Abstract

This article aims at analyzing the factors which influence the staff of the Air Force In-formation Technology Board – DTI in relation to the understanding of the application of the Information Security Management practices. This attempt was based on the hypothetical-deductive method and, as to its objective, it was descriptive in nature. As to the approach of the research problem, it was quantitative in nature. In order to achieve the proposed objective, an adaptation of the Theoretical Technology Acceptance Model – TAM, which allowed the analysis of the relation between sociodemographic profile, perceived ease of use, perceived usefulness, attitude and behavior of the users, and the level of understanding of the Information Security practices. The survey was conducted with 59 military servants and civilians which are part of the Brazilian Air Force Information Technology Board, to whom a questionnaire was applied, submitted and approved by the Committee of Ethics in Research (CAAE: 62636016.7.0000.5111), which was based on the precepts of ISO/IEC 27001 (2013) and 27002, which deal, respectively, with the Information Security Management system and with the code of practice for Information Security controls. Once the data were gathered, they were tabu-lated and statistically analyzed, which enabled the demonstration of the influence of sociodemographic and behavioral factors and of the precepts of the TAM in the perception of the Information Security practices by the DTI staff.

Highlights

  • The demand for the immediate access to information in the corporate environment has considerably increased in the last years, and the professionals of the information era are increasingly more demanding as to the availability and speed with which they may access their systems, by means of the most varied technological devices

  • The data processing centers became obsolete, giving up space to the corporate networks, which provide more performance and speed to the information access, and which, on their turn, have become the main channel of distribution of information through the Internet, integrating the organization to the other elements of the chain of production, such as suppliers, partners, clients, and government (SÊMOLA, 2014). This scenario tends to become even more complex, as it can be observed in the study commissioned by the Chamber of Technology Strategy and prepared jointly with PricewaterhouseCoopers LLP (BRASIL, 2010), of the United Kingdom, when the main trends which will conform the future of information security by the year 2020 were mentioned, among which it is important to emphasize the revolution of the infrastructure and the data explosion

  • INFORMATION SECURITY MANAGEMENT AND TECHNOLOGY ACCEPTANCE MODEL. This topic is destined to a brief introduction of concepts related to the Information Security Management and to the security standards NBR 27001 (2013) and 27002

Read more

Summary

INFORMATION SECURITY MANAGEMENT AND TECHNOLOGY ACCEPTANCE MODEL

This topic is destined to a brief introduction of concepts related to the Information Security Management and to the security standards NBR 27001 (2013) and 27002. The concepts related to the Technology Acceptance Model and the relations established between the constructs, whose investigation is intended, will be introduced

Information Security
Technology Acceptance Model
METHODOLOGY
PRESENTATION AND DISCUSSION OF THE RESULTS
Frequency of creation of backup
Perceived usefulness Attitude Attitude
TAM Constructs
Adoption of Information Security practices makes my work more efficient
Removing access for disconnected users
FINAL COMMENTS
Questions on the intention of use
Findings
Questions on the agreement related to the adoption

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.