Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.4.929

A Study on the Influence of Mobile Information Security on Mobile Office Service Satisfaction and Continuous Use in the Enterprise BYOD Environment  

Park, Byoung-Woo (Chonnam National University)
Jang, Seok-Eun (Chonnam National University)
Lee, Eun-Kyoung (Chonnam National University)
Lee, Sang-Joon (Chonnam National University)
Abstract
The mobile office, which was expected to be a key strategy for business operation through business innovation, was slow to spread from the BYOD environment to information security issues. This study analyzes mobile office information security and analyzes countermeasures against mobile information security threats to analyze the influence of information security factors on corporate satisfaction and continuous use of mobile office service. The results of the study were identified through the research model and hypothesis, quantitative empirical analysis based on the questionnaire and qualitative empirical analysis based on the expert interview. Through this study, practical implications and future directions for mobile office service satisfaction and continuous use are suggested.
Keywords
Mobile Information Security; Personal Information Security; Mobile Office; BYOD;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Min-gyu, Park, "Design and implementation of mobile office security system using mobile device control function and location based information," Gachon University, Jul. 2013
2 Dae Hyung Lee, Seung Yeon Cho, and Hee-Woong Kim, "A study on the improvement of smart work satisfaction and productivity," 21(2), pp. 24-48, Jun. 2014   DOI
3 ITWorld, "Korea enterprise mobility market forecast 2016-2020," IDC Korea, 2015
4 Jae-Sung Lee and Heung-Sick Kim, "Study on smart work status and activation plan," Journal of Korean Association for Regional Information Society, 13(4), pp. 75-96, Jun. 2010
5 J. Shim, D. Mittleman, R. Welke, A. French, and J. Guo, "Bring Your Own Device (BYOD): current status, issues, and future directions," Proceeding of the Nineteenth Americas Conference on Information Systems, pp. 1-20, 2013
6 Dongwan Kang and Chaetae Imm, "A study on security requirement and response for corporate assets in BYOD environments," Korea Information Science Society, pp. 747-749, 2014
7 Keun-Young Lee, Tae-Hyoung Park, and Jong-In Lim, "A study on roles of CERT and ISAC for enhancing the security of smart mobile office," Korea Institute Of Information Security And Cryptology, 21(5), pp. 109-127, Oct. 2011
8 Jae-Ho Lee, Dong-Hoon Lee, and Huy Kang Kim, "Decision support system to detect unauthorized access in smart work environment," Korea Institute Of Information Security And Cryptology, 22(4), pp. 797-808, Aug. 2012
9 Young-Hee Kim and Kwang-Ho Kook, "A study on priority rankings of actions providing personal information security," Convergence Security Journal, vol. 14, no. 4, pp. 9-17, 2014
10 Hyun-mi Jang and Seng-Phil Hong, "A framework for personal information handler in smart device environment," Journal of Security Engineering, 11(1), pp. 13-24, Feb. 2014   DOI
11 J. Anderson and D. W. Gerbing, "Structure equation modelling in practive: A review and recommended two-step approach," Psychological Bulletin, vol. 103, no. 3, pp. 411-423, Aug. 1988   DOI
12 Z. Ahmed, H. Jamal, R. Mehboob, S. Khan, and M. Shahbaz, "Secure cognitive mobile hotspot," IEEE Transactions on Consumer Electronics, vol. 56, no. 2, pp. 606-612, May. 2010   DOI
13 Ji-Hyung Park and Gun-Kwon Shin, "Effects of smartphones usability on user's satisfaction and loyalty: Focusing on moderating effect of terms of use," Korean Journal of Business Administration, 25(2), pp. 811-831, Apr. 2012
14 S.Sharma, S.Durand, and M. Gur-Arie, "Identification and analysis of moderator variable," Journal of Marketing Research, vol. 18, no. 3, pp. 291-300, Aug. 1981   DOI
15 Song Ji-joon, "SPSS / AMOS statistical analysis method for writing paper," 21century-company, 2017