A study on factors of information security investment in the fourth industrial revolution
- Authors
- Lee, H.J.; Roh, E.H.; Han, K.S.
- Issue Date
- Feb-2018
- Publisher
- Science and Engineering Research Support Society
- Keywords
- 4th industrial revolution; Information security investment; PMT; Survey on information security; UTAUT
- Citation
- International Journal of Advanced Science and Technology, v.111, pp.157 - 174
- Journal Title
- International Journal of Advanced Science and Technology
- Volume
- 111
- Start Page
- 157
- End Page
- 174
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/34397
- DOI
- 10.14257/ijast.2018.111.14
- ISSN
- 2005-4238
- Abstract
- In the era of the 4th Industrial Revolution, information security threats are expanding from the cyber world to the real world, even threatening safety beyond information leakage. Recently, companies have been introducing new technologies such as mobile, wireless LAN, Big Data, Cloud, and IOT, which are key technologies of the 4th Industrial Revolution. However, the security environments are not sufficient to cope with new threats in term of information security organization, budgets, manpower, etc. In order to cope with security risks of the 4th Industrial Revolution, we analyzed information security investment factors to improve level through investments. We designed a research model to extend the UTAUT, consisted of information assets, concerns, experience and habits, social influences and facilitation conditions. For the empirical analysis, we used data from the survey on information security of Korean companies and analyzed correlation through structural equation model. The results showed that information assets, facilitation conditions have a strong influence on experience and habits, intention to investments and experience and habits, investment intention have a strong influence on the 4th Industrial Revolution security investment. Also, there were moderating effects by size, type of business, the experience of security incidents, formal information security organization and policy. © 2018 SERSC Australia.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Business Administration > School of Business Administration > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.