Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/16383
Title: | 利用科技接受模式與人格特質探討資訊安全系統使用-以賦稅再造資訊系統為例 An exploration of technology acceptance model in information security - A case study of the Taxation Reform Information System |
Authors: | Yi-Hsiu Lin 林毅修 |
Advisor: | 陳鴻基(Houn-Gee Chen) |
Keyword: | 科技接受模式,資訊安全系統,五大人格特質理論, technology acceptance model,information security system,personality traits,big five personality traits, |
Publication Year : | 2012 |
Degree: | 碩士 |
Abstract: | 儘管隨著科技的日新月異,資訊安全系統的效能不斷提升,使用上也越來越人性化,但仍然有許多使用者對於資訊安全系統沒有太高的使用意願,因此有必要針對人為之因素進行探討。在資訊系統中又以政府部門最為龐大,以財政部為例本,其稽徵作業每年約服務530萬納稅戶,處理共約176億筆交易量。除此之外,財稅資訊系統為各個財政單位所共同使用,是一整合型的大型財稅資訊系統,因此對於資訊系統的安全控管更須謹慎處理。故本研究以財政部國稅局人員為受訪對象,利用科技接受模式及五大人格特質理論探討人格特質如何影響資訊安全系統使用者的使用意向。研究顯示知覺有用性及知覺易用性顯著影響使用者對於資訊安全系統之使用行為意向,同時知覺易用與某些人格特質之交互作用亦顯著影響資訊安全系統之使用行為意向。透過本研究之分析將有助於未來管理階層對於國稅局人員之遴選及員工訓練,藉以提升人員對於資訊安全系統之使用行為態度。 Despite the fact that information security systems have become more effective and user-friendly, they still can’t effectively appeal to user for smoothly and effective use. In part, it is due to the complexity of the system and unpredictable nature of security events and caused impact. This study aims at exploring the impact of human factors on the adoption of information security system as an attempt to provide a holistic viewpoint into the deployment of information security system. The case of National Taxation Information System in Taiwan was examined. In this system, around 17.6 billions tax payers information are processed annually and the information handling are under strict regulation for the protection of data and personal information privacy. By combining technology acceptance model and big five personality traits, a research model is proposed in which the personality traits are regarded as moderator to the system acceptance. More than a hundred of users at the tax bureau participated in the survey study. The results indicate that perceived usefulness and ease of use significantly affect the user’s behavior intention. Several personalities did play the role in moderating the user’s behavior intention on the use of information security system. |
URI: | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/16383 |
Fulltext Rights: | 未授權 |
Appears in Collections: | 商學研究所 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
ntu-101-1.pdf Restricted Access | 473.66 kB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.