Browse > Article
http://dx.doi.org/10.7838/jsebs.2013.18.4.215

Factors Influencing the Introduction of Mobile Security Technology  

Choi, Woong-Gyu (Department of Management Information System Graduate School of Dongguk University)
Lee, Young-Jai (Department of Management Information System of Dongguk University)
Publication Information
The Journal of Society for e-Business Studies / v.18, no.4, 2013 , pp. 215-240 More about this Journal
Abstract
This research has reviewed the major composition concepts and the positive research results in the selected studies which were theoretically based on IDT (Innovation Diffusion Theory), IRM (Model of Innovation Resistance), TAM(Technology Acceptance Model), and IAPA(Information Asset Protection Activity) in order to improve the theoretical explanation of major characterized factors influencing on the introduction of MST (Mobile Security Technology). The characterized factors for the adaptation of MST and 17 hypotheses on the MST study models in order to test the effects on the intention to use are empirically verified by utilizing the analysis method of structure equation model. As a result of a study, First, the most influential characterized factors of IRM are shown as compatibility, complexity, relative advantage, information asset protection in order. Second, the characterized factors affecting intention to use are shown as relative advantage, compatibility, innovation resistance, performance expectancy. The results of this study are relevantly significant to establish the theoretical foundation of the study on the adaptation of MST and The verification of the characterized factors provide strategic implication for the introduction of MST and policy direction which alleviates informational gap between new MST and previous Security Technology to diffusion agency.
Keywords
Mobile Security; Information Asset Protection; Innovation Diffusion; Innovation Resistance; Technology Acceptance Model;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Adams, D. A., Nelson, R. R. and Todd, P. A., "Perceived Usefulness, Ease of Use, and Usage of Information Technology : a Replication," MIS Quarterly, Vol. 16, No. 2, pp. 227-247, 1992.   DOI   ScienceOn
2 Agarwal, R. and Karahanna, E., "Time Flies when youʼre having Fun : Cognitive Absorption and Beliefs about Information Technology Usage," MIS Quarterly, Vol. 24, No. 4, pp. 665-694, 2000.   DOI   ScienceOn
3 Agrifoglio, R., Black, S. and Metallo, C., "Twitter acceptance : The role of intrinsic motivation," Working Papers on Information Systems, Vol. 10, No. 9, 2010.
4 Ariss, S. S., "Computer Monitoring : Benefits and Pitfalls Facing Management," Information and Management, Vol. 39, No. 7, pp. 553-558, 2001.
5 Bae, B. R., "Understanding and utilizing of structural equation model," Daekyung Publishing Company, 2002.
6 Bagozzi, R. P. and Yi, Y., "On the evaluation of structural equation models," Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74-94, 1988.   DOI   ScienceOn
7 Baron, R. M. and Kenny, D. A., "The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations," Journal of Personality and Social Psychology, Vol. 51, No. 6, pp. 1173-1182, 1986.   DOI
8 Beatty, R. C., Shim, J. P., and Jones, M. C., "Factors Influencing Corporate Web Site Adoption : A Time-Based Assessment," Information and Management, Vol. 38 No. 6, pp. 337-354, 2001.   DOI   ScienceOn
9 Bentler, P. M. and Bonett, D. G., "Significance Tests and Goodness of Fit in the Analysis of Covariance Structures," Psychological Bulletin, Vol. 88, pp. 588-606, 1980.   DOI
10 Bentler, P. M., "On the Fit of Models Covariance and Methodology to the Bulletin," Psychological Bulletin, Vol. 112, pp. 400-404, 1992.   DOI   ScienceOn
11 Brancheau, J. C. and Wetherbe, J. C., "The adoption of spreadsheet software testing innovation diffusion theory in the context of end-user computing," Information System Research, Vol. 1, No. 2, pp. 115-143, 1990.   DOI
12 Browne, M. W. and Cudeck, R., Alternative Ways of Assessing Model Fit, In K. A. Bollenand J. S. Long (Eds.), Testing Structural Equation Models, Newbury Park, CA : Sage, pp. 133-162, 1993.
