DOI QR코드

DOI QR Code

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone

정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향

  • Received : 2016.08.16
  • Accepted : 2016.11.20
  • Published : 2017.02.28

Abstract

Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

현재 국내 인구의 85% 이상이 스마트폰을 사용 중이며, 개인의 사생활과 다양한 정보들이 스마트폰 내부에 저장되어 있다. 이러한 정보를 불법으로 취득하고자 악성코드와 스파이웨어 등을 유포하여 사용자에게는 금전적인 피해를 입히는 사례들이 증가하고 있다. 이에 따라 스마트폰을 이용하는데 있어 정보보안의 필요성은 불가피하며 사용자의 보안 인식이 중요시 되고 있다. 본 논문에서는 정보보안이 사용자들의 스마트폰 운영체제 선택에 어떠한 영향을 미치는지에 대해서 알아보고자 한다. 스마트폰 사용자를 대상으로 온라인 설문조사를 실시하여 수집한 응답지 218개를 샘플로 통계분석 프로그램 IBM SPSS Statistics 22를 사용하여 요인분석을 통한 공통성, 신뢰성 분석 그리고 회귀분석을 통해 가설을 검증하였다. 검증 결과, 하드웨어 환경에 따라 지각된 용이성에 영향을 주는 것을 알 수 있었다. 스마트폰의 사용을 통해 즐거움을 얻고 편하게 사용하고자 하는 소비자의 의도는 스마트폰의 하드웨어가 그 기능을 수행하기 위해 뒷받침되어야 함이 검증되었다. 또한 브랜드 영향력은 지각된 유용성과 지각된 용이성에 모두 영향을 미침을 알 수 있었다. 개인위험 감수정도에 따라 스마트폰 스파이웨어 위험성을 인지하는데 차이가 있다는 가설이 채택되었다. 또한 지각된 유용성, 지각된 용이성, 개인위험 감수정도, 스파이웨어 위험성이 스마트폰 구매의향에 유의한 영향을 준다는 것을 파악하였다. 한편 안드로이드와 iOS 운영체제(OS) 사용자의 집단간 차이분석 결과 두 집단 간에는 유의한 차이가 없음을 알 수 있었다. 본 연구의 결과는 국내 스마트폰 관련 기업 및 실무자에게 중요한 시사점을 줄 수 있고, 정보시스템 관련 분야 연구에 새로운 관점을 제시해 줄 수 있다는 점에서 유용성을 가진다.

