DOI QR코드

DOI QR Code

A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior

청소년의 개인정보보안 인식이 보안의도와 보안행동에 미치는 영향에 관한 연구

  • Received : 2019.07.08
  • Accepted : 2019.08.06
  • Published : 2019.08.30

Abstract

In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.

본 논문은 인터넷을 사용하면서 심각해지는 개인정보위험에 대해 청소년들의 개인정보와 관련된 태도와 보안행동을 합리적 행동이론과 보호동기이론을 바탕으로 실증적인 데이터를 이용하여 알아보았다. 인터넷 등을 사용하면서 개인정보위험에 대한 개인의 보안행동을 알아보기 위해 사회적 영향요인으로 주관적 규범과 개인적인 특성인 자기 효능감과 보안 태도, 보안의도, 개인혁신성이 보안 행동에 어떠한 영향을 주는지 청소년을 대상으로 확인하였다. 통계 패키지인 엑셀, SPSS 21.0과 SmartPLS2.0.M3를 통해 실증연구를 진행하였다. 연구결과는 정보기기와 인터넷을 사용하는 청소년들의 보안태도와 행동이 밀접하게 관련되어 있고, 청소년에게 영향을 미치는 사회적 영향인 주관적 규범과 개인적 성향인 자기효능감, 보안태도는 보안행동에 큰 영향을 미치고 있음을 연구결과를 통해 알 수 있었다. 청소년들이 새로운 기술을 사용하고 접하는 과정에서 보안의 중요성을 알고 보안행동으로 연결될 수 있도록 지속적인 교육을 통해 안전하게 개인정보를 지켜나갈 수 있도록 해야 할 것이다.