13 Choi, C. H., "A Study of the Relationship of Organizational Structure and Innovation : An Application of LISREL," KAPA, Vol. 28, No. 2, pp. 469-480, 1994.
14 Choi, E. H., "Smart Work Security Issues and Responses," KT AIT, 2011.
15 Cooper, R. B. and Zmud, R. W., "Information Technology Implementation Research : A Technological Diffusion Approach," Management Science, Vol. 36 No. 2, pp. 123-139, 1990.   DOI   ScienceOn
16 Damanpour, F. and Evan, W. M. "Organizational Innovation and Performance : The Problem of Organizational Lag," Administrative Science Quarterly, Vol. 29, No. 3, pp. 392-409. 1984.   DOI   ScienceOn
17 Damanpour, F., "Organizational Innovation : A Meta‐Analysis of Effects of Determinants and Moderators," Academy of Management Journal, Vol. 34, No. 3, pp. 555-590, 1991.   DOI   ScienceOn
18 Davis, F. D., "Perceived usefulness, perceived ease of use, and user acceptance of information technology," Management Information Systems Quarterly, Vol. 13, No. 3, pp. 319-340, 1989.   DOI   ScienceOn
19 Eder, L. B. and Igbaria, M., "Determinants of Internet Diffusion and Infusion," Omega, Vol. 21, No. 3, pp. 233-242, 2001.
20 Delone, W. H. and McLean, E. R., "Measuring e-Commerce Success : Applying the DeLone and McLean Information Systems Success Model," International Journal of Electronic Commerce, Vol. 9, No. 1, pp. 31-47, 2004.
21 ETRI, "Smartphone Threats and Security Technology," Electronics and Telecommunications Trends, Vol. 25, No. 3, pp. 72-80, 2010.
22 Fornell, C. and Larcker, D. F., "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.   DOI   ScienceOn
23 Ghosh, A. K. and Swaminatha, T. M., "Software security and privacy risks in mobile e-commerce," Communications of the ACM, Vol. 44, No. 2, pp. 51-57, 2001.
24 Hair, J. F., Jr., Black, W. C., Babin, B. J. and Anderson, R. E., "Multivariate data analysis(7th ed.), Upper Saddle River," NJ : Prentice-Hall, 2010.
25 Hayduck, L., "Structural Equation Modeling with LISREL : Essentials and Advances," Johns Hopkins University Press, Baltimore, 1987.
26 Hong, K. H., "A Study on the Effect of Information Security Controls and Processes on the Performance of Information Security," Dept. of Management Information Systems Graduate School, Kookmin University, 2003.
27 Hong, S. I., Choi, H. J., and Lee, J. K., "Social Motivational Factors Influencing the Intention to Use of Blog," Korea Contents Association, Vol. 10 No. 1, pp. 122-137, 2010.
28 Hsu, C. L. and Lin, J. C. C., "Acceptance of blog usage : The roles of technology acceptance, social influence and knowledge sharing motivation," Information and Management, Vol. 45, No. 1, pp. 65-74, 2008.   DOI   ScienceOn
29 Jaccard, J. and Wan, C. K., "LISREL Approaches to Interration Effects in Mulitple Regresstion," Thousand Oaks, Galif, 1996.
30 Hu, F. and Liu, Y., "An empirical examination on mobile services adoption in rural China," International Journal of Digital Content Technology and its Application, Vol. 5, No. 1, pp. 328-334, 2011.   DOI
31 Jarvenpaa, S. L. and Lang, L. R., "Managing the Paradoxes of Mobile Technology," Information Systems Management, Vol. 22, No. 4, pp. 7-23, 2005.
32 James, L. R., Mulaik, S. A. and Brett, J. M., "Casual Analysis : Assumptions, Models, and Data," Beverly Hills : Sage, 1982.
33 Jeong, G. H., Yoon, H. S. and Park, J. C., "An Empirical Study on Predicting User Acceptance of Blog," KIECA, Vol. 9, No. 4, pp. 505-521, 2009.
