Browse > Article
http://dx.doi.org/10.21219/jitam.2020.27.2.001

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors  

Jung, Seungmin (Department of Store Management, So ngeui Women's College)
Park, Joo Yeon (Discipline of Information Technology, Mathematics and Statistics, College of Science, Health, Engineering and Education, Murdoch University)
Publication Information
Journal of Information Technology Applications and Management / v.27, no.2, 2020 , pp. 1-21 More about this Journal
Abstract
The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.
Keywords
Biometric Authentication Security Awareness Training Security Attitude Protection Motivation Theory;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 Abawajy, J., "User preference of cybersecurity awareness deliverymethods", Behavior &Information Technology, Vol. 33, No. 3, 2014, pp. 237-248.   DOI
2 Albrechtse, E. and J. Hovden, "Improving information security awareness and behavior through dialogue, participation and collective reflection", An Intervention Study, Computers and Security, Vol. 29, No. 4, 2010, pp. 432-445.   DOI
3 An, J. S., "Biometric authentication for banknotes ...Will it settled as a newtrend?". Available at http://www.segye.com/news-View/20160202004025 (Downloaded 03 Feb. 2016).
4 Anderson, C. L. and R. Agarwal, "Practicing Safe Computing: AMultimedia Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 613-643.   DOI
5 Bhattacherjee, A., "Understanding Information Systems Continuance: An Expectation-Confirmation Model", MIS Quarterly, Vol. 25, 2001, pp. 351-371.   DOI
6 Bulgurcu, B., H. Cavusoglu, and I. Benbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information security Awareness", MIS Quarterly, Vol. 34, No. 3. 2010, pp. 523-548.   DOI
7 Chae, S. I., Social Science Investigation Methodology, Hakhyeonsa, Seoul, Korea. 2001.
8 Chang, H. S. and D. H. Jung, "A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance", Journal of The Korea Society of Computer and Information, Vol. 20, No. 9, 2015, pp. 73-80.   DOI
9 Chang, M. H. and D. Y. Kang, "Factors Affecting the Information Security Awareness and Perceived Information Security Risk of Employees of Port Companies", Journal of Navigation and Port Research, Vol. 36, No. 3, 2012, pp. 261-271.   DOI
10 Chen, X., L. Chen, and D. Wu, "Factors That Influence Employees' Security Policy Compliance: An Awareness-Motivation- Capability Perspective", Journal of Computer Information Systems, Vol. 58, No. 4, 2018, pp. 312-324   DOI
11 Coventry, L., A. De Angeli, and G. Johnson, "Usability and Biometric Verification at the ATM Interface", SIGCHI Conference on Human Factors in Computing Systems, 2003, pp. 153-160.
12 Das, T. K. and B. Teng, "Between Trust and Control: Developing Confidence in Partner Cooperation in Alliance", Academy of Management Review, Vol. 23, No. 3, 1998, pp. 491-512.   DOI
13 Davis, D., "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 319-340.   DOI
14 Dinev, T. and P. Hart, "Internet Privacy Concern and their Antecedents-Measurement Validity and a Regression Model", Behavior and Information Technology, Vol. 23, No. 6, 2004, pp. 413-422.   DOI
15 Furnell, S. and I. Vasileiou, "Security education and awareness: Just let themburn?", Network Security, Dec. 2017, pp. 5-9.
16 Eminagaoglu, M., E. Ucar, and S. Eren, "The positive outcomes of information security awareness training in companies: A case study", Information Security Technical Report, Vol. 4, 2010, pp. 1-7.   DOI
17 Flavian, C. and M. Guinaliu, "Consumer Trust, Perceived Security and Privacy Policy: Three Basic Elements of Loyalty to a Web Site", Industrial Management and Data Systems, Vol. 106, No. 4, 2006, pp. 601-620.   DOI
18 Fornell, C. and D. F. Larcker, "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50.   DOI
19 Heo, J. and S. J. Ahn, "Effects of Biased Awareness of Security Policies on Security Compliance Behavior", The Journal of Korean Association of Computer Education, Vol. 23, No. 1, 2020, pp. 63-75.   DOI
20 Ifinedo, P., "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory", Computers and Security, Vol. 31, No. 1, 2012, pp. 83-95.   DOI
21 James, T., T. Pirim, K., Boswell, B. Reithel, and R. Barkhi, "Determining the Intention to Use Biometric Devices: An Application and Extension of the Technology Acceptance Model", Journal of Organizational and End User Computing, Vol. 18, No. 3, 2006, pp. 1-24.   DOI
22 Jarvenpaa, S. L. and P. Todd, "Consumer Reactions to Electronic Shopping on the World Wide Web", International Journal of Electronic Commerce, Vol. 1, No. 2, 1996, pp. 59-88.   DOI
23 Jemal, A., "User preference of cyber security awareness delivery methods", Behaviour & Information Technology, Vol. 33, No. 3, 2014, pp. 237-248.   DOI
24 Vijayasarathy, L. R., "Predicting Consumer Intentions to Use On-line Shopping: The Case for an Augmented Technology Acceptance Model", Information and Management, Vol. 41, No. 6, 2004, pp. 747-762.   DOI
25 Jin, S. H., D. G. Lee, and S. J. Lee. "The Influence of Technostress and Antismart on Smartphones", Journal of Digital Convergence, Vol. 10, No. 10, 2012, pp. 187-195.   DOI
26 Johnston, A. C. and M. Warkentin, "Fear Appeals and Information Security Behaviors: An Empirical Study", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.   DOI
27 Tamjidyamcholo, A., M. S. B. Baba, H. Tamjid, and R. Gholipour, "Information security: Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity and shared-language", Computers & Education, Vol. 68, 2013, pp. 223-232.   DOI
28 Vance, A., M. Siponen, and S. Pahnila, "Motivation IS Security Compliance: Insights From Habit and Protection Motivation Theory", Information and Management, Vol. 49, 2012, pp. 190-198.   DOI
29 Vatanasombut, B. M., A. C. Igbaria, and W. Stylianou, "Information Systems Continuance Intention of Web-based Applications Customers: The Case of Online Banking", Information andManagement, Vol. 45, No. 7, 2008, pp. 419-428.
30 Yim, M. S., "Why Security Awareness Education is not Effective?", Journal of Digital Convergence, Vol. 12, No. 2, 2014, pp. 27-37.   DOI
31 Yu, J. W., Replace your secret number... Is there any problemwith the introduction of biometric authentication in the financial sector?. Available at http://www.enewstoday.co.kr/news/articleView.html?idxno=690695 (Download 03 Feb. 2017).
32 Yun, J. B., "A Study on the Short Term Curriculumfor Strengthening Information Security Capability in Public Sector", Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 3, 2016, pp. 769-776.   DOI
33 Kim, J. K. and J. H. Kim, "An Empirical Study on Security Behavioral Intention of Individual Users: Comparison between Personal Computers and Smartphones", The Journal of Internet Electronic Commerce Research, Vol. 14, No. 6, 2014, pp. 45-69.
34 Kang, D. Y. andM. H. Chang, "An Analysis of Compliance with Information Security Policy Effects on Information Security Ability and Behavior: Focused on Workers of Shipping and Port Organization", Journal of Korea Port Economic Association, Vol. 30, No. 1, 2014, pp. 97-118.
35 Kim, B. R., J.W. Lee, and B. S. Kim, "Effect of Information Security Training and Services on Employees' Compliance to Security Policies", Informatization Policy, Vol. 25, No. 1, 2018, pp. 99-114.   DOI
36 Kim, J. K. and D. Y. Kang, "A Study on the Factors Affecting the Information Systems Security Effectiveness of Password", Asia Pacific Journal of Information System, Vol. 18, No. 4, 2008, pp. 1-26.   DOI
37 Kim, J. K., J. Y. Kim, and Q. Li, "A Study on Factors Affecting Smartphone User's Security Behavior Intention", The Journal of Internet Electronic Commerce Research, Vol. 16, No. 6, 2016, pp. 115-136.
