Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.1.199

An Analysis on Intention to Use Information Service for Personal Information Breach  

Kim, Taek-Young (Chungbuk National University/Cybersecurity Economics Research Institute(CERI))
Jun, Hyo-Jung (Chungbuk National University/Cybersecurity Economics Research Institute(CERI))
Kim, Tae-Sung (Chungbuk National University/Cybersecurity Economics Research Institute(CERI))
Abstract
Since 2008, large-scale personal information breach incidents have occurred frequently. Even though national education, policy, and laws have been enacted and implemented to resolve the issue, personal information breaches still occur. Currently, individuals cannot confirm detailed information about what personal information has been affected, and they cannot respond to the breaches. Therefore, it is desirable to develop various methods for preventing and responding to personal information infringement caused by breach and leakage incidents and move to privacy protection behaviors. The purpose of this study is to create understanding of personal information security and information breach, to present services that can prevent breaches of personal information, to investigate the necessity of and analyze the potential public demand for such services, and to provide direction for future privacy-related information services.
Keywords
Information Breach; Social Disaster; Service Acceptance; Poersonal Information Security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Bo-Mi Choi, Min-Jung Park, and Sang-Mi Chai, "An investigation of users' privacy protection behaviors : Factors affecting privacy protection technology adoption," Information Systems Review, 17(30), pp. 77-94, Dec. 2015.
2 Young-Soo Son, and Jin-Ho Yu, "Consideration of privacy infringement and utilization of information security service," Proceedings of the Korea Society of Management information Systems, pp. 355-359, Nov. 2014.
3 Soo-Jung Kim, and Min-Jung Sung, "The effects of the perception of and online risk and prior knowledge on public's communication behavior," The Korean Journal of Advertising and Public Relations, 13(4), pp. 528-567, Oct. 2011.
4 Jeong-Gyu Kim, and Kyung-Ho Lee, "FAIR-based loss measurement caused by personal information breach of a company," Journal of the Korea Institute of Information Security & Cryptology, 27(1), pp. 129-145, Feb, 2017.   DOI
5 http://www.privacy.kisa.or.kr/kor/main.jsp (accessed on 2016.10.12.)
6 http://www.eprivacy.go.kr/introCleanCenter.do (accessed on 2016.10.12.)
7 http://www.krcert.or.kr/main.do (accessed on 2016.10.12.)
8 http://www.nis.go.kr/AF/1_7.do (accessed on 2016.10.12.)
9 http://www.us-cert.gov/ncas (accessed on 2016.10.12.)
10 http://www.cert.org.cn (accessed on 2016. 10.12.)
11 http://www.jpcert.or.jp (accessed on 2016.10.12.)
12 R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, "Preventing private information inference attacks on social networks," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 8, pp. 1849-1862, Jun. 2012.   DOI
13 R. Whitaker, The End of Privacy: How Total Surveillance is Becoming a Reality, The New Press, 2010.
14 Kyoung-Jin Choi, "Right to be forgotten-A personal information perspective," Korea Association for Informedia Law, 16(2), pp. 97-120, Aug. 2012.
15 A. H. Crespo, I. R. del Bosque, and M. G. de los Salmones Sanchez, "The influence of perceived risk on Internet shopping behavior: a multidimensional perspective," Journal of Risk Research, vol. 12, no. 2, pp. 259-277, Feb. 2009.   DOI
16 Chung-Hun Lee, Yu-Mi Ko, and Beom-Soo Kim, "A framework and guidelines for personal data breach notification act," Journal of the Korea Institute of Information Security & Cryptology, 21(5), pp. 169-179, Oct. 2011.
17 Mi-Na Im and Jung-Sik Lee, "A study on usage of smartphone push notification," HCI 2013, pp. 388-392, Jan. 2013.
18 K. Juvva, and R. Rajkumar, " A real-time push-pull communications model for distributed real-time and multimedia systems," No. CMU-CS-99-107. Carnegie-mellon Univ pittsburgh Pa Dept of Computer Science, Jan. 1999.
