DOI QR코드

DOI QR Code

A Study on Disconfirmity to Security Practices of Smart-phone : Focused on Roles of Efficacy

스마트폰 사용자의 보안수칙 실천 부족에 관한 연구 : 효능감의 역할을 중심으로

  • Received : 2015.06.08
  • Accepted : 2015.08.17
  • Published : 2015.09.30

Abstract

Purpose This study discusses the contradictory behavior of smart-phone users who consider security is important, but they do not follow the security recommendations. We found through literature research that this contradictory behavior is resulted from a low level of efficacy. Design/methodology/approach Research hypotheses were set based on Extended Parallel Process Model, Control Theory, and Self Efficacy Mechanism. The data were collected from undergraduate students. Total of 178 data were used for the analysis. Findings Results of the analysis, first, showed that the relationship between threat and security attitude varies with the level of coping efficacy. Second, showed that the relationship between threat and fear does not vary with the level of coping efficacy. Both the groups with high coping efficacy and low coping efficacy had a statistically significant effect on the relationship between threat and fear.

Keywords

References

  1. 김종기, 강다연, 전진환, "패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인," 정보시스템연구, 제17권, 제1호, 2008, pp. 23-43.
  2. 김종기, 강다연, 전진환, "인터넷뱅킹 사용자의 보안의도에 영향을 미치는 요인에 관한 연구," 정보시스템연구, 제18권, 제2호, 2009, pp. 1-18.
  3. 김종기, 전진환, 임호섭, "정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로," 정보시스템연구, 제15권, 제1호, 2006, pp. 145-168.
  4. Bandura, A., Self-efficacy: The Exercise of Control, Worth Publishers, 1997.
  5. Browne, M. W. and Cudeck, R., Alternate Ways of Assessing Model Fit, In Bollen, Sage Publications; Newbury Park(CA), 1993.
  6. Carver, C. S. and Scheier, M. F., On the Self-regulation of Behavior, New York: Cambridge University Press, 2001.
  7. Carver, C. S. and Scheier, M. F., "Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology," Psychological Bullentin, Vol. 92, No. 1, 1982, pp. 111-135. https://doi.org/10.1037/0033-2909.92.1.111
  8. Carver, C. S., "Approach, Avoidance, And the Self-regulation of Affect and Action," Motivation and Emotion, Vol. 30, No. 2, 2006, pp. 105-110. https://doi.org/10.1007/s11031-006-9044-7
  9. Compeau, D. R. and Higgins, C. A., "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly, Vol. 19, No. 2, 1995, pp. 189-211. https://doi.org/10.2307/249688
  10. Crowne, D. and Marlowe, D., The Approval Motive: Studies in Evaluative Dependence, New York: Wiley, 1964.
  11. Diamantopoulos, A., "Incorporating Formative Measures into Covariance-Based Structural Equation Models," MIS Quarterly, Vol. 35, No. 2, 2011, pp. 335-358.
  12. Etezadi-Amoli, J. and Farhoomand, A. R., "A Structural Model of end User Computing Satisfaction and User Performance," Information & Management, Vol. 30, No. 2, 1996, pp. 65-73. https://doi.org/10.1016/0378-7206(95)00052-6
  13. Fishbein, M. and Ajzen, I., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley Publishing, 1975.
  14. Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
  15. Furnell, S., "Why Users Cannot Use Security," Computers & Security, Vol. 24, No. 4, 2005, pp. 274-279. https://doi.org/10.1016/j.cose.2005.04.003
  16. Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., Multivariate Data Analysis, 7th Edition., Prentice Hall International., 2010.
  17. Harris, P. L., Children and Emotion: The Development of Psychological Understanding, Oxford: Basil Blackwell, 1989.
  18. Hovland, C. I., Janis, I. L., and Kelly, H. H., Communication and Persuasion: Psychological Studies of Opinion Change, New Haven, CT: Yale University Press, 1953.
  19. Hu, L. and Bentler, P. M., "Cutoff Criteria Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives," Structural Equation Modeling, Vol. 6, No. 1, 1999, pp. 1-55. https://doi.org/10.1080/10705519909540118
