Примена теорије ставова за одређивање приступа безбедности корисника
Sažetak
Мобилни телефони и интернет представљају битан део модерног живота, што поставља важна питања, као што су безбедност, заштита података и приватност. Бескрајна истраживања испитују шта утиче на приступе корисника безбедности. Теорија става даје основу за ово истраживање кроз које се испитују теме сајбер безбедности и сигурности, заштите података и приватности. Три компоненте става, које служе као три стуба примењеног истраживања, су: (1) когнитивна компонента (веровање и знање), (2) афективна компонента (осећања) и (3) понашајна компонента (утицај става на понашање корисника). Самопријављено знање о безбедности и осећања о безбедности су процењена, из чега су формирани три фактора користећи ЕФА. Безбедносно понашање сваког фактора испитано је да се утврди конзистентност одговора. Поред тога, три фактора помогла су у идентификацији три посебне групе. Као закључак може се рећи да теорија ставова може помоћи да се боље разуме понашање корисника у вези са безбедношћу. Напослетку, предложени су смерови за будућа истраживања.
Reference
Ashenden, D. (2018). In their own words: employee attitudes towards information security. Information and Computer Security, 26 (3), 327-337.
Aydin, K., Say, A. T., Ustaahmetoglu, E., & Yamamoto, G. T. (2007). Attitudes of Potential Consumers toward Country-of-Origin and Auto Brand Images. Serbian Journal of Management, 2 (2), 205 - 216.
Balapour, A., Nikkhah, R. H., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063.
Behardien, R., & Brown, I. (2022). Factors Influencing Smartphone End-User Security Behaviour – The Case of Young Adults in South Africa. 2022 IST-Africa Conference (IST-Africa), (pp. 1-10). Retrieved from https://ieeexplore.ieee.org/document/9845602
Chan, J. K. (2008). Understanding the Tourists' Attitudes toward Participating Nature-Based Tourism. Proceedings for Euro-Asia conference on environment and corporate social responsibility: tourism and management session, 156-168. Retrieved from https://www.webofscience.com/wos/woscc/full-record/WOS:000263364600018
Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261.
Harris, M. A., Brookshire, R., & Chin, A. G. (2016). Identifying factors influencing consumers’ intent to install mobile applications. International Journal of Information Management, 36 (3), 441-450.
Hofmeister-Tóth, Á. (2014). The Fundamentals of Consumer behavior. Budapest, Hungary: Akadémiai Kiadó (AK), (in Hungarian)
Kadena, E., & Keszthelyi, A. (2022). Identifying Failures in Mobile Devices. Interdisciplinary Description of Complex Systems, 20 (3), 222-229.
Kadena, E., Koçak, S., Takács-György, K., & Keszthelyi, A. (2022). FMEA in Smartphones: A Fuzzy Approach. MATHEMATICS, 10(3), 513.
KSH. (2021). 12.1.3.4. Internet users [as a percentage of the population aged 16-74]. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0029.html. (in Hungarian)
KSH. (2022a). 12.1.1.1. Main indicators of information and communication. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0001.html. (in Hungarian)
KSH. (2022b). Faster internet with a stable wireless net data processing form - Internet usage, 2022. Quarter II. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/infografika/2022/internet_infografika_20222.pdf. (in Hungarian)
KSH. (2022c). 12.1.1.14. Percentage of households connected to the internet. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0016.html. (in Hungarian)
KSH. (2022d). 12.1.1.16. Frequency distribution of internet use. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0018.html. (In Hungarian)
KSH. (2022e). 22.1.1.2. Number and average age of the population by sex. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0002.html. (in Hungarian)
KSH. (2022f). 22.1.2.1. Population by sex, county and region, 1 January. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0034.html. (in Hungarian)
Lazareva, E., Zakharova, A., Nikolaev, E., & Emelianova, M. (2019). Professional culture and attitude to personality security in future specialists. Professional culture of the specialists of the future- Book SeriesEuropean Proceedings of Social and Behavioural Sciences, 73, 785-793.
Münnich, Á., Nagy , Á., & Abari , K. (2006). Multivariate statistics for psychology students. Debrecen, Hungary: Bölcsész Konzorcium. Retrieved from http://gepeskonyv.btk.elte.hu/adatok/Pszichologia/8M%FCnnich/pages/p_2_9.xml. (in Hungarian)
Rahim, N., Hamid, S., Mat Kiah, M., Shamshirband, S., & Furnell , S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44, 606-622.
Rekettye , G., Tóth , T., & Malota , E. (2016). International Marketing - Online version. Budapest, Hungary: Akadémiai Publisher. Retrieved from https://mersz.hu/hivatkozas/dj76nm_116. (in Hungarian)
Szatmáry, R., & Szikora, P. (2023). Factors influencing technostress. In A. Szakál (Ed.), 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI) (pp. 299-306). Herlany,: Slovakia. doi:10.1109/SAMI58000.2023.10044527
Szucs, K. (2019). Mobile security basics to improve personal and corporate safety. National security review : periodical of the military national security service, (2), 56-72.
Thompson, N., McGill, T., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376-391.
Tick, A., Cranfield, D. J., Venter, I. M., Renaud, K. V., & Blignaut, R. J. (2021). Comparing Three Countries’ Higher Education Students’ Cyber Related Perceptions and Behaviours during COVID-19. Electronics , 10 (22), 2865.
Tsai, C.-Y., Shih, W.-L., Hsieh, F.-P., Chen , Y.-A., Lin, C.-L., & Wu, H.-J. (2022). Using the ARCS model to improve undergraduates’ perceived information security protection motivation and behavior. Computers & Education, 181. 104449
The Author wishes to submit the Work to SJM for publication. To enable SJM to publish the Work and to give effect to the parties’ intention set forth herein, they have agreed to cede the first right to publication and republication in the SJM Journal.
Cession
The Author hereby cedes to SJM, who accepts the cession, to the copyright in and to the paper.
The purpose of the cession is to enable SJM to publish the Work, as first publisher world-wide, and for republication in the SJM Journal, and to grant the right to others to publish the Work world-wide, for so long as such copyright subsists;
SJM shall be entitled to edit the work before publication, as it deems fit, subject to the Authors approval
The Author warrants to SJM that:
- the Author is the owner of the copyright in the Work, whether as author or as reassigned from the Author’s employee and that the Author is entitled to cede the copyright to SJM;
- the paper (or any of its part) is not submitted or accepted for publication in any other Journal;
- the Work is an original work created by the Author;
- the Author has not transferred, ceded, or assigned the copyright, or any part thereof, to any third party; or granted any third party a licence or other right to the copyright, which may affect or detract from the rights granted to SJM in terms of this agreement.
The Author hereby indemnifies the SJM as a body and its individual members, to the fullest extent permitted in law, against all or any claims which may arise consequent to the warranties set forth.
No monetary consideration shall be payable by SJM to the Author for the cession, but SJM shall clearly identify the Author as having produced the Work and ensure that due recognition is given to the Author in any publication of the Work.
Should SJM, in its sole discretion, elect not to publish the Work within 1 year after the date of this agreement, the cession shall lapse and be of no further effect. In such event the copyright shall revert to the Author and SJM shall not publish the Work, or any part thereof, without the Author’s prior written consent.