淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-2007202016301300
中文論文名稱 從道德認同的角度探討國軍人員遵守資訊安全政策之意圖-以海軍某單位為例
英文論文名稱 A Study of Discussion on Military Personnel's Intention to Obey Information Security Policy from the Perspective of Moral Identity-Take One Navy Unit as An Example
校院名稱 淡江大學
系所名稱(中) 資訊管理學系碩士在職專班
系所名稱(英) On-the-Job Graduate Program in Advanced Information Management
學年度 108
學期 2
出版年 109
研究生中文姓名 林子煦
研究生英文姓名 Tzu-Hsu Lin
學號 707630074
學位類別 碩士
語文別 中文
口試日期 2020-05-23
論文頁數 66頁
口試委員 指導教授-蕭瑞祥
委員-廖則竣
委員-張應華
委員-蕭瑞祥
中文關鍵字 組織認同  社會支持  道德認同  資安意識  資訊安全政策 
英文關鍵字 Organizational Identity  Social Support  Moral Identity  Security Awareness  Information Security Policy. 
學科別分類
中文摘要 資訊安全已是現代社會日常維運中無法忽略的議題,軍中更是如此,以目前資訊及網路設備蓬勃發展的年代,任何資料都能上傳到網路雲端,雖然大家享受到科技帶來的便利,卻忽略了後端資訊安全的威脅與侵害,因此資訊安全防護是我們必須重視的,唯有在確保資訊安全之前提之下才能享受資訊的便利。
本研究之目的在探討國軍人員組織認同及社會支持影響道德認同之程度,而擁有道德認同及資訊安全意識的環境下,遵守資訊安全政策之影響因素。透過問卷調查研究法針對海軍某單位收集資料,回收102份有效問卷。研究結果顯示組織認同及社會支持對於道德認同有顯著影響,道德認同對於遵守資訊安全政策並不顯著,而資安意識對於遵守資訊安全政策有顯著的影響,最後研究結果顯示組織認同及資安意識都對遵守資訊安全政策有正向關係,本研究具體貢獻及建議為:(1) 建立一個良好的組織環境,提升成員組織認同感促進遵守單位資訊安全之意圖;(2)加強人員資訊安全教育訓練,提升人員對資訊安全意識的觀念使其遵守資訊安全政策。
英文摘要 Information security is an issue that cannot be ignored in the daily maintenance of modern society, especially in the military. In the current era of vigorous development of information and network equipment, any data can be uploaded to the network cloud, although everyone enjoys the technology The convenience of the Internet, however, ignores the threats and violations of back-end information security. Therefore, we must pay attention to the protection of information security, and we can only enjoy information if it is mentioned before ensuring information security.
The purpose of this study is to explore the degree to which national military personnel's organizational identity and social support affect moral identity, and in an environment with moral identity and information security awareness, compliance with information security policies. Through questionnaire research method to collect data for a naval unit, 102 valid questionnaires were recovered. The results of the study show that organizational identity and social support have a significant impact on moral identity. Moral identity is not significant on compliance with information security policies, while security awareness has a significant impact on compliance with information security policies. The final research results show organizational identity and security awareness All of them have a positive relationship with respect to compliance with information security policies. The specific contributions and recommendations of this study are: (1)Establish a good organizational environment, enhance the sense of identification of member organizations, and promote compliance with the information security of the unit; (2)Strengthen personnel information security education training to raise personnel's awareness of information security awareness to comply with information security policies.
論文目次 目錄
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 3
第三節 研究流程 3
第二章 文獻探討 5
第一節 資訊安全政策及議題 5
第二節 道德認同 8
第三節 組織認同及社會支持 9
第四節 資安意識 13
第三章 研究方法 14
第一節 研究架構 14
第二節 研究假說 15
第三節 操作型定義 17
第四節 研究設計 18
第四章 資料分析 25
第一節 預試分析 25
第二節 描述統計分析 29
第三節 皮爾森積差相關分析 37
第四節 多元線性回歸分析 39
第五節 假說檢定結果 42
第五章 研究討論 43
第一節 組織認同與道德認同之正向影響 43
第二節 社會支持與道德認同之正向影響 44
第三節 資安意識與遵守資訊安全政策之關係 44
第四節 道德認同與遵守資訊安全之關係 44
第六章 訪談調查結果與討論 46
第一節 訪談目的及對象 46
第二節 訪談內容與實施方式 47
第三節 訪談結果分析與討論 48
第七章 研究結論與建議 52
第一節 研究結論 52
第二節 管理意涵 53
第三節 研究限制與後續研究建議 54
參考文獻 55
附 錄 63


表目錄
表 3-1 各變數操作型定義 18
表 3-2 組織認同問項 20
表 3-3 社會支持問項 21
表 3-4 道德認同問項 22
表 3-5 遵守資訊安全政策問項 23
表 3-6 資安意識問項 24
表 4-1 項目分析 27
表 4-2 信度分析摘要表 29
