Browse > Article
http://dx.doi.org/10.5859/KAIS.2020.29.1.51

A Study on the Factors of Online Information Security Behavior Failure: Focused on the Elderly  

TIAN, YANG (이화여자대학교 경영학과)
Park, Minjung (이화여자대학교 경영학과)
Chai, Sangmi (이화여자대학교 경영학과)
Publication Information
The Journal of Information Systems / v.29, no.1, 2020 , pp. 51-74 More about this Journal
Abstract
Purpose Since the number of personal information breach incidents increased, many people have perceived the importance of personal information protection, in the recent. Especially, the number of personal information breach targeting middle-aged and elderly people rapidly increases. Therefore, the purpose of this study is to identify the factors which influence to fail of online information security behaviors among the elderly. Design/methodology/approach This study made a research model by adopting the factors deducted from the protection motivation theory. To analyze the research model, we conducted an online survey targeted on the elderly and middle ages users who have nations of Korean and Chinese respectively. Findings According to the empirical analysis result, we identified that only perceived severity and perceived vulnerability affected information security awareness. On contrast, it was also discovered that perceived barriers, self-efficacy, and response efficacy did not affect information security awareness. Additionally, the awareness of information security also did not affect information security behaviors. Middle-aged and elderly people with personal information protection education did more information security behaviors than people those who no education experiences. Korean middle-aged and elderly people with education significantly did more information protection behaviors than the people without the education.
Keywords
Elderly People; Information Security; Information Security Awareness; Information Security Education; Personal Information Protection; Protection Motivation Theory;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Haenlein, M., and Kaplan, A. M., "A Beginner's Guide to Partial Least Squares Analysis," Understanding statistics, Vol.3, No. 4, 2004, pp. 283-297.   DOI
2 Hair, J. F., Ringle, C. M., and Sarstedt, M., "Pls-Sem: Indeed a Silver Bullet," Journal of Marketing theory & Practice, Vol.19, No.2, 2011, pp. 139-152.   DOI
3 Harrison A.W., and Rainer R.K., "The influence of individual differences on skill in end-user computing," Journal of Management Information Systems, 1992.
4 Hoa, N. T., Hien, L. M., and Lien, V. T. P., "Studying the Factors Affecting Online Payment Decision: A Case of Vietnamese Customers," Journal of Management Information & Decision Sciences, Vol.22, No.1, 2019, pp. 43-54.
5 Ifinedo, P, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory," Computers & Security., Vol. 31, No. 1, 2012, pp. 83-95.   DOI
6 Leach, J., "Improving User Security Behavior," Computers & Security, Vol. 22, No. 8, 2003, pp. 685-692.   DOI
7 Lee, Y., "Understanding Anti-Plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective," Decision Support Systems, Vol.50, No. 2, 2011, pp. 361-369.   DOI
8 Lee, D., Larose, R. and Rifon, N., "Keeping our network safe: a model of online protection behavior," Behaviour & Information Technology. Vol. 27 No.5, 2008, pp. 445-454.   DOI
9 Milne, G. R., Rohm, A. J., and Bahl, S., "Consumers' protection of online privacy and identity," Journal of Consumer Affairs, Vol. 38, No. 2, 2004, pp.217-232.   DOI
10 Liang Huigang, and Yajiong Xue., "Understanding security behaviors in personal computer usage: A threat avoidance perspective," Journal of the Association for Information Systems, Vol. 11, No. 7, 2010, pp. 394-413.   DOI
11 Moscardelli, D. M., and Divine, R., "Adolescents' concern for privacy when using the internet: An empirical analysis of predictors and relationships with privacy-protecting behaviors," Family and Consumer Sciences Research Journal, Vol. 35, 2007, pp. 232-252.   DOI
12 Rogers, R. W., "A protection motivation theory of fear appeals and attitude change". Journal of Psychology. Vol. 91, No.1, 1975, pp. 93-114.   DOI
13 김민성, 김성태, "개인정보 노출이 잊혀질 권리 수용 의도에 미치는 영향에 관한 연구, 한국언론학보, 제58권, 제2호, 2014, pp. 307-336.
14 김상훈, 박선영, "정보보호 정책 준수 의도에 대한 영향요인," 한국전자거래학회지, 제16권, 제4호, 2011, pp. 33-51.   DOI
15 Pavlou, P., "Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation," Proceedings of Seventh Americas Conference on Information Systems, 2001, pp. 816- 822.
16 Prentice-Dunn, S, Mcmath, B, and Cramer, R., "Protection motivation theory and stages of change in sun protective behavior." Journal of Health Psychology, 2009, Vol. 14.
