DOI QR코드

DOI QR Code

중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로

A Study on the Factors of Online Information Security Behavior Failure: Focused on the Elderly

  • 전양 (이화여자대학교 경영학과) ;
  • 박민정 (이화여자대학교 경영학과) ;
  • 채상미 (이화여자대학교 경영학과)
  • 투고 : 2019.08.28
  • 심사 : 2020.02.12
  • 발행 : 2020.03.31

초록

Purpose Since the number of personal information breach incidents increased, many people have perceived the importance of personal information protection, in the recent. Especially, the number of personal information breach targeting middle-aged and elderly people rapidly increases. Therefore, the purpose of this study is to identify the factors which influence to fail of online information security behaviors among the elderly. Design/methodology/approach This study made a research model by adopting the factors deducted from the protection motivation theory. To analyze the research model, we conducted an online survey targeted on the elderly and middle ages users who have nations of Korean and Chinese respectively. Findings According to the empirical analysis result, we identified that only perceived severity and perceived vulnerability affected information security awareness. On contrast, it was also discovered that perceived barriers, self-efficacy, and response efficacy did not affect information security awareness. Additionally, the awareness of information security also did not affect information security behaviors. Middle-aged and elderly people with personal information protection education did more information security behaviors than people those who no education experiences. Korean middle-aged and elderly people with education significantly did more information protection behaviors than the people without the education.

키워드

참고문헌

  1. 김민성, 김성태, "개인정보 노출이 잊혀질 권리 수용 의도에 미치는 영향에 관한 연구, 한국언론학보, 제58권, 제2호, 2014, pp. 307-336.
  2. 김상훈, 박선영, "정보보호 정책 준수 의도에 대한 영향요인," 한국전자거래학회지, 제16권, 제4호, 2011, pp. 33-51. https://doi.org/10.7838/jsebs.2011.16.4.033
  3. 김용태, 이상준, "부분최소제곱모형을 위한 R 프로그램의 활용: Smartpls 와 R 의 비교," Journal of Digital Convergence, 제 13권, 제12호, 2015, pp. 117-124. https://doi.org/10.14400/JDC.2015.13.12.117
  4. 김정은, 김성준, 권두순, "소셜 네트워크 서비스(Sns) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로," 정보시스템연구, 제25권, 제3호, 2016, pp. 1-30.
  5. 김종기, 김지윤, "정보보호 의사결정에서 정보보호 침해사고 발생가능성의 심리적 거리감과 상대적 낙관성의 역할," Information Systems Review 제20권, 제3호, 2018, pp. 51-71. https://doi.org/10.14329/isr.2018.20.3.051
  6. 권은경, 이한솔, 채상미, 유경원, "정보보안 교육이 침해사고에 미치는 영향에 대한 실증분석,' 한국경영정보학회 춘계학술대회," 2016, pp.342-348.
  7. 김형지, 정세훈, "중장년층 인터넷 이용자의 온라인 개인정보 노출 및 보호 행동의 차이에 관한 연구,"사이버커뮤니케이션학보, 제32권, 제3호, 2015, pp. 49-79.
  8. 박민정, 채상미, "빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구," 지식경영연구, 제18권, 제3호, 2017, pp.63-80. https://doi.org/10.15813/kmr.2017.18.3.003
  9. Park, J. H., Lee, S., "정보 프라이버시와 관련한 개인의 태도 및 행동 경로분석," 행정논총 제45권, 제1호, 2007, pp. 281-307.
  10. 박찬욱, and 이상우. "인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로." 인터넷정보학회논문지, Vol.15, No. 2, 2014, pp. 59-71. https://doi.org/10.7472/jksii.2014.15.2.59
  11. 박철, 전종근, 이태민. "모바일 쇼핑만족도에 영향을 미치는 고객특성에 관한 연구: 한국, 중국, 미국, 일본 4 개국 비교," 국제경영연구, 제26권, 제2호, 2015, pp.99-128.
  12. 박현선, 김상현, "SNS 이용자들의 프라이버시 보호행동에 관한 실증연구," 경영경제, 제46권, 제2호, 2013, pp. 69-91.
  13. 심재웅, 황하성, 이호규, "UCC 이용량과 연령에 따른 온라인 프라이버시 인식 차이 연구," 방송통신연구, 2009, pp. 192-221.
  14. 최대선, 안은영, "페이스북과 트위터에 노출된 개인정보 현황," 한국콘텐츠학회지, 제11권, 제4호, 2013, pp. 61-64. https://doi.org/10.20924/CCTHBL.2013.11.4.061
  15. 황인호, 김대진, "조직의 정보보안 환경이 조직구성원의 보안준수의도에 미치는 영향," 정보시스템 연구, 제25권, 제2호, 2016, pp. 51-77.
  16. "2017년 정보보호 실태조사," 한국인터넷진흥원, 2018, pp.1-514.
  17. Ajzen, I. "The theory of planned behavior." Organizational behavior and human decision processes, Vol.50, No.2, 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  18. Bae, B, Analyses of Moderating and Mediating Effects with Spss/Amos/Lisrel/Smartpls, Seoul: Chungram Publishing, 2015.
  19. Cassel, C., Hackl, P., and Westlund, A. H., "Robustness of Partial Least-Squares Method for Estimating Latent Variable Quality Structures," Journal of applied statistics Vol.26, No.4, 1999, pp. 435-446. https://doi.org/10.1080/02664769922322
  20. Chin, W., "Issues and Opinion on Structural Equation Modeling, in Mis Quarterly," MIS Quarterly & the Society for Information Management, 1998a, p. 1.
  21. Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling," Modern methods for business research Vol.295, No.2, 1998b, pp. 295-336.
  22. Churchill Jr, G. A., "A Paradigm for Developing Better Measures of Marketing Constructs," Journal of marketing research, Vol.16, No.1, 1979, pp. 64-73. https://doi.org/10.1177/002224377901600110
  23. Compeau D.R., Higgins C.A., "Computer self-efficacy: development of a measure and initial test," MIS Quarterly, Vol.19, No.2, 1995, pp.189-211 https://doi.org/10.2307/249688
  24. Bandura, Albert, "Self-efficacy: toward a unifying theory of behavioral change." Psychological review, Vol. 84, No. 2 1997, pp. 191. https://doi.org/10.1037/0033-295X.84.2.191
  25. Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D., "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American society for information science and technology, Vol 58, No. 2, 2007, pp. 157-165. https://doi.org/10.1002/asi.20459
  26. Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness," MIS quarterly, Vol. 34, No. 3, 2010, pp. 523-548. https://doi.org/10.2307/25750690
  27. Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., and Upadhyaya, S. J., "Internet and online information privacy: An exploratory study of preteens and early teens," IEEE Transactions on Professional Communication, Vol. 52, 2009, pp. 167-182. https://doi.org/10.1109/TPC.2009.2017985
  28. Choi, C, B. and D. Kim., "Knowing is doing," Information Management & Computer Security, Vol. 16, No. 5, 2008, pp.484-501 https://doi.org/10.1108/09685220810920558
  29. Compeau D.R., and Higgins C.A., "Computer self-efficacy: development of a measure and initial test," MIS Quarterly, Vol. 19, No.2, 1995, pp.189-211. https://doi.org/10.2307/249688
  30. Dinev, T., and Hart, P., "Internet privacy concerns and their antecedents' measurement validity and a regression model," Behavior and Information Technology, Vol. 23, No. 6, 2004, pp. 413-422. https://doi.org/10.1080/01449290410001715723
  31. Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement." Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104
  32. Gefen, D., and Straub, D., "A Practical Guide to Factorial Validity Using Pls-Graph: Tutorial and Annotated Example," Communications of the Association for Information systems, Vol.16, No.1, 2005, p. 5.
  33. Gefen, D., Straub, D., and Boudreau, M.-C., "Structural Equation Modeling and Regression: Guidelines for Research Practice," Communications of the association for information systems, Vol.4, No.1, 2000, p. 7.
  34. Gurung, Anil, Xin Luo, and Qinyu Liao.,"Consumer motivations in taking action against spyware: an empirical investigation.", Information Management & Computer Security Vol. 17, No. 3, 2009, pp. 276-289. https://doi.org/10.1108/09685220910978112
  35. Haenlein, M., and Kaplan, A. M., "A Beginner's Guide to Partial Least Squares Analysis," Understanding statistics, Vol.3, No. 4, 2004, pp. 283-297. https://doi.org/10.1207/s15328031us0304_4
  36. Hair, J. F., Ringle, C. M., and Sarstedt, M., "Pls-Sem: Indeed a Silver Bullet," Journal of Marketing theory & Practice, Vol.19, No.2, 2011, pp. 139-152. https://doi.org/10.2753/MTP1069-6679190202
  37. Harrison A.W., and Rainer R.K., "The influence of individual differences on skill in end-user computing," Journal of Management Information Systems, 1992.
  38. Hoa, N. T., Hien, L. M., and Lien, V. T. P., "Studying the Factors Affecting Online Payment Decision: A Case of Vietnamese Customers," Journal of Management Information & Decision Sciences, Vol.22, No.1, 2019, pp. 43-54.
  39. Ifinedo, P, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory," Computers & Security., Vol. 31, No. 1, 2012, pp. 83-95. https://doi.org/10.1016/j.cose.2011.10.007
  40. Leach, J., "Improving User Security Behavior," Computers & Security, Vol. 22, No. 8, 2003, pp. 685-692. https://doi.org/10.1016/S0167-4048(03)00007-5
  41. Lee, Y., "Understanding Anti-Plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective," Decision Support Systems, Vol.50, No. 2, 2011, pp. 361-369. https://doi.org/10.1016/j.dss.2010.07.009
  42. Lee, D., Larose, R. and Rifon, N., "Keeping our network safe: a model of online protection behavior," Behaviour & Information Technology. Vol. 27 No.5, 2008, pp. 445-454. https://doi.org/10.1080/01449290600879344
  43. Liang Huigang, and Yajiong Xue., "Understanding security behaviors in personal computer usage: A threat avoidance perspective," Journal of the Association for Information Systems, Vol. 11, No. 7, 2010, pp. 394-413. https://doi.org/10.17705/1jais.00232
  44. Milne, G. R., Rohm, A. J., and Bahl, S., "Consumers' protection of online privacy and identity," Journal of Consumer Affairs, Vol. 38, No. 2, 2004, pp.217-232. https://doi.org/10.1111/j.1745-6606.2004.tb00865.x
  45. Moscardelli, D. M., and Divine, R., "Adolescents' concern for privacy when using the internet: An empirical analysis of predictors and relationships with privacy-protecting behaviors," Family and Consumer Sciences Research Journal, Vol. 35, 2007, pp. 232-252. https://doi.org/10.1177/1077727X06296622
  46. Pavlou, P., "Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation," Proceedings of Seventh Americas Conference on Information Systems, 2001, pp. 816- 822.
  47. Prentice-Dunn, S, Mcmath, B, and Cramer, R., "Protection motivation theory and stages of change in sun protective behavior." Journal of Health Psychology, 2009, Vol. 14.
  48. Rahimnia, F., and Hassanzadeh, J. F., "The Impact of Website Content Dimension and E-Trust on E-Marketing Effectiveness: The Case of Iranian Commercial Saffron Corporations," Information & management, Vol.50, No. 5, 2013, pp. 240-247. https://doi.org/10.1016/j.im.2013.04.003
  49. Rogers, R. W., "A protection motivation theory of fear appeals and attitude change". Journal of Psychology. Vol. 91, No.1, 1975, pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
  50. Rogers, R. W., "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation," Social Psychophysiology, pp. 153-176.
  51. Sheehan, K.B., and Hoy, M.G., "Dimensions of privacy concern among online consumers," Journal of Public Policy & Marketing, Vol. 19, No. 1, 2000, 1983, pp.62-73. https://doi.org/10.1509/jppm.19.1.62.16949
  52. Srite, M., and Karahanna, E., "The Role of Espoused National Cultural Values in Technology Acceptance," MIS quarterly, Vol.30, No.3, 2006, pp. 679-704. https://doi.org/10.2307/25148745
  53. Woon, G.W., and Tan, R.T., Low. "A protection motivation theory approach to home wireless security," Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, Nevada, USA, 2005.
  54. Workman, Michael, William H. Bommer, and Detmar Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in human behavior, Vol. 24, No. 6, 2008, pp. 2799-2816. https://doi.org/10.1016/j.chb.2008.04.005
  55. Workman, Michael, William H. Bommer, and Detmar Straub., "The amplification effects of procedural justice on a threat control model of information systems security behaviours," Behaviour & Information Technology, Vol. 28, No. 6, 2009, pp.563-575. https://doi.org/10.1080/01449290802556021
  56. Youn, S., "Teenagers'perceptions of online privacy and coping behaviours: A risk-benefit appraisal approach," Journal of Broadcasting & Electronic Media, Vol. 49, No.1, 2005, pp.86-110. https://doi.org/10.1207/s15506878jobem4901_6
  57. Youn, S., "Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents," Journal of Consumer Affairs, Vol. 43, No. 3, 2009, pp. 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
  58. Zhang, Lixuan, and William C. McDowell., "Am I really at risk? Determinants of online users' intentions to use strong passwords," Journal of Internet Commerce, Vol. 8, No. 3-4, 2009, pp.180-197. https://doi.org/10.1080/15332860903467508
  59. 德媒 : 调查表明年轻人比老年人更容易遭受网络诈骗, Retrieved September 12, 2018, Available: http://world.huanqiu.com/exclusive/2016-10/9594551.html
  60. 中老年网民近三成每天上网超3小时75%用移动支付 Retrieved September 12, 2018, Available: https://baijiahao.baidu.com/s?id=1604572113518233676&wfr=s
  61. Pew Research Center, "In Emerging Economies, Smartphone and Social Media Users Have Broader Social Networks,' 2019.08.22, Available: https://www.pewresearch.org/search/smartphone
  62. 박수형, "국민 88.5%, 스마트폰으로 인터넷 이용한다," ZDNet Korea, 2017.03.21, Available:https://www.zdnet.co.kr/view/?no=20170321135018
  63. 온기홍, "中 누리꾼 8억 2,900만 명... 인터넷 보급률 60%," 보안뉴스, 2019.03.15, Available: https://www.boannews.com/media/view.asp?idx=77883
  64. 정철환, "北 인터넷 보급률 0.1% '세계 꼴찌'," 조선비즈, 2019.09.09, Available: http://biz.chosun.com/site/data/html_dir/2019/09/09/2019090900022.html
  65. 차현아, "모바일 결제 선진국 중국, 더디 가는 한국," IT 조선, 2019.09.23, Available: http://it.chosun.com/site/data/html_dir/2019/09/23/2019092301238.html