JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Factors Affecting Information Security Practice of Elementary School Students
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Factors Affecting Information Security Practice of Elementary School Students
Choi, Seung-Jae; Kim, Hyeong-Yeol; Kim, Tae-Sung;
  PDF(new window)
 Abstract
If students are not aware of the information security, they easily let others know their information or they use others` information with no sense of guilt. The information security education is necessary to protect and prevent students from cyber crime. However, South Korea`s information curriculum has no specific information security education course and it has led a school or teacher to teach contents of information ethics superficially. The purpose of this paper is to find the factors affecting the information security practice of the elementary school students. For an empirical analysis, questionnaire survey was conducted and the Partial Least Square(PLS) was used to analyze the research model. The analysis results show that the information ethics awareness and the information security awareness have a positive impact on the information security practice. The results of this study are expected to help choose the specific information security curriculum required for the information security practice of elementary school students.
 Keywords
Information Security Education;Information Ethics;Information Security Awareness;Information Security Practice;Elementary School Students;
 Language
Korean
 Cited by
 References
1.
Korea Internet and Security Agency, Internet Use Survey, 2014.

2.
Korea Internet and Security Agency, Mobile Internet Use Survey, 2015.

3.
Korea Communications Commission, Cyber Bullying Research, 2014.

4.
Korea Association of Information Education, Elementary School Information Curriculum Contents System, 2014.

5.
Education and Information Research Academy of Korea, Primary and Secondary Information Education, 2005.

6.
Ministry of Education(South Korea), Information and Communication Technology Education Instructions, 2005.

7.
Korea Internet and Security Agency, Online Learning of Junior Information Security, 2014.

8.
Korea Education and Research Information Service, Primary and Secondary School Information Security Education Reinforcement Support, 2005.

9.
National Information Society Agency, The Healthy Information Life, 2007.

10.
The Seoul Metropolitan Office of Education, Information and Communication Ethics Education Instructional Materials for Elementary School Students, 2010.

11.
CSTA, CSTA K-12 Computer Science Standard, 2011.

12.
Department for Education(England), National Curriculum in England: Computing Programmes of Study, 2013.

13.
Department of Computer Science and Engineering Indian Institute of Technology Bombay, Mumbai, CMC: A Model Computer Science Curriculum for K-12 School, 2013.

14.
A. Ellis, "The revised ABC's of rational-emotive therapy(RET)," Journal of Rational-Emotive and Cognitive-Behavior Therapy, vol. 9, no. 3, pp. 139-172, 1991. crossref(new window)

15.
K.E. Goodpaster, "The concept of corporate responsibility," Journal of Business Ethics, vol. 2, no. 1, pp. 1-22, 1983. crossref(new window)

16.
K.C. Laudon, "Ethical concepts and information technology," Communications of the ACM, vol. 38, no. 12, pp. 33-39, 1995.

17.
R. Rubin, Moral Distancing and The Use of Information Technologies, Computer Ethics Institute, Washington, DC, 1994.

18.
D. Johnson, Computer Ethics, The Philosophy of Computing and Information, 1985.

19.
N. Choi, D. Kim, J. Goo and A. Whitemore, "Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action," Information Management and Computer Security, vol. 16, no. 4, pp. 484-501, 2008. crossref(new window)

20.
M. Siponen, "A conceptual foundation for organizational information security awareness," Information Management and Computer Security, vol. 8, no. 1, pp. 31-44, 2000. crossref(new window)

21.
B.V. Solms, "Information security - A multidimensional discipline," Computer and Security, vol. 20, no. 6, pp. 504-508, 2001. crossref(new window)

22.
J. Nosworthy, "Implementing information security in the 21 st century - do you have the balancing factors?," Computer and Security, vol. 19, no. 4, pp. 337-347, 2000. crossref(new window)

23.
C. Chen., B. Medlin and R. Shaw, "A cross-cultural investigation of situational information security awareness programs," Information Management and Computer Security, vol. 16, no. 4, pp. 360-376, 2008. crossref(new window)

24.
Y. Rezgui and A. Marks, "Information security awareness in higher education: An exploratory study," Computer and Security, vol. 27, no. 7, pp. 241-253, 2008. crossref(new window)

25.
J. Hagen, E. Albrechtsen and S.O. Johnsen, "The long-term effects of information security e-learning on organizational learning," Information Management and Computer Security, vol. 19, no. 3, pp. 140-154, 2011. crossref(new window)

26.
B. Bulgurcu, H. Cavusoglu and I, Benbasat, "Roles of information security awareness and perceived fairness in information security policy compliance," AMCIS 2009 Proceedings, pp. 419, 2009.

27.
M. Eminagaoglu, E. Ucar and S. Eren, "The positive outcomes of information security awareness training in companies - A case study," Information Security Technical Report, vol. 14, no. 4, pp. 223-229, 2009. crossref(new window)

28.
S.L. Grover, "Lying, deceit, and subterfuge: A model of dishonesty in the workplace," Organization Science, vol. 4, no. 3, pp. 478-495, 1993. crossref(new window)

29.
K.E. Stanovich, "Matthew effects in reading: Some consequences of individual differences in the acquisition of literacy," Reading Research Quarterly, vol. 21, no. 4, pp. 360-407, 1986. crossref(new window)

30.
R.E. Owens Jr, Language Development: An Introduction, Pearson, 2015.

31.
H. Kruger, L. Drevin and T. Steyn, "A vocabulary test to assess information security awareness," Information Management and Computer Security, vol. 18, no. 5, pp. 316-327, 2010. crossref(new window)

32.
M. Wetzel, G. Odekerken-Schroder and C. V. Oppen, "Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration," MIS Quarterly, vol. 33, no. 1, pp. 177-195, 2009. crossref(new window)

33.
J.C. Nunnally, Psychological Theory, McGraw-Hill, 1987.

34.
C. Fornell and D.F. Larcker, "Two structural equation models with unobservable variables and measurement error," Journal of Marketing Research, vol. 18, no. 1, pp. 39-50, 1981. crossref(new window)

35.
R.F. Falk and N.B. Miller, A Primer for Soft Modeling, University of Akron Press, 1992.

36.
D. Gefen and D. Straub, "A practical guide to factorial validity using pls-graph: tutorial and annotated example," Communications of the Association for Information Systems, vol. 16, no. 1, pp. 91-109, 2005.

37.
T. Lee, The Computer Curriculum Education Theory, Ehan Publishing Company, 2006.