DOI QR코드

DOI QR Code

Intrinsic and Extrinsic Factors Impacting Individuals' Cyber Ethics Awareness and Behavior Intention

사이버윤리 준수인식과 행동의도에 영향을 미치는 사용자의 내·외적요인

  • 김상현 (경북대학교 경영학부) ;
  • 박현선 (경북대학교 경영학부 일반대학원)
  • Received : 2013.12.02
  • Accepted : 2014.03.23
  • Published : 2014.03.31

Abstract

As the Internet is widely used worldwide, Cyber world has become a part of daily life. On the other hand, the adverse effects of Internet, such as abusive comments, illegal harmful contents, rumor diffusion, infringement on a right have emerged with the increase. Researchers recognized the important of cyber ethics as an effective means of coping with the adverse effects on Internet. But, Little empirical research has been related to cyber ethics in management information systems. Thus, the purpose of this research is to identify multidimensional motivation factors that cyber ethics awareness and compliance behavior Intention. For this, this study investigated the factors that might influence Internet users to compliance cyber ethics. Using university students as a sample, one hundred and ninety six are collected for further analysis. The results of this study are as follows; First, self-esteem, Moral Obligation, self-control, cyber ethics education and Social Influence are significantly related to cyber ethics awareness, while punishment is not significantly related. Second, cyber ethics awareness have a positive effect on cyber ethics compliance behavior Intention. Third, the moderating effect of ego strength is also significant. This study is significant in that it established a behavior model to understand the compliance of cyber ethics with internet user in Korea.

