The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
Autor(a) principal: | |
---|---|
Data de Publicação: | 2017 |
Outros Autores: | |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Brazilian Journal of Information Science |
Texto Completo: | https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920 |
Resumo: | This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group. |
id |
UNESP-31_446de127315f5206aeb6719bce01b990 |
---|---|
oai_identifier_str |
oai:ojs.revistas.marilia.unesp.br:article/5920 |
network_acronym_str |
UNESP-31 |
network_name_str |
Brazilian Journal of Information Science |
repository_id_str |
|
spelling |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use informationThe information behavior of Information Security and Cryptography professionals: how these professionals seek and use informationInformation BehaviorInformation NeedInformation SeekInformation UseInformation SecurityCryptographyThis paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.Faculdade de Filosofia e Ciências2017-10-09info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttps://revistas.marilia.unesp.br/index.php/bjis/article/view/592010.36311/1981-1640.2017.v11n3.02.p6Brazilian Journal of Information Science: Research Trends; Vol. 11 No. 3 (2017)Brazilian Journal of Information Science: Research Trends; Vol. 11 Núm. 3 (2017)Brazilian Journal of Information Science: research trends; v. 11 n. 3 (2017)1981-1640reponame:Brazilian Journal of Information Scienceinstname:Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP)instacron:UNESPenghttps://revistas.marilia.unesp.br/index.php/bjis/article/view/5920/4664Copyright (c) 2017 Paulo Hideo Ohtoshi, Cláudio Gottschalg Duquehttps://creativecommons.org/licenses/by-sa/4.0info:eu-repo/semantics/openAccessOhtoshi, Paulo HideoDuque, Cláudio Gottschalg2022-06-20T17:42:31Zoai:ojs.revistas.marilia.unesp.br:article/5920Revistahttps://revistas.marilia.unesp.br/index.php/bjis/indexPUBhttps://revistas.marilia.unesp.br/index.php/bjis/oaibrajis.marilia@unesp.br||1981-16401981-1640opendoar:2022-06-20T17:42:31Brazilian Journal of Information Science - Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP)false |
dc.title.none.fl_str_mv |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information |
title |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information |
spellingShingle |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information Ohtoshi, Paulo Hideo Information Behavior Information Need Information Seek Information Use Information Security Cryptography |
title_short |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information |
title_full |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information |
title_fullStr |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information |
title_full_unstemmed |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information |
title_sort |
The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information |
author |
Ohtoshi, Paulo Hideo |
author_facet |
Ohtoshi, Paulo Hideo Duque, Cláudio Gottschalg |
author_role |
author |
author2 |
Duque, Cláudio Gottschalg |
author2_role |
author |
dc.contributor.author.fl_str_mv |
Ohtoshi, Paulo Hideo Duque, Cláudio Gottschalg |
dc.subject.por.fl_str_mv |
Information Behavior Information Need Information Seek Information Use Information Security Cryptography |
topic |
Information Behavior Information Need Information Seek Information Use Information Security Cryptography |
description |
This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group. |
publishDate |
2017 |
dc.date.none.fl_str_mv |
2017-10-09 |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920 10.36311/1981-1640.2017.v11n3.02.p6 |
url |
https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920 |
identifier_str_mv |
10.36311/1981-1640.2017.v11n3.02.p6 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920/4664 |
dc.rights.driver.fl_str_mv |
Copyright (c) 2017 Paulo Hideo Ohtoshi, Cláudio Gottschalg Duque https://creativecommons.org/licenses/by-sa/4.0 info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Copyright (c) 2017 Paulo Hideo Ohtoshi, Cláudio Gottschalg Duque https://creativecommons.org/licenses/by-sa/4.0 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Faculdade de Filosofia e Ciências |
publisher.none.fl_str_mv |
Faculdade de Filosofia e Ciências |
dc.source.none.fl_str_mv |
Brazilian Journal of Information Science: Research Trends; Vol. 11 No. 3 (2017) Brazilian Journal of Information Science: Research Trends; Vol. 11 Núm. 3 (2017) Brazilian Journal of Information Science: research trends; v. 11 n. 3 (2017) 1981-1640 reponame:Brazilian Journal of Information Science instname:Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP) instacron:UNESP |
instname_str |
Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP) |
instacron_str |
UNESP |
institution |
UNESP |
reponame_str |
Brazilian Journal of Information Science |
collection |
Brazilian Journal of Information Science |
repository.name.fl_str_mv |
Brazilian Journal of Information Science - Universidade Estadual Paulista Júlio de Mesquita Filho (UNESP) |
repository.mail.fl_str_mv |
brajis.marilia@unesp.br|| |
_version_ |
1797069098246471680 |