Browse > Article

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction  

Kwon, Soon-Jae (인하대학교 BK21 지능형 유비쿼터스 물류기술 연구사업단)
Lee, Kun-Chang (성균관대학교 경영학부)
Kim, Chang-Hyun (성균관대학교 경영학부)
Publication Information
Abstract
In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.
Keywords
System; Information; Confidentiality; Integrity; Nonrepudiation; Authentication; Information Security Quality; Information Security Satisfaction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 원동호, 김경국, 이보영, 김승주, '공개키 기반 구조 구축을 위한 디렉토리 서비스 구현', 성균관대학교 정보통신기술연구소, 1998
2 이덕영, '인터넷 쇼핑몰 신뢰의 결정요인과 구매와의 관계에 대한 연구', 건국대학교 석사학위논문, 2002
3 Davis, F.D., 'Perceived usefulness, perceived ease of use, and user acceptance of information technology,' MIS Quarterly, Vol.13, No.3(1989), pp.319-340   DOI   ScienceOn
4 Early, A.H. and S. Chaiken, The Psychology of Attitudes, Thomson Wadsworth, Belmont, CA, 1993
5 Fishbein, M. and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, Reading, MA, 1975
6 Fornell, C. and D.F. Larcker, 'Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,' Journal of Marketing Research, Vol.18, No.1(1981), pp.39-51   DOI   ScienceOn
7 Hair, J,F., R.E. Anderson, R.L. Tatham, and W.C. Black, Multivariate Data Analysis: With Readings, 5th ed., Prentice Hall, 1998
8 Jarvenpaa, S., K. Knoll, and D. Leidner, 'Is Anybody Out There? Antecedents of Trust in Global Virtual Teams,' Journal of Management Information Systems, Vol.14, No.4 (1998), pp.29-64   DOI
9 Reichheld, F. and P. Schefter, 'E-Loyalty : Your Secret Weapon on the Web,' Harvard Business Review, Vol.78, No.4(2000), pp. 105-113
10 Pavlou, P. and D. Gefen, 'Building Effective Online Marketplaces with Institution-Based Trust,' Twenty-Third International Conference on Information Systems, 2002, pp. 667-675
11 Wilson, S., 'Certificates and trust in electronic commerce,' Information Management and Computer Security, Vol.5, No.5(1997), pp.175-181   DOI   ScienceOn
12 국가정보원, 정보통신부 2006 국가정보보호백서, 2006
13 정경수, 김용, '인터넷뱅킹 이용자달이 지각하는 신뢰와 위험 요인간의 관계에 대한 실증 연구', 한국경영정보학회 추계학술대회, 2004
14 Hoffman, D.L. T.P. Novak, and M. Peralta, 'Building consumer trust online,' Communications of the ACM, Vol.42, No.4(1999), pp.80-85
15 Wold, H., Soft Modeling: the Basic Design and Some Extensions, in System Under Indirect Observations: Part 2, Amsterdam North-Holland: K.G. Joreskog and H. Wold (eds), 1982
16 Hartwick, J. and H. Barki, 'Explaining the role of user participation in information system use,' Management Science, Vol.40, No. 4(1994), pp.440-465   DOI   ScienceOn
17 Nunnally, J.C, Psychometric Theory, McGrawHill, 1994
18 Barbara H.W. and PA Todd, 'A Theoretical Integration of User Satisfaction and Technology Acceptance,' Information Systems Research, Vol.16, No.1(2005), pp.85-102   DOI   ScienceOn
19 ISO/IEC JTCI CS27, Guidelines for the management of IT security(GMITS)-Part 1 : Concepts and models of IT security, TR 13335-1, 2000
20 Gefen, D. and D.W. Straub, 'Gender differences in the perception and use of e-mail : an extension to the technology acceptance model,' MIS Quarterly, Vol.21, No.4(1997), pp.389-400   DOI   ScienceOn
21 Gefen, D., 'Customer Loyalty in E-Commerce,' Journal of the Association for Information Systems, Vol.3(2002), pp.27-51
