Browse > Article
http://dx.doi.org/10.9708/jksci.2010.15.12.163

Drivers for Trust and Continuous Usage Intention on OTP: Perceived Security, Security Awareness, and User Experience  

Yun, Hae-Jung (연세대학교 정보대학원)
Jang, Jae-Bin (한국정보인증 연구원)
Lee, Choong-C. (연세대학교 정보대학원)
Abstract
PKI(Public Key Infrastructure)-based information certification technology has some limitations to be universally applied to mobile banking services, using smart phones, since PKI is dependent on the specific kind of web browser, Internet Explorer. OTP(One Time Password) is considered to be a substitute or complementary service of PKI, but it still shows low acceptance rate. Therefore, in this research, we analyze why OTP has not been very popular, and provide useful implications of making OTP more extensively and frequently used in the mobile environment. Perceived security of OTP was set as a higher-order construct of integrity, confidentiality, authentication, and non-repudiation. Research findings show that security awareness and perceived security of OTP is positively associated, and the relationship between perceived security and trust on OTP is statistically significant. Also, trust is positively related to intention to use OTP continuously.
Keywords
OTP(One Time Password); Perceived Security; Security Awareness; User Experience; Trust; Continous Use Intention; Consumer Learning Model;
Citations & Related Records
Times Cited By KSCI : 9  (Citation Analysis)
연도 인용수 순위
1 K. Spies, F. Hesse, and K. Loesch, "Store Atmosphere, Mood, and Purchasing Behavior," International Journal of Research in Marketing, Vol. 14, No. 1, pp. 1-17, 1997.   DOI   ScienceOn
2 S. Wilson, "Certificates and Trust in Electronic Commerce, Information Management and Computer Security, Vol. 5, No. 5, pp. 175-181, 1997.   DOI   ScienceOn
3 V. Venkatesh, M.G. Morris, F.D. Davis, G.B. Davis, "User Acceptance of Information Technology: Toward an Integrated Model," MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003.
4 E. Karahanna, D. Straub, and N. Chevany, "Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs," MIS Quarterly, Vol. 23, No. 2, pp. 183-213, 1999.   DOI   ScienceOn
5 J.J. Garrett, "Customer Loyalty and the Elements of User Experience," Design Management Review, Vol. 17, No. 1, pp. 35-39, winter 2006.
6 S. Taylor, and P. Todd, "Assessing IT Usage: The Role of Prior Experience," MIS Quarterly, Vol. 19, No. 4, pp. 561-570, 1995.   DOI   ScienceOn
7 Y.L. Doz, P.M. Olk, and P.S. Ring, "Formation Processes of R&D Consortia: Which Path to Take? Where Does It Lead?," Strategic Management Journal, Vol. 21, No. 3, pp. 239-266, 2000.   DOI   ScienceOn
8 디지털데일리, 2010-06-24, http://www.ddaily.co.kr/news/news_view.php?uid=64979.
9 P. Denise P, and B. Philip, "The Computer Understanding and Experience Scale: A Self-Report Measure of Computer Experience," Computer in Human Science, Vol. 14, No. 2, pp. 337-348, 1998.
10 황성훈, "정보시스템 사용자 경험 측정도구 개발에 관한 연구," 연세대학교 정보대학원 석사학위논문, 2008년 1월.
11 J. Frank, B. Shamr, and W. Briggs, "Security-Related Behavior of PC Users in Organizations," Information & Management, Vol. 21, No. 3, pp. 445-451, 1991.
12 K. Suh, and Y, Lee, "The Effects of Virtual Reality on Consumer Learning: An Empirical Investigation," MIS Quarterly Vol. 29, No. 4, pp. 673-697, 2005.
13 B. Wilson, and J. Henseler, "Modeling Reflective Higher-Order Constructs Using Three Approaches with PLS Path Modeling: A Monte Carlo Comparison," ANZMAC Conference 2007, pp. 791-800, Dec. 2007.
14 R.F. Falk, and N.B. Miller, "A Primer for Soft Modeling," University of Akron Press, 1992.
15 L. Drevin, H.A. Kruger, T. Steyn, "Value-Focused Assessment of ICT Security Awareness in an Academic Environment, Computers & Security, Vol. 26, No. 1, pp. 36-43, Feb. 2007.   DOI   ScienceOn
16 권영옥, 김병도, "정보보안 사고와 사고방지 관련 투자가 기업가치에 미치는 영향," 정보시스템학회학회지, 제 9권, 제 1호, 105-120쪽, 2007년.   과학기술학회마을
17 J. Park, L. Stoel, and S.J. Lennon, "Cognitive, Affective and Conative Responses to Visual Simulation: The Effects of Rotation in Online Product Presentation," Journal of Consumer Behavior, No. 7, pp. 72-87, 2008.
18 H. Li, T. Daugherty, T, and F. Biocca, F, "The Role of Virtual Experience in Consumer Learning, Journal of Consumer Psychology, Vol. 13, No. 4, pp. 395-408, 2003.   DOI   ScienceOn
19 D. Goodue, and D. Straub, "Security Concerns of System Users: A Study of Perception of the Adequacy of Security," Information & Management, Vol. 20, No. 1, pp. 13-27, 1991.   DOI   ScienceOn
20 신광철, "서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜," 한국컴퓨터정보학회 논문지, 제 12권, 제 6호, 201-206쪽, 2007년. 12월.   과학기술학회마을
21 G. Biehal, and D. Chakravarti, "Information-Presentation Format And Learning Goals as Determinants of Consumers' Memory Retrieval and Choice Processes," Journal of Consumer Research, Vol. 8, No. 4, pp. 431-441, Mar. 1982.   DOI   ScienceOn
22 Chin, W.W., "Issues and Opinion on Structural Equation Modeling," MIS Quarterly, Vol. 22, No. 1, pp. vii-xvi, 1998.
23 허성혜, 류성렬, 전수현, "온라인 리뷰 수용에 영향을 미치는 요인: 온라인 리뷰 품질과 동의성을 중심으로," Journal of Information Technology Applications and Management, 제 16권, 제 4호, pp. 41-58, 2009년.   과학기술학회마을
24 J.R. Bettman, and C.W. Park, "Effects of Prior Knowledge and Experience and Phase of the Choice Process on Consumer Decision Processes: A Protocol Analysis," Journal of Consumer Research, Vol. 7, No. 3, pp. 234-249, Dec. 1980.   DOI   ScienceOn
25 K. Suh, and S. Chang, "User Interfaces and Consumer Perceptions of Online Stores: The role of Telepresence, Behaviour & Information Technology," Vol. 25, No. 2, pp. 99-113, March-April 2006.   DOI   ScienceOn
26 T. Kim, and F. Biocca, "Telepresence via Television: Two Dimensions of Telepresence May have Different Connections to Memory and Persuasion, Journal of Computer- Mediated Communication, Vol. 3, No. 2, 1997.
27 S. Jarvenpaa, K. Knoll, and D. Leidner, "Is Anybody Out There? Antecedents of Trust in Global Virtual Team," Journal of Management Information Systems, Vol. 14, No. 4, pp. 29-64, 1998.   DOI
28 김기영, "일회용 패스워드를 기반으로 한 인증 시스템에 대한 고찰," 정보보호학회지, 제 17권, 제 3호, 26-31쪽, 2007년 6월.   과학기술학회마을
29 D. Gefen, D.W. Straub, and M. Boudreau, "Structural Equation Modeling and Regression: Guidelines for Research Practice", Communications of the AIS, Vol. 4, No. 7, Oct. 2000.
30 R. Mayer, J. Davis, and F. Schoorman, "An Integrative Model of Organizational Trust," Academy of Management Review, Vol. 20, No. 3, pp. 709-734, 1995.
31 R.J. Ladvidge, G.A. Steiner, "A Model for Predictive Measurements of Advertising Effectiveness," Journal of Marketing, Vol. 25, 59-62, Oct. 1961.   DOI   ScienceOn
32 E.J. Arnould, L. Price, abd G. Zinkhan, "Consumers," McGraw-Hill, 2001.
33 서승현, 강우진, "OTP 기술현황 및 국내 금융권 OTP 도입사례," 정보보호학회지, 제 17권, 제 3호, 18-25쪽, 2007년. 6월.   과학기술학회마을
34 금융보안연구원, "해외 인터넷뱅킹 보안현황 조사보고서," 2010년. 2월.
35 김지홍, 오세웅, "HMAC 기반의 일회용 패스워드를 이용한 3-Factor 인증," 한국컴퓨터정보학회 논문지, 제 14권, 제 6호, 27-32쪽, 2009년. 6월.   과학기술학회마을
36 권순재, 이건창, 김창현, "IT자산 안정성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구," 한국경영과학회지, 제 32권, 제 2호, 149-162쪽, 2007년 6월.   과학기술학회마을
37 J.H. Wu, and Y.M. Wang, "Measuring KMS Success: A Respecification of the DeLone and McLean''s Model," Information & Management, Vol. 43, No. 6, pp. 728-739, Sep. 2006.   DOI   ScienceOn
38 P.A. Pavlou, "Comsumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model," International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 101-134, 2003.
39 정해철, 김현수, "조직구성원의 정보보안 의식과 조직의 정보보안 수준과의 관계연구," Journal of Information Technology Applications & Management, 제 7권, 제 2호, 117-134쪽, 2000년. 12월.
40 김종기, 강다연, "보안정책, 보안의식, 개인적 특성이 패스워드 보안효과에 미치는 영향," 정보보호학회논문지 제 18권, 제 4호, 123-133쪽, 2008년. 8월.   과학기술학회마을
41 mk뉴스, 2010-04-13, http://news.mk.co.kr/v3/view.php?year=2010&no=187990
42 P. Doney, J. Cannon, and M. Mullen, "Understanding the Influence of National Culture on the Development of Trust," Academy of Management Review, Vol. 23, No. 3, pp. 601-620, 1998.
43 P. Pavlou, and D. Gefen, "Building Effective Online Marketplaces with Institution-Based Trust," Twenty-Third International Conference on Information Systems, pp. 667-675, 2002.
44 D.L. Hoffman, T.P. Novak, and M. Peralta, "Building Consumer Trust Online," Communications of the ACM, Vol. 42, No. 4, pp. 80-50, 1999.   DOI   ScienceOn
45 M.W. Vail, J.B. Earp, and A.I. Anton, "An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies," IEEE Trans. on Engineering Management, Vol. 55, No. 3, pp. 442-454, Aug. 2008.   DOI   ScienceOn
46 B.M. Suh, and I.G. Han, "The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce," International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 29-44, Mar. 2003.
47 T. Daugherty, H. Li, and F. Biocca, "Consumer Learning and the Effects of Virtual Experience Relative to Indirect and Direct Product Experience," Psychology & Marketing, Vol. 25, No. 7, pp. 568-586, Jul. 2008.   DOI   ScienceOn
48 김재일, 이장은, "소비자의 내적 지식이 신제품 수용에 미치는 영향에 관한 연구," 경영논집, 제 37호, 제 2-3호, pp. 15-36, 2003년 9월.
49 김기환, 박대우, "Tokenless OTP를 활용한 인증모델," 제 12권, 제 1호, 113-122쪽, 2007년. 3월.   과학기술학회마을