User Behavior Research of Information Security Technology Based on TAM

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security Behavior: Factors and Research Directions

This study presents an extensive literature review on information security behavior in the context of factors affecting security behavior of users in organizational environments. The study critically analyzes articles in the information security behavior and brings forward 18 themes for security practitioners and researchers to consider in implementing information security initiatives. The find...

متن کامل

an analysis of user interface elements supporting information seeking behavior based on dervin’s sense making theory

purpose: scientific databases are the most important and useful sources where information is accessible via user interfaces. one of the approaches to eliminating the existing challenges in databases user interface is utilizing the sense-making theory (smt) approach. smt approach helps the users to understand problematic situations they have faced with and bridges the cognitive and information g...

متن کامل

An Empirical Study of Instant Messaging Behavior Based on the Technology Assessment Model (TAM)

Instant messaging (IM) is an important form of synchronous electronic communications that has become extremely popular among teens and young adults. The communication offers unique advantages over email and other forms of communication but has not gained widespread support among corporate users. This study reviews instant messaging and its use and attempts to determine factors which influence i...

متن کامل

Analysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)

Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis.    Methods: The method of this research is log anal...

متن کامل

An Empirical Research of Successful ERP Implementation Based on TAM

The issues of enterprise resource planning (ERP) implementation have been given much attention due to its high failure rate. Some researches were focused on the influence of perceived use (PU) and perceived ease of use (PEU) on attitude and symbolic adoption based on the theory of technology acceptance model (TAM). Others studied the critical success factors from organizational or personal aspe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2014

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2014.8.2.21