Browse > Article
http://dx.doi.org/10.9716/KITS.2014.13.2.113

The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW  

Jang, Jaeyoung (연세대학교 정보대학원)
Kim, Jidong (연세대학교 정보대학원)
Kim, Beomsoo (연세대학교 정보대학원)
Publication Information
Journal of Information Technology Services / v.13, no.2, 2014 , pp. 113-131 More about this Journal
Abstract
Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.
Keywords
Protection Motivation Theory; Smartphone; Mobile Anti-Malware SW;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Lee, Y. and K. Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communications of the ACM, Vol.48, No.8(2005), pp.72-77.
2 Lee, Y. and K. R. Larsen, "Threat or coping appraisal : determinants of SMB executives' decision to adopt anti-malware software", European Journal of Information Systems, Vol.18, No.2(2009), pp.177-187.   DOI   ScienceOn
3 Loch, K. D., H. H. Carr, and M. E. Warkentin, "Threats to Information Systems : Today's Reality, Yesterday's Understanding", MIS Quarterly, Vol.16, No.2(1992), pp.173-186.   DOI   ScienceOn
4 Milne, S. E., S. Orbell, and P. Sheeran, "Combining motivational and volitional interventions to promote exercise participation : Protection motivation theory and implementation intentions", British Journal of Health Psychology, Vol.7(2002), pp.163-184.   DOI   ScienceOn
5 Axelrod, L. J. and J. W. Newton, "Preventing Nuclear War : Beliefs and attitude of Disarmist and Deterrentist Behavior", Journal of Applied Psychology, Vol.21, No.1(1991), pp.29-40.
6 Bandura, A., "Self efficacy : toward a unifying theory of behavioral change", Psychological Review, Vol.84(1977), pp.191-215.   DOI   ScienceOn
7 Barden-O'Fallon, J. L., J. deGraft-Johnson, T. Bisika, S. Sulzbach, A. Benson, and A. O. Tsui, "Factors Associated with HIV/AIDS Knowledge and Risk Perception in Rural Malaw", AIDS and Behavior, Vol.8, No.2(2009), pp.131-140.
8 Campbell, K., L. A. Gordon, M. P. Loeb, and L. Zhou, "The Economic Cost of Publicly Announced Information Security Breaches : Empirical Evidence from the Stock Market", Journal of Computer Security, No.11(2003), pp.431-448.
9 Walker, E. A., A. Caba, C. B. Schechter, C. E. Basch, E. Blanco, T. DeWitt, M. R. Kalten, M. S. Mera, and G. Mojica, "Measuring Comparative Risk Perceptions in an Urban Minority Population : The Risk Perception Survey for Diabetes", The Diabetes Educator, Vol.33(2007), pp.103-110.   DOI
10 Chau, P. Y. K. and P. J. H. Hu, "Investigating healthcare professionals' decisions to accept telemedicine technology : an empirical test of competing theories", Information and Management, Vol.39(2002), pp.297-311.   DOI   ScienceOn
11 Croog, S. H. and N. P. Richards, "Health Beliefs and Smoking Patterns in Heart Patients and Their Wives : A Longitudinal Study", American Journal of Public Health, