Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.1.207

A study on the influence of information security in selecting smart-phone  

Ahn, Jong-Chang (Hanyang University)
Lee, Seung-Won (Hanyang University)
Lee, Ook (Hanyang University)
Cho, Sung-Phil (Hanyang University)
Abstract
Recently, smartphone spyware resembles various types of virus components in PCs and has trends getting more and more severe. Users do not perceive the risk factors severely even if smartphone security is very vulnerable in spite of the smartphone spyware growth. Thus, this study observes the influence of information security in selecting smartphone based on the personal inclinations and spyware perceptions. The main variables of study model are such as the degree of personal risk-accepting and the risk of smartphone spyware as independent variables and smartphone purchasing intention as a dependent variable. The model is tested using SPSS 21 packages on the effective 200 samples gathered through questionnaire survey on the present smartphone users. As a result, the two main hypotheses which are "the degree of personal risk-accepting will influence on the perceiving risk of smartphone spyware" and "the perceiving risk of smartphone spyware will influence on smartphone purchasing intention" were significant statistically. Therefore, we could find out information security's influence on the selecting smartphone.
Keywords
risk-accepting; purchasing intention; smartphone security; spyware;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Woongyeol Cheon, Jiyeon Kim, Youngsook Lee, Dongho Won, "Samrtphone security threats and responding technology analysis," Journal of The Korea Society of Computer and Information, 16(2), pp. 153-163, Feb. 2011.
2 Heyonook Kim, "Smartphone technology development and security technology trends," Telecommunications Review, 21(2), pp. 219-241, Mar. 2011.
3 Hyeonah Park, Jaetag Choi, Jongin Lim, Donghun Lee, "Analytical study on the individual information threats in mobile environments," Review of KIISC, 17(4), pp. 56-73, Aug. 2007.
4 Seunghyeon Seo, Kilsoo Cheon, "Samrtphone security threats and responding technology," TTA Journal, 132, pp. 44-48, Nov./Dec. 2010.
5 Dongho Kang, Jinhee Han, Youn- keyong Lee, Yourngsub Cho, Seong-wan Han, Jeongyeo Kim, Heonsook Cho, "Samrtphone security threats and corresponding technology," Electronics and Telecommunications Trends, 25(23), pp. 72-80, Jun. 2010.
6 Kiyoung Kim, Dongho Kang, "Smartphone security technology in open mobile environments," Review of KIISC, 19(5), pp. 21-28, Oct. 2009.
7 Dong-Her Shih, Binshan Lin, Hsiu-Sen Chiang, and Ming-Hung Shih, "Security aspects of mobile phone virus: a critical survey," Industrial Management & Data Systems, vol. 108, no. 4. pp. 478-494, 2008.
8 Gilbert A. Churchill, and Jr.,J. Paul Peter, "Research design effects on the reliability of rating scales: a meta analysis," Journal of Marketing Research, vol. 11, pp. 360-375, Nov. 1984.
9 A. H. Van de Van, and D. L. Ferry, Measuring and assessing organization, Wiley Inter science, New York, 1980.
10 Mincheol Shin, The basic managerial and economic statistics, Changmin publisher, Seoul, Mar. 2010.