Browse > Article
http://dx.doi.org/10.7472/jksii.2017.18.1.105

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone  

Park, Jong-jin (Department of Information System, Hanyang University)
Choi, Min-kyong (Department of Information System, Hanyang University)
Ahn, Jong-chang (Department of Information System, Hanyang University)
Publication Information
Journal of Internet Computing and Services / v.18, no.1, 2017 , pp. 105-119 More about this Journal
Abstract
Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.
Keywords
Smartphones; Information security; Degree of personal risk accepting; Buying intention; Android; iOS;
Citations & Related Records
Times Cited By KSCI : 10  (Citation Analysis)
연도 인용수 순위
1 S.B. Kang and D.H. Yang, "User-centered response method trends of smartphone security threats", Journal of the Korea Institute of Information Security and Cryptology, vol. 24, no. 3, pp. 36-43, 2014. http://ocean.kisti.re.kr/IS_mvpopo001P.do?method=multMain&poid=kiisc&free
2 S.T. Nam, D.G. Kim, and C.Y. Jin, "A study on the continuous intention to use for Smartphone based on the innovation diffusion theory: Considered on the loyalty between users of iOS and Android platform", Journal of the Korea Institute Of Information and Communication Engineering, vol. 17, no. 5, pp. 1219- 1226, 2013. DOI : 10.6109/jkiice.2013.17.5.1219   DOI
3 Y.H. Chang, S.B. Pyo, et al., "A Study on Hacking Attack when Free WiFi Internet Access In Smartphone", Proceedings of the Korean Society of Computer Information Conference, vol. 9, 2011. http://www.ndsl.kr/ndsl/commons/util/ndslOriginalView.do
4 J.Y. Jang, J.D. Kim, and B.S. Kim, "The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW", Journal of Information Technology Services, vol. 13, no. 2, pp. 113-131, 2014. http://dx.doi.org/10.9716/KITS.2014.13.2.113   DOI
5 S.G. Kim, "A study of influencing on perceived usefulness, ease of use, and acceptance intention by user environments and smartphone charateristic attributes", Hongik Univ. Master thesis, 2009.
6 H.J. Park, "The Effect of Online Information Characteristics on the Intention to Use Restaurant Information: Focused on the Mediating Effect of Perceived ease of Use, Perceived Usefulness, Trust", Sejong Univ. Master thesis, 2011.
7 D.H. Shih, B.S. Lin, et al., "Security aspects of mobile phone virus: a critical survey", Industrial Management & Data Systems, vol. 108, no. 4, pp. 478-494, 2008. http://dx.doi.org/10.1108/02635570810868344   DOI
8 C. Fornell and D.F. Larcker, "Evaluating Structural Equations with Unobservable Variables and Measurement Error", Journal of Marketing Research, vol. 18, no. 1, pp. 39-50, 1981. http://www.jstor.org/stable/3151312   DOI
9 J.J. Park, "A Study on the influence of information security in consumer's preference of iOS and Android based smartphones", Hanyang Univ. Master thesis, 2015.
10 M.C. Shin, Basic Statistics for Business and Economics, Changmin publishing, Seoul, 2010.
11 D.H. Shin, "An analysis for Cyworld users through technology acceptance model and structured equation model approach", Trends/Studies report, Korean Association for Broadcasting & Telecommunication Studies, p.33-52, 2008. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E01104221
12 I. Ajzen, Attitude structure and behavior, In Pratkanins, A.R., S.J. Beckler & A.G. Greenwald(Eds.), Attitude structure and function(chap. 10, pp. 241-274), Hillsdale, NJ: Lawrence Erlbaum Association, 1989.
13 A.H. Eagly and S. Chaiken, "The psychology of attitudes", Fort Worth: Harcourt Brace Jovanovich College Publishers, 1993.
