Browse > Article
http://dx.doi.org/10.7838/jsebs.2022.27.2.137

A Study on Acceptance Factors of Financial Mydata Service from Information Security Perspectives  

Lee, Seok Ho (Department of Information Security, WOORI FINANCIAL GROUP-WFIS)
Bae, Chang Hang (Department of Industrial Security, Chung-Ang University)
Publication Information
The Journal of Society for e-Business Studies / v.27, no.2, 2022 , pp. 137-152 More about this Journal
Abstract
Consumers' enhanced intention to adopt the Mydata service or their voluntary provision of personal information is a very essential element in the stable growth of the Mydata industry along with the creation of corporate values. The growing leakage of customer information according to the rising value of data can have negative impacts on the use of Mydata service and shrink quality custom service needs based on the personal information provided by financial consumers. This study set out to identify security risks that financial consumers could recognize and security factors that could supplement them and investigate the effects of these security factors on consumers' intention to adopt the Mydata service, thus providing useful implications for increasing the acceptance of financial consumers and finding a strategy to expand safe utilization. The findings raise a need to guarantee the stability and transparency of information provided by customers as information subjects, and they should be essential requirements for the Mydata service. The security factors applied to guarantee them should include convenience in terms of financial service.
Keywords
Mydata Service; Security Factors; Expanded Acceptance; Transparency;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Yeo, K. S., Kim, C. J., and Choi, J. h., "An empirical study on security quality evaluation model for portal information system," The Journal of Korean Institute of Information Technology, Vol. 12, No. 7, pp. 67-77, 2014.
2 Hsiao, C. H. and Yang, C., "The intellectual development of the technology acceptance model: A co-citation analysis," International Journal of Information Management, Vol. 31, No. 2, pp. 128-136, 2011.   DOI
3 Kim, J. G., Noh, S. C., and Lee, D. H., "A study of web application security quality architecture management process referenced ISO/IEC9000 Model," Journal of Information and Security, Vol. 12, No. 3, pp. 11-17, 2012.
4 Financial Services Commission, Compr ehensive plan for data utilization and information protection in the financial sector, pp. 3-25, Korea's FSC, 2018.
5 Brinkley, D. L., and Schell, R. R., Concepts and Terminology for Computer Security, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, Calif, 1995.
6 Buellingen, F. and Woerter, M., "Development perspectives, firm strategies and applications in mobile commerce," Journal of Business Research, Vol. 57, No. 12, pp. 1402-1408, 2004.   DOI
7 Chen, L. and Lee, D. M., "An empirical study on the factors influecing the acceptance of mobile easy payment service," Journal of Korea Contents Association, Vol. 17, No. 8, pp. 1-13, 2017.   DOI
8 Chenoweth, T., Minch, R., and Tabor, S., "Expanding views of technology acceptance: Seeking factors explaining security control adoption," AMCIS 2007, Vol. 7, p. 321, 2007.
9 Davis, F. D., "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-339, 1989.   DOI
10 Davis, F. D., Bagozzi, R. P., and Warahaw, P. R., "User acceptance of computer technology: A comparison of two theoretical models," Management Science, Vol. 35, No. 8, pp. 982-1003, 1989.   DOI
11 Jung, H. J., "A proposal of software quality measurement model and testcase on the basis of ISO/IEC 25010," The Journal of Korean Institute of Information Technology, Vol. 9, No. 10, pp. 197-205, 2011.
12 Kim, D. H., Kim, D. Y., and Oh, J. S., "An empirical study on the factors influencing acceptance of convergence services: Focusing on telematics service," The Journal of Society for e-Business Studies, Vol 18, No 4, pp. 241-255, 2013.   DOI
13 Kim, D. U. and Oh, J. S., "A structure on mobile service quality," Journal of Korea Service Management Society, Vol. 7. No. 3, pp. 51-82, 2006.
14 Rogers, R. W., "A protection motivation theory of fear appeals and attitude change," The journal of psychology, Vol. 91, No. 1, pp. 93-114, 1975.   DOI
15 Lee, H. J., Roh, E. H., and Han, K. S., "A study on factors affecting the investment intention of information security," Journal of Digital Contents Society, Vol. 19, No 8, pp. 1515-1525, 2018.   DOI
16 No, K. S., The proper methods of statistical analysis for dissertation, pp. 334-350, Hanbit Academy, inc., Seoul, 2019.
17 Pavlou, P., "Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation," AMCIS 2001 Proceedings, No. 159, pp. 816-822 2001.
18 Venkatesh, V. and Davis, F. D., "A theoretical extension of the technology acceptance model: Four longitudinal field studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000.   DOI
19 Seo, K. K., "Factor Analysis of the Cloud Service Adoption Intension of Korean Firms: Applying the TAM and VAM," The Society of Digital Policy & Management, Vol. 11, No. 12, pp. 155-160, 2013.
20 Sharma, S., "Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling," Information Systems Frontiers, Vol. 21, No. 4, pp. 815-827, 2019.   DOI
21 Rogers, R. W., Cognitive and psycho logical processes in fear appeals and attitude change: A revised theory of protection motivation, pp. 153-176, Guliford Press, NY, 1983.
22 Bandura, A., "Self-efficacy: Toward a unifying theory of behavioral change," Psycho logical Review, Vol. 84, No. 2, pp. 191-215, 1977.   DOI
23 Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User acceptance of information technology: Toward a unified view," MIS quarterly, Vol. 27, No. 3, pp. 425-478, 2003.   DOI