DOI QR코드

DOI QR Code

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services)

SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인

  • Received : 2014.06.09
  • Accepted : 2015.02.02
  • Published : 2015.02.28

Abstract

Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

최근 IT 산업의 급격한 성장과 스마트폰의 출현으로 인해, 우리는 시와 장소를 가리지 않고 인터넷 환경에 접속할 수 있게 되었다. 하지만, 이로 인한 부정적인 영향도 발생하였다. 그중 하나는 피싱(Phishing), 스미싱(SMishing)과 같은 금융 범죄의 증가이다. 피싱, 스미싱과 같은 범죄로부터 이용자를 보호하기 위한 많은 연구들이 진행 중에 있지만, SNS에서의 보안 관련 지식공유를 통한 범죄 완화에 대한 연구는 현재 찾아보기 어려운 실정이다. 본 연구에서는, SNS 이용자가 보안 관련 지식공유 의도를 불러일으키는 영향 요인에는 무엇이 있는지 알아보고자 한다. 연구를 통해 다음을 알 수 있었다. 지식제공 자기효능감은 자기표현에 유의미한 영향을 미친다. 그리고 자기표현, 정보보안 의식, 소속감은 SNS 내에서 보안 관련 지식공유 의도에 유의미한 영향을 미치는 것으로 밝혀졌다. 반면에, 이타성은 SNS 내에서 보안 관련 지식공유 의도에 유의미한 영향을 미치지 않았다. 향후에는 본 연구를 토대로, SNS 뿐만 아니라 모든 형태의 온라인 공동체로 연구의 범위를 넓혀, 가설을 일반화시키려는 노력이 필요할 것으로 보인다.

Keywords

References

  1. Ajzen, I., "Constructing a TPB questionnaire : Conceptual and methodological considerations," chuang.epage.au.edu.tw, 2002.
  2. Ashforth, B. E. and Mael, F., "Social identity theory and the organization," Academy of management review, 1989.
  3. Bandura, A., "Self-Efficacy Mechanisms in Human Agency," American Psychologist, Vol. 37, No. 2, pp. 122-147, 1982. https://doi.org/10.1037/0003-066X.37.2.122
  4. Bandura, A., "Social Foundations of Thought and Action," Prentice Hall, Englewood Cliffs, NJ, 1986.
  5. Bandura, A., "Social Learning Theory," Prentice Hall, Englewood Cliffs, NJ, 1977.
  6. Bhattacharya, C. B., Rao, H. and Glynn, M. A., "Understanding the Bond of Identification : An Investigation of its Correlates among Art Museum Members," Journal of Marketing, Vol. 59, No. 4, pp. 46-57, 1995. https://doi.org/10.2307/1252327
  7. Bock, G. W. and Kim, Y. G., "Breaking the Myths of Rewards : an Exploratory Study of Attitudes about Knowledge Sharing," Information Resources Management Journal, Vol. 15, No. 2, pp. 14-21, 2002. https://doi.org/10.4018/irmj.2002040102
  8. Brewer, M. B., "The Social Self : On Being the Same and Different at the Same Time," Personality and Social Psychology Bulletin, Vol. 17, pp. 475-82, 1991. https://doi.org/10.1177/0146167291175001
  9. Cha, J. and Kim, Y., "An Analytical Review of Interrater Reliability & Agreement," The Korean Academic Society of Business Administration, Vol. 23, pp. 75-102, 1994.
  10. Chai, S. and Kim, M., "A socio-technical approach to knowledge contribution behavior : An empirical investigation of social networking sites users," International Journal of Information Management, Vol. 32, pp. 118-126, 2012. https://doi.org/10.1016/j.ijinfomgt.2011.07.004
  11. Chin, W. W., Marcolin, B. L., and Newsted, P. R., "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects : Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information systems research, Vol. 14, No. 2, pp. 189-217, 2003. https://doi.org/10.1287/isre.14.2.189.16018
  12. Chiu, C., Hsu, M., and Wang, E. T. G., "Understanding knowledge sharing in virtual communities : an integration of social capital and social cognitive theories," Decision Support Systems, Vol. 42, No. 3, pp. 1872-1888, 2006. https://doi.org/10.1016/j.dss.2006.04.001
  13. Choi, N., Kim, D., Goo, J., and Whitmore, A., "Knowing is doing : An empirical validation of the relationship between managerial information security awareness and action," Information Management and Computer Security, Vol. 16, No. 5, pp. 484-501, 2008. https://doi.org/10.1108/09685220810920558
  14. Davenport, T. H. and Prusak, L., "Working Knowledge : How Organizations Manage What They Know," Harvard Business School Press, Boston, 1998.
  15. Deaux, K., "Focusing on the self : Challenges to Self-Definition and Their Consequences for Mental Health," The Social Psychology of Mental Health : Basic Mechanisms and Applications, edited by Diane N. Ruble, Philip R. Costanzo, and Mary Ellen Oliveri. New York : Guilford, pp. 301-27, 1992.
  16. Dominick, J. R., "Who Do You Think You Are? Personal Home Pages and Self-Presentation on the World Wide Web," Journalism and Mass Communication Quarterly, Vol. 76, No. 4, pp. 646-658, 1999. https://doi.org/10.1177/107769909907600403
  17. Drevin, L., Kruger, H. A., and Steyn, T., "Value Focused Assessment of IGT Security Awareness in an Academic Environment," Computers and Security, Vol. 26, pp. 36-43, 2007. https://doi.org/10.1016/j.cose.2006.10.006
  18. Fornell, C. and Larcker, D. F., "Structural equation models with unobservable variables and measurement error : Algebra and statistics," Journal of marketing research, 1981.
  19. Frank, J., Shamir, B., and Briggs, W., "Security-related Behavior of PC Users in Organizations," Information and Management, Vol. 21, No. 3, pp. 127-135, 1991. https://doi.org/10.1016/0378-7206(91)90059-B
  20. Gruen, T. W., Summers, J. O., and Acito, F., "Relationship marketing activities, commitment, and membership behaviors in professional associations," Journal of Marketing, Vol. 64, pp. 34-49, 2000. https://doi.org/10.1509/jmkg.64.3.34.18030
