DOI QR코드

DOI QR Code

Factors Affecting the Security Ability of Port Logistics Organization Members

항만물류조직구성원들의 보안능력에 영향을 미치는 요인

  • Kang, Da-Yeon (BK21 PLUS School of Business Administration Kyungpook National University)
  • 강다연 (경북대학교 경영학부 BK21플러스)
  • Received : 2019.03.19
  • Accepted : 2019.04.08
  • Published : 2019.06.30

Abstract

Currently, despite having active movements related to port logistics security, there is lack of awareness, education, and security systems related to port technology. Before implementing port logistics security, a mutual authentication agreement should be reached through the establishment of an integrated network that can share port logistics security information in real time. In order to achieve port competitiveness and strengthen logistics service, establishment of national strategy for logistics security is necessary. However, there is an urgent need to raise the security consciousness among the port logistics organization members and enhance the information security ability which is a crucial feature of the port logistics organization. Therefore, the objective of this study is to analyze the factors affecting the information security capacity of port logistics organization members. Even though the analysis rejected the hypothesis that security regulations affect security awareness, the security activities and security awareness were significantly correlated. It also has a positive impact on the relationship between security norms and security abilities, and security awareness and security abilities.

현재 항만물류보안과 관련한 노력이 활발하게 일어나고 있지만 항만정보기술과 관련된 보안에 대해서는 인식과 교육, 제도 등이 부족한 상황이다. 상호인증 협약 수립을 통해 항만물류보안 정보를 실시간으로 교환 할 수 있는 통합 네트워크를 구축할 필요성이 있다. 항만경쟁력 확보 및 물류 서비스 강화를 목적으로 물류보안을 위한 국가 전략수립이 중요하다. 무엇보다 시급히 필요한 것은 항만물류조직구성원 들의 보안의식을 높이고 항만물류조직의 중요한 특성인 정보 보안 능력을 향상시키는 것이다. 따라서 본 연구는 항만물류조직구성원들의 정보보안능력에 영향을 미치는 요인을 분석하였다. 분석결과 보안규범이 보안인식에 영향을 미친다는 가설은 기각되었지만 보안활동과 보안인식 간의 관련성은 유의한 것으로 나타났다. 또한 보안규범과 보안능력 간의 관계, 보안인식과 보안능력 간의 관계에도 긍정적인 영향을 미치는 결과로 나타났다.

Keywords

GHMHD9_2019_v43n3_179_f0001.png 이미지

Fig. 1 Research model

GHMHD9_2019_v43n3_179_f0002.png 이미지

Fig. 2 Results of research model

Table 1 Demographic characteristics

GHMHD9_2019_v43n3_179_t0001.png 이미지

Table 2 Measurement model analysis

GHMHD9_2019_v43n3_179_t0002.png 이미지

Table 3 Determination Validity(AVE)

