$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

사이버 정보보호 인력의 양성과 유지를 위한 방향: 정보보호 전공자들의 직업 선택 의도에 관한 연구
A Road To Retain Cybersecurity Professionals: An Examination of Career Decisions Among Cybersecurity Scholars 원문보기

情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.22 no.2, 2012년, pp.295 - 316  

채상미 (이화여자대학교) ,  김민균 (서강대학교)

초록
AI-Helper 아이콘AI-Helper

최근 정보화 사회에서 사이버 정보 보호는 가장 중요한 분야로 대두 되고 있는 가운데 전문적인 정보 보호 인력에 대한 수요는 전 세계적으로 빠르게 증가 하고 있다. 전문적이고 능력 있는 정보 기술 인력의 보유는 정보화 사회에서 향후 경쟁력과 리더십을 얻는데 매우 중요한 이슈이다. 본 연구는 대학에서 정보 보호와 관련한 전공을 선택한 학생들을 중심으로 어떠한 요인들이 그들의 전공선택과 향후 정보보안과 관련한 직업을 선택하게 하는데 영향을 미치는 지를 분석 하였다. 문헌 고찰을 통해 학생들이 전공 선택과 직업선택에 관한 영향을 미칠 수 있는 대표적인 요인들을 도출하고 이 요인들과 학생들의 전공 및 직업선택과의 관계를 실증적으로 검증 하였다. 본 연구의 연구 결과는 향후 우리 사회가 보다 우수하고 전문적인 정보 보호 인력을 양성하고 유지하는 데에 기여 할 수 있을 것이다.

Abstract AI-Helper 아이콘AI-Helper

In the recent field, cybersecuriyt has become one of the critical areas in the information technology field, and demands for cyberseucirty professionals have been increasing tremendously. However, there is In the recent past, cybersecurity has become one of the critical areas in the Information Tech...

주제어

참고문헌 (75)

  1. A.-M. Chang, and P. K. Kannan, Preparing for Wireless and Mobile Technologies in Government, IBM Endowment for The Business of Government, Oct. 2002. 

  2. E. Chabrow, "Homeland Security Tries To Get Its Cybersecurity House In Order "Information Week, [10/2/2006,2006]. 

  3. P. Duchessi, and I. Chengalur-Smith, "Client/server benefits, problems, best practices," Communications of the ACM, vol. 41, no. 5, pp.87, May 1998. 

  4. L. M. Liebrock, "Scholarship For Service," IEEE Distributed Systems Online, vol. 7, pp. 9, art.no.0609-o9002, Sep. 2006. 

  5. J. Bailey, and G. Stefaniak, "Preparing the information technology workforce for the new millennium." ACM SIGCPR Computer Personnel, vol. 20, no. 4, pp.4-15. Oct. 1999. 

  6. S. Nielsen, L. V. Hellens, and S. Wong, "The male IT domain: You've got to be in it to win IT." Proceedings from the 12th Australasian Conference on Information System, pp.1-12, Dec. 2001. 

  7. L.V. Hellens, S. Nielsen, R. Doyleetal., "Bridging the IT Skills Gap: .A Strategy to Improve the Recruitment and Success of IT Students." Proceedings from the 10th Australasian Conference on Information Systems, pp.1129-1144, Dec. 1999. 

  8. M. Igbaria, and J. Greenhaus, "Determinants of MIS employees' turnover intentions: a structural equation model," Communications of the ACM, vol. 35, no. 2, pp.34-49, Feb. 1992. 

  9. M. K. Ahuja, " Women in the information technology profession: A literature review, synthesis and research agenda," European Journal of Information Systems, vol. 11, no. 1, pp.20-34, Mar. 2002. 

  10. E. M. Trauth, "Mapping informationsector work to the work force," Communications of the ACM, vol. 44, no.7, pp.74-75, Jul. 2001. 

  11. D. Clyton, and T. Lynch, "Ten years of strategies to increase participation of women in computing programs: The central queensland university experience 1999-2001," SIGCSE Bulletin,.vol. 34, no.2, pp.89-93, Jun. 2002. 