34 Ji, S. G., Lee, G. D., "The Relationship of Individual Disposition, Innovation Resistance and Innovation Performance," The Korean Academic Association of Business Administration, Vol. 52, No. 1, 2005.
35 Joreskong, K. G. and Sorbom, D., "LISREL 7; A Guide to the Program and Application," SPSS Publication, 1989.
36 Jung, Y., Perez-Mira, B. and Wiley- Patton, S., "Consumer adoption of mobile TV : Examining psychological flow and media content," Computers in Human Behavior, Vol. 25, No. 1, pp. 123-129, 2009.   DOI   ScienceOn
37 Kang, D. H., Kim, J. N. and Jo, H. S., "Trends of Mobile Threats and Security Service Technology," Journal of KIISE, Vol. 28, No. 6, pp. 51-56, 2010.   과학기술학회마을
38 Karahanna, E., Straub, D. and Chervany, N., "Information Technology Adoption Across Time : A Cross- Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs," MIS Quarterly, Vol. 23, No. 2, pp. 183-213, 1999.   DOI   ScienceOn
39 Kim, J. H. and Shin, Y. S., "The Roles of Mediated to Consumer' Resistance in the Internet Service Acceptance Processing," Korean Industrial Economic Association, pp. 85-98, 2002.
40 Kim, H. G., "The Impact of User Perception on Usage Intention : Focusing on the Moderating Role of Attitude of Acceptance and Resistance," Journal of Information Technology Applications and Management Vol. 16, No. 2, pp. 65-67, 2009.
41 Kim, K. K., Shin, H. K., Park, S. S. and Kim, B. S., "A Study on the Effects of the Information Asset Protection Performance on the Organization Performance : Management Activity and Control Activity," Information Management Research, Vol. 40, No. 3, pp. 61-77, 2009.   DOI   ScienceOn
42 Kim, K. Y. and Kang, D. H., "The SmartPhone Security Technology of open collaborative environment," Korea Institute of Information Security and Cryptology, Vol. 19, No. 5, pp. 10-104, 2009.
43 Kim, S. H. and Park, S. Y., "Influencing Factors for Compliance Intention of Information Security Policy," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 33-51, 2011.   과학기술학회마을   DOI   ScienceOn
44 Korea Internet and Security Agency, "Internet and security," 2010.
45 KPCB, "Internet Trends," http://www. slideshare.net/kleinerperkins/kpcb-internet- trends-2012, 2012.
46 Kwon, J. S., "The Relationships among the Organizational Justice, Resistance to Innovation and Defensive Behavior of Employee," Korean Academy of Organization and management, Vol. 25, No. 1, pp. 223-244, 2001.
47 Lai, V. S., "Critical Factors of ISDN Implementation : An Exploratory Study," Information and Management, Vol. 33, No. 2, pp. 97-97, 1997.
48 Lee, D. M., "Factors Influencing Adoption of Corporate Web Site Over Time : Innovation Diffusion Theory Perspective," Asia Pacific Journal of Information Systems, Vol. 13, No. 4, pp. 257-277, 2003.
49 Lee, B. K. et al., "A Research on Discovering New Vulnerabilities and Analyzing Methods in Domestic Mobile Environment," KISA, 2010.
50 Lee, B. K. et al., "A Research on Issues and Developmental Needs of the Future Internet in the Context of Security Technologies and Information Security," KISA, 2010.
51 LEE, H. S. and LIM, J. H., "SPSS 16.0 manual," Seoul : Bobmunsa, 2009.
52 Lee, J. T., "An Introduction to Information Security," Seoul : Life and Power press, 2007.
53 Lee, K. H., "Risk Management and Information Security : Case Study," KERIS, 2006.
54 Lee, S. G., Kang, M. C. and Kim, B. Y., "An Analytical Study of ICT Adoption based on Diffusion Innovation Theory," The Journal of Information Systems, Vol. 14, No. 2, pp. 257-276, 2005.
