語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
An examination of organizational inf...
~
Maar, Michael C.
FindBook
Google Book
Amazon
博客來
An examination of organizational information protection in the era of social media: A study of social network security and privacy protection.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
An examination of organizational information protection in the era of social media: A study of social network security and privacy protection./
作者:
Maar, Michael C.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2013,
面頁冊數:
358 p.
附註:
Source: Dissertations Abstracts International, Volume: 74-10, Section: B.
Contained By:
Dissertations Abstracts International74-10B.
標題:
Statistics. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3556686
ISBN:
9781267989352
An examination of organizational information protection in the era of social media: A study of social network security and privacy protection.
Maar, Michael C.
An examination of organizational information protection in the era of social media: A study of social network security and privacy protection.
- Ann Arbor : ProQuest Dissertations & Theses, 2013 - 358 p.
Source: Dissertations Abstracts International, Volume: 74-10, Section: B.
Thesis (Ph.D.)--Capella University, 2013.
This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive practices. The study examines the protection motivation factors, privacy management practices, and their relationships. The privacy and security issues related to online social networks are discussed. A review of protection motivation theories and privacy management theories has been conducted. Combining protection motivation theories and communication privacy management, an integrated information protection model has been created. Motivating factors include perceived privacy threat, perceived security threat, perceived trustworthiness of online social networks, perceived deception threats, information security self-efficacy, response efficacy, benefit-cost ratio, personal norms, and habits. Privacy management practices are characterized by boundary permeability, boundary linkage, and boundary ownership. With respect to online social networks, these three privacy management constructs have been defined as breadth, depth, and frequency of information disclosure, control of social network connections, and control of sensitive information respectively. Based on the research model, a set of hypotheses have been developed for testing using online survey. The survey data has been analyzed using structural equation modeling and a more detailed model developed that is based on theories and findings from published studies. The findings confirm the hypotheses of the direct relations of the refined research model. Privacy, deception, and security concerns influence boundary permeability, linkage, and ownership respectively. Self-efficacy and response efficacy are positive motivators for social network connection and sensitive information control. Trust reduces privacy, deception, and security concerns. Trust enhances perception of benefits and efficacy. Aggravated security concern can depress self-efficacy. Personal norms and habits can be valuable drivers for information protection behavior. The integrated information protection model may be used to develop security promotion messages and training for employees to help them protect their personal private information and confidential business information. Future research may include larger samples, research in businesses or organizations, cross-cultural studies, other information sharing or collaboration environments, and meta-analysis.
ISBN: 9781267989352Subjects--Topical Terms:
517247
Statistics.
Subjects--Index Terms:
Cyber attacks
An examination of organizational information protection in the era of social media: A study of social network security and privacy protection.
LDR
:03914nmm a2200397 4500
001
2274621
005
20201202130036.5
008
220629s2013 ||||||||||||||||| ||eng d
020
$a
9781267989352
035
$a
(MiAaPQ)AAI3556686
035
$a
(MiAaPQ)capella:14283
035
$a
AAI3556686
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Maar, Michael C.
$3
3552120
245
1 3
$a
An examination of organizational information protection in the era of social media: A study of social network security and privacy protection.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2013
300
$a
358 p.
500
$a
Source: Dissertations Abstracts International, Volume: 74-10, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Yellen, Richard E.
502
$a
Thesis (Ph.D.)--Capella University, 2013.
520
$a
This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive practices. The study examines the protection motivation factors, privacy management practices, and their relationships. The privacy and security issues related to online social networks are discussed. A review of protection motivation theories and privacy management theories has been conducted. Combining protection motivation theories and communication privacy management, an integrated information protection model has been created. Motivating factors include perceived privacy threat, perceived security threat, perceived trustworthiness of online social networks, perceived deception threats, information security self-efficacy, response efficacy, benefit-cost ratio, personal norms, and habits. Privacy management practices are characterized by boundary permeability, boundary linkage, and boundary ownership. With respect to online social networks, these three privacy management constructs have been defined as breadth, depth, and frequency of information disclosure, control of social network connections, and control of sensitive information respectively. Based on the research model, a set of hypotheses have been developed for testing using online survey. The survey data has been analyzed using structural equation modeling and a more detailed model developed that is based on theories and findings from published studies. The findings confirm the hypotheses of the direct relations of the refined research model. Privacy, deception, and security concerns influence boundary permeability, linkage, and ownership respectively. Self-efficacy and response efficacy are positive motivators for social network connection and sensitive information control. Trust reduces privacy, deception, and security concerns. Trust enhances perception of benefits and efficacy. Aggravated security concern can depress self-efficacy. Personal norms and habits can be valuable drivers for information protection behavior. The integrated information protection model may be used to develop security promotion messages and training for employees to help them protect their personal private information and confidential business information. Future research may include larger samples, research in businesses or organizations, cross-cultural studies, other information sharing or collaboration environments, and meta-analysis.
590
$a
School code: 1351.
650
4
$a
Statistics.
$3
517247
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Systems science.
$3
3168411
653
$a
Cyber attacks
653
$a
Deception
653
$a
Information protection
653
$a
Online social network
653
$a
Privacy
653
$a
Security
690
$a
0463
690
$a
0489
690
$a
0790
710
2
$a
Capella University.
$b
School of Business and Technology.
$3
1673949
773
0
$t
Dissertations Abstracts International
$g
74-10B.
790
$a
1351
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3556686
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9426855
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入