Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.5.1251

An Investigation of the Psychology of Password Replacement by Email Users  

Lim, Se Hun (Sangji University)
Abstract
Recently, leaks of the personal information of Internet users have been occurring too frequently. Generally, Internet users have email accounts. The use of email as a communications tool in the private and public sectors has increased. Therefore, in email usage, password management to ensure a more secure email service is most important. In this study, we conducted an online survey of email users and analyzed their responses by using structural equation modeling software to find the psychological and behavioral characteristics of their password management. The results of this study provide useful suggestions on information security strategies related to email password management at both the enterprise and individual levels.
Keywords
password replacement intentions; password replacement behavior; privacy; information security knowledge;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 B. Kim, J.I. Lim, and Y.H. Cho, "Response measures and privacy status of mobile app : focusing on financing and operating system of Android", The journal of the institute of internet, broadcasting and communication, 14(6), pp. 267-272, 2014.   DOI
2 Daily Security News (Kim, M.K., reporter), the Chinese hacker groups, broke into the email systems of the US State Department, September 24, 2015, URL: http://dailysecu.com/news_view.php?article_id=10981, (Accessed: October 1, 2015)
3 The Dong-A Ilbo (Dong-A dotcom), principles to create a safe password, Remember these guidelines, February 11, 2015, URL: http://news.donga.com/3/all/20150211/69589160/2, (Accessed: October 2, 2015)
4 KISA (Korea Internet Security Agency), A study on knowledge level of personal information privacy, pp. 98-99, 2003
5 Health Chosun Media (Lee, H.N., intern reporter), Card account password 6-digit... concern to password syndrome, April 14, 2014, URL: http://health.chosun.com/site/data/html_dir/2014 /04/14/2014041401498.html (Accessed: October 1, 2015)
6 I. Ajzen, "The Theory of Planned Behavior", Organizational Behavior and Human Decision Processes, vol. 50, no. 2, pp. 179-211, Dec. 1991   DOI
7 G. Blake, "email with feeling", Research Technology Management, vol. 42, no. 6, pp. 12-13, Nov/Dec. 1999.
8 W.W. Chin, and P.R. Newsted, Structural equation modeling analysis with small samples using partial least squares. In R. H. Hoyle (Ed.), Statistical strategies for small sample research (pp. 307-341). Thousand Oaks, CA: Sage, 1999.
9 F.D. Davis, A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results, Ph.D. Thesis, doctoral dissertation, Sloan School of Management, Massachusetts Institute of Technology, Dec. 1986.
10 F.D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology", MIS Quarterly, vol. 13, no. 3, pp. 319-340, Sep. 1989   DOI
11 T. Herath, and H.R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organizations", European Journal of Information Systems, vol. 18, no. 2, pp. 106-125, April 2009.   DOI
12 F.D. Davis, R.P. Bagozzi, and P.R Warshaw, "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models", Management Science, vol. 35, no. 8, pp. 982-1003, Aug. 1989   DOI
13 F.D. Davis, "User acceptance of information technology: system characteristics, user perceptions and behavioral impacts", International Journal of Man-Machine Studies, vol. 38, no. 3, pp. 475-487, March 1993.   DOI
14 M. Fishbein, and I. Ajzen, Belief, attitude, intention and behavior: An introduction to theory and research, Reading, MA: Addison-Wesley. 1975
15 D.L. Floyd, S. Prentice-Dunn and R.W. Rogers, "A meta-analysis of research on protection motivation theory", Journal of applied social psychology, vol. 30, no. 2, pp. 407-429, February 2000.   DOI
16 J.F. Hair, Jr., G.T.M. Hult, C.M. Ringle, and M. Sartedt, "A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)," SEGE Publications, Inc, 2013.
17 S. Lee, "Electronic mail as a medium for rich communication: an empirical investigation using hermeneutic interpretation", MIS Quarterly, vol. 18, no. 2, pp. 143-157, June 1994.   DOI
18 H. Li, J. Zhang, and R. Sarathy, "Understanding compliance with internet use policy from the perspective of rational choice theory", Decision Support Systems, vol. 48, no. 4, pp. 635-645, March 2010.   DOI
19 J.C. Nunnally and I.H. Bernstein, "Psychometric Theory", 3rd ed. McGraw-Hill, New York, 1994.
20 S. Pahnila, M. Siponen, and A. Mahmood, "Employees' behavior toward IS security policy compliance", 40th Hawaii International Conference on System Sciences, Hawaii, Jan. 2007.
21 I. Woon, G.W. Tan, and R. Low, "A protection motivation theory approach to home wireless security". In Proceedings of the 26th International Conference on Information Sytems. Las Vegas, Nevada, USA. Paper 31ICIS 2005 Proceedings, 31, 2005.
22 M. Siponen, S. Pahnila, and A. Mahmood, "Factors influencing protection motivation and IS security policy compliance, Innovations in Information Technology", IEEE Conference Proceedings, pp. 1-5, Nov. 2006.
23 D.W. Straub, "The Effect of Culture on IT Diffusion: email and FAX in Japan and the U.S", Information Systems Research, vol. 5, no. 1, pp. 23-47, March 1994   DOI
24 A. Vance, M. Siponen and S. Pahnila, S., "Motivating IS security compliance: Insights from habit and protection motivation theory". Information & Management, vol. 49, no. 3/4, pp. 190-198, May 2012.   DOI