17 Rahimnia, F., and Hassanzadeh, J. F., "The Impact of Website Content Dimension and E-Trust on E-Marketing Effectiveness: The Case of Iranian Commercial Saffron Corporations," Information & management, Vol.50, No. 5, 2013, pp. 240-247.   DOI
18 김종기, 김지윤, "정보보호 의사결정에서 정보보호 침해사고 발생가능성의 심리적 거리감과 상대적 낙관성의 역할," Information Systems Review 제20권, 제3호, 2018, pp. 51-71.   DOI
19 김용태, 이상준, "부분최소제곱모형을 위한 R 프로그램의 활용: Smartpls 와 R 의 비교," Journal of Digital Convergence, 제 13권, 제12호, 2015, pp. 117-124.   DOI
20 김정은, 김성준, 권두순, "소셜 네트워크 서비스(Sns) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로," 정보시스템연구, 제25권, 제3호, 2016, pp. 1-30.
21 권은경, 이한솔, 채상미, 유경원, "정보보안 교육이 침해사고에 미치는 영향에 대한 실증분석,' 한국경영정보학회 춘계학술대회," 2016, pp.342-348.
22 Woon, G.W., and Tan, R.T., Low. "A protection motivation theory approach to home wireless security," Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, Nevada, USA, 2005.
23 Rogers, R. W., "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation," Social Psychophysiology, pp. 153-176.
24 Sheehan, K.B., and Hoy, M.G., "Dimensions of privacy concern among online consumers," Journal of Public Policy & Marketing, Vol. 19, No. 1, 2000, 1983, pp.62-73.   DOI
25 Srite, M., and Karahanna, E., "The Role of Espoused National Cultural Values in Technology Acceptance," MIS quarterly, Vol.30, No.3, 2006, pp. 679-704.   DOI
26 Workman, Michael, William H. Bommer, and Detmar Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in human behavior, Vol. 24, No. 6, 2008, pp. 2799-2816.   DOI
27 박찬욱, and 이상우. "인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로." 인터넷정보학회논문지, Vol.15, No. 2, 2014, pp. 59-71.   DOI
28 김형지, 정세훈, "중장년층 인터넷 이용자의 온라인 개인정보 노출 및 보호 행동의 차이에 관한 연구,"사이버커뮤니케이션학보, 제32권, 제3호, 2015, pp. 49-79.
29 박민정, 채상미, "빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구," 지식경영연구, 제18권, 제3호, 2017, pp.63-80.   DOI
30 Park, J. H., Lee, S., "정보 프라이버시와 관련한 개인의 태도 및 행동 경로분석," 행정논총 제45권, 제1호, 2007, pp. 281-307.
31 박철, 전종근, 이태민. "모바일 쇼핑만족도에 영향을 미치는 고객특성에 관한 연구: 한국, 중국, 미국, 일본 4 개국 비교," 국제경영연구, 제26권, 제2호, 2015, pp.99-128.
32 박현선, 김상현, "SNS 이용자들의 프라이버시 보호행동에 관한 실증연구," 경영경제, 제46권, 제2호, 2013, pp. 69-91.
33 심재웅, 황하성, 이호규, "UCC 이용량과 연령에 따른 온라인 프라이버시 인식 차이 연구," 방송통신연구, 2009, pp. 192-221.
34 최대선, 안은영, "페이스북과 트위터에 노출된 개인정보 현황," 한국콘텐츠학회지, 제11권, 제4호, 2013, pp. 61-64.   DOI
35 황인호, 김대진, "조직의 정보보안 환경이 조직구성원의 보안준수의도에 미치는 영향," 정보시스템 연구, 제25권, 제2호, 2016, pp. 51-77.
36 Cassel, C., Hackl, P., and Westlund, A. H., "Robustness of Partial Least-Squares Method for Estimating Latent Variable Quality Structures," Journal of applied statistics Vol.26, No.4, 1999, pp. 435-446.   DOI
37 "2017년 정보보호 실태조사," 한국인터넷진흥원, 2018, pp.1-514.
38 Ajzen, I. "The theory of planned behavior." Organizational behavior and human decision processes, Vol.50, No.2, 1991, pp. 179-211.   DOI
39 Bae, B, Analyses of Moderating and Mediating Effects with Spss/Amos/Lisrel/Smartpls, Seoul: Chungram Publishing, 2015.