表 4-3 個人基本資料之次數分配表 30
表 4-4 組織認同感量表之描述性分析 32
表 4-5 社會支持量表之描述性分析 33
表 4-6 道德認同感量表之描述性分析 34
表 4-7 資訊安全政策量表之描述性分析 35
表 4-8 資安意識量表之描述性分析 36
表 4-9 組織認同感、社會支持、道德認同感、資訊安全政策與資安意識
之相關係數表 39
表 4-10 組織認同與社會支持影響道德認同之迴歸係數表 40
表 4-11 道德認同與資安意識影響資訊安全政策之迴歸係數表 42
表 4-12 假說檢定結果 42
表 6-1 訪談對象基本資料 47
表 6-2 訪談內容分析 49

圖目錄
圖 1-1 網路犯罪研究成本 1
圖 1-2 研究流程 4
圖 3-1 研究架構 14

參考文獻 中文文獻
王文科、王智弘 (2004)。教育研究法(2004年8版)。臺北市:五南。
余一鳴、顏志龍 (2011)。道德認同對軍事社會化與道德疏離間的調節作用。師範大學教育心理學報,43(2),477-498。
沈翊芯 (2018)。從道德疏離的角度探討員工資訊安全政策違反意圖。中山大學,高雄市。
岳振豪 (2011)。國軍人員資訊素養與工作績效相關性之研究-以國防部某單位為例。世新大學,台北市。
邱皓政(2010)。量化研究與統計分析:SPSS(PASW)資料分析範例解析。臺北市:五南。
柯建安、余一鳴 (2010)。軍事社會化的道德形塑與道德認知發展-軍事道德認同導向 與社會認同導向。復興崗學報,99,81-101。
國家安全會議 (2018)。國家資通安全戰略報告:資安及國安。國安辦,臺北市。
張嘉祐 (2013)。響遵守資訊安全規範意圖之因素研究。中正大學,嘉義縣。
張毓凌(2004)。研究生生活壓力、社會支持與學習滿意度隻研究-以臺北縣市大學為例。臺灣師範大學,臺北市。
楊世平 (2008)。我國國軍資訊安全政策探討:危機管理觀點。淡江大學,新北市。
蔣宗明 (2010)。軍校生道德認同歷程之研究。國防大學,臺北市。
趨勢科技公司,趨勢科技公布2020資安預測報告:三大關鍵要點迅速掌握企業雲端風險加劇、AI偽冒詐騙增加、家用物聯網威脅攀升,取自https://www.trendmicro.com/zh_tw/about/newsroom/press-releases/2019/2019-12-11.html。(2019年12月11日)
iThome,網釣攻擊成2019年最大網路威脅,Check Point資安事件團隊在臺現身說法,取自https://www.ithome.com.tw/news/132114。(2019年7月30日)
英文文獻
Aquino, K., & Reed, A., (2002).The self-Importance of moral identity. Journal of Personality and Social Psychology, 83(6), 1423-1440.
Aquino, K., Freeman, D., Reed Ii, A., Lim, V. K. G., & Felps, W. (2009). Testing a social-cognitive model of moral behavior: The interactive influence of situations and moral identity centrality. Journal of Personality and Social Psychology, 97(1), 123-141
Ashforth, B. E., & Mael, F. (1989). Social identity theory and the organization. Academy of management review, 14(1), 20-39.
Blasi, A. (1984). Moral identity: Its role in moral functioning. In W. Kurtines & J. Gewirtz (Eds.), Morality, moral behavior and moral development. 128–139. New York: Wiley
Bandura, A., Adams, N. E., & Beyer, J. (1977). Cognitive processes mediating behavioral change. Journal of personality and social psychology, 35(3), 125.
Bandura,A. (1986). Social foundations of thought and action: A social cognitive theory.Englewood Cliffs, NJ: Prentice- Hall, Inc.
Bandura, A. (1990). Selective activation and disengagement of moral control. The Journal of Social Issues, 46(1), 27-46.
Bandura, A. (1995). Guide for Constructing Self-efficacy Scales. Standford University.
Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman.
Bandura, A. (1999). Moral disengagement in the perpetration of inhumanities. Personality and social psychology review, 3(3), 193-204.
Bandura, A. (2002). Selective moral disengagement in the exercise of moral agency. Journal of Moral Education, 31(2), 101-119.
Brown, T. J., Dacin, P. A., Pratt, M. G., & Whetten, D. A. (2006). Identity, intended image, construed image and reputation: An interdisciplinary framework and suggested terminology. Journal of the Academy of Marketing Science, 34(2), 99-106.
Bulgurcu, B. (2010). Information Security Policy Compliance: An Empirical Study of Rationlity-Based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523-548
Carlson, D. S., & Perrewé, P. L. (1999). The role of social support in the stressorstrain relationship: An examination of work-family conflict. Journal of management, 25(4), 513-540.
Cheney, G. (1983). On the various and changing meanings of organizational membership: A field study of organizational identification. Communications Monographs, 50(4), 342-362.
Colby, A., & Damon, W. (1995). The development of extraordinary commitment. In M. Killen & D. Hart (Eds.), Morality in Everyday Life: Developmental perspectives,342-370. New York: Cambridge University Press.
Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine.
