-473.
[43] Fisher, J. D., Fisher, W. A., Bryan, A. D., & Misovich, S. J. (2002). Information-motivation-behavioral skills model-based HIV risk behavior change intervention for inner-city high school youth. Health Psychol, 21(2), 177-186.
[44] Fisher, W., Fisher, J., & Harman, J. (2009).The Information‐Motivation‐Behavioral Skills Model: A General Social Psychological Approach to Understanding and Promoting Health Behavior. Social Psychological Foundations of Health and Illness, 82-106.
[45] Fisher, W. A., Williams, S. S., Fisher, J. D., & Malloy, T. E. (1999). Understanding AIDS Risk Behavior Among Sexually Active Urban Adolescents: An Empirical Test of the Information–Motivation–Behavioral Skills Model. AIDS and Behavior, 3(1), 13-23.
[46] Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variabiles and neasurement error: Algebra and Statistics. Journal of marketing research, 18(3), 382-388.
[47] Frydenberg, M., & Lorenz, B. (2020). Lizards in the Street! Introducing Cybersecurity Awareness in a Digital Literacy Context. Information systems education journal, 18(4), 33-34.
[48] Frydenberg, M., & Press, L. (2010). From Computer Literacy to Web 2.0 Literacy: Teaching and Learning Information Technology Concepts Using Web 2.0 Tools. Proceedings of the Information Systems Education Conference, ISECON, 8.
[49] Funder, D. C. (2001). Personality. Annual Review of Psychology. 52(1), 197-221.
[50] Furnham, A., & Fudge, C. (2008). The Five Factor model of personality and sales performance. Journal of Individual Differences, 29, 11-16.
[51] Garg, V., & Camp, J. (2012). End User Perception of Online Risk under Uncertainty. 45th Hawaii International Conference on System Sciences, 3278-3287.
[52] Goldberg, L. R. (1990). An alternative description of personality: The Big-Five factor structure. Journal of Personality and Social Psychology, 59, 1216-1229.
[53] Gratian, M., Bandi, S., Cukier, M., Dykstra, J., & Ginther, A. (2018). Correlating human traits and cyber security behavior intentions. Computers & Security, 73, 345-358.
[54] Hadlington, L. (2018). Employees attitude towards cyber security and risky online behaviours: An empirical assessment in the United Kingdom. International Journal of Cyber Criminology, 12, 269-281.
[55] Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a Silver Bullet. Journal of marketing theory and practice. 19(2), 139-152.
[56] Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review. 31(1), 2-24.
[57] Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414-433.
[58] Halevi, T., Lewis, J., & Memon, N. (2013). A pilot study of cyber security and privacy related behavior and personality traits. WWW ′13 Companion International World Wide Web Conference,
[59] He, W., Yuan, X., & Tian, X. (2014). The Self-Efficacy Variable in Behavioral Information Security Research. Proceedings - 2nd International Conference on Enterprise Systems, ES 2014, 28-32.
[60] Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135.
[61] Hong, Y., & Furnell, S. (2021). Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications, 57, 102.
[62] Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95.
[63] Interpol. (2017). “ Counter the threat of terrorism. ”
[64] Jeske, D., & van Schaik, P. (2017). Familiarity with Internet threats: Beyond awareness. Computers & Security, 66, 129-141.
[65] Jin-Hee, C., Hasan, C., & Oltramari, A. (2016). Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).
[66] John, O. P., Naumann, L. P., & Soto, C. J. (2008). Paradigm shift to the integrative Big Five trait taxonomy: History, measurement, and conceptual issues. In Handbook of personality: Theory and research, 3rd ed, 114-158.
[67] John, O. P., & Srivastava, S. (1999). The Big Five Trait taxonomy: History,measurement, and theoretical perspectives. In L. A. Pervin & O. P. John (Eds.).Handbook of personality: Theory and research, 102–138.
[68] Kim, W., Jeong, O.-R., Kim, C., & So, J. (2011). The dark side of the Internet: Attacks, costs and responses. Information systems (Oxford), 36(3), 675-705.
[69] Kinzie, M. B., & Delcourt, M. A. B. (1991). Computer Technologies in Teacher Education: The Measurement of Attitudes and Self-Efficacy. American Education Research Association (AERA).
[70] Korotkov, D., & Hannah, T. E. (2004). The Five-Factor Model of Personality: Strengths and limitations in predicting health status, sick-role and illness behaviour. Personality and Individual Differences, 36, 187-199.
[71] Korzaan, M., & Boswell, K. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48, 15-24.
[72] Kruger, H., Drevin, L., & Steyn, T. (2010). A vocabulary test to assess information security awareness. Information Management & Computer Security, 18(5), 316-327.
[73] Lehto, M. (2019). Cyber security competencies -cyber security education and research in Finnish universities. The 14th European Conference on Information Warfare and Security, 2-3.
[74] Liao, H., & Chuang, A. (2004). A Multilevel Investigation of Factors Influencing Employee Service Performance and Customer Outcomes. Academy of Management Journal, 47, 41-58.
[75] Lodi-Smith, J., & Roberts, B. W. (2007). Social investment and personality: a meta-analysis of the relationship of personality traits to investment in work, family, religion, and volunteerism. Pers Soc Psychol Rev, 11(1), 68-86.
[76] Ma, Q., & Liu, L. (2005). The Role of Internet Self-Efficacy in the Acceptance of Web-Based Electronic Medical Records. Journal of Organizational and End User Computing, 17(1), 38-57.
[77] Matt, C., & Peckelsen, P. (2016). Sweet Idleness, but Why? How Cognitive Factors and Personality Traits Affect Privacy-Protective Behavior. 2016 49th Hawaii International Conference on System Sciences (HICSS).