55 Lim, J. U., Oh, J, I., "A Study on the Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use : From the Perspective of the Innovation Diffusion Theory," Asia Pacific Journal of Information Systems Vol. 22, No. 3, pp. 100-124, 2012.
56 Lindqvist J. and Laura Takkinen, "Privacy Management for Secure Mobility," WPES'06, 2006.
57 Luarn, P. and Lin, H., "Toward an understanding of the behavioral intention to use mobile banking," Computers in Human Behavior, Vol. 21, No. 6, pp. 873-891, 2005.   DOI   ScienceOn
58 Moore, G. and Benbasat, I., "Development of an Instrument to Measure the Perceptions of Adopting and Information Technology," Information Systems Research, Vol. 2, No. 3, pp. 192-222, 1991.   DOI
59 Mayers, B. L., Kappelman, L. A. and Pry butok, V. R., "A Comprehensive Model for Assessing the Quality and Productivity of the Information System Function : Toward a Theory for Information Systems Assessment," Information Resource Management Journal, Vol. 10, No. 1, pp. 6-25, 1997.   DOI   ScienceOn
60 Mick, D. G. and Fournier, S., "Paradoxes of Technology : Consumer Cognizance, Emotions and Coping Strategies," Journal of Consumer Research, Vol. 25, pp. 123-143, 1998.   DOI   ScienceOn
61 Moulton, R. T. and Moulton, M. E., "Electronic Communications Risk Management : A Checklist for Business Managers," Computers and Security, Vol. 15, No. 5, pp. 377-386, 1996.   DOI   ScienceOn
62 NIST, "SP 800-64, Security Considerations in the Information System Development Life Cycle," 2005.
63 Nunnally, J. C., "Psychometric Theory," McGraw-Hill, New York, NY, 1994.
64 O'Callaghan, R., Kaufmann, P. J. and Konsynski, B. R., "Adoption Correlates and Share Effects of Electronic Data Interchange Systems in Marketing Channels," Journal of Marketing, Vol. 56, pp. 45-56, 1992.   DOI   ScienceOn
65 Osborne, K., "Cost-Effective IT Security," Datapro, pp. 1-8, 1996.
66 Park, J. G., "Integrative Adoption Model of New Media," Korean Society for Journalism and Communication Studies, Vol. 55, No. 5, pp. 448-497, 2011.
67 Park, J. G., "Twitter Adoption Model : Integrative Approach to Innovation Diffusion Theory, Technology Acceptance Model, and Model of Innovation Resistance," Internet and Information Security, Vol. 3, No. 1, pp. 35-63, 2012.
68 Ram, S., "A model of innovation resistance, Advances in Consumer Research," Vol. 14, No. 1, pp. 208-212, 1987.
69 Plouffe, C. R., Hulland, J. S. and Vandenbosch, M., "Research report : Richness versus parsimony in modeling technology adoption decisions : Understanding merchant adoption of a smart card-based payment system," Information Systems Research, Vol. 12, No. 2, 2001.
70 Post, G. and Karan, A., "Management Tradeoffs in Anti-virus Strategies," Information and Management, Vol. 37, No. 1, pp. 13-24, 2000.   DOI   ScienceOn
71 Ram, S. and Sheth, R., "Consumer Resistance To Innovation : The Marketing Problem and Its Solution," Journal of Consumer Marketing, Vol. 6, No. 2, pp. 5-14, 1989.
72 Robertson, J., Sorbello, T. and Unsworth, K., "Innovation implementation : The role of technology diffusion agencies," Journal of Technology Management and Innovation, Vol. 3, pp. 1-10, 2008.
73 Robertson, Thomas S. and Hubert Gatignon, "Competitive Effects on technology Diffusion," Journal of Marketing, Vol. 50, No. 3, pp. 1-12, 1986.   DOI   ScienceOn
74 Rogers, E. M. and Shoemaker, F., "Communication of Innovations : A Cross-Cultural Approach," NewYork : Free Press, 1971.