  20. Janis, I. L., "Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research," In Advances in Experimental Social Psychology, Vol. 3, 1967, pp. 166-244.
  21. Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.
  22. Lazarus, R. S. and Folkman, S., Stress, Appraisal, and Coping, New York: McGraw-Hill, 1984.
  23. Leventhal, H., "Findings and Theory in the Study of Fear Communications," Advances in Experimental Social Psychology, Vol. 5, 1970, pp.119-186. https://doi.org/10.1016/S0065-2601(08)60091-X
  24. Leventhal, H., "Fear Appeals and Persuasion: The Differentiation of Motivational Construct," American Journal of Public Health, Vol. 61, No. 6, 1971, pp. 1208-1224. https://doi.org/10.2105/AJPH.61.6.1208
  25. Liang, H., Saraf, N., Hu, Qing., and Xue, Y., "Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management," MIS Quarterly, Vol. 31, No. 1, 2007, pp. 59-87.
  26. Liang, H. and Xue, Y., "Avoidance of Information Technology Threats: A Theoretical Perspective," MIS Quarterly, Vol. 33, No. 1, 2009, pp. 71-90.
  27. Lindell, M. K. and Whitney, D. J., "Accounting for Common Method Variance in Cross-sectional Research Designs," Journal of Applied Psychology, Vol. 86, No. 1, 2001, pp. 114-121. https://doi.org/10.1037/0021-9010.86.1.114
  28. Pajares, F. and Urdan, T., Self-efficacy Beliefs of Adolescents, Information Age Publishing, 2006.
  29. Pavlov, I., Conditioned Reflexes: An Investigation into the Physiological Activity of the Cortex, New York: Dover, 1927.
  30. Petter, S., Straub, D., and Rai, A., "Specifying Formative Constructs in Information systems Research," MIS Quarterly, Vol. 31, No. 4, 2007, pp. 623-656.
  31. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P., "Common Method biases in Behavioral Research: A Critical Review of the Literature and Recommende Remedies," Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
  32. Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology, Vol. 91, No. 1, 1975, pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
  33. Segars, A. H. and Grover, V., "Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis," MIS Quarterly, Vol. 17, No. 4, 1993, pp. 517-525. https://doi.org/10.2307/249590
  34. Siponen, M. and Vance, A., "Neutralization: New Insights into Problem of Employee Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 487-502.
  35. Skinner, B. F., Science and Human Behavior, New York: Macmillan, 1953.
  36. Stober, J., "The Social Desirability Scale-17," European Journal of Psychological Assessment, Vol. 17, No. 3, 2001, pp. 222-232. https://doi.org/10.1027//1015-5759.17.3.222
  37. Sutton, S. K. and Davidson, R., "Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems," Psychological Science, Vol. 8, No. 3, 1997, pp. 204-210. https://doi.org/10.1111/j.1467-9280.1997.tb00413.x
  38. Turel, O., Serenko, A., and Giles, P., "Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users," MIS Quarterly, Vol. 35, No. 4, 2011, pp. 1043-1061.
  39. Tversky, A. and Kahneman, D., "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Vol. 5, No. 4, 1992, pp. 297-323. https://doi.org/10.1007/BF00122574
  40. Williams, L., Edwards, J. R., and Vandenberg, R. J., "Recent Advances in Causal Modeling Methods for Organizational and Management Research," Journal of Management, Vol. 29, No. 6, 2003, pp. 903-936. https://doi.org/10.1016/S0149-2063(03)00084-9
  41. Witte, K., "Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model," Communication Monographs, Vol. 59, No. 4, 1992, pp. 329-349. https://doi.org/10.1080/03637759209376276
  42. Witte, K., "Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)," Communication Monographs, Vol. 61, No. 2, 1994, pp. 113-134. https://doi.org/10.1080/03637759409376328