Keywords

References

  1. Jang, J. H., Mok,, H. J., Kim, Y. S., Choi, J. S. and Choi, C. J., "Analysis of the Recognition Level of Personal Information Protection of Public Institutions in the Local Governments," The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 11, No. 3, pp. 345-350, 2016. https://doi.org/10.13067/JKIECS.2016.11.3.345
  2. Bulgurcu, B., Cavusoglu, H. and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, pp. 523-548, 2010. https://doi.org/10.2307/25750690
  3. Shin, I. S., "Effects and Causality of Measures for Personal Information: Empirical Studies on Firm and Individual Behaviors and Their Implications," Korea Institute of Information Security and Cryptology, Vol. 26, No. 2, pp. 523-531, 2016. https://doi.org/10.13089/JKIISC.2016.26.2.523
  4. Davis, F., "Perceived Usefulness, Perceived Ease of Use, and Use Acceptance of Information Technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-340, 1989. https://doi.org/10.2307/249008
  5. Trustwave, Global Security Report, 2012.
  6. Park, C. O. and Lee, S. W., "A Study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory," Journal of Internet Computing and Services, Vol. 15, No. 2, pp. 59-71, 2014. https://doi.org/10.7472/jksii.2014.15.2.59
  7. Bae, J. K., "An Empirical Study on the Effect of Leakage Threat of Personal Information on Protective Behavior Intention in Big Data Analysis," Proceedings of KIIT Summer Conference, Vol. 17, No. 3, pp. 90-93, 2016.
  8. Kim, Y. R., "Measuring Individuals' Privacy Concerns and Survey of Privacy Recognition," Journal of the Korea Industrial Information Systems Society, Vol. 15, No. 5, pp. 259-271, 2010.
  9. Park, G. J., Statistics on the Number of Domestic Internet Users and Users Worldwide in 2015, https://ceolink.tistory.com/250 (Accessed on July 21th, 2016)
  10. Kim, S. W. and Kim, T. H., "Relationship Between Family, School, Internet Use Environmental Factors and Middle School Students' Internet Dependence: Inspecting Mediation Effect of Depression," Journal of Family Relations, Vol. 15, No. 4, pp. 25-49, 2011.
  11. Kwon, D. S., Kim, J. H., Yu, C. H. and Kim, S. J., "An Empirical Study Applying the Self-Determination Factors to Flow and Satisfaction of SmartPhone," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 197-220, 2011. https://doi.org/10.7838/jsebs.2011.16.4.197
  12. Kim, H. J. and Ahn, H. S., "A Study on the Effect on Flow and Smartphone Addiction by Smartphone User's Self-determination," The Journal of Korean Association of Computer Education, Vol. 18, No. 2, pp. 35-45, 2015. https://doi.org/10.32431/KACE.2015.18.2.004
  13. National Information Society Agency, "2018 Smartphone and Dependence Survey," Ministry of Science and ICT, 2019.
  14. Siponen, M. and Vance, A., "Neutralization: New Insights into the Problem of Employe Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, pp. 487-502, 2010. https://doi.org/10.2307/25750688
  15. Fishbein, M. and Ajzen, I., "Belief, Attitude, Intention, and Behavior. An Introduction to Theory and Research, Reading," MA: Addison-Wesley, 1975.
  16. Lee, G. O. and Song, Y. M., "The Study on Visit Behavior of Customer an Application of the Theory of Reasoned Action," Korea Journal of Tourism and Hospitality Research, Vol. 27, No. 5, pp. 397-411, 2013.
  17. Lee, I. S., "A Study on the Effect of Food Service Employees' Job Related Information Technology on Perceived Ease of Use, Usefulness, System Use Activity and Performance," Doctoral Dissertation, Kyunghee University, 2012.
  18. Ajzen, I. and Fishbein, M., "Understanding Attitudes and Predicting Social Behavior," Englewood-Cliffs, NJ: Prentice Hall, 1980.
  19. Safa, N., Sokhak, M., Von Solms, R., Furnel, S., Ghani, N. A. and Herawan, T., "Information Security Conscious Care Behavior Formation in Organizations," Computer and Security, Vol. 53, pp. 65-78, 2015. https://doi.org/10.1016/j.cose.2015.05.012
  20. Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology, Vol. 91, pp. 93-114, 1975. https://doi.org/10.1080/00223980.1975.9915803
  21. Kim, Witte., "Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)," Communications Monographs, Vol. 61, No. 2, pp. 113-134, 1994. https://doi.org/10.1080/03637759409376328
  22. Bandura, A., "Self-Efficacy in Changing Societies," Cambridge University Press, 1995.
  23. Rogers, R., "Protection Motivation Theory of Fear Appeal and Attitude Change," Journal of Psychology, Vol. 91, No. 1, pp. 93-114, 1975. https://doi.org/10.1080/00223980.1975.9915803
  24. Park, J. Y., Kim, J. D. and Kim, B. S., "Online Users' Password Security Behavior: the Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior," Journal of Information Technology Services, Vol. 16, No. 3, pp. 147-165, 2017. https://doi.org/10.9716/KITS.2017.16.3.147
  25. Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, pp. 549-566, 2010. https://doi.org/10.2307/25750691
  26. Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D. and Polak, P., "What Do Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors," MIS Quarterly, Vol. 39, No. 4, pp. 837-864, 2015. https://doi.org/10.25300/MISQ/2015/39.4.5
  27. Mwagwabi, F., McGill, T. and Dixon, M., "Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines," The 47th Hawaii International Conference on System Sciences(HICSS), pp. 3188-3197, 2014.
  28. Chen, Y. and Zahedi, F. M., "Individuals' Internet Security Perceptions and Behaviors: PolyContextual Contrasts Between the United States and China," MIS Quarterly, Vol. 40, No. 1, pp. 205-222, 2016. https://doi.org/10.25300/MISQ/2016/40.1.09
  29. Tsai, H. Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J. and Cotten, S. R., "Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective," Computers and Security, Vol. 59, pp. 138-150, 2016. https://doi.org/10.1016/j.cose.2016.02.009
  30. Venkatesh, V. and Davis, F. D., "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000. https://doi.org/10.1287/mnsc.46.2.186.11926
  31. Venkatesh, V., Moris, M., Davis, G. B. and Davis, F. D., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003. https://doi.org/10.2307/30036540
  32. Bandura, A., "Self-efficacy; Toward a Unifying Theory of Behavioral Change," Psychological Review, Vol. 84, pp. 191-215, 1977. https://doi.org/10.1037/0033-295X.84.2.191
  33. Vealey, R. S., "Conceptualization of Sport-Confidence and Competitive Orientation; Preliminary Investigation and Instrument Development," Journal of Sport Psychology, Vol. 8, pp. 221-246, 1986. https://doi.org/10.1123/jsp.8.3.221
  34. Schunk, D. H., "Social Cognitive Theory and Self-Regulated Learning," In Zimmerman, B. J. and Schunk, D. H. (Eds.), Self-Regulated Learning and Academic Achievement, Springer, New York, 1989.
  35. Shi, H. Y., "Empirical Study on Information Security Behavior Intent of Smartphone Users," Doctoral Dissertation, Yeungnam University, 2013.
  36. Dilshodjon Gafurov., Shin, H. Y. and Kim, K. S., "Smartphone Users's Behavior on Information Security In Information Service Usages: Application of Protection Motivation Theory," Journal of Marketing Studies, Vol. 2 No. 3, pp. 53-76, 2014.
  37. Bandura, A., "Social Foundations of Thought and Action: A Social Cognitive Theory," Englewood Cliffs, NJ: Prentice-Hall, 1986.
  38. Bulgurcu, B., Cavusoglu, H. and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, pp. 523-548, 2010. https://doi.org/10.2307/25750690
  39. Lee, K. H., Han, K. S. and Jung, J. S., "A Study of Influencing Factors for Compliance Intention of Personal Information Protection Policy of Public Institution Employees," Entrue Journal of Information Technology, Vol. 15, No. 1, pp. 75-94, 2016.
  40. Shin, H. S., "The Effect of User Characteristics of Mobile Media on Recognition and Acceptance," Doctoral Dissertation, Sogang University, 2011.
  41. Rogers, E. M., Diffusion of Innovation, 5th ed. NY, The Free Press, 2003.
  42. Agarwal, R. and Prasad, J., "A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology," Information Systems Research, Vol. 9, No. 2, pp. 204-215, 1998. https://doi.org/10.1287/isre.9.2.204
  43. Woo, H. J., "Exploring the Relationship Between the Perceived Risk to Cyber Security and the Behavioral Intention to Technology Acceptance and Sustainable Use for Promoting Personal Information Security," Journal of Communication, Science, Vol. 14 No. 2, pp. 220-257, 2013.
  44. Yim, M. S., "The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees," Journal of Digital Convergence, Vol. 11 No. 1, pp. 27-38, 2013. https://doi.org/10.14400/JDPM.2013.11.1.027
  45. Kim, J. K. and Kim, S. H., "Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory," Informatization Policy, Vol. 20, No. 3, pp. 63-85, 2013.
  46. Catherine, L. A. and Ritu, A., "Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly, Vol. 34, No. 3, pp. 613-644, 2010. https://doi.org/10.2307/25750694
  47. Goldsmith, R. and Hofacker, C., "Measuring Consumer Innovativeness," Journal of the Academy of Marketing Science, Vol. 19, No. 3, pp. 209-221, 1991. https://doi.org/10.1007/BF02726497
  48. Rhee, H. S., Kim, C. T. and Young U. R., "Self-Efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior," Computers and Security, Vol. 28, No. 8, pp. 816-826, 2009. https://doi.org/10.1016/j.cose.2009.05.008
  49. Yang, J. G., Kang, K. S. and Yu, Y. M., "A Study on Vendor Managed Inventory to Apply Technology Acceptance Model," Journal of the Korea Industrial Information Systems Research, Vol. 21, No. 2, pp. 45-57, 2016. https://doi.org/10.9723/jksiis.2016.21.2.045
  50. Chin, W. W., Marcolin, B. L. and Newsted, P. R., "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, Vol. 14, No. 2, pp. 189-217, 2003. https://doi.org/10.1287/isre.14.2.189.16018
  51. Choi, Y. M. and Kwon, H. G., "Effects of Relationship Benefits on Trust, Flow and Customer Loyalty of Social Commerce: Focus of Self-Determination," Journal of the Korea Industrial Information Systems Research, Vol. 24, No. 3, pp. 39-50, 2019. https://doi.org/10.9723/JKSIIS.2019.24.3.039
  52. Kim, S. H. and Kim, J. K., "Impact of Privacy Concern and Institutional Trust on Privacy Decision Making: A Comparison of E-Commerce and Location-Based Service," Journal of the Korea Industrial Information Systems Research, Vol. 22, No. 1, pp. 69-87, 2017. https://doi.org/10.9723/jksiis.2017.22.1.069

Cited by

  1. 개인의 대처 유형과 조직문화가 조직원의 정보보안에 미치는 영향 vol.26, pp.2, 2021, https://doi.org/10.9723/jksiis.2021.26.2.027
  2. How Does Metro Maintenance Staff’s Risk Perception Influence Safety Citizenship Behavior-The Mediating Role of Safety Attitude vol.18, pp.10, 2019, https://doi.org/10.3390/ijerph18105466