22 Suh, B. and I. Han, 'The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce,' International Journal of Electronic Commerce, Vol.7, No.3(2003), pp.135-161   DOI
23 장윤희, 권오준, 백민정, '고객 신뢰도와 만족도에 영향을 미치는 전자결제 시스템 성공요인에 관한 연구', 한국경영정보학회 추계학술대회, 2004
24 Straub, D., M. Limayem, and E. Karahanna-Evaristo, 'Measuring system usage: implications for IS theory testing,' Management Science, Vol.41, No.8(1995), pp.1328-1342   DOI   ScienceOn
25 Adams, D.A, R.R. Nelson, and P.A. Todd, 'Perceived usefulness, ease of use, and usage of information technology: a replication,' MIS Quarterly, Vol.16, No.2(1992), pp.227-247   DOI   ScienceOn
26 Ajzen, I. and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, Englewood Cliffs, NJ, 1980
27 Goodhue, D.L., 'IS attitudes: Toward theoretical and definitional clarity,' Database Advertise of Information Systems, Vol.19, No.3/4(1988), pp.6-15   DOI
28 Fazio, R.H. and MA Olson, 'Attitudes: Foundation, function and consequences,' Hogg, MA and J. Cooper, eds. The Sage Handbook of Social Psychology, Sage, London, UK, 2003
29 김종기, 이동호, '전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구', 경영정보학연구, 제15권, 제2호(2005), pp.65-96
30 Brynjolfsson, E. and M. Smith, 'Frictionless Commerce? A Comparison of Internet & Conventional Retailers,' Management Science, Vol.46, No.4(2000), pp.563-585   DOI   ScienceOn
31 Melone, N., 'A theoretical assessment of the user-satisfaction construct in information systems research,' Management Science, Vol.36, No.1(1990) pp.76-91   DOI   ScienceOn
32 CSI, IPAK : Information Protection Assessment Kit, Computer Security Institute, 1997
33 Chin, W.W., 'Issues and Opinion on Structural Equation Modeling,' MIS Quarterly, Vol.22, No.1(1998), pp.7-16
34 Seddon, P., 'A respecification and extension of the Delone and McLean model of IS success,' Inform. Systems Research, Vol.8, No.3(1997), pp.240-253   DOI   ScienceOn
35 Sitkin, S.B. and N.L. Roth, 'Explaining the Limited Effectiveness of Legalistic Remedies for Trust/Distrust,' Organization Science, Vol.4, No.3(1993), pp.367-388   DOI   ScienceOn
36 James E. and W. Sammy, 'Development of a Tool for Measuring and Analyzing Computer User Satisfaction,' Management Science, Vol.29, No.5(1983), pp.126-145
37 http://www.boho.or.kr, 정보보호실천수칙, 2006
38 OECD, Guidelines for the Security of Information Systems, 1992
39 Matthew K., O. Lee, and E. Turban, 'A Trust Model for Consumer Internet Shopping,' International Journal of Electronic Commerce, Vol.6, No.1(2001), pp.75-91   DOI
40 한근회, 박영종, 소우영, '안전한 전자상거래 모델', 한국멀티미디어학회 추계학술발표논문집, 1998
41 우석천, 이재우, 홍기융, 이성욱, '정보보호 정책 수립 및 관리지침 개발', 해킹바이러스연구, 제7권(2000)
42 Grazioli, S. and S. Jarvenpaa, 'Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers,' IEEE Transaction on System, Vol.30, No.4(2000), pp.395-410
43 Lederer, A.L., D.J. Maupin, M.P. Sena, and Y. Zhuang, 'The Technology Acceptance Model and the World Wide Web,' Decision Support Systems, Vol.29(2000), pp.26-282
44 Delone, W.H. and E.R. McLean, 'Information systems success : The quest for the dependent variable,' Inform. Systems Research. Vol.3, No.1(1992), pp. 60-95   DOI
45 한국인터넷진흥원, 2005 하반기 정보화실태조사, 2006
46 Howel, J,M. and C.A. Higgins, 'Champion of Technological Innovation,' Administrative Science Quarterly, Vol.35, No.2(1990), pp.317-341   DOI   ScienceOn