14 F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989. DOI: 10.2307/249008   DOI
15 J.S. Lee, H. Cho, G. Gay, B. Davidson, and A.R. Ingraffea, "Technology acceptance and social networking in distance learning", Educational Technology & Society, vol. 6, no. 2, pp. 50-61, 2003. http://www.ifets.info/journals/6_2/6.html
16 J.H. Yoo and C. Park, "A Comprehensive Review of Technology Acceptance Model Researches," Entrue Journal of Information Technology, vol. 9, no. 2, pp. 31-50, 2010. UCI: I410-ECN-0102-2012-560-001711426
17 H. Yu, S. Sura, and J.C. Ahn, "An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service", Journal of Internet Computing and Services, vol. 16, no. 3, pp. 79-93, 2015. http://dx.doi.org/10.7472/jksii.2015.16.3.79   DOI
18 I.K. Park and D.H. Shin, "Using the Uses and Gratifications Theory to Understand the Usage and the Gratifications of Smartphones", Journal of Communication Science, vol. 10, no. 4, pp. 192-225, 2010. http://www.dbpia.co.kr/Journal/PDFViewNew?id=NODE01572022&prevPathCode=
19 J. Cho and S.J. Kim, "Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory", Journal of Internet Computing and Services, vol. 16, no. 1, pp. 101-108, 2015. http://dx.doi.org/10.7472/jksii.2015.16.1.101   DOI
20 J.C. Ahn, S.W. Lee, et al., "A study on the influence of information security in selecting smart-phone", Journal of the Korea Institute of Information Security and Cryptology, vol. 24, no. 1, pp. 207-214, 2014. http://dx.doi.org/10.13089/JKIISC.2014.24.1.207   DOI
21 J.K. Kim and S.T. Nam, "Factors Influencing Smartphones Purchase Decision : With a Focus on the Comparison among Users of Smartphones, Non-Users, and related Company Workers", The Journal of Internet Electronic Commerce Research, vol. 11, no. 3, pp. 23-34, 2011. http://academic.naver.com/view.nhn?doc_id=74840744
22 L. Leung and R. Wei, "More than just talk on the move: uses and gratifications of the cellular phone", Journalism & Mass Communication Quarterly, vol. 77, no. 2, pp. 308-320, 2000. http://images4.wikia.nocookie.net/cb20060711180826/scratchpad/images/e/ed/More_than_just_talk.pdf   DOI
23 S.H. Kim, "Effects of Perceived Attributes on the Purchase Intention of Smart-Phone", The Journal of the Korea Contents Association, vol. 10, no. 9, pp. 318-326, 2010. DOI : 10.5392/JKCA.2010.10.9.318   DOI
24 J.K. Bae and H.M. Jeong, "Effect on influencing acceptance decision factor by functional attributes of smartphone", The e-Business Studies, vol. 9, no. 4, pp. 337-361, 2008. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E01769371   DOI
25 W.R. Jeon, J.Y. Kim, et al., "Analysis of Threats and Countermeasures on Mobile Smartphone", Journal of The Korea Society of Computer and Information, vol. 16, no. 2, pp. 153-163, 2011. DOI : 10.9708/jksci.2011.16.2.153   DOI
26 S.J. Oho, "Smartphone user's typology and its effect on their purchasing behavior : a case study of users", Hankuk University of Foreign Studies, Doctor thesis, 2011.
27 D.W. Kim and W.J. Seong, "A Study on Information Security Policy in the Era of Smart Society", Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 4, pp. 883-899, 2012. http://www.ndsl.kr/ndsl/commons/util/ndsl
28 Korea Internet and Security Agency (KISA), "2012 state survey for information security (home/business)", Policy report, Ministry of Science, ICT and Future Planning, 2012.
29 K.C. Laudon and J.P. Laudon, Management Information Systems, Pearson, 13th Edition. 2014.
30 K.D. Kwon, "The opening future by smartphone", Samsung Economic Research Institute, 714, 2010.
31 H.Y. Shin, "An Empirical Study on Information Security Behavior Intent of Smartphone Users", Yeungnam Univ. Doctor thesis, 2013.
32 K.J. Lee, "A Study on Enhanced Security Model of Smartphone based on Information Security Management System", Seoul National University of Science and Technology, Master thesis, 2012.
33 T.H. Kim, H.W. Jin, et al., "Analysis of Android Mobile Platform Security Model", Korea Internet and Security Agency (KISA), 2010.
34 S.P. Jobs, "WWDC 2010 Apple Keynote," 2010.
35 H.S. Lee and Y. Kim, "Critiques and Alternative Suggestions on the Theory of Reasoned Action and the Theory of Planned Behavior", Journal of Consumer Studies, vol. 11, no. 4, pp. 21-47, 2000. http://academic.naver.com/view.nhn?doc_id=10896 524
36 J.S. Oho, "Study on the leakage of personal information through the iOS jailbreak", Chungnam Univ. Master thesis, 2012.
37 H.R. Ryu, M. Hong, and T.K. Kwon, "Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks- from User Experience and HCI Perspectives", Journal of Internet Computing and Services, vol. 15, no. 3, pp. 79-90, 2014. http://dx.doi.org/10.7472/jksii.2014.15.3.79   DOI
38 J.K. Yang, G.U. Ha, and H.B. Kim, "An analysis of loss cases and counterfeiting methods of new phising of smartphone", Journal of the Korea Institute of Information Security and Cryptology, vol. 23, no. 4, pp. 73-81, 2013. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E02238723
39 I.W. Park and D.W. Park, "A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone", Journal of the Korea Institute Of Information and Communication Engineering, vol. 17, no. 11, pp. 2588-2594, 2013. DOI : 10.6109/jkiice.2013.17.11.2588   DOI
40 M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, Mass: Addison-Wesley, 1975.
41 J.G. Jeong and K.J. Jang, "A study on acceptance factor of smartphone centered on real users", The e-Business Studies, vol. 11, no. 4, pp. 361-379, 2010. http://www.dbpia.co.kr/Journal/ArticleDetail/NODE01765870   DOI
42 E.Y. Na, "Recent trends of attitude and attitude change studies: 1985-1994", Korean Psychological Journal of Society and Personality, vol. 15, pp. 3-33, 1994. http://academic.naver.com/view.nhn?doc_id=10462985