earticle

논문검색

User Behavior Research of Information Security Technology Based on TAM

원문정보

초록

영어

By analyzing the present applying situation and influential factors of the information security technology, considering technological utility, cognitive cost, social impact, individual innovation, computer self-efficacy and other external variables, this paper constructs a model of user behavior of information security technology based on TAM. Through questionnaire to collect data and SPSS to perform reliability analysis, validity analysis, correlation analysis and regression analysis, the model in this paper is verified to be effective. Finally, some relative recommendations for the development of Chinese information security technology are put forward.

목차

Abstract
 1. Introduction
 2. Present Situation Analysis of Information Security Technology
 3. Model of User Behavior of Information Security Technology
 4. Empirical Analysis
 5. Conclusion
 Acknowledgment
 References

저자정보

  • Wang Cheng School of Economics and Management of Qiqihar University, Qiqihar, 161006, China
  • Wang Shi-bo School of Economics and Management of Qiqihar University, Qiqihar, 161006, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.