  12. I. Ajzen, From intentions to actions: A theory of planned behavior, Springer, Mar. 1985. 

  13. I. Ajzen, "The theory of planned behavior," Organizational Behavior and Human Decision Processes, vol. 50, no. 2. pp.179- 211, Dec. 1991. 

  14. S. A. Brown, and V. Venkatesh, "Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle.," MIS Quarterly, vol. 29, no. 3, pp.399-426, Sep. 2005. 

  15. J. F. George, "The theory of planned behavior and internet purchasing," Internet Research, vol. 14, no. 3, pp.198- 212, 2004 

  16. A. H. Eagly, and S. Chaiken, The psychology of attitudes, Harcourt Brace Jovanovich College, Nov. 1993. 

  17. A. Bandura, Social Foundations of Thought and Action, Prentice Hall, Oct. 1986. 

  18. D. R. Compeau, and C. A. Higgins, "Computer Self-Efficacy - Development of a Measure and Initial Test," MIS Quarterly, vol. 19, no. 2, pp.189-211, Jun. 1995. 

  19. A. Bandura, "Human Agency in Social Cognitive Theory," American Psychologist, vol. 44, no.9, pp.1175-1184, Sep. 1989. 

  20. A. Bandura, C. Barbaranelli, G. Caprara and C. Pastorelli, "Multifaceted impact of self-efficacy beliefs on academic functioning," Child Development. vol. 67, no. 3, pp.1206-1222, Jun. 1996. 

  21. D. Compeau, C. A. Higgins, and S. Huff, "Social cognitive theory and individual reactions to computing technology: A longitudinal study," MIS Quarterly, vol. 23, no. 2, pp.145-158, Jun. 1999. 

  22. D. R. Compeau, and C. A. Higgins, "Application of Social Cognitive Theory to Training for Computer Skills," Information Systems Research, vol. 6, no. 2, pp.118-143, Jun. 1995. 

  23. R. W. Lent, F. G. Lopez, and K. J. Bieschke, "Mathematics Self-Efficacy: Sources and Relation to Science-Based Career Choice," Journal of Counseling Psychology, vol. 38, no. 4, pp.424-430, Oct. 1991. 

  24. G. Hackett, and N. E. Betz, "A selfefficacy approach to the career development of women," Journal of Vocational Behavior, vol. 18, pp.326-339, Jun. 1981. 

  25. G. Hackett, and N. K. Campbell, "Task self-efficacy and task interest as a function of performance on a genderneutral task," Journal of Vocational Behavior, vol. 30, pp.203-215, Apr. 1987. 

  26. I. Ajzen Attitudes, personality, and behavior, Dorsey Press, Nov. 1988. 

  27. I. Ajzen, and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, Mar. 1980. 

  28. F. D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, vol. 13, no. 3, pp.319-340, Sep. 1989. 

  29. R,W. Lent, S.D. Brown and G, Hackett. "Toward a unifying social cognitive theory of career and academic interest, choice, and performance." Journal of Vocational Behavior, vol. 45, pp.79-122, Aug. 1994. 

  30. S. Felton, T. Dimnik, and M. Northey, "A theory of reasoned action model of the chartered accountant career choice," Journal of Accounting Education, vol. 13, no. 1, pp.1-19, Winter 1995. 

  31. R. Crepeau, C. Crook, M. Goslar and M. McMurtery, "Career anchors of information systems personnel," Journal of Management Information Systems. vol. 9, no. 2, pp.145-160, Fall 1992. 

  32. V. Vroom, Work and motivation, Wiley, Aug. 1964. 

  33. N. Betz, E.Voyten, and K. Klein, "Efficacy and Outcome Expectations Influence Career Exploration and Decidedness," Career Development Quarterly, vol. 46, no. 2, pp.179-89, Dec. 1997. 

  34. R. W. Lent, G. Hackett, and S. D. Brown, "A Social Cognitive Framework for Studying Career Choice and Transition to Work," Journal of Vocational Education Research, vol. 21, no. 4, pp.2-31, Dec. 1996. 