38 Korea Consumer Agency, Mobile Payment Service Status Survey, 2016.
39 Kim, J. S. and B. Bernhard, "Factors influencing hotel customers' intention to use a fingerprint system", Journal of Hospitality and Tourism Technology, Vol. 5, No. 2, 2014, pp. 98-125.   DOI
40 Kim, S. H. and Y. M. Song, "An Empirical Study onMotivational Factors Influencing Information Security Policy Compliance and Security Behavior of End-Users (Employees) in Organizations", The e-Business Studies, Vol. 12, No. 3, 2011, pp. 327-349.   DOI
41 Lee, B. Y. andM. Y. Kim, "Factors affecting the Continuance Usage Intention of Biometric Technology: Comparing Dark Scenario with Bright Scenario", The Journal of Society for e-Business Studies, Vol. 16, No. 3, 2011, pp. 1-22.   DOI
42 Lee, C. S. and Y. H. Kim, "An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage", The Journal of Society for e-Business Studies, Vol. 20, No. 2, 2015, pp. 27-36.   DOI
43 Lee, K. E., J. Y. Kim, J. S. Hyun, and C. J. Park, "The Effects of Information Security Vaccine User's Construal Level and Message Type on the Information Security Behavior", The Journal of Korean Association of Computer Education, Vol. 18, No. 6, 2015, pp. 33-42.   DOI
44 Lee, S. K. and M. S. Chae, "An Study on the Factors that Motivate The Compliance of the Organizational Security Policy", Korean Journal of Business Administration, Vol. 27, No. 6, 2014, pp. 927-953.
45 Lee, Y. and K. R. Larsen, "Threat or coping appraisal: determinants of SMB executives' decision to adopt antimalware software", European Journal of Information Systems, Vol. 18, No. 2, 2009, pp. 177-187.   DOI
46 Moody, J., "Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use", Journal of Issues in Informing Science and Information Technology, Vol. 1, 2004, pp. 753-761.   DOI
47 Liang, H. and Y. Xue, "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective", Journal of the Association for Information Systems, Vol. 11, No. 7, 2009, pp. 394-413.   DOI
48 Limayem, M., M. Khalifa, andW. W. Chin, "Factors Motivating Software Privacy: A Longitudinal Study", IEEE Transactions on Engineering Management, Vol. 51, No. 4, 2004, pp. 414-425.   DOI
49 Lin, C. S., S.Wu, and R. J. Tsai, "Integrating Perceived Playfulness into Expectation-ConfirmationModel for Web Portal", Information and Management, Vol. 43, No. 5, 2005, pp. 683-693.
50 Ngugi, B., A. Kamis, and M. Tremaine, "Intention to Use Biometric Systems", e-Service Journal, Vol. 7, No. 3, 2011, pp. 20-46.   DOI
51 Peyravian, M. and N. Zunic, "Methods for Protecting Password Transmission", Computers & Security, Vol. 19, No. 5, 2000, pp. 466-469.   DOI
52 Ring, P. S. and A. H. Van De Ven, "Developing Processes of Cooperative Inter-organizational Relationships", Academy of Management Review, Vol. 19, 1994, pp. 90-118.   DOI
53 Roca, J. C., C. M. Chiu, and F. J.Martinez. "Understanding E-learning Continuance Intention: An Extension of the Technology AcceptanceModel", Human-Computer Studies, Vol. 64, No. 8, 2006, pp. 683-696.   DOI
54 Rogers, R. W., In Social Psychophysiology: A Sourcebook. Cacioppo, J. T. &Petty, R. E. (Eds.). Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protected Motivation. New York: The Guilford Press, 1983.
55 Smith, H., S. Milberg, and S. Berke, "Information Privacy: Measuring Individuals' Concerns about Organizational Practices", MIS Quarterly, Vol. 20, 1996, pp. 167-196.   DOI
56 Rosa, R. H., A. S. Patrick, and A. Ozok, "Perception and Acceptance of Fingerprint Biometric Technology", Symposium On Usable Privacy Security(SOUPS), 2007.
57 Rousseau, D. M., S. G. Sitkin, R. S. Butt, and C. Camerer, "Not So Different After All: A Cross-Discipline View of Trust", Academy ofManagement Review, Vol. 23, No. 3, 1998, pp. 393-404.
58 Shaw, R. S., C. C. Chen, A. Harris, and H. J. Huang, "The impact of information richness on information security awareness training effectiveness", Computers & Education, Vol. 52, 2009, pp. 92-100.   DOI
59 Soh, K. L.,W. P.Wongand, and K. L. Chan, "Adoption of Biometric Technology in Online Applications", International Journal of Business and Management Science, Vol. 3, No. 2, 2010, pp. 121-146.
60 Park, K. A., D. Y. Lee, and C. M. Koo, "An Empirical Study about Internet and Social Network Security Behavior of End User", Journal of Information Systems, Vol. 21, No. 4, 2012, pp. 1-29.   DOI