Browse > Article
http://dx.doi.org/10.5859/KAIS.2015.24.3.1

A Study on Disconfirmity to Security Practices of Smart-phone : Focused on Roles of Efficacy  

Kim, Jea-hyun (부산대학교 경영학과)
Kim, Jong-ki (부산대학교 경영학과)
Publication Information
The Journal of Information Systems / v.24, no.3, 2015 , pp. 1-19 More about this Journal
Abstract
Purpose This study discusses the contradictory behavior of smart-phone users who consider security is important, but they do not follow the security recommendations. We found through literature research that this contradictory behavior is resulted from a low level of efficacy. Design/methodology/approach Research hypotheses were set based on Extended Parallel Process Model, Control Theory, and Self Efficacy Mechanism. The data were collected from undergraduate students. Total of 178 data were used for the analysis. Findings Results of the analysis, first, showed that the relationship between threat and security attitude varies with the level of coping efficacy. Second, showed that the relationship between threat and fear does not vary with the level of coping efficacy. Both the groups with high coping efficacy and low coping efficacy had a statistically significant effect on the relationship between threat and fear.
Keywords
Smart-phone Security; Coping Efficacy; Danger Control Process; Fear Control Process; Security Recommendations; Security Attitude;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., Multivariate Data Analysis, 7th Edition., Prentice Hall International., 2010.
2 Harris, P. L., Children and Emotion: The Development of Psychological Understanding, Oxford: Basil Blackwell, 1989.
3 Hovland, C. I., Janis, I. L., and Kelly, H. H., Communication and Persuasion: Psychological Studies of Opinion Change, New Haven, CT: Yale University Press, 1953.
4 Hu, L. and Bentler, P. M., "Cutoff Criteria Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives," Structural Equation Modeling, Vol. 6, No. 1, 1999, pp. 1-55.   DOI
5 Janis, I. L., "Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research," In Advances in Experimental Social Psychology, Vol. 3, 1967, pp. 166-244.
6 Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.
7 Lazarus, R. S. and Folkman, S., Stress, Appraisal, and Coping, New York: McGraw-Hill, 1984.
8 Leventhal, H., "Findings and Theory in the Study of Fear Communications," Advances in Experimental Social Psychology, Vol. 5, 1970, pp.119-186.   DOI
9 Leventhal, H., "Fear Appeals and Persuasion: The Differentiation of Motivational Construct," American Journal of Public Health, Vol. 61, No. 6, 1971, pp. 1208-1224.   DOI
10 Liang, H., Saraf, N., Hu, Qing., and Xue, Y., "Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management," MIS Quarterly, Vol. 31, No. 1, 2007, pp. 59-87.
11 Liang, H. and Xue, Y., "Avoidance of Information Technology Threats: A Theoretical Perspective," MIS Quarterly, Vol. 33, No. 1, 2009, pp. 71-90.
12 Lindell, M. K. and Whitney, D. J., "Accounting for Common Method Variance in Cross-sectional Research Designs," Journal of Applied Psychology, Vol. 86, No. 1, 2001, pp. 114-121.   DOI
13 Pajares, F. and Urdan, T., Self-efficacy Beliefs of Adolescents, Information Age Publishing, 2006.
14 Pavlov, I., Conditioned Reflexes: An Investigation into the Physiological Activity of the Cortex, New York: Dover, 1927.
15 Petter, S., Straub, D., and Rai, A., "Specifying Formative Constructs in Information systems Research," MIS Quarterly, Vol. 31, No. 4, 2007, pp. 623-656.
16 Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P., "Common Method biases in Behavioral Research: A Critical Review of the Literature and Recommende Remedies," Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903.   DOI
17 Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology, Vol. 91, No. 1, 1975, pp. 93-114.   DOI
18 Segars, A. H. and Grover, V., "Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis," MIS Quarterly, Vol. 17, No. 4, 1993, pp. 517-525.   DOI
19 Siponen, M. and Vance, A., "Neutralization: New Insights into Problem of Employee Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 487-502.
20 Skinner, B. F., Science and Human Behavior, New York: Macmillan, 1953.
21 Stober, J., "The Social Desirability Scale-17," European Journal of Psychological Assessment, Vol. 17, No. 3, 2001, pp. 222-232.   DOI   ScienceOn
22 Sutton, S. K. and Davidson, R., "Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems," Psychological Science, Vol. 8, No. 3, 1997, pp. 204-210.   DOI
23 Turel, O., Serenko, A., and Giles, P., "Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users," MIS Quarterly, Vol. 35, No. 4, 2011, pp. 1043-1061.
24 Tversky, A. and Kahneman, D., "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Vol. 5, No. 4, 1992, pp. 297-323.   DOI
25 Williams, L., Edwards, J. R., and Vandenberg, R. J., "Recent Advances in Causal Modeling Methods for Organizational and Management Research," Journal of Management, Vol. 29, No. 6, 2003, pp. 903-936.   DOI
26 Witte, K., "Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model," Communication Monographs, Vol. 59, No. 4, 1992, pp. 329-349.   DOI
27 Witte, K., "Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)," Communication Monographs, Vol. 61, No. 2, 1994, pp. 113-134.   DOI
28 김종기, 전진환, 임호섭, "정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로," 정보시스템연구, 제15권, 제1호, 2006, pp. 145-168.
29 김종기, 강다연, 전진환, "패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인," 정보시스템연구, 제17권, 제1호, 2008, pp. 23-43.
30 김종기, 강다연, 전진환, "인터넷뱅킹 사용자의 보안의도에 영향을 미치는 요인에 관한 연구," 정보시스템연구, 제18권, 제2호, 2009, pp. 1-18.
31 Bandura, A., Self-efficacy: The Exercise of Control, Worth Publishers, 1997.
32 Browne, M. W. and Cudeck, R., Alternate Ways of Assessing Model Fit, In Bollen, Sage Publications; Newbury Park(CA), 1993.
33 Compeau, D. R. and Higgins, C. A., "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly, Vol. 19, No. 2, 1995, pp. 189-211.   DOI
34 Carver, C. S. and Scheier, M. F., On the Self-regulation of Behavior, New York: Cambridge University Press, 2001.
35 Carver, C. S. and Scheier, M. F., "Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology," Psychological Bullentin, Vol. 92, No. 1, 1982, pp. 111-135.   DOI
36 Carver, C. S., "Approach, Avoidance, And the Self-regulation of Affect and Action," Motivation and Emotion, Vol. 30, No. 2, 2006, pp. 105-110.   DOI
37 Crowne, D. and Marlowe, D., The Approval Motive: Studies in Evaluative Dependence, New York: Wiley, 1964.
38 Diamantopoulos, A., "Incorporating Formative Measures into Covariance-Based Structural Equation Models," MIS Quarterly, Vol. 35, No. 2, 2011, pp. 335-358.
39 Etezadi-Amoli, J. and Farhoomand, A. R., "A Structural Model of end User Computing Satisfaction and User Performance," Information & Management, Vol. 30, No. 2, 1996, pp. 65-73.   DOI
40 Fishbein, M. and Ajzen, I., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley Publishing, 1975.
41 Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50.   DOI
42 Furnell, S., "Why Users Cannot Use Security," Computers & Security, Vol. 24, No. 4, 2005, pp. 274-279.   DOI