  35. A. Bandura, "Self-Efficacy Mechanism in Human Agency," American Psychologist, vol. 37, no. 2, pp.122-147, Feb. 1982. 

  36. A. Bandura, and D. Cervone, "Self- Evaluative and Self-Efficacy Mechanisms Governing the Motivational Effects of Goal Systems," Journal of Personality and Social Psychology, vol. 45, no. 5, pp.1017-1028, Nov. 1983. 

  37. J. Konvalina, A. W. Stanley, and L. Stephens, "Math Proficiency: a key to success factor for computer science students," Communications of the ACM, vol. 26, np.5, pp.377-382, May 1983. 

  38. D. Havelka, "Predicting Software Self Efficacy among Business Students: A Preliminary Assessment," Journal of Information Systems Education, vol. 14, no. 2, pp.145-152, Summer 2003. 

  39. R. Agarwal, V. Sambamurthy, and R. Stair, "The Evolving Relationship between General and Specific Computer Self- Efficacy: An Empirical Investigation," Information Systems Research, vol. 11, no. 4, pp.418-430, Dec. 2000. 

  40. A. Yasinsac, and M. Burmester, "Centers of Academic Excellence: A Case Study," IEEE Security & Privacy, vol. 3. no. 1, pp.62-65, Jan.-Feb. 2005. 

  41. D. H. Schunk, Self-efficacy and education and instruction, Plenum, Apr. 1995. 

  42. D. J. Bagert, and S. A. Mengel, "Developing and using a web-based project process throughout the software engineering curriculum " The Journal of Systems and Software. vol. 74, no. 2, pp.113-120, Jan. 2005. 

  43. V. Venkatesh, and F. D. Davis, "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, vol. 46, no. 2, pp.186-204, Feb. 2000. 

  44. B. J. Bank, R. L. Slavings, and B. J. Biddle, "Effects of peer, faculty, and parental influences on students' persis tence" Sociology of education, vol. 63, no. 3, pp.208-225, Jul. 1990. 

  45. M. London, "Relationships between career motivation, empowerment and support for career development," Journal of occupational and organizational psychology, vol. 66, pp.55-69, Mar. 1993. 

  46. F. Guay, C. Senecal, L. Gauthier and C. Fernet, "Predicting Career in decision: A self-determination theory perspective," Journal of counseling psychology, vol. 50, no. 2, pp.165-177, Apr. 2003. 

  47. I. Ajzen, and T. J. Madden, "Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control," Journal of Experimental Social Psychology, vol. 22, pp.453-474, Sep. 1986. 

  48. J. L. Swanson, and D. M. Tokar, "Development and initial validation of the Career Barriers Inventory," Journal of Vocational Behavior, vol. 39, pp.344-361, Dec. 1991. 

  49. D. A. Luzzo, "Ethnic Differences in College Students' Perceptions of Barriers to Career Development," Journal of Multicultural Counseling and Development, vol. 21, no. 4, pp.211-226, Oct. 1993. 

  50. J. L. Swanson, and D. M. Tokar, "College stuents' perceptions of barriers to career development," Journal of Vocational Behavior, vol. 38, pp.92-106, Feb. 1991. 

  51. S. Chai, S. Bagchi-Sen, R. Goel, H. R. Rao, S. Upadhyaya "A Framework for Understanding Minority Students' cybersecurity Career Interests." Procedings of the Twelfth Americas conference on Information systems, pp.3426-3432, Aug. 2006. 

  52. R. W. Lent, S. D. Brown, R. Talleyrand, McPartland, E.B., Davis, T., Chopra, S.B, Alexander M.S., Suthkaran, V.Chai, C.M..,"Career Choice Barriers, Supports, and Coping Strategies: College Students Experience," Journal of Vocational Behavior, vol. 60, pp.61-72, Feb. 2002. 

  53. A. Carey, 2006 Global Information Security Workforce Study, IDC, Oct. 2006. 

  54. P. Newton, Computing: an ideal occupation for women? In Women at Work: Psychological and Occupational Perspective, Open University Press, Jan. 1991. 

