The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information

Detalhes bibliográficos
Autor(a) principal: Ohtoshi, Paulo Hideo
Data de Publicação: 2017
Outros Autores: Duque, Cláudio Gottschalg
Tipo de documento: Artigo
Idioma: eng
Título da fonte: Brazilian Journal of Information Science
Texto Completo: https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920
Resumo: This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.
id UNESP-31_446de127315f5206aeb6719bce01b990
oai_identifier_str oai:ojs.revistas.marilia.unesp.br:article/5920
network_acronym_str UNESP-31
network_name_str Brazilian Journal of Information Science
repository_id_str
spelling The information behavior of Information Security and Cryptography professionals: how these professionals seek and use informationThe information behavior of Information Security and Cryptography professionals: how these professionals seek and use informationInformation BehaviorInformation NeedInformation SeekInformation UseInformation SecurityCryptographyThis paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.Faculdade de Filosofia e Ciências2017-10-09info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttps://revistas.marilia.unesp.br/index.php/bjis/article/view/592010.36311/1981-1640.2017.v11n3.02.p6Brazilian Journal of Information Science: Research Trends; Vol. 11 No. 3 (2017)Brazilian Journal of Information Science: Research Trends; Vol. 11 Núm. 3 (2017)Brazilian Journal of Information Science: research trends; v. 11 n. 3 (2017)1981-1640reponame:Brazilian Journal of Information Scienceinstname:Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP)instacron:UNESPenghttps://revistas.marilia.unesp.br/index.php/bjis/article/view/5920/4664Copyright (c) 2017 Paulo Hideo Ohtoshi, Cláudio Gottschalg Duquehttps://creativecommons.org/licenses/by-sa/4.0info:eu-repo/semantics/openAccessOhtoshi, Paulo HideoDuque, Cláudio Gottschalg2022-06-20T17:42:31Zoai:ojs.revistas.marilia.unesp.br:article/5920Revistahttps://revistas.marilia.unesp.br/index.php/bjis/indexPUBhttps://revistas.marilia.unesp.br/index.php/bjis/oaibrajis.marilia@unesp.br||1981-16401981-1640opendoar:2022-06-20T17:42:31Brazilian Journal of Information Science - Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP)false
dc.title.none.fl_str_mv The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
title The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
spellingShingle The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
Ohtoshi, Paulo Hideo
Information Behavior
Information Need
Information Seek
Information Use
Information Security
Cryptography
title_short The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
title_full The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
title_fullStr The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
title_full_unstemmed The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
title_sort The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
author Ohtoshi, Paulo Hideo
author_facet Ohtoshi, Paulo Hideo
Duque, Cláudio Gottschalg
author_role author
author2 Duque, Cláudio Gottschalg
author2_role author
dc.contributor.author.fl_str_mv Ohtoshi, Paulo Hideo
Duque, Cláudio Gottschalg
dc.subject.por.fl_str_mv Information Behavior
Information Need
Information Seek
Information Use
Information Security
Cryptography
topic Information Behavior
Information Need
Information Seek
Information Use
Information Security
Cryptography
description This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.
publishDate 2017
dc.date.none.fl_str_mv 2017-10-09
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920
10.36311/1981-1640.2017.v11n3.02.p6
url https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920
identifier_str_mv 10.36311/1981-1640.2017.v11n3.02.p6
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920/4664
dc.rights.driver.fl_str_mv Copyright (c) 2017 Paulo Hideo Ohtoshi, Cláudio Gottschalg Duque
https://creativecommons.org/licenses/by-sa/4.0
info:eu-repo/semantics/openAccess
rights_invalid_str_mv Copyright (c) 2017 Paulo Hideo Ohtoshi, Cláudio Gottschalg Duque
https://creativecommons.org/licenses/by-sa/4.0
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Faculdade de Filosofia e Ciências
publisher.none.fl_str_mv Faculdade de Filosofia e Ciências
dc.source.none.fl_str_mv Brazilian Journal of Information Science: Research Trends; Vol. 11 No. 3 (2017)
Brazilian Journal of Information Science: Research Trends; Vol. 11 Núm. 3 (2017)
Brazilian Journal of Information Science: research trends; v. 11 n. 3 (2017)
1981-1640
reponame:Brazilian Journal of Information Science
instname:Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP)
instacron:UNESP
instname_str Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP)
instacron_str UNESP
institution UNESP
reponame_str Brazilian Journal of Information Science
collection Brazilian Journal of Information Science
repository.name.fl_str_mv Brazilian Journal of Information Science - Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP)
repository.mail.fl_str_mv brajis.marilia@unesp.br||
_version_ 1797069098246471680