237 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author신유형-
dc.date.accessioned2018-03-19T06:32:46Z-
dc.date.available2018-03-19T06:32:46Z-
dc.date.issued2012-04-
dc.identifier.citationAsia Pacific Journal of Information Systems, 2012, 22(1), P.53-77, 25P.en_US
dc.identifier.issn1229-0270-
dc.identifier.urihttp://www.earticle.net/article.aspx?sn=156501-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/48977-
dc.description.abstractFinancial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers’ personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.en_US
dc.description.sponsorshipThis work was supported by the research fund of Hanyang University(HY-2009-N).en_US
dc.language.isoko_KRen_US
dc.publisher한국경영정보학회en_US
dc.subject금융회사en_US
dc.subject고객정보보호en_US
dc.subject내부직원의태도en_US
dc.subject억제이론en_US
dc.subject보안주기활동en_US
dc.subjectIS Managementen_US
dc.subjectInformation Securityen_US
dc.subjectInformation Privacyen_US
dc.subjectDeterrence Theoryen_US
dc.subjectSecurity Action Cycleen_US
dc.title금융회사의 고객정보보호에 대한 내부직원의 태도 연구en_US
dc.title.alternativeThe Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Koreaen_US
dc.typeArticleen_US
dc.relation.no1-
dc.relation.volume22-
dc.relation.page53-77-
dc.relation.journalAsia Pacific Journal of Information Systems-
dc.contributor.googleauthor정우진-
dc.contributor.googleauthor신유형-
dc.contributor.googleauthor이상용-
dc.contributor.googleauthorJung, Woo-Jin-
dc.contributor.googleauthorShin, Yuhyung-
dc.contributor.googleauthorLee, Sang-Yong Tom-
dc.relation.code2012220852-
dc.sector.campusS-
dc.sector.daehakSCHOOL OF BUSINESS[S]-
dc.sector.departmentDIVISION OF BUSINESS ADMINISTRATION-
dc.identifier.pidyuhyung-
Appears in Collections:
GRADUATE SCHOOL OF BUSINESS[S](경영전문대학원) > ETC
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE