Browse > Article
http://dx.doi.org/10.9728/dcs.2018.19.1.93

A Study on the Factors of Experience and Habit on Information Security Behavior of New Services - based on PMT and UTAUT2  

Lee, Hong-Je (Department of IT Policy Management, Soongsil University)
Kho, Hyeong-Seog (Department of IT Policy Management, Soongsil University)
Roh, Eun-Hee (Department of College of Liberal Arts & Sciences, Hansung University)
Han, Kyeong-Seok (Department of Business Administration, Soongsil University)
Publication Information
Journal of Digital Contents Society / v.19, no.1, 2018 , pp. 93-102 More about this Journal
Abstract
This study aims to present policy implications by analyzing information security behavior factors of internet users. The research model, based on PMT and UTAUT2, consists of perceived threat, severity, social influence, self-efficacy, experience and habits, PC and privacy behaviors, security behaviors on new services and set demographic characteristics, use places of internet, use of paid products, and experiences of accident as moderate variables to analyze the effect on security behavior. The results showed that perceived severity, self-efficacy significantly influenced on experience and habits, and experience and habits and self-efficacy had a high influence on PC and privacy behavior. Also, PC and privacy behaviors have a high impact on security behavior of new services. Age, income, use of paid products, and experience of accidents have a moderating effects on security behaviors. The results of this study are expected to help policy decision making to improve the level of information security of internet users.
Keywords
Information Security; UTAUT2; Protection Motivation; Experience and Habit; Survey on Information Security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Wang, Ping An, and Easwar Nyshadham, "Knowledge of online security risks and consumer decision making: An experimental study," in 2011 44th Hawaii International Conference on System Sciences, 2011.
2 Wang, Ping An, "Assessment of cyber security knowledge and behavior: An anti-phishing scenario, in " Proc. IEEE Int. Conf. Internet Monitor. Protection (ICIMP), p. 1-7, 2013.
3 Wang, Ping An, "Information security knowledge and behavior: An adapted model of technology acceptance," in 2010 2nd International Conference on Education Technology and Computer, Vol. 2, pp. 364-367, 2010.
4 Witte, K, The handbook of communication and emotion: Research, theory, applications, and contexts, in P. A.Andersen & L. K.Guerrero Eds. San Diego, CA: Academic Press, pp. 423-450, 1998.
5 Witte, Kim, "Fear control and danger control: A test of the extended parallel process model (EPPM)," Communications Monographs, Vol. 61, No. 2, pp. 113-134, 1994.   DOI
6 Woon, Irene, Gek-Woo Tan, and R. Low, "A protection motivation theory approach to home wireless security," ICIS 2005 proceedings, 2005.
7 Youn, Seounmi, "Teenagers' perceptions of online privacy and coping behaviors: a risk-benefit appraisal approach," Journal of Broadcasting & Electronic Media, Vol. 49, No. 1, pp. 86-110, 2005.   DOI
8 Kim, Sang-Hoon, and Gab-Su Lee, "An Empirical Study on Influencing Factors of Using Information Security Technology," Journal of Society for e-Business Studies, Vol. 20, No. 4, pp. 151-175, 2015.   DOI
9 Park, Chanouk, and Sang-Woo Lee, "A Study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory," Journal of Internet Computing and Services, Vol. 15, No. 2, pp. 59-71, 2014.   DOI
10 Milne, George R., Andrew J. Rohm, and Shalini Bahl, "Consumers' protection of online privacy and identity," Journal of Consumer Affairs, Vol. 38, No. 2, pp. 217-232, 2004.   DOI
11 Milne, Sarah, Paschal Sheeran, and Sheina Orbell, "Prediction and intervention in health‐related behavior: A meta‐analytic review of protection motivation theory," Journal of Applied Social Psychology, Vol. 30, No. 1, pp. 106-143, 2000.   DOI
12 Mohamed, Norshidah, and Ili Hawa Ahmad, "Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia," Computers in Human Behavior, Vol. 28, No. 6, pp. 2366-2375, 2012.   DOI
13 Rogers, Ronald W, "A protection motivation theory of fear appeals and attitude change," The journal of psychology, Vol. 91, No. 1, pp. 93-114, 1975.   DOI
14 Rogers, Ronald W, "Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation," Social psychophysiology: A sourcebook, pp. 153-176, 1983.
15 Siponen, Mikko, Seppo Pahnila, and Adam Mahmood, "Employees' adherence to information security policies: an empirical study, in " IFIP International Information Security Conference, Boston, 2007.
16 Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D., "User acceptance of information technology: Toward a unified view," MIS quarterly, pp. 425-478, 2003.
17 Ifinedo, Princely, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory," Computers & Security, Vol. 31, No. 1, pp. 83-95, 2012.   DOI
18 Hsu, Chien-Lung, Ming-Ren Lee, and Chien-Hui Su, "The role of privacy protection in healthcare information systems adoption," Journal of medical systems, Vol. 37, No. 5, 2013.
19 Gurung, Anil, Xin Luo, and Qinyu Liao, "Consumer motivations in taking action against spyware: an empirical investigation," Information Management & Computer Security, Vol. 17, No. 3, pp. 276-289, 2009.   DOI
20 Hanus, Bartlomiej, and Yu and Wu, "Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective," Information Systems Management, Vol. 33, No. 1, pp.2-16, 2016.   DOI
21 Condiotte, Mark M., and Edward Lichtenstein, "Self-efficacy and relapse in smoking cessation programs," Journal of consulting and clinical psychology, Vol. 49, No. 5, 1981.
22 Arekete, Samson, Princely Ifinedo, and Boluwaji Ade Akinnuwesi, "Antecedent factors to end-users' symbolic acceptance of enterprise systems: An analysis in Nigerian organization," in Adaptive Science & Technology (ICAST), 2014 IEEE 6th International Conference, pp. 1-8, 2014.
23 Bandura, A., Adams, N. E., Hardy, A. B. and Howells, G. N, "Tests of the generality of self-efficacy theory," Cognitive therapy and research, Vol. 4, No. 1, pp. 39-66, 1980.   DOI
24 Chenoweth, Tim, Robert Minch, and Sharon Tabor, "Expanding views of technology acceptance: seeking factors explaining security control adoption," AMCIS 2007 Proceedings, 2007.
25 Fruin, Donna J., Chris Pratt, and Neville Owen, "Protection motivation theory and adolescents' perceptions of exercise," Journal of Applied Social Psychology, Vol. 22, No. 1, pp. 55-69, 1992.   DOI
26 Gore, Thomas D., and Cheryl Campanella Bracken, "Testing the theoretical design of a health risk message: Reexamining the major tenets of the extended parallel process model," Health Education & Behavior, Vol. 32, No. 1, pp.27-41, 2005.   DOI
27 KISA. Cyber Threat Trend Report (Q3 2017). Available: https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=26797.
28 Park, H. S., and S. Kim, "An Empirical Study on SNS Users' Privacy Protection Behaviors," Management and Economics, Vol. 46, No. 2, pp. 69-91, 2013.
29 Jung, J. W, Empirical study on acceptance of personal information protection technology in the 'Smart' era, Ph.D. dissertation, Busan University, Busan, 2012.
30 KISA. 2016 Survey on Information Security Individual. Available:https://isis.kisa.or.kr/board/?pageId=060200.
31 Johnston, Allen C., and Merrill Warkentin, "Fear appeals and information security behaviors: an empirical study," MIS quarterly, pp. 549-566, 2010.
32 LaRose, R., Rifon, N., Liu, S., & Lee, D., "Understanding online safety behavior: A multivariate model," The 55th annual conference of the international communication association, New York, 2005.
33 Liang, Huigang, and Yajiong Xue, "Understanding security behaviors in personal computer usage: A threat avoidance perspective," Journal of the Association for Information Systems, Vol. 11, No. 7, 2010.
34 Maddux, James E., and Melinda A. Stanley, "Self-efficacy theory in contemporary psychology: An overview," Journal of Social and Clinical psychology, Vol. 4, No. 3, pp. 249-255, 1986.   DOI
35 Maddux, James E., and Ronald W. Rogers, "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change," Journal of experimental social psychology, Vol. 19, No. 5, pp. 469-479, 1983.   DOI
36 Lee, Sang-Gi, Sei-Yoon Lee, and Jeong-Chul Kim, "A Study on Security Vulnerability Management in Electric Power Industry IoT," Journal of Digital Contents Society, Vol 17, No. 6, pp. 499-507, 2016   DOI
37 Venkatesh, Viswanath, James YL Thong, and Xin Xu, "Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology," MIS Quarterly, Vol. 36, No. 1, pp. 157-178, 2012.
38 Jee, B. S., Fan, L., Lee, S. C., & Suh, Y. H., "Personal Information Protection Behavior for Information Quality: Health Psychology Theory Perspectives," Journal of the Korean society for quality management, Vol. 39, No. 3, pp. 432-443, 2011.