75 Rogers, E. M., "Diffusion of Innovations( Third Edition)," The Free Press, New York, 1983.
76 Rogers, E. M., "Diffusion of Innovations( Forth Edition)," The Free Press, New York, 1995.
77 Rogers, E. M., "Diffusion of Innovations( Fifth Edition)," The Free Press, New York, 2003.
78 Samuel, W. and Zeckhasuer, R., "Status Quo Bias in Decision Making," Journal of Risk and Uncertainty, Vol. 1, pp. 7-59, 1988.   DOI   ScienceOn
79 Schein, E. H., "Organizational Culture and Leadership," San Francisco : Jossey -Bass, 1985.
80 Scott, J., "The Measurement of Information Systems Effectiveness : Evaluating a Measuring Instrument," Proceedings of the 15th International Conference on Information Systems, Vancouver, pp. 111-128, 1994.
81 Seo, B. M., "The Impact of Perceived Security Control on the Acceptance of Internet Banking," The Journal of Society for e-Business Studies, Vol. 11, No. 1, pp. 25-52, 2006.   과학기술학회마을
82 Seo, M. S., Ahn, J. W., Lee E. K. and Oh. D. Y., "Purchasing Avoidance of Digital Convergence Products : Focusing on the Customer's Psychological Factors and the Innovation Resistance," Journal of Korean Contents, pp. 270-284, 2009.
83 Seo, S. W., "THE ECONOMICS OF INFORMATION SECURITY," Seoul National University Press, 2008.
84 Shang, S. and Seddon, P. B., "Assessing and Managing the Benefits of Enterprise Systems : The Business Manager's Perspective," Information Systems Journal, Vol. 12, No. 4, pp. 271-299, 2002.   DOI   ScienceOn
85 Smith, S., Stephen, G. and Malampy, W., "A financial Management Approach for Selecting Optimal, Cost- Effective Safeguards Upgrades for Computer and Information Security Risk Management," Computer and Security, Vol. 14, No. 1, pp. 28-29, 1995.
86 Solms, R., Eloff, J. J. P. and Solms, S. H., "Computer Security Management : A Framework for Effective Management Involvement," Security, Vol. 12, No. 4, pp. 217-222, 1990.
87 Straub, E., "Understanding Technology Adoption : Theory and Future Directions for Informal learning," Review of Educational Research, Vol. 79, No. 2, pp. 625-649, 2009.   DOI
88 Tomarken, A. J. and Waller N. G., "Po- tential problems with 'well fitting' models," Journal of Abnormal Psychology, Vol. 112, No. 4, pp. 578- 598. r Studies, Vol. 45, No. 1, pp. 19- 45, 2003.   DOI   ScienceOn
89 Venkatesh, V. and Davis, F. D., "A theoretical extension of the technology acceptance model : Four longitudinal field studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000.   DOI   ScienceOn
90 Tornatzky, L. G. and Klein, K. J., "Innovation characteristics and innovation adoption implementation : A meta-analysis of findings," IEEE Transactions on Engineering Management, Vol. 29, No. 1, pp. 28-45, 1982.
91 Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D., "User acceptance of information technology : Toward a unified view," Information Management, Vol. 27, No. 3, pp. 425- 478, 2003.
92 Verkasalo, H., C. Lopez-Nicolas, Molina- Castillo, F. J. and Bouwman, H., "Analysis of users and non-users of smart phone applications," MIS Quarterly, Vol. 27, No. 3, pp. 242-255, 2003.
93 Wenbo, S., Jang I. J. and Yoo, H. S., "A improved authentication protocol for the forward security," The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 17-27, 2007.   과학기술학회마을
94 Whetten, D. A., "What constitutes a theoretical contribution?," The Academy of Management Review, Vol. 14, No. 4, 1989.
95 Yoon, S. U., "A study on the innovation resistance on social network service : Focusing on facebook non-users on their 20's university students," KRCRA, Vol. 13, No. 3, pp. 331-360, 2013.
96 Zaltman, G. and Wallendorf, M., "Consumer Behavior : Basic Findings and Management Implications," New York, NY : John Wiley and Sons, 1983.