Browse > Article
http://dx.doi.org/10.15207/JKCS.2015.6.3.065

The Impact of Perceived IT Threat on Convergence Information System Performance  

Park, Hyeon-Ho (Gwanfju Information & Culture Industry Promotion Agency)
Nho, Hee-Ock (Gwanfju Information & Culture Industry Promotion Agency)
Kim, Yong-Ho (Dept. of Self-designed and Open Majors, Gwangju University)
Publication Information
Journal of the Korea Convergence Society / v.6, no.3, 2015 , pp. 65-71 More about this Journal
Abstract
Based on Technology Threat Avoidance Theory, this study explains the process that the users cope with IT Threat and accomplish IS outcome. To empirically test the proposed model, data were collected through a survey of respondents who have the experience of using IS, and analyzed by using structural equations modelling. The result shows IT Threat had negative effects on Problem-Focused Coping and IS Appropriation. Also Problem-Focused Coping had significant effects on IS Appropriation and IS Appropriation had positive relation on IS Performance. In conclusion the study proposed that IT users improve Convergence Information System Performance by Problem-Focused Coping when they perceive IT Threat.
Keywords
IT Convergence; Technology Threat Avoidance Theory; Coping Theory; IS appropriation; Information System Performance;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Kim Heewoong, Cheng Xi, Lee Sunyoung, Lee Dongwoo,", Entrue Journal of Information Technology, Vol. 5, No. 2, pp. 7-20, 2006.   DOI
2 Bagchi, K., & Udo, G., "An analysis of the growth of computer and Internet security breaches." Communications of the Association for Information Systems, Vol. 12, No. 1, Article 46, 2003.
3 Stafford, T. F., & Urbaczewski, A., "Spyware: The ghost in the machine.", The Communications of the Association for Information Systems, Vol. 14, No. 1, Article 15, 2004.
4 Liang, H. and Xue, Y., "Avoidance of information technology threats: a theoretical perspective," MIS Quarterly, Vol. 33 No. 1, pp. 71-90, 2009.
5 Lazarus, R. and Folkman, S., Stress, Coping, and Adaptation, New York: Springer-Verlag, 1984.
6 Beaudry, A. and Pinsonneault, A., "IT-induced adaptation and individual performance: a coping acts model," Twenty-Second International Conference on Information Systems, pp. 475-480, 2001.
7 Beaudry, A. and Pinsonneault, A., "Understanding User Responses To Information Technology: A Coping Model Of User Adaptationl," MIS Quarterly Vol. 29 No. 3, pp. 493-524, 2005,   DOI
8 Beaudry, A., & Pinsonneault, A., "The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use.", MIS quarterly, Vol. 34, No. 4, pp. 689-710, 2010.   DOI
9 Mehrabian, A., & Russell, J. A., "An approach to environmental psychology.", the MIT Press, 1974.
10 Elliot, A. J., "Approach and avoidance motivation and achievement goal," Educ. Psychol, Vol. 34, pp. 169-189, 1999,   DOI
11 Elliot, A. J., "The Hierarchical Model of Approach-Avoidance Motivation," Motivation and Emotion, Vol. 30, pp. 111-116, 2006.   DOI
12 Elliot, A. J. and Covington, M. V., "Approach and avoidance motivation," Educational Psychology Review, 13, pp. 73-92, 2001.   DOI
13 Poole, M. S. and DeSanctis, G., Understanding the use of group decision support systems: The theory of adaptive structuration. In J. Fulk & C. Steinfeld (Eds). Organizations and Communication Technology. Newbury Park, Ca: Sage, 1990.
14 Bong Gyou Lee, Ki Youn Kim, Sung Wan Koo, "Impact of Security, Charge and Quality on the Usage Satisfaction of Mobile Internet", The KIPS Transactions, Vol. 15, No. 15, pp. 721-732, 2008.
15 Chin, W.W., Gopal, A., and Salisbury, W.D., "Advancing the Theory of Adaptive Structuration: The Development of a Scale to Measure Faithfulness of Appropriation," Information Systems Research, Vol. 8, No. 4, pp. 342-367, 1997.   DOI
16 Fornell, C. and Larcker, D. F., "Evaluating structural equations models with unobservable variables and measurement error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.   DOI
17 Gopal, A., Bostrom, R., and Chin, W., "Applying Adaptive Structuration Theory to Investigate the Process of Group Support Systems Use," Journal of Management Information Systems, Vol. 9, No. 3, pp. 45-69, 1993.
18 Han Bong-Ju, "A Study on the Effects of Organizational Culture and Leadership on Employee Behavior: A comparative analysis on different types of organizations", Korea Institute of Public Administration, Vol. 19, No. 1, 2010.
19 Etezadi-Amoli, J., & Farhoomand, A. F., "A structural model of end user computing satisfaction and user performance.", Information & management, Vol. 30, No. 2, pp. 65-73, 1996.   DOI
20 Keun-Ho Lee, "Analysis of Threats Factor in IT Convergence Security", Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 49-55, 2010.
21 Jun-Young Go, Keun-Ho Lee, "SNS disclosure of personal information in M2M environment threats and countermeasures", Journal of the Korea Convergence Society, Vol. 5, No. 1, pp. 29-34, 2014.   DOI
22 Kwang-Jae Lee, Keun-Ho Lee, "Authentication Scheme using Biometrics in Intelligent Vehicle Network", Journal of the Korea Convergence Society, Vol. 3, No. 1, pp. 7-11, 2012.