Cutrona & J.A. Suhr, 1992. “Controllability of stressful events and satisfaction with spouse support behaviors,” Communication Research, 19(2), 154–174.
D'Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: a coping perspective. Journal of Management Information Systems, 31(2), 285-318.
Dinev, T., & Hu, Q. 2007. “The centrality of awareness in the formation of user behavioral intention toward protective information technologies, ”Journal df the Association of Information Systems, 8(7), 386-408.
Erikson, E. (1950). Childhood and society. New York, NY: Norton.
Erikson, E. H. (1968). Identity, youth, and crisis. New York, NY: Norton.
Reed, A., II, & Aquino, K. F. (2003). Moral identity and the expanding circle of moral regard toward out-groups. Journal of Personality and Social Psychology, 84(6), 1270 –1286.
Reidenbach, R. E., & Robin, D. P. (1990). Toward the development of a multidimensional scale for improving evaluations of business ethics. Journal of Business Ethics, 9(8), 639-653.
Fida, R., Paciello, M., Tramontano, C., Fontaine, R. G., Barbaranelli, C., & Farnese, M. L. (2015). An integrative approach to understanding counterproductive work behavior: The roles of stressors, negative emotions, and moral disengagement. Journal of Business Ethics, 130(1), 131-144.
Goodhue, D.L., & Straub, D. W. 1991. "Security concerns of system user:A studyofprerceptions of the adequacy of security,"Information and Management, 20(1), 13-27.
Gouldner,A.W., & Lewis,P.V.(1975).Organizational Communications:The Essence of Effective Management,Columbus,O.H. Grid.
Hong, K.S., Chi, Y.P., Chao, L.R., & Tang, J.H.“An Empirical Study of Information Security Policy on Information Security Elevation in Taiwan,"Information Management & Computer Security 14(2), 2006, 104-115.
Hart, D. Atkins, R., & Ford, D. (1999). Family influences on the formation of moral identity in adolescence: Longitudinal analyses.Journal of Moral Education, 28(3), 375-386.
Herath, Tejaswini & Rao, H.. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. EJIS. 18. 106-125. 10.1057/ejis.2009.6.
Hinchcliffe, F.(2003). Creating the effective Security Awareness Program and Demonstration, GSEC Practical Version 1.4b
Herath T. & rao, H.R.(2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systeams, 18(2), 106-125.
House,J.S. (1981). Work stress and social support. Addison-Wesley Publishing Company Reading, MA.
Hu, Q., & Dinev, T. (2005). Is spyware an internet nuisance or public menace?.Communications of the ACM, 48(8), 61-66.
Hu, Q., & Hart, P., & Cooke, D. (2006).The role of external influences on organizationl information security practices:An institutional perspective, Proceedings of the 39th Annual Hawaii International Conference, pp. 1-10a.
Johnson, Johnson & Heimberg(1999). A Primary- and Second-Order Component Analysis of the Organizational Identification Questionnaire. Educational and Psychological Measurement, 159-70.
Lin, N., Ensel, W. M., Simeone, R. S., & Kuo, W. (1979). Social support, stressful life events, and illness: A model and an empirical test. Journal of health and Social Behavior, 108-119.
March, James G., & Simon, Herbert A., Organizations (1958). University of Illinois at Urbana-Champaign's Academy for Entrepreneurial Leadership Historical Research Reference in Entrepreneurship.
Mael, F., & Ashforth, B. E. (1992). Alumni and their alma mater: A partial test of the reformulated model of organizational identification. Journal of organizational Behavior, 13(2), 103-123.
Miller, V. D., Allen, M., Casey, M. K., & Johnson, J. R. (2000). Reconsidering the organizational identification questionnaire. Management communication quarterly, 13(4), 626-658.
Patchen, M. (1970). Participation, achievement and involvement on job. Englewood Cliffs, NJ: Prentice Hall.
Porter, L. W., Steers, R. M., Mowday, R. T., & Boulian, P. V. (1974). Organizational commitment, job satisfaction, and turnover among psychiatric technicians. Journal of applied psychology, 59(5), 603.
Russell, C. (2002). Security Awareness-Implementing an Effective Strategy: GSEC Practical Version 1.4b-Option 1.
Reed, A., II, & Aquino, K. F. (2003). Moral identity and the expanding circle of moral regard toward out-groups. Journal of Personality and Social Psychology, 84(6), 1270 –1286.
Reidenbach, R. E., & Robin, D. P. (1990). Toward the development of a multidimensional scale for improving evaluations of business ethics. Journal of Business Ethics, 9(8), 639-653.
Reber, A. S. (1995). The Penguin dictionary of psychology. Penguin Press.
Rusbult, C. E., & Farrell, D. (1983). A longitudinal test of the investment model: The impact on job satisfaction, job commitment, and turnover of variations in rewards, costs, alternatives, and investments. Journal of applied psychology, 68(3), 429.
Sarason, I. G., Levine, H. M., Basham, R. B., & Sarason, B. R. (1983). Assessing social support: The social support questionnaire. Journal of personality and social psychology, 44(1), 127.

論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2020-07-22公開。
  • 同意授權瀏覽/列印電子全文服務,於2020-07-22起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2486 或 來信