Browse > Article
http://dx.doi.org/10.5859/KAIS.2014.23.1.111

Intrinsic and Extrinsic Factors Impacting Individuals' Cyber Ethics Awareness and Behavior Intention  

Kim, Sanghyun (경북대학교 경영학부)
Park, Hyunsun (경북대학교 경영학부 일반대학원)
Publication Information
The Journal of Information Systems / v.23, no.1, 2014 , pp. 111-138 More about this Journal
Abstract
As the Internet is widely used worldwide, Cyber world has become a part of daily life. On the other hand, the adverse effects of Internet, such as abusive comments, illegal harmful contents, rumor diffusion, infringement on a right have emerged with the increase. Researchers recognized the important of cyber ethics as an effective means of coping with the adverse effects on Internet. But, Little empirical research has been related to cyber ethics in management information systems. Thus, the purpose of this research is to identify multidimensional motivation factors that cyber ethics awareness and compliance behavior Intention. For this, this study investigated the factors that might influence Internet users to compliance cyber ethics. Using university students as a sample, one hundred and ninety six are collected for further analysis. The results of this study are as follows; First, self-esteem, Moral Obligation, self-control, cyber ethics education and Social Influence are significantly related to cyber ethics awareness, while punishment is not significantly related. Second, cyber ethics awareness have a positive effect on cyber ethics compliance behavior Intention. Third, the moderating effect of ego strength is also significant. This study is significant in that it established a behavior model to understand the compliance of cyber ethics with internet user in Korea.
Keywords
Cyber Ethics Awareness; Cyber Ethics Compliance Behavior Intention; Intrinsic Factor; Extrinsic Factor; Ego Strength;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 구본희, 최무진, "인터넷 중독과 정보윤리에 영향을 미치는 요인에 관한 연구-자아 특성 및 인터넷 인지 특성을 중심으로," 정보시스템연구, 제15권, 제3호, 2006, pp. 233-252.   과학기술학회마을
2 김문구, 박종현, "국내 성인의 인터넷 윤리수준 영향요인과 인터넷 폭력과의 관계에 관한 연구," 소비자문제연구, 제33호, 2008, pp. 65-91.
3 김경희, 김태웅, "디지털 콘텐츠 저작권 침해의도에 관한 영향요인 연구," 한국컴퓨터교육학회 논문지, 제16권, 제1호, 2013, pp. 63-71.   과학기술학회마을
4 김효정, 유상진, 구본희, "개인 특성 및 인터넷 활용 특성이 인터넷 중독 및 정보 윤리에 미치는 영향에 관한 연구," 경영교육연구, 제48권, 2007, pp. 101-124.
5 백승익, 조남재, 이인, 강진우, 김봉준, "사이버 윤리지표 개발에 관한 실증연구-한국, 미국, 인도의 차이를 중심으로," 정보화정책, 제14권, 제1호, 2007, pp. 85-101.
6 명재진, 이한태, "사이버윤리 연구동향 분석과 정보인권 측면에서의 평가," 정보화정책, 제20권, 제1호, 2013, pp. 3-21.
7 박주연, "인터넷 저작권 침해 보호에 관한 연구-저작권 침해에 대한 처벌 및 윤리의식을 중심으로" 디지털정책연구, 제11권, 제1호, 2013, pp. 145-151.
8 박철주, 임명성, "보안 대책이 지속적 보안 정책 준수에 미치는 영향," 디지털정책연구, 제10권, 제4호, 2012, pp. 23-35.   과학기술학회마을
9 안은정, 이제홍, "인터넷 윤리의식 분석 및 평가에 관한 연구," e-비즈니스연구, 제14권, 제2호, 2013, pp. 69-87.
10 추병완, "사이버 공간의 도덕과 교육적 함의," 도덕윤리교육과교육연구, 제16권, 2003, pp. 306-320.
11 유진호, "인터넷 윤리의 개요 및 국내 현황," 정보과학회지, 제30권, 제10호, 2012, pp. 15-20.   과학기술학회마을
12 이기식, "인터넷시대 사이버윤리(CyberEthics)의 영향요인분석: 매체-내용-상황-문화 관점의 적용," 한국정책과학회보, 제11권, 제3호, 2007, pp. 49-76.
13 이기식, "사이버 저작권윤리(Cyber Copyright Ethics)의 수용에 관한 연구: 영향요인도출," 디지털정책연구, 제9권, 제6호, 2011, pp. 57-70.   과학기술학회마을
14 이상배, 김용겸, 김인호, "정보시스템 요원의 정보윤리 실천의도에 영향을 미치는 요인간 관계연구," 경영학연구, 제33권, 제2호, 2004, pp. 375-422.
15 추병완, 정보윤리교육론, 서울:울력, 2001.
16 추병완, "온라인에서의 도덕적 이탈과 인터넷윤리교육의 과제," 윤리연구, 제87권, 2012, pp. 119-141.
17 하영윤, 오영환, "대학생의 수준과 스트레스 대처방식과의 관계 연구," 서울여자대학교 학생생활연구소, 제8권, 1996, pp.99-119.
18 한국인터넷진흥원, 2011년 인터넷윤리문화실태조사, 2011.
19 한국인터넷진흥원, 2012년 인터넷이용실태조사, 2012.