40 Workman, Michael, William H. Bommer, and Detmar Straub., "The amplification effects of procedural justice on a threat control model of information systems security behaviours," Behaviour & Information Technology, Vol. 28, No. 6, 2009, pp.563-575.   DOI
41 Chin, W., "Issues and Opinion on Structural Equation Modeling, in Mis Quarterly," MIS Quarterly & the Society for Information Management, 1998a, p. 1.
42 Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling," Modern methods for business research Vol.295, No.2, 1998b, pp. 295-336.
43 Churchill Jr, G. A., "A Paradigm for Developing Better Measures of Marketing Constructs," Journal of marketing research, Vol.16, No.1, 1979, pp. 64-73.   DOI
44 Compeau D.R., Higgins C.A., "Computer self-efficacy: development of a measure and initial test," MIS Quarterly, Vol.19, No.2, 1995, pp.189-211   DOI
45 Bandura, Albert, "Self-efficacy: toward a unifying theory of behavioral change." Psychological review, Vol. 84, No. 2 1997, pp. 191.   DOI
46 Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D., "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American society for information science and technology, Vol 58, No. 2, 2007, pp. 157-165.   DOI
47 Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness," MIS quarterly, Vol. 34, No. 3, 2010, pp. 523-548.   DOI
48 Zhang, Lixuan, and William C. McDowell., "Am I really at risk? Determinants of online users' intentions to use strong passwords," Journal of Internet Commerce, Vol. 8, No. 3-4, 2009, pp.180-197.   DOI
49 Youn, S., "Teenagers'perceptions of online privacy and coping behaviours: A risk-benefit appraisal approach," Journal of Broadcasting & Electronic Media, Vol. 49, No.1, 2005, pp.86-110.   DOI
50 Youn, S., "Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents," Journal of Consumer Affairs, Vol. 43, No. 3, 2009, pp. 389-418.   DOI
51 德媒 : 调查表明年轻人比老年人更容易遭受网络诈骗, Retrieved September 12, 2018, Available: http://world.huanqiu.com/exclusive/2016-10/9594551.html
52 中老年网民近三成每天上网超3小时75%用移动支付 Retrieved September 12, 2018, Available: https://baijiahao.baidu.com/s?id=1604572113518233676&wfr=s
53 Pew Research Center, "In Emerging Economies, Smartphone and Social Media Users Have Broader Social Networks,' 2019.08.22, Available: https://www.pewresearch.org/search/smartphone
54 박수형, "국민 88.5%, 스마트폰으로 인터넷 이용한다," ZDNet Korea, 2017.03.21, Available:https://www.zdnet.co.kr/view/?no=20170321135018
55 온기홍, "中 누리꾼 8억 2,900만 명... 인터넷 보급률 60%," 보안뉴스, 2019.03.15, Available: https://www.boannews.com/media/view.asp?idx=77883
56 정철환, "北 인터넷 보급률 0.1% '세계 꼴찌'," 조선비즈, 2019.09.09, Available: http://biz.chosun.com/site/data/html_dir/2019/09/09/2019090900022.html
57 Dinev, T., and Hart, P., "Internet privacy concerns and their antecedents' measurement validity and a regression model," Behavior and Information Technology, Vol. 23, No. 6, 2004, pp. 413-422.   DOI
58 Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., and Upadhyaya, S. J., "Internet and online information privacy: An exploratory study of preteens and early teens," IEEE Transactions on Professional Communication, Vol. 52, 2009, pp. 167-182.   DOI
59 Choi, C, B. and D. Kim., "Knowing is doing," Information Management & Computer Security, Vol. 16, No. 5, 2008, pp.484-501   DOI
60 Compeau D.R., and Higgins C.A., "Computer self-efficacy: development of a measure and initial test," MIS Quarterly, Vol. 19, No.2, 1995, pp.189-211.   DOI
61 Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement." Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50.   DOI
62 Gefen, D., and Straub, D., "A Practical Guide to Factorial Validity Using Pls-Graph: Tutorial and Annotated Example," Communications of the Association for Information systems, Vol.16, No.1, 2005, p. 5.
63 Gefen, D., Straub, D., and Boudreau, M.-C., "Structural Equation Modeling and Regression: Guidelines for Research Practice," Communications of the association for information systems, Vol.4, No.1, 2000, p. 7.
64 Gurung, Anil, Xin Luo, and Qinyu Liao.,"Consumer motivations in taking action against spyware: an empirical investigation.", Information Management & Computer Security Vol. 17, No. 3, 2009, pp. 276-289.   DOI
65 차현아, "모바일 결제 선진국 중국, 더디 가는 한국," IT 조선, 2019.09.23, Available: http://it.chosun.com/site/data/html_dir/2019/09/23/2019092301238.html