• Nie Znaleziono Wyników

Rozbudowa modelu akceptacji technologii dla potrzeb bezpiecznego wykorzystania tożsamości cyfrowej w małych i średnich przedsiębiorstwach; Extension of technology acceptance model for secure use of digital identity in small and medium enterprises - Digita

N/A
N/A
Protected

Academic year: 2021

Share "Rozbudowa modelu akceptacji technologii dla potrzeb bezpiecznego wykorzystania tożsamości cyfrowej w małych i średnich przedsiębiorstwach; Extension of technology acceptance model for secure use of digital identity in small and medium enterprises - Digita"

Copied!
3
0
0

Pełen tekst

(1)

r

Politechnika Śląska

Wydział Organizacji i Zarządzania

Marta Juszczyk

R

o z b u d o w a

m o d e l u

a k c e p t a c j i

t e c h n o l o g i i

DLA POTRZEB BEZPIECZNEGO WYKORZYSTANIA

TOŻSAMOŚCI CYFROWEJ W MAŁYCH I ŚREDNICH

PRZEDSIĘBIORSTWACH

R o zp raw a dok to rsk a n ap isan a p o d kierunkiem : dr. hab. Z b ig n iew a Pastuszaka, prof. U M C S i p ro m o to ra pom ocniczego:

dr hab. Izabeli Jonek-K ow alskiej, prof. PŚ

(2)

Abstrcict

In the thesis, Digital Identity Acceptance Model (DIAM), created on the basis o f the Technology Acceptance Model (TAM) was presented. In order to prepare it, aseries ofresearch activities were conducted.

In the first stage o f literary research, theoretical Identification o f the topie o f digital identities was made. The sources o f knowledge were scientific articles, reports o f organizations investigating Information security and development o f e-economy, as well as documents generated by IT companies, with particular reference to the so-called white books.

The TAM model was chosen as the basis for explaining the factors that make employees use authentication in a certain way. To develop the model, critical analysis o f the literaturę has been carried out in order to investigate factors influencing the security o f IT systems use (including the analysis o f motivation theories and the use o f the TAM model).

Then, during the research internship, a preliminary research was conducted in cooperation with a software company. Using the experience o f employees o f this company, the probłematic areas that influence the use o f digital identities in the layer o f technical impłementation, organization and, above all, the practice o f using digital identities by employees, have been identified with the Delphi method. This area was chosen to formulate a research problem.

In the next stage, an open interviews scenario was developed and critiąued by the experts, followed by a study o f its use on a group o f 10 managers. This allowed to perceive managers perceptions o f purposefulness and motivation to use digital identities in an enterprise, their views on different ways o f accessing information in IT systems, and ways to manage an employee so that he or she is using the assigned access as intended. The results o f the interviews have allowed author to diagnose potential gaps in the way which digital identities are used.

Based on research using the Delphi method and the results o f the open interviews, a research ąuestionnaire was developed. This ąuestionnaire was used to conduct preliminary research on a limited sample o f Polish employees. Preliminary research concemed:

• area o f Digital Identity utilize with an extension o f a survey on access to data (individual accounts vs. accounts used by a group o f employees),

• perception o f various authentication methods by enterprise employees.

The results o f the preliminary studies have been analyzed and used in a study design. The studies were carried out using an extensive research ąuestionnaire on 202 employees o f smali and m edium enterprises. The investigated areas:

• organization of access to IT resources, including: impłementation o f security policies, types o f accounts and authentication tools used by respondents,

• user action in the context o f digital identity security, i.e. multi-dimensional use o f passwords and authentication devices,

• employee’s perception o f current Solutions, i.e. management in the area o f shaping employee's attitudes towards secure authentication, evaluation o f current Solutions, preference o f employees and comparison o f preferences with current Solutions.

(3)

The second part o f the research w as the study o f the param eters o f the initial D IA M m odel, i.e.

Alfa-Cronbach coefficicnt was used to determine the reliability o f the scalę and to examine the internal consistency o f the ąuestions. In order to investigate relationship between the model elements, 17 statistical hypotheses were constructed, and tested with Chi sąuared, Chi sąuare o f the highest reliability, and Spearman correlation.

As a result, four parts o f DIAM model were obtained: the universal one (DIAM-0), associated with the use o f passwrords/PIN numbers (DIAM-H), dedicated to authentication devices (D1AM-P), and biometric methods (DIAM-B). In addition, gaps between employees in management and executive positions have been identified.

The analysis o f the study results revealed the main 43 dependencies (testing statistical hypothesis) and 17 conclusions (the gaps and ąuantified DIAM model analysis); based on which 20 recommendations for management were formulated.

The recommendations w'ere grouped as foliowTs:

• design information security system (6 recommendations), • actions and competences o f superiors (5 recommendations),

• shaping empioyee attitudes towards secure authentication (5 recommendations),

• recommendations for reducing staff resistance when introducing biometric authentication (4 recommendations).

factors and the strength o f the relationship between them. For this purpose, an analysis o f the

Cytaty

Powiązane dokumenty

W koncepcji Cubitta najważniejszym przekaźnikiem jest światło, dla moich celów jednak uznam, że może być nim fotografia, medium w sensie spirytystycznym.. Ponownie musimy

Cultural knowledge is inherently integrated, so the problem of content de- velopment of cultural training needs justification form of integration [Клепко

Postępowanie sądowoadministracyjne jest postępowaniem formalnie kontra- dyktoryjnym, w którym — nie licząc sądu administracyjnego — biorą udział co najmniej dwa podmioty, a

Several other indicators in conjunction with each other can be used to estimate the size and trends of the transitory migration through Bulgaria: the number of people who have

Aleksandra Oko-

Na wystawie dotyczą- cej nietoperzy, można było zobaczyć gatunki z krótkimi opisami, sylwetki tych zwierząt w skali czy przykłady zajmowanych przez nie siedlisk oraz gatunków

The most important factor in small and medium-sized enterprises is undoubtedly the training; intellectual capital directly impacts the growth and productivity of the organization,

Customer database, expert database, organisational structure and internal processes, organisational culture, optimisation of project management and other structural resources