20 한정희, 장활식, "인터넷에서의 디지털 음악 저작권 침해 행동에 관한 연구," 정보시스템연구, 제16권, 제1호, 2007, pp. 135-158.   과학기술학회마을
21 Al-Rafee, S. and Cronan, T.P., "Digital Piracy: Factors that Influence Attitude Toward Behavior," Journal of Business Ethics, Vol.63, No.3, 2006, pp.237-259.   DOI   ScienceOn
22 Banerjee, D., Cronan, T.P. and Jones, T.W., "Modeling IT Ethics: A Study in Situational Ethics," MIS Quarterly, Vol.22, No.1, 1998, pp.31-60.   DOI
23 Chang, M.K., "Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and The Theory of Planned Behavior," Journal of Business Ethic, Vol.17, No.16, 1998, pp.1825-1834.   DOI   ScienceOn
24 Ajzen, I., "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol.50, No.2, 1991, pp.179-211.   DOI
25 Bagchi, K., Kirs, P. and Cerveny, R., "Global Software Piracy: Can Economic Factors Alone Explain the Trend?," Communications of the ACM, Vol.49, No.6, 2006, pp.70-76.   DOI   ScienceOn
26 Carte, T.A. and C. J. Russell, C.J., "In Pursuit of Moderation: Nine Common Errors and Their Solutions," MIS Quarterly, Vol. 27, No.3, 2003, pp.479-501.
27 Chin, W., Marcolin, B. and Newsted, P.R., "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and a Electronic-Mail Emotion/Adoption Study," Information System Research, Vol.14, No.2, 2003, pp.189-217.   DOI   ScienceOn
28 Fishbein, M. and Ajzen, L., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley, 1975.
29 Fornell, C. and Larcker, D.F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement," Journal of Marketing Research, Vol.18, No.1, 1981, pp.39-50.   DOI   ScienceOn
30 Gefen, D. and Straub, D., "A Practical Guide to Factorial Validity Using PLS Graph: Tutorial and Annotated Example," Communications of the Association for Information Systems, Vol.16, No.5, 2005, pp.91-109.
31 Harrington, S.J., "A Test of a Person-Issue Contingent Model of Ethical Decision Making in Organizations," Journal of Business Ethics, Vol.16, No.4, 1997, pp.363-375.   DOI   ScienceOn
32 Gottfredson, M.R. and Hirschi, T., A General Theory of Crime, Palo Alto: Stanford University Press, 1990.
33 Kurland, N.B., "Ethical Intentions and the Theories of Reasoned Action and Planned Behavior," Journal of Applied Social Psychology, Vol. 25, No. 4, 1995, pp. 297-313.   DOI   ScienceOn
34 Hair, J.F., Anderson, R.E., Tatham, R. L. and Black, W. C., Multivariate Data Analysis, Upper Saddle River, NJ: Prentice-Hall.
35 Kolberg, L., "Stage and Sequence: The Cognitive Developmental Approach to Socialization," in D. Goslin (Ed,), Handbook of socialization theory and research, Rand McNally, Chicago, IL, 1969.
36 Kreie, J. and Cronan, P., "Copyright, Piracy, Privacy and Security Issues: Acceptable or UInacceptable Action for End Users?", Journal of End User Computing, Vol.11, No.2, 1999, pp.13-21.   DOI
37 Leonard, L.N.K. and Cronan, T.P., "Attitude toward Ethical Behavior in Computer Use: A Shifting Model," Industrial Management & Data Systems, Vol.105, No.9, 2005, pp.1150-1171.   DOI
38 Leonard, L.N.K., Cronan, T.P. and Kreie, J., "What Influences IT Ethical Behaviour Intentions-Planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?," Information & Management, Vol.42, No.1, 2004, pp.143-158.   DOI
39 Logue, Self-Control, New York: Prentice Hall, 1995.
40 Nunnally, N.C., Psychometric Theory, NY: McGraw-Hill, 1978.
41 Peace, A.G., Galletta, D.F. and Thong, J.Y.L., "Software Piracy in the Workplace: A Model and Empirical Test," Journal of Management Information Systems, Vol.20, No.1, 2003, pp.153-177.   DOI
42 Mann, D. and Sutton, M., "Net Crime: More Chang in the Organization of Thieving," British Journal of Criminology, Vol.38, No.2, 1998, pp.201-229.   DOI
43 Mason, R.O., "Four Ethical Issues of the Information Age," MIS Quarterly, Vol.10, No.1, 1986, pp.5-12.   DOI   ScienceOn
44 Mischel, W., Schoda, Y. and Peake, P.K., "The Nature of Adolescent Competencies Predicted by Preschool Delay of Gratification," Journal of Personality and Social Psychology, Vol.54, No.4, 1988, pp.687-696.   DOI
45 Rosenberg, M., Society and the Adolescent Self-Image, NJ: Princeton University Press, 1965.
46 Scholtz, J.T., "Enforcement Policy and Corporate Misconduct: The Changing Perspective of Deterrence Theory," Law and Contemporary Problems, Vol.60, No.3, 1997, pp.253-268.   DOI   ScienceOn
47 Straub, D.W., "Effective IS Security: An Empirical Study," Information Systems Research, Vol.1, No.3, 1990, pp.255-276.   DOI
48 Trevino, L.K., "Ethical Decision Making in Organizations: A Person-Situation Interactionist Model," Academy of Management Review, Vol.11, No.3, 1986, pp.601-617.
49 Wu, W.P. and Yang, H.L., "A Comparative Study of College Students' Ethical Perception concerning Internet Piracy," Quality & Quantity, Vol.47, No.1, 2013, pp.111-120.   DOI
50 Young, K.S., Caught in the net: How to Recognize the Signs of Internet Addiction and a Winning Strategy for Recovery, NY: John Wiley & Sons Inc, 1998.
51 Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Vol.100, No.3, 2011, pp.405-417.   DOI   ScienceOn
52 Carmines, E.G. and Zeller, R.A., Reliability and Validity Assessment, Newbury Park, CA: Sage Publications, 1979.
53 Hsu, M.H. and Kue, F.Y., "An Investigation of Volitional Control in Information Ethics," Behavior and Information Technology, Vol.22, No.1, 2003, pp.53-62.   DOI   ScienceOn