GHMHD9_2019_v43n3_179_t0003.png 이미지

Table 4 Goodness of fit index

GHMHD9_2019_v43n3_179_t0004.png 이미지

Table 5 Results of hypothesis testing

GHMHD9_2019_v43n3_179_t0005.png 이미지

References

  1. Anderson, C. L. and Agarwal, R.(2010), "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol. 34, No. 3, pp. 613-643. https://doi.org/10.2307/25750694
  2. Bang, H. S. and Ju, J. K.(2013), "A Study on an Improvement in Korean Port Security Related Laws", Maritime Law Review, Vol. 25, No. 1, pp. 153-178.
  3. Berejikian, J. D.(2002), "A Cognitive Theory of Deterrence", Journal of Peace Research, Vol. 39, No. 2, pp. 165-183. https://doi.org/10.1177/0022343302039002002
  4. Bulgurcu, B., Cavusoglu, H. and Benbasat, I.(2010), Information Security policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness, MIS Quarterly, Vol. 34, No. 3, pp. 523-548. https://doi.org/10.2307/25750690
  5. Choi, N., Kim, D., Goo, J. and Whitmore, A.(2008), "Knowing is Doing: An Empirical Validation of the Relationship between Managerial Information Security Awareness and Action", Information Management and Computer Security, Vol. 16, No. 5, pp. 484-501. https://doi.org/10.1108/09685220810920558
  6. Choi, D. K., Song, M. S., Im, J. I. and Lee, K. H.(2015), "Study the role of information security personnel have on an organization's information security level", Korea Institute Of Information Security And Cryptology, Vol. 25, No. 1, pp. 197-209. https://doi.org/10.13089/JKIISC.2015.25.1.197
  7. Choi, Y. H.(2015), "The Effect of Organizational Culture on Organizational Commitment, Job Satisfaction, and Willingness to Comply with the Industrial Security Policies", The Korean Association of Police Science Review, Vol. 17, No. 6, pp. 343-366.
  8. Drevin, L., Kruger, H. A. and Steyn, T.(2007), "Value Focused Assessment of ICT Security Awareness in an Academic Environment", Computers and Security, Vol. 26, No. 1, pp. 36-43. https://doi.org/10.1016/j.cose.2006.10.006
  9. Jeong, W. L.(2012), "A Study on the Development of Analysis Model for Maritime Security Management", Journal of Navigation and Port Research, Vol. 36, No. 1, pp. 9-14. https://doi.org/10.5394/KINPR.2012.36.1.9
  10. Kang, J. Y.(2013), "A Study on the Systematized and Unified Plan of Port Logistics Security Management System", Journal of Law and Politics research, Vol. 13, No. 2, pp. 389-436.
  11. Kim, S. H. and Song, Y. M.(2011), "An Empirical Study on Motivational Factors Influencing Information Security Policy Com- pliance and Security Behavior of End-Users (Employees) in Organizations", The e-Business Studies, Vol. 12, No. 3, pp. 327-249. https://doi.org/10.15719/geba.12.3.201109.327
  12. Kim, S. Y., Choi, J. H. and Kim, C. H.(2009), A Study on Measures to Develop the Port Logistics Security Industry, Korea Maritime Institute.
  13. Kim, Y. J.(2015), "Key Determinants of Employees' Trust toward Information Security Management in an Organization",The Journal of Internet Electronic Commerce Resarch, Vol. 15, No. 4, pp. 247-264.
  14. Knapp, K. J., Marshall, T. E., Rainer, R. K. and Ford, F. N.(2005), Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness, White Paper, Information Systems Security Certification Consortium (ISC), 2.
  15. Ko, H. J.(2011), "A Study on the Implications and Trends of Logistics Security Assurance Programs for International Trade Facilitation", Korean Institute of Navigation and Port Research, Vol. 27, No. 2, pp. 333-354.
  16. Layton, T.(2005) ,Information Security Awareness: The Psychology Behind the Technology, Author House.
  17. Lee, H. G.(2009), "A Study on the Evaluation of the Information Security Level in Major Container Terminals", Journal of Navigation and Port Research, Vol. 33, No. 1, pp. 45-50.
  18. Lim. C. H.(2006), "Effective Information Protection Recognition Improvement Plan", Korea Institute Of Information Security And Cryptology , Vol. 16, No. 2, pp. 30-36.
  19. Ministry of Maritime Affairs and Fisheries (2013), Rules for the enforcement of the Act on the Security of International Navigation Ships and Port Facilities.
  20. Ministry of Maritime Affairs and Fisheries (2016), Prepare the basis for strengthening port security, such as the system for allowing ships to enter and leave.
  21. Park, M. K.(2007), "Study on Remodeling Korean Logistics Laws for Strengthening Integration and Adjustment Function of Logistics Policy", Journal of Korea Port Economic Association, Vol. 23, No. 2, pp. 63-86.
  22. Park, H. K.(2016), "Impact of Security Related Financial Investment on Port Performance through Relationship Management: Focused on Ports and Port Users", Korea Logistics Review , Vol. 26, No. 5, pp. 67-78. https://doi.org/10.17825/klr.2016.26.5.67
  23. Rogers, R. W.(1983) Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. In: Cacioppo, J. and Petty, R., Eds., Social Psychophysiology, Guilford Press, New York, pp. 153-177.
  24. Shim, W. H.(2011), "Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities", The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 53-73.
  25. Siponen, M. T.(2000), "A Conceptual Foundation for Organization Information Security Awareness", Information Management and Computer Security, Vol. 8, No. 1, pp. 31-41. https://doi.org/10.1108/09685220010371394
  26. Siponen, M., Pahnila, S. and Mahmood, M. A.(2010), "Compliance with Information Security Policies: An Empirical Investigation", Computer, Vol. 43, No. 2, pp. 64-71. https://doi.org/10.1109/MC.2010.35
  27. Stanton, J., Stam, K., Mastrangelo, P. and Jolton, J.(2005), "Analysis of End User Security Behaviors", Computers and Security, Vol. 24, No. 2, pp. 124-133. https://doi.org/10.1016/j.cose.2004.07.001
  28. Woo, S. H.(2012), "A Study on Security Capability of IDPS", The Institute of Electronics and Information Engineers-CI, Vol. 49, No. 4, pp. 9-15. https://doi.org/10.5573/ieek.2012.49.11.009
  29. Workman, M. and Gathegi, J.(2007), "Punishment and Ethics Deterrents: A Study of Insider Security Contravention", Journal of the American Society for Information Science and Technology, Vol. 58, No. 2, pp. 212-222. https://doi.org/10.1002/asi.20474