Keywords

References

  1. 구본희, 최무진, "인터넷 중독과 정보윤리에 영향을 미치는 요인에 관한 연구-자아 특성 및 인터넷 인지 특성을 중심으로," 정보시스템연구, 제15권, 제3호, 2006, pp. 233-252.
  2. 김문구, 박종현, "국내 성인의 인터넷 윤리수준 영향요인과 인터넷 폭력과의 관계에 관한 연구," 소비자문제연구, 제33호, 2008, pp. 65-91.
  3. 김경희, 김태웅, "디지털 콘텐츠 저작권 침해의도에 관한 영향요인 연구," 한국컴퓨터교육학회 논문지, 제16권, 제1호, 2013, pp. 63-71.
  4. 김효정, 유상진, 구본희, "개인 특성 및 인터넷 활용 특성이 인터넷 중독 및 정보 윤리에 미치는 영향에 관한 연구," 경영교육연구, 제48권, 2007, pp. 101-124.
  5. 명재진, 이한태, "사이버윤리 연구동향 분석과 정보인권 측면에서의 평가," 정보화정책, 제20권, 제1호, 2013, pp. 3-21.
  6. 박주연, "인터넷 저작권 침해 보호에 관한 연구-저작권 침해에 대한 처벌 및 윤리의식을 중심으로" 디지털정책연구, 제11권, 제1호, 2013, pp. 145-151.
  7. 박철주, 임명성, "보안 대책이 지속적 보안 정책 준수에 미치는 영향," 디지털정책연구, 제10권, 제4호, 2012, pp. 23-35.
  8. 백승익, 조남재, 이인, 강진우, 김봉준, "사이버 윤리지표 개발에 관한 실증연구-한국, 미국, 인도의 차이를 중심으로," 정보화정책, 제14권, 제1호, 2007, pp. 85-101.
  9. 안은정, 이제홍, "인터넷 윤리의식 분석 및 평가에 관한 연구," e-비즈니스연구, 제14권, 제2호, 2013, pp. 69-87.
  10. 유진호, "인터넷 윤리의 개요 및 국내 현황," 정보과학회지, 제30권, 제10호, 2012, pp. 15-20.
  11. 이기식, "인터넷시대 사이버윤리(CyberEthics)의 영향요인분석: 매체-내용-상황-문화 관점의 적용," 한국정책과학회보, 제11권, 제3호, 2007, pp. 49-76.
  12. 이기식, "사이버 저작권윤리(Cyber Copyright Ethics)의 수용에 관한 연구: 영향요인도출," 디지털정책연구, 제9권, 제6호, 2011, pp. 57-70.
  13. 이상배, 김용겸, 김인호, "정보시스템 요원의 정보윤리 실천의도에 영향을 미치는 요인간 관계연구," 경영학연구, 제33권, 제2호, 2004, pp. 375-422.
  14. 추병완, 정보윤리교육론, 서울:울력, 2001.
  15. 추병완, "사이버 공간의 도덕과 교육적 함의," 도덕윤리교육과교육연구, 제16권, 2003, pp. 306-320.
  16. 추병완, "온라인에서의 도덕적 이탈과 인터넷윤리교육의 과제," 윤리연구, 제87권, 2012, pp. 119-141.
  17. 하영윤, 오영환, "대학생의 수준과 스트레스 대처방식과의 관계 연구," 서울여자대학교 학생생활연구소, 제8권, 1996, pp.99-119.
  18. 한국인터넷진흥원, 2011년 인터넷윤리문화실태조사, 2011.
  19. 한국인터넷진흥원, 2012년 인터넷이용실태조사, 2012.
  20. 한정희, 장활식, "인터넷에서의 디지털 음악 저작권 침해 행동에 관한 연구," 정보시스템연구, 제16권, 제1호, 2007, pp. 135-158.
  21. Al-Rafee, S. and Cronan, T.P., "Digital Piracy: Factors that Influence Attitude Toward Behavior," Journal of Business Ethics, Vol.63, No.3, 2006, pp.237-259. https://doi.org/10.1007/s10551-005-1902-9
  22. Ajzen, I., "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol.50, No.2, 1991, pp.179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  23. Bagchi, K., Kirs, P. and Cerveny, R., "Global Software Piracy: Can Economic Factors Alone Explain the Trend?," Communications of the ACM, Vol.49, No.6, 2006, pp.70-76. https://doi.org/10.1145/1132469.1132470
  24. Banerjee, D., Cronan, T.P. and Jones, T.W., "Modeling IT Ethics: A Study in Situational Ethics," MIS Quarterly, Vol.22, No.1, 1998, pp.31-60. https://doi.org/10.2307/249677
  25. Carmines, E.G. and Zeller, R.A., Reliability and Validity Assessment, Newbury Park, CA: Sage Publications, 1979.
  26. Carte, T.A. and C. J. Russell, C.J., "In Pursuit of Moderation: Nine Common Errors and Their Solutions," MIS Quarterly, Vol. 27, No.3, 2003, pp.479-501.
  27. Chang, M.K., "Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and The Theory of Planned Behavior," Journal of Business Ethic, Vol.17, No.16, 1998, pp.1825-1834. https://doi.org/10.1023/A:1005721401993
  28. Chin, W., Marcolin, B. and Newsted, P.R., "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and a Electronic-Mail Emotion/Adoption Study," Information System Research, Vol.14, No.2, 2003, pp.189-217. https://doi.org/10.1287/isre.14.2.189.16018
  29. Fishbein, M. and Ajzen, L., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley, 1975.
  30. Fornell, C. and Larcker, D.F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement," Journal of Marketing Research, Vol.18, No.1, 1981, pp.39-50. https://doi.org/10.2307/3151312
  31. Gefen, D. and Straub, D., "A Practical Guide to Factorial Validity Using PLS Graph: Tutorial and Annotated Example," Communications of the Association for Information Systems, Vol.16, No.5, 2005, pp.91-109.
  32. Gottfredson, M.R. and Hirschi, T., A General Theory of Crime, Palo Alto: Stanford University Press, 1990.
  33. Hair, J.F., Anderson, R.E., Tatham, R. L. and Black, W. C., Multivariate Data Analysis, Upper Saddle River, NJ: Prentice-Hall.
