Hyeun-Suk Rhee

Learn More
The ultimate success of information security depends on appropriate information security practice behaviors by the end users. Based on social cognitive theory, this study models and tests relationships among self-efficacy in information security, security practice behavior and motivation to strengthen security efforts. This study also explores antecedents(More)
Information security is a critically important issue in current networked business and work environments. While there is extensive publicity on the increasing incidents of numerous information security breaches and their serious consequences, recent surveys and research on information security repeatedly identify the low levels of user and managerial(More)
A laboratory experiment was conducted to test the impact of communication medium (computermediated versus face-to-face) on the performance of three-person groups with an integrative negotiation task. Negotiation process variables this study investigated were: conflict management behavior, judgment accuracy and negotiation time. Negotiation outcome variables(More)
Natural language (NL) interfaces for DB query formulation have always been recognized as a much needed enhancement for end-users. Poor performances with earlier NL systems had led to a lull in research in this field. However, latter-day experiments and systems appear to be sufficiently more promising to warrant continued and further research in this area.(More)
An intrusion detection system plays an important role in a firm's overall security protection. Its main purpose is to identify potentially intrusive events and alert the security personnel to the danger. A typical intrusion detection system, however, is known to be imperfect in detection of intrusive events, resulting in high false-alarm rates.(More)