  55. B. Ramussen, and T. Hapnes, "Excluding women from the technologies of the future: a case study of the culture of computer science," Futures, vol. 23, pp.1107-1119, Dec. 1991. 

  56. E. H. Shinar, "Sexual stereotypes of occupations" Journal of Vocational Behavior, vol. 7, no. 1, pp.99-111, Aug. 1975. 

  57. T. Ruble, R. Cohen, and S. Ruble, "Sex stereotypes occupational barriers for women," The American Behavioral, vol. 27, no. 3, pp.339-356, Jan. 1984. 

  58. V. W. Mbarika, C. S. Sankar, and P. K. Raju, "Identification of Factors That Lead to Perceived Learning Improvements for Female Students," IEEE Transactions on Education, vol. 46, no. 1, pp.26-37, Feb. 2003. 

  59. C. Ogan, M. Ahuja, J. C. Robinson, Herring, S.C., Gender differences among students in computer science and applied information technology. MIT Press, Feb. 2006. 

  60. S. Herring, C. Ogan, M. Ahuja, Robinson, J., Gender and the culture of computing in applied IT education, Information Science Publishing, Mar. 2006. 

  61. H. Wold, Introduction to the Second Generation of Multivariate Analysis, Paragon House, Sep. 1989. 

  62. J. R. Hackamn, and G. R. Oldham, "Motivation through the design of work: Test of a theory," Organizational Behavior and Human Performance, vol. 16, pp.250-279, Aug. 1976. 

  63. J. R. Hackman, and L. W. Porter, "Expectancy theory of predictions of work effectiveness," Organizational Behavior and Human Performance, vol. 3, pp, 417-426, Nov. 1968. 

  64. W. W. Chin, B. L. Marcolin, and P. R. Newsted, "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, vol. 14, no. 2, pp.189-217, Jun. 2003. 

  65. W. W. Chin, The partial least squares approach for structural equation modeling, Lawrence Erlbaum Associates, Sep. 1998. 

  66. D. Barclay, C. Higgins, and R. Thompson, "The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration," Technology Studies,.vol. 2, no. 2, pp.285-324, Summer/Fall 1995. 

  67. C. Fornell, and D. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, vol. 18 ,pp.39-50, Feb. 1981. 

  68. W. W. Chin, "Issues and Opinion on Structural Equation Modeling," MIS Quarterly, vol. 22, no. 1, pp.vii-xvi, Mar. 1998. 

  69. T. Carte, and C. Russell, "In pursuit of moderation: nine common errors and their solutions," MIS Quarterly,.vol. 27, no. 3, pp.479-501, Sep. 2003. 

  70. W. W. Chin and A. Gopal, "Adoption intention in GSS: Relative importance of belief," SIGMIS Database, vol. 26, no. 2-3, pp.42-64, May/Aug. 1995. 

  71. J. Cohen, Statistical Power Analysis for the Behavioral Sciences, Lawrence Erlbaum, Jan. 1998. 

  72. A. E. Yasinsac, R.F. Marks, D.G. Pollitt, M.M. Sommer, P.M., "Computer forensics education," IEEE Security & Privacy, vol. 1, no. 4, pp.15-23, Jul./Aug. 2003. 

  73. L. Kvasny, F. C. Payton, V. W. Mbarika., "Gendered Perspectives on the Digital Divide, IT Education, and Workforce Participation in Kenya," IEEE Transaction on Education, vol. 51, no. 2, pp. 256-251, May 2008. 

  74. R. Agarwal, and T. W. Ferratt, "Enduring Practices for Managing IT Professionals," Communications of the ACM, vol. 45, no. 9, pp.73-79, Sep. 2002. 

  75. H. W. Yoo, and T. S. Kim, Information Security Professionals' Turnover Intention and Its Causes. Journal of the Korea Institute of Information Security and Cryptology, vol. 20, no. 1, pp.95-104, Feb. 2010. 

저자의 다른 논문 :

관련 콘텐츠

오픈액세스(OA) 유형

FREE

Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문

이 논문과 함께 이용한 콘텐츠

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로