원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.8 No.2
2014.03
pp.203-210
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
By analyzing the present applying situation and influential factors of the information security technology, considering technological utility, cognitive cost, social impact, individual innovation, computer self-efficacy and other external variables, this paper constructs a model of user behavior of information security technology based on TAM. Through questionnaire to collect data and SPSS to perform reliability analysis, validity analysis, correlation analysis and regression analysis, the model in this paper is verified to be effective. Finally, some relative recommendations for the development of Chinese information security technology are put forward.
목차
Abstract
1. Introduction
2. Present Situation Analysis of Information Security Technology
3. Model of User Behavior of Information Security Technology
4. Empirical Analysis
5. Conclusion
Acknowledgment
References
1. Introduction
2. Present Situation Analysis of Information Security Technology
3. Model of User Behavior of Information Security Technology
4. Empirical Analysis
5. Conclusion
Acknowledgment
References
저자정보
참고문헌
자료제공 : 네이버학술정보