19 B. Lepori, L. Cantoni, and R. Mazza, "Push communication services: a short history, a concrete experience and some critical reflections," Studies in Communication Sciences, vol. 2, no. 1, pp. 149-164, Feb. 2002.
20 T. Us, N. Jensen, M. Lind, and S. B. Jorgensen, "Fundamental principles of alarm design," International Journal of Nuclear Safety and Simulation, vol. 2, no. 1, pp. 44-51. Feb. 2011.
21 M. E. Fishbein, Readings in Attitude Theory and Measurement, Wiley, 1967.
22 I. Ajzen, "From intentions to actions: A theory of planned behavior," In Action Control, Springer Berlin Heidelberg, pp. 11-39, 1985.
23 S. Taylor and P. A. Todd, "Understanding information technology usage: A test of competing models," Information Systems Research, vol. 6, no. 2, pp. 144-176, Jun. 1995.   DOI
24 M. H. Hsu and C. M. Chiu, "Internet Self Efficacy and electronic service acceptance," Decision Support Systems, vol. 38, no. 3, pp. 369-381, Dec. 2004.   DOI
25 M. Hauswirth, and M. Jazayeri, "A component and communication model for push systems," Software Engineering-ESEC/FSE'99. pp. 20-38, Aug. 1999.
26 H. P. Shih, "An empirical study on predicting user acceptance of e-shopping on the web," Information & Management, vol. 41, no. 3, pp. 351-368, Jan. 2004.   DOI
27 S. Y. Hung and C. M. Chang, "User acceptance of WAP services: test of competing theories," Computer Standards & Interfaces, vol. 27, no. 4, pp. 359-370, Apr. 2005.   DOI
28 Min-Kyu Lee and Young-Eun Kim, "A study on effects of disease information use on the internet: Based on the protection motivation theory," Journal of Communication Science, 9(4), pp. 506-539, Dec. 2009.
29 S. Y. Hung, C. M. Chang, and T. J. Yu, "Determinants of user acceptance of the e-Government services: The case of online tax filing and payment system," Government Information Quarterly, vol 23, no. 1, pp. 97-122, 2006.   DOI
30 R. W. Rogers, "A protection motivation theory of fear appeals and attitude change," The Journal of Psychology, vol. 91, no. 1, pp. 93-114, June. 1975.   DOI
31 Chan-Ouk Park and Sang-Woo Lee, "A study of the user privacy protection behavior in online environment: Based on protection motivation theory," Journal of Internet Computing and Services, 15(2), pp. 59-71, Apr. 2014.   DOI
32 H. F. Lin, "Predicting consumer intentions to shop online: An empirical test of competing theories," Electronic Commerce Research and Applications, vol. 6, no. 4, pp. 433-442, Feb. 2008.   DOI
33 T. D. Susanto and R. Goodwin, "User acceptance of SMS-based egovernment services," In International Conference on Electronic Government, pp. 75-87, Aug. 2011.
34 V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, "User acceptance of information technology: Toward a unified view," MIS Quarterly, vol. 27, no. 3, pp. 425-478, Sep. 2003.   DOI
35 R. Noonan and H. Wold, "PLS path modeling with indirectly observed variables: a comparison of alternative estimates for the latent variable," Systems under Indirect Observation, Part II, pp. 75-94, 1982.
36 C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, vol. 18, no. 1, pp. 39-50, Feb. 1981.   DOI
37 C. B. Thompson, "Apoptosis in the pathogenesis and treatment of disease," Science, vol. 267, no. 5203, pp. 1456-1462, Mar. 1995.   DOI
38 M. Wetzels, G. Odekerken-Schroder, and C. Van Oppen, "Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration," MIS Quarterly, vol. 33, no. 1, pp. 177-195, Mar. 2009.   DOI
39 R. F. Falk and N. B. Miller, A Primer for Soft Modeling, University of Akron Press, 1992.