A variety of information security solutions are being developed to enhance user security from advanced and enhanced security threats. Highlight the aspects of end-user security as the most important aspect of information security. Based on the factors influencing the user’s behavior, this study focuses on the impact of information on the impact of information on the time required by users (Higgins 1996). The purpose of this study is to understand the causes of information security compliance and establish effective security systems to address information security policies in the information security section of the Information Security Administration. In particular, it seeks to analyze the security compliance issues and measure the outcome of the survey by focusing on visual factors and opportunities in terms of users’ voluntary improvement. To do this, consider influencing factors that affect user decision making based on self-determination theory (SDT).
CITATION STYLE
Ju, G. I., Park, J., Heo, W., Gil, J. M., & Park, H. S. (2017). A study of the factors influencing information security policy compliance: Focusing on the case of ‘k’ institute. In Lecture Notes in Electrical Engineering (Vol. 448, pp. 720–728). Springer Verlag. https://doi.org/10.1007/978-981-10-5041-1_115
Mendeley helps you to discover research relevant for your work.