[78] Mayberry, L. S., & Osborn, C. Y. (2014). Family involvement is helpful and harmful to patients’ self-care and glycemic control. Patient Education and Counseling, 97, 418-425.
[79] McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual differences and Information Security Awareness. Computers in Human Behavior, 69, 151-156.
[80] Mount, M. K., & Barrick, M. R. (1998). Five reasons why the "Big Five" article has been frequently cited. Personnel Psychology, 51(4), 849–857.
[81] Ng, B.-Y., Kankanhalli, A., & Xu, Y. (2009). Studying users′ computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825.
[82] Ng, B.-Y., & Rahim, M. (2005). A Socio-Behavioral Study of Home Computer Users′ Intention to Practice Security. Pacific Asia Conference on Information Systems.
[83] Näsi, M., Oksanen, A., Keipi, T., & Räsänen, P. (2015). Cybercrime victimization among young people: a multi-nation study. Journal of Scandinavian Studies in Criminology and Crime Prevention, 16(2), 203-210.
[84] Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R. T., & Whitty, M. (2014). Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Security and Privacy Workshops.
[85] Pervin, L. A. (1996). The science of personality. N.Y.: Wiley.
[86] Phillips, J. G., Butt, S., & Blaszczynski, A. (2006). Personality and Self-Reported Use of Mobile Phones for Games. Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society, 9(6), 753-758.
[87] Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users′ information security practice behavior. Computers & Security, 28(8), 816-826.
[88] Rocha Flores, W., Holm, H., Svensson, G., & Ericsson, G. (2014). Using phishing experiments and scenario-based surveys to understand security behaviours in practice. Information Management & Computer Security, 22(4), 393-406.
[89] Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of applied psychology, 88(5), 879-903.
[90] Söllner, M., Bitzer, P., Janson, A., & Leimeister, J. M. (2018). Process is King: Evaluating the Performance of Technology-mediated Learning in Vocational Software Training. Journal of information technology, 33(3), 233-253.
[91] Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the ′weakest link′ - A human/computer interaction approach to usable and effective security. BT technology journal, 19(3), 122-131.
[92] Saucier, G., & Goldberg, L. R. (2003). The structure of personality attributes. Personality and work: Reconsidering the role of personality in organizations, 1-29.
[93] Schunk, D. H., Meece, J. L., & Pintrich, P. R. (2014). Motivation in education: Theory,research, and applications (4th ed.). Pearson Education.
[94] Seacat, J. D., & Northrup, D. (2010). An information–motivation–behavioral skills assessment of curbside recycling behavior. Journal of Environmental Psychology, 30, 393-401.
[95] Shappie, A., Dawson, C., & Debb, S. (2019). Personality as a Predictor of Cybersecurity Behavior. Psychology of Popular Media Culture, 9.
[96] Shmueli, G., & Koppius, O. R. (2011). Predictive Analytics in Information Systems Research. MIS Quarterly, 35(3), 553-572.
[97] Shropshire, J., Warkentin, M., Johnston, A., & Schmidt, M. (2006). Personality and IT security: An application of the five-factor model. 12th Americas Conference on Information Systems ( AMCIS ).
[98] Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers & Security, 49, 177-191.
[99] Safa, Nader & Furnell, Steven. (2015). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.
[100] Taylor, S., Todd, P.A (1995). Understanding Information Technology Usage: A Test of Competing Models. Inf. Syst. Res. 6, 144–176.
[101] Thompson, N., McGill, T. J., & Wang, X. (2017). Security begins at home: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376-391.
[102] Tsai, H.-y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138-150.
[103] Uffen, J., Guhr, N., & Breitner, M. H. (2012). Personality traits and information security management : An empirical study. Computer Science, Business
[104] Vamos, C. A., Thompson, E. L., Avendano, M., Daley, E. M., Quinonez, R. B., & Boggess, K. (2015). Oral health promotion interventions during pregnancy: a systematic review. Community Dent Oral Epidemiol, 43(5), 385-396.
[105] Van Dijk, J. A. G. M., & Deursen, A. J. A. M. (2014). Digital skills, unlocking the Information society. Digital Education and Learning (DEAL).
[106] Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & management, 49(3-4), 190-198.
[107] Woon, I.M.Y.,Tan, G.W.,Low, R.T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems 26th International Conference on Information Systems, 367-380.
[108] Zaphiris, P., & Ioannou, A. (2018). Stenmap: Framework for Evaluating Cybersecurity-Related Skills Based on Computer Simulations. Springer International Publishing AG., Vol. 10925, 492-504.
[109] Zhao, X., Lynch Jr, J. G., & Chen, Q. (2010). Reconsidering Baron and Kenny: Myths and truths about mediation analysis. Journal of Consumer Research, 37(2), 197-206.
[110] Zhu, C., Cai, Y., Ma, J., Li, N., Zhu, J., He, Y., Redmon, P., & Qiao, Y. (2013). Predictors of intention to smoke among junior high school students in Shanghai, China: An empirical test of the information-motivation-behavioral skills (IMB) model. PloS one, 8(11), 80.
[111] Zimet, G.D., Dahlem, N.W., Zimet, S.G., Farley, G.K (1988). The Multidimensional scale of perceived social support. Personal, 52, 30–41.
[112] Zwilling, M., Klien, G., Lesjak, D., Wiechetek, L., Çetin, F., & Basım, N. (2022). Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. Journal of Computer Information Systems, 62, 82-97.
指導教授 周惠文(Hui-Wen Chou) 審核日期 2023-7-13
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明