  34. Harrington, S.J., "A Test of a Person-Issue Contingent Model of Ethical Decision Making in Organizations," Journal of Business Ethics, Vol.16, No.4, 1997, pp.363-375. https://doi.org/10.1023/A:1017900615637
  35. Hsu, M.H. and Kue, F.Y., "An Investigation of Volitional Control in Information Ethics," Behavior and Information Technology, Vol.22, No.1, 2003, pp.53-62. https://doi.org/10.1080/01449290301781
  36. Kurland, N.B., "Ethical Intentions and the Theories of Reasoned Action and Planned Behavior," Journal of Applied Social Psychology, Vol. 25, No. 4, 1995, pp. 297-313. https://doi.org/10.1111/j.1559-1816.1995.tb02393.x
  37. Kolberg, L., "Stage and Sequence: The Cognitive Developmental Approach to Socialization," in D. Goslin (Ed,), Handbook of socialization theory and research, Rand McNally, Chicago, IL, 1969.
  38. Kreie, J. and Cronan, P., "Copyright, Piracy, Privacy and Security Issues: Acceptable or UInacceptable Action for End Users?", Journal of End User Computing, Vol.11, No.2, 1999, pp.13-21. https://doi.org/10.4018/joeuc.1999040102
  39. Leonard, L.N.K. and Cronan, T.P., "Attitude toward Ethical Behavior in Computer Use: A Shifting Model," Industrial Management & Data Systems, Vol.105, No.9, 2005, pp.1150-1171. https://doi.org/10.1108/02635570510633239
  40. Leonard, L.N.K., Cronan, T.P. and Kreie, J., "What Influences IT Ethical Behaviour Intentions-Planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?," Information & Management, Vol.42, No.1, 2004, pp.143-158. https://doi.org/10.1016/j.im.2003.12.008
  41. Logue, Self-Control, New York: Prentice Hall, 1995.
  42. Mann, D. and Sutton, M., "Net Crime: More Chang in the Organization of Thieving," British Journal of Criminology, Vol.38, No.2, 1998, pp.201-229. https://doi.org/10.1093/oxfordjournals.bjc.a014232
  43. Mason, R.O., "Four Ethical Issues of the Information Age," MIS Quarterly, Vol.10, No.1, 1986, pp.5-12. https://doi.org/10.2307/248873
  44. Mischel, W., Schoda, Y. and Peake, P.K., "The Nature of Adolescent Competencies Predicted by Preschool Delay of Gratification," Journal of Personality and Social Psychology, Vol.54, No.4, 1988, pp.687-696. https://doi.org/10.1037/0022-3514.54.4.687
  45. Nunnally, N.C., Psychometric Theory, NY: McGraw-Hill, 1978.
  46. Peace, A.G., Galletta, D.F. and Thong, J.Y.L., "Software Piracy in the Workplace: A Model and Empirical Test," Journal of Management Information Systems, Vol.20, No.1, 2003, pp.153-177. https://doi.org/10.1080/07421222.2003.11045759
  47. Rosenberg, M., Society and the Adolescent Self-Image, NJ: Princeton University Press, 1965.
  48. Scholtz, J.T., "Enforcement Policy and Corporate Misconduct: The Changing Perspective of Deterrence Theory," Law and Contemporary Problems, Vol.60, No.3, 1997, pp.253-268. https://doi.org/10.2307/1192014
  49. Straub, D.W., "Effective IS Security: An Empirical Study," Information Systems Research, Vol.1, No.3, 1990, pp.255-276. https://doi.org/10.1287/isre.1.3.255
  50. Trevino, L.K., "Ethical Decision Making in Organizations: A Person-Situation Interactionist Model," Academy of Management Review, Vol.11, No.3, 1986, pp.601-617.
  51. Wu, W.P. and Yang, H.L., "A Comparative Study of College Students' Ethical Perception concerning Internet Piracy," Quality & Quantity, Vol.47, No.1, 2013, pp.111-120. https://doi.org/10.1007/s11135-011-9506-1
  52. Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Vol.100, No.3, 2011, pp.405-417. https://doi.org/10.1007/s10551-010-0687-7
  53. Young, K.S., Caught in the net: How to Recognize the Signs of Internet Addiction and a Winning Strategy for Recovery, NY: John Wiley & Sons Inc, 1998.

Cited by

  1. A Study on Intention to Pirate Digital Video by an Integrated Model of TPB, TIB, and Neutralization vol.23, pp.4, 2014, https://doi.org/10.5859/KAIS.2014.23.4.197