  21. Gundlach, M., Zivnuska, S., Stoner, J., "Understanding the relationship between individualism-collectivism and team performance through an integration of social identity theory and the social relations model," Human Relations, 2006.
  22. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C., "Multivariate analysis," Englewood : Prentice Hall International, 1998.
  23. Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C., "Multivariate Data Analysis," 5th Edn., Prentice Hall, Upper Saddle River, New Jersey, USA, 2006.
  24. Heide, J. B. and Miner, A. S., "The Shadow of The Future Effects of Anticipated Interaction and Frequency of Contact on Buy-Seller Cooperation," Academy of Management Journal, Vol. 35, No. 2, pp. 265-291, 1992. https://doi.org/10.2307/256374
  25. Hogg, M. A. and Dominic, A., "Social Identifications : A Social Psychology of Intergroup Relations and Group Processes," London : Routledge, 1988.
  26. Hogg, M. A., Deborah, J. T. and Katherine, M. W., "A Tale of Two Theories : A Critical Comparison of Identity Theory with Social Identity Theory," Social Psychology Quarterly, Vol. 58, No. 4, pp. 255-269, 1995. https://doi.org/10.2307/2787127
  27. Hwang, H. S., Son, S. H., and Choe, Y. J., "Exploring Factors Affecting Smart-Phone Addiction-Characteristics of Users and Functional Attributes," Korean Journal of Broadcasting and Telecommunication Studies, Vol. 25, No. 2, pp. 277-313, 2011.
  28. Jan, E. S. and Peter, J. B., "Identity Theory and Social Identity Theory," Social Psychology Quarterly, Vol. 63, No. 3, pp. 224-237, 2000. https://doi.org/10.2307/2695870
  29. Jang, J. Y., Park, T. H., and Kim, B. S., "The Life Cycle Model Considering Legal and Technical Characteristics of Personal Data," The Journal of Society for e-Business Studies, Vol. 17, No. 3, pp. 43-60, 2012. https://doi.org/10.7838/jsebs.2012.17.3.043
  30. Jing, Z., Kathleen, A., James, G. A., Sejin, H., and Richard, W., "Trust, empathy, social identity, and contribution of knowledge within patient online communities," Behaviour and Information Technology, Vol. 32, No. 10, pp. 1041-1048, 2013. https://doi.org/10.1080/0144929X.2013.819529
  31. Kankanhalli, A., Tan, B. C. Y., and Wei, K. K., "Contributing Knowledge to Electronic Knowledge Repositories : An Empirical Investigation," MIS Quarterly, Vol. 28, No 1, pp. 113-143, 2005.
  32. Kim, J. K. and Kang, D. Y., "The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness," Journal of the Korea Institute of Information Security and Cryptology, Vol. 18, No. 4, pp. 123-133, 2008.
  33. Kim, S. H. and Song, Y. M., "An Empirical Study on Motivational Factors Influencing Information Security Policy Compliance and Security Behavior of End-Users (Employees) in Organizations," The e-Business Studies, Vol. 12, No. 3, pp. 327-349, 2011. https://doi.org/10.15719/geba.12.3.201109.327
  34. Kim, Y. J. and Kim, J. W., "Effecting Factors on Producing Blog Contents : Comparison of Power Blogers and General Blogers," Entrue Journal of Information Technology, Vol. 10, No. 1, pp. 7-18, 2011.
  35. Kim, Y. K. and Koo, S. H., "The Effect of Influence Factors of Knowledge Sharing Behavior on Knowledge Sharing Behavior and Community Loyalty in Online Community," Korean Strategic Marketing Association, Vol. 19, No. 2, pp. 1-19, 2011. https://doi.org/10.1080/0965254X.2011.559815
  36. Koh, J. and Kim, Y. G., "Sense of Virtual Community : A Conceptual Framework and Empirical Validation," International Journal of Electronic Commerce, Vol. 8, No. 2, pp. 75-93, 2003.
  37. Koh, J., Shin, S. J., and Kim, H. W., "The Antecedents of Need for Self-Presentation and the Effect on Digital Item Purchase Intention in an Online Community," The Korea Society of Management information Systems, Vol. 18, No. 1, pp. 117-144, 2008.
  38. Leach, J., "Improving User Security Behavior," Computers and Security, Vol. 22, No. 8, pp. 685-692, 2003. https://doi.org/10.1016/S0167-4048(03)00007-5
  39. Leary, M. R. and Kowalski, R. M., "Impression management : A literature review and two-component model," Psychological bulletin, Vol. 107, No. 1, pp. 34-47, 1990. https://doi.org/10.1037/0033-2909.107.1.34
  40. Leary, M. R., "Self-Presentation : Impression Management and Interpersonal Behavior," Boulder, CO : Westview Press, 1995.
