Примена теорије ставова за одређивање приступа безбедности корисника

Ključne reči: теорија ставова, став о безбедности, сигурност мобилних уређаја, информатичка безбедност

Sažetak


Мобилни телефони и интернет представљају битан део модерног живота, што поставља важна питања, као што су безбедност, заштита података и приватност. Бескрајна истраживања испитују шта утиче на приступе корисника безбедности. Теорија става даје основу за ово истраживање кроз које се испитују теме сајбер безбедности и сигурности, заштите података и приватности. Три компоненте става, које служе као три стуба примењеног истраживања, су: (1) когнитивна компонента (веровање и знање), (2) афективна компонента (осећања) и (3) понашајна компонента (утицај става на понашање корисника). Самопријављено знање о безбедности и осећања о безбедности су процењена, из чега су формирани три фактора користећи ЕФА. Безбедносно понашање сваког фактора испитано је да се утврди конзистентност одговора. Поред тога, три фактора помогла су у идентификацији три посебне групе. Као закључак може се рећи да теорија ставова може помоћи да се боље разуме понашање корисника у вези са безбедношћу. Напослетку, предложени су смерови за будућа истраживања. 

Biografije autora

Kata Rebeka Szűcs, ÓBUDA UNIVERSITY

PhD student

Doctoral School on Safety and Security Sciences, Népszínház u. 8., Budapest, Hungary

Andrea Tick, Óbuda University

Andrea Tick PhD is a habilitated associate professor at Óbuda University Keleti Faculty of Business and Management. Her research interests include internet security, cyber security, user behavior regarding digital learning, cyber security awareness and the human factor in cyber security. She also does research in digitalisation and digital transformation of SMESs. She has a BSc in Economics, an MA in Mathematics, Computer Science and English language and literature. Her PhD and Dr. habil research areas are digital teaching and learning with special cyber security awareness.

Regina Zsuzsanna Reicher, BUDAPEST BUSINESS SCHOOL

Associate professor

Faculty of Finance and Accountancy, Buzogány u. 10-12., Budapest, Hungary

Reference

Ashenden, D. (2018). In their own words: employee attitudes towards information security. Information and Computer Security, 26 (3), 327-337.

Aydin, K., Say, A. T., Ustaahmetoglu, E., & Yamamoto, G. T. (2007). Attitudes of Potential Consumers toward Country-of-Origin and Auto Brand Images. Serbian Journal of Management, 2 (2), 205 - 216.

Balapour, A., Nikkhah, R. H., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063.

Behardien, R., & Brown, I. (2022). Factors Influencing Smartphone End-User Security Behaviour – The Case of Young Adults in South Africa. 2022 IST-Africa Conference (IST-Africa), (pp. 1-10). Retrieved from https://ieeexplore.ieee.org/document/9845602

Chan, J. K. (2008). Understanding the Tourists' Attitudes toward Participating Nature-Based Tourism. Proceedings for Euro-Asia conference on environment and corporate social responsibility: tourism and management session, 156-168. Retrieved from https://www.webofscience.com/wos/woscc/full-record/WOS:000263364600018

Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261.

Harris, M. A., Brookshire, R., & Chin, A. G. (2016). Identifying factors influencing consumers’ intent to install mobile applications. International Journal of Information Management, 36 (3), 441-450.

Hofmeister-Tóth, Á. (2014). The Fundamentals of Consumer behavior. Budapest, Hungary: Akadémiai Kiadó (AK), (in Hungarian)

Kadena, E., & Keszthelyi, A. (2022). Identifying Failures in Mobile Devices. Interdisciplinary Description of Complex Systems, 20 (3), 222-229.

Kadena, E., Koçak, S., Takács-György, K., & Keszthelyi, A. (2022). FMEA in Smartphones: A Fuzzy Approach. MATHEMATICS, 10(3), 513.

KSH. (2021). 12.1.3.4. Internet users [as a percentage of the population aged 16-74]. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0029.html. (in Hungarian)

KSH. (2022a). 12.1.1.1. Main indicators of information and communication. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0001.html. (in Hungarian)

KSH. (2022b). Faster internet with a stable wireless net data processing form - Internet usage, 2022. Quarter II. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/infografika/2022/internet_infografika_20222.pdf. (in Hungarian)

KSH. (2022c). 12.1.1.14. Percentage of households connected to the internet. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0016.html. (in Hungarian)

KSH. (2022d). 12.1.1.16. Frequency distribution of internet use. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0018.html. (In Hungarian)

KSH. (2022e). 22.1.1.2. Number and average age of the population by sex. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0002.html. (in Hungarian)

KSH. (2022f). 22.1.2.1. Population by sex, county and region, 1 January. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0034.html. (in Hungarian)

Lazareva, E., Zakharova, A., Nikolaev, E., & Emelianova, M. (2019). Professional culture and attitude to personality security in future specialists. Professional culture of the specialists of the future- Book SeriesEuropean Proceedings of Social and Behavioural Sciences, 73, 785-793.

Münnich, Á., Nagy , Á., & Abari , K. (2006). Multivariate statistics for psychology students. Debrecen, Hungary: Bölcsész Konzorcium. Retrieved from http://gepeskonyv.btk.elte.hu/adatok/Pszichologia/8M%FCnnich/pages/p_2_9.xml. (in Hungarian)

Rahim, N., Hamid, S., Mat Kiah, M., Shamshirband, S., & Furnell , S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44, 606-622.

Rekettye , G., Tóth , T., & Malota , E. (2016). International Marketing - Online version. Budapest, Hungary: Akadémiai Publisher. Retrieved from https://mersz.hu/hivatkozas/dj76nm_116. (in Hungarian)

Szatmáry, R., & Szikora, P. (2023). Factors influencing technostress. In A. Szakál (Ed.), 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI) (pp. 299-306). Herlany,: Slovakia. doi:10.1109/SAMI58000.2023.10044527

Szucs, K. (2019). Mobile security basics to improve personal and corporate safety. National security review : periodical of the military national security service, (2), 56-72.

Thompson, N., McGill, T., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376-391.

Tick, A., Cranfield, D. J., Venter, I. M., Renaud, K. V., & Blignaut, R. J. (2021). Comparing Three Countries’ Higher Education Students’ Cyber Related Perceptions and Behaviours during COVID-19. Electronics , 10 (22), 2865.

Tsai, C.-Y., Shih, W.-L., Hsieh, F.-P., Chen , Y.-A., Lin, C.-L., & Wu, H.-J. (2022). Using the ARCS model to improve undergraduates’ perceived information security protection motivation and behavior. Computers & Education, 181. 104449

Objavljeno
2024/05/20
Rubrika
Originalni naučni članak