Keywords

References

  1. D.W. Kim and W.J. Seong, "A Study on Information Security Policy in the Era of Smart Society", Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 4, pp. 883-899, 2012. http://www.ndsl.kr/ndsl/commons/util/ndsl
  2. Korea Internet and Security Agency (KISA), "2012 state survey for information security (home/business)", Policy report, Ministry of Science, ICT and Future Planning, 2012.
  3. K.C. Laudon and J.P. Laudon, Management Information Systems, Pearson, 13th Edition. 2014.
  4. K.D. Kwon, "The opening future by smartphone", Samsung Economic Research Institute, 714, 2010.
  5. W.R. Jeon, J.Y. Kim, et al., "Analysis of Threats and Countermeasures on Mobile Smartphone", Journal of The Korea Society of Computer and Information, vol. 16, no. 2, pp. 153-163, 2011. DOI : 10.9708/jksci.2011.16.2.153
  6. K.J. Lee, "A Study on Enhanced Security Model of Smartphone based on Information Security Management System", Seoul National University of Science and Technology, Master thesis, 2012.
  7. T.H. Kim, H.W. Jin, et al., "Analysis of Android Mobile Platform Security Model", Korea Internet and Security Agency (KISA), 2010.
  8. S.P. Jobs, "WWDC 2010 Apple Keynote," 2010.
  9. H.Y. Shin, "An Empirical Study on Information Security Behavior Intent of Smartphone Users", Yeungnam Univ. Doctor thesis, 2013.
  10. J.S. Oho, "Study on the leakage of personal information through the iOS jailbreak", Chungnam Univ. Master thesis, 2012.
  11. H.R. Ryu, M. Hong, and T.K. Kwon, "Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks- from User Experience and HCI Perspectives", Journal of Internet Computing and Services, vol. 15, no. 3, pp. 79-90, 2014. http://dx.doi.org/10.7472/jksii.2014.15.3.79
  12. J.K. Yang, G.U. Ha, and H.B. Kim, "An analysis of loss cases and counterfeiting methods of new phising of smartphone", Journal of the Korea Institute of Information Security and Cryptology, vol. 23, no. 4, pp. 73-81, 2013. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E02238723
  13. I.W. Park and D.W. Park, "A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone", Journal of the Korea Institute Of Information and Communication Engineering, vol. 17, no. 11, pp. 2588-2594, 2013. DOI : 10.6109/jkiice.2013.17.11.2588
  14. M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, Mass: Addison-Wesley, 1975.
  15. H.S. Lee and Y. Kim, "Critiques and Alternative Suggestions on the Theory of Reasoned Action and the Theory of Planned Behavior", Journal of Consumer Studies, vol. 11, no. 4, pp. 21-47, 2000. http://academic.naver.com/view.nhn?doc_id=10896 524
  16. J.G. Jeong and K.J. Jang, "A study on acceptance factor of smartphone centered on real users", The e-Business Studies, vol. 11, no. 4, pp. 361-379, 2010. http://www.dbpia.co.kr/Journal/ArticleDetail/NODE01765870 https://doi.org/10.15719/geba.11.4.201011.361
  17. E.Y. Na, "Recent trends of attitude and attitude change studies: 1985-1994", Korean Psychological Journal of Society and Personality, vol. 15, pp. 3-33, 1994. http://academic.naver.com/view.nhn?doc_id=10462985
  18. I. Ajzen, Attitude structure and behavior, In Pratkanins, A.R., S.J. Beckler & A.G. Greenwald(Eds.), Attitude structure and function(chap. 10, pp. 241-274), Hillsdale, NJ: Lawrence Erlbaum Association, 1989.
  19. A.H. Eagly and S. Chaiken, "The psychology of attitudes", Fort Worth: Harcourt Brace Jovanovich College Publishers, 1993.
  20. F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989. DOI: 10.2307/249008
  21. D.H. Shin, "An analysis for Cyworld users through technology acceptance model and structured equation model approach", Trends/Studies report, Korean Association for Broadcasting & Telecommunication Studies, p.33-52, 2008. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E01104221
  22. J.S. Lee, H. Cho, G. Gay, B. Davidson, and A.R. Ingraffea, "Technology acceptance and social networking in distance learning", Educational Technology & Society, vol. 6, no. 2, pp. 50-61, 2003. http://www.ifets.info/journals/6_2/6.html
  23. J.H. Yoo and C. Park, "A Comprehensive Review of Technology Acceptance Model Researches," Entrue Journal of Information Technology, vol. 9, no. 2, pp. 31-50, 2010. UCI: I410-ECN-0102-2012-560-001711426
  24. H. Yu, S. Sura, and J.C. Ahn, "An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service", Journal of Internet Computing and Services, vol. 16, no. 3, pp. 79-93, 2015. http://dx.doi.org/10.7472/jksii.2015.16.3.79
  25. J. Cho and S.J. Kim, "Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory", Journal of Internet Computing and Services, vol. 16, no. 1, pp. 101-108, 2015. http://dx.doi.org/10.7472/jksii.2015.16.1.101
  26. J.C. Ahn, S.W. Lee, et al., "A study on the influence of information security in selecting smart-phone", Journal of the Korea Institute of Information Security and Cryptology, vol. 24, no. 1, pp. 207-214, 2014. http://dx.doi.org/10.13089/JKIISC.2014.24.1.207
  27. I.K. Park and D.H. Shin, "Using the Uses and Gratifications Theory to Understand the Usage and the Gratifications of Smartphones", Journal of Communication Science, vol. 10, no. 4, pp. 192-225, 2010. http://www.dbpia.co.kr/Journal/PDFViewNew?id=NODE01572022&prevPathCode=
  28. J.K. Kim and S.T. Nam, "Factors Influencing Smartphones Purchase Decision : With a Focus on the Comparison among Users of Smartphones, Non-Users, and related Company Workers", The Journal of Internet Electronic Commerce Research, vol. 11, no. 3, pp. 23-34, 2011. http://academic.naver.com/view.nhn?doc_id=74840744
  29. L. Leung and R. Wei, "More than just talk on the move: uses and gratifications of the cellular phone", Journalism & Mass Communication Quarterly, vol. 77, no. 2, pp. 308-320, 2000. http://images4.wikia.nocookie.net/cb20060711180826/scratchpad/images/e/ed/More_than_just_talk.pdf https://doi.org/10.1177/107769900007700206
  30. S.H. Kim, "Effects of Perceived Attributes on the Purchase Intention of Smart-Phone", The Journal of the Korea Contents Association, vol. 10, no. 9, pp. 318-326, 2010. DOI : 10.5392/JKCA.2010.10.9.318
  31. J.K. Bae and H.M. Jeong, "Effect on influencing acceptance decision factor by functional attributes of smartphone", The e-Business Studies, vol. 9, no. 4, pp. 337-361, 2008. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E01769371 https://doi.org/10.15719/geba.9.4.200811.337
  32. S.J. Oho, "Smartphone user's typology and its effect on their purchasing behavior : a case study of users", Hankuk University of Foreign Studies, Doctor thesis, 2011.
  33. S.B. Kang and D.H. Yang, "User-centered response method trends of smartphone security threats", Journal of the Korea Institute of Information Security and Cryptology, vol. 24, no. 3, pp. 36-43, 2014. http://ocean.kisti.re.kr/IS_mvpopo001P.do?method=multMain&poid=kiisc&free
  34. S.T. Nam, D.G. Kim, and C.Y. Jin, "A study on the continuous intention to use for Smartphone based on the innovation diffusion theory: Considered on the loyalty between users of iOS and Android platform", Journal of the Korea Institute Of Information and Communication Engineering, vol. 17, no. 5, pp. 1219- 1226, 2013. DOI : 10.6109/jkiice.2013.17.5.1219
  35. Y.H. Chang, S.B. Pyo, et al., "A Study on Hacking Attack when Free WiFi Internet Access In Smartphone", Proceedings of the Korean Society of Computer Information Conference, vol. 9, 2011. http://www.ndsl.kr/ndsl/commons/util/ndslOriginalView.do
  36. J.Y. Jang, J.D. Kim, and B.S. Kim, "The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW", Journal of Information Technology Services, vol. 13, no. 2, pp. 113-131, 2014. http://dx.doi.org/10.9716/KITS.2014.13.2.113
  37. S.G. Kim, "A study of influencing on perceived usefulness, ease of use, and acceptance intention by user environments and smartphone charateristic attributes", Hongik Univ. Master thesis, 2009.
  38. H.J. Park, "The Effect of Online Information Characteristics on the Intention to Use Restaurant Information: Focused on the Mediating Effect of Perceived ease of Use, Perceived Usefulness, Trust", Sejong Univ. Master thesis, 2011.
  39. D.H. Shih, B.S. Lin, et al., "Security aspects of mobile phone virus: a critical survey", Industrial Management & Data Systems, vol. 108, no. 4, pp. 478-494, 2008. http://dx.doi.org/10.1108/02635570810868344
  40. C. Fornell and D.F. Larcker, "Evaluating Structural Equations with Unobservable Variables and Measurement Error", Journal of Marketing Research, vol. 18, no. 1, pp. 39-50, 1981. http://www.jstor.org/stable/3151312 https://doi.org/10.2307/3151312
  41. M.C. Shin, Basic Statistics for Business and Economics, Changmin publishing, Seoul, 2010.
  42. J.J. Park, "A Study on the influence of information security in consumer's preference of iOS and Android based smartphones", Hanyang Univ. Master thesis, 2015.