  41. Leary, M. R., Tambor, E. S., and Terdal, S. K., "Self-esteem as an interpersonal monitor : The sociometer hypothesis," Journal of Personality and Social Psychology, Vol. 68, No. 3, pp. 518-530, 1995. https://doi.org/10.1037/0022-3514.68.3.518
  42. Lee, D. S., "Probleme der zivilrechtlichen Haftung im Hinblick auf die Information sausnutzung im Online-Banking-anhand der aktuellen deutschen Judikatur uber das Phishing-Risiko," Institute for Law of Science and Technology, Vol. 19, No. 1, pp. 37-78, 2013.
  43. Ma, M. and Agarwal, R., "Through a Glass Darkly : Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities," Information Systems Research, Vol. 18, No. 1, pp. 42-67, 2007. https://doi.org/10.1287/isre.1070.0113
  44. Maslow, A. H., "Motivation and personality," New York : Harper & Row, 1954.
  45. Melinda, L. K. and Katherine, T. B., "The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions," Journal of Computer Information Systems, pp. 15-24, 2008.
  46. Organ, D. W., "Organizational Citizenship Behavior : The "Good Soldier" Syndrome," Lexington, MA, England : Lexington Books/D. C. Heath and Com., Vol. 13, pp. 132, 1988.
  47. Pandey, M. and Ravi, V., "Text and Data Mining to Detect Phishing Websites and Spam Emails," Swarm, Evolutionary, and Memetic Computing, Vol. 8298, pp. 559-573, 2013. https://doi.org/10.1007/978-3-319-03756-1_50
  48. Park, S. H. and Lee, J. H., "The proposal for SMishing protecting system through authentication and pre right verification," The Journal of Korea Information and Communications Society, Vol. 23, No. 6, pp. 5-12, 2013.
  49. Podsakoff, P. M. and Organ, D. W., "Self Reports in Organization Research : Problems and Prospects," Journal of Management, Vol. 12, pp. 531-544, 1986.
  50. Ramesh, G., Krishnamurthi, I. and Kumar, K. S., "An efficacious method for detecting phishing webpages through target domain identification," Decision Support Systems, Vol. 61, pp. 12-22, 2014. https://doi.org/10.1016/j.dss.2014.01.002
  51. Report, "Analysis of the damage caused by Phishing and precautions for financial transactions," Financial supervisory service, 2013.
  52. Report, "Tweeter protects voice Phishing," Korea POST, 2011.
  53. Schlenker, B. R., Britt, T. W., Pennington, J., Murphy, R., and Doherty, K., "The triangle model of responsibility," Psychological Review, Vol. 101, No. 4, pp. 632-652, 1994. https://doi.org/10.1037/0033-295X.101.4.632
  54. Shin, M. H., "The Self-Presentation Strategy and the Media Management Characteristics on Online Personal Media," Korea Communication Association, Vol. 17, No. 3, pp. 33-59, 2009.
  55. Tajfel, H. and Turner, J. C., "An Integrative Theory of Intergroup Conflict," In W. G. Austin and S. Worchel(Eds.), The social Psychology of Intergroup Relations, Monterey, CA : Brooks/Cole, pp. 33-48, 1979.
  56. Turkle, S., "Life on the Screen : Identity in the Age of the Internet," Simon and Schuster, New York, 1995.
  57. Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., and Wetherell, M. S., "Rediscovering the Social Group : A Self-Categorization Theory," Oxford, England : Basil Blackwell, 1987.
  58. Verkuyten, M. and Hagendoorn, L., "Prejudice and Self-Categorization : The Variable Role of Authoritarianism and In-group Stereotypes," Personality and Social Psychology Bulletin, Vol. 24, No. 1, pp. 99-110, 1998. https://doi.org/10.1177/0146167298241008
  59. White, R. W., "Motivation reconsidered: the concept of competence," Psychological Review, Vol. 66, No. 5, pp. 297-333, 1959. https://doi.org/10.1037/h0040934
  60. Woon, I. M. Y., Tan, G. W., and Low, R. T., "A Protection Motivation Theory Approach to Home Wireless Security," Proceedings of the 2005 International Conference On Information Systems, pp. 367-380, 2005.

Cited by

  1. 개인적·사회적 요인을 고려한 가상 공동체에서의 지식 공유 모형 vol.28, pp.1, 2015, https://doi.org/10.5859/kais.2019.28.1.41
  2. The Structural Relationships of Future Oriented Time Perspective, SNS Attitude, and SNS Recommendation Intention vol.21, pp.4, 2015, https://doi.org/10.9728/dcs.2020.21.4.741
  3. 소셜 네트워크 서비스 이용자의 자기결정성 요인이 자기존중감과 만족을 통해 심리적 안녕감에 미치는 영향 vol.17, pp.1, 2021, https://doi.org/10.17662/ksdim.2021.17.1.085