DOI QR코드

DOI QR Code

The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking

비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력

  • 정병호 (경남대학교 글로벌프로젝트매니지먼트)
  • Received : 2018.05.15
  • Accepted : 2018.05.30
  • Published : 2018.06.30

Abstract

The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.

Keywords

References

  1. Turban, Efraim, et al. Electronic Commerce 2018: A Managerial and Social Networks Perspective. Springer, 2017.
  2. Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson Education India, 2016.
  3. 정병호․김병초, "중소기업의 IT 투자에 따른 정보 품질과 프로세스 개선에 관한 연구," 중소기업연구, 제36권, 제4호, 2014, pp.47-71.
  4. 최재영, "IT 투자 정당화 요인에 관한 연구," 디지털정보산업학회지, 제11권, 제4호, 2015, pp.177-187.
  5. Hartman, Laura Pincus, Joseph R. DesJardins, and Chris MacDonald. Business ethics: Decision making for personal integrity and social responsibility. New York: McGraw-Hill, 2014.
  6. NIST, Information Security Handbook: A Guide for Managers, 2006.
  7. Conger, Sue, Karen D. Loch, and B. Loerine Helft. "Ethics and information technology use: a factor analysis of attitudes to computer use," Information Systems Journal, Vol.5, No.3, 1995, pp. 161-183. https://doi.org/10.1111/j.1365-2575.1995.tb00106.x
  8. Ferrell, Odies C., and John Fraedrich. Business ethics: Ethical decision making & cases. Nelson Education, 2015.
  9. Heller, Frank., "Socio-technology and the environment," Human Relations, Vol.50, No.5, pp. 605-624, 1997. https://doi.org/10.1177/001872679705000507
  10. Elster, Jon. Rational choice history: A case of excessive ambition. 2000.
  11. Elster, Jon, ed. Rational choice. NYU Press, 1986.
  12. Elster, Jon. "The nature and scope of rational-choice explanation," Science in reflection. Springer, Vol. 110, 1988, pp.51-65.
  13. Tenbrunsel, Ann E. "Misrepresentation and expectations of misrepresentation in an ethical dilemma: The role of incentives and temptation." Academy of Management Journal, Vol.41, No.3, 1998, pp.330-339. https://doi.org/10.2307/256911
  14. De Dreu, Carsten KW, Bernard A. Nijstad, and Daan van Knippenberg. "Motivated information processing in group judgment and decision making," Personality and social psychology review, Vol.12, No.1, 2008, pp.22-49. https://doi.org/10.1177/1088868307304092
  15. 정병호, "기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구," 디지털정보산업학회지, 제12권, 제2호, 2016, pp.73-86.
  16. 이정환․정병호․김병초, "기업 보안 유형에 따른 보안사고 대응역량: 사회기술시스템 이론 관점에서," 한국IT서비스학회지, 제12권, 제1호, 2013, pp.289-208. https://doi.org/10.9716/KITS.2013.12.1.289
  17. 정병호․김병초, "윤리 프로그램을 통한 비윤리적 정보공유 행동의 개선 : 사회적 자본과 잔물결 효과," 한국디지털정책학회, 제15권, 제8호, 2017, pp.169-182.
  18. Anderson, Evan E., and Joobin Choobineh., "Enterprise information security strategies," Computers & Security, Vol.27, No.1, 2008, pp. 22-29. https://doi.org/10.1016/j.cose.2008.03.002
  19. Guo, Ken H., "Security-related behavior in using information systems in the workplace: A review and synthesis," Computers & Security, Vol. 32, 2013, pp. 242-251. https://doi.org/10.1016/j.cose.2012.10.003
  20. Schlegelmilch, Bodo B., and Irene Pollach., "The perils and opportunities of communicating corporate ethics," Journal of Marketing Management, Vol.21, No.3-4, 2005, pp.267-290. https://doi.org/10.1362/0267257053779154
  21. Burt, R. S. "The network structure of social capital., Research in organizational behavior," Vol. 22, 2000, pp. 345-423. https://doi.org/10.1016/S0191-3085(00)22009-1
  22. Clegg, Chris W., "Sociotechnical principles for system design," Applied ergonomics, Vol. 31, No. 5, 2000, pp.463-477. https://doi.org/10.1016/S0003-6870(00)00009-0
  23. Seibert, Scott E., Maria L. Kraimer, and Robert C. Liden., "A social capital theory of career success," Academy of management journal, Vol.44, No.2, 2001, pp. 219-237. https://doi.org/10.2307/3069452
  24. Ifinedo, Princely., "Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition," Information & Management, Vol. 51, No. 1, 2014, pp. 69-79. https://doi.org/10.1016/j.im.2013.10.001
  25. Merkow, Mark S., and Jim Breithaupt. Information security: Principles and practices, Pearson Education, 2014.
  26. 정병호․김병초, "IT 프로젝트 모방 투자 유형에 따른 성과 차이 연구," 한국IT서비스학회지, 제11권, 제3호, 2012, pp.205-225. https://doi.org/10.9716/KITS.2012.11.3.205
  27. 신현조․이경복․박태형, "인적 및 직무특성과 보안 교육 이수율 및 사이버테러 대응과의 연관성 분석," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 97-107.
  28. Carroll, John M., Confidential information sources: Public and private, Elsevier, 2014.
  29. Hair, Joseph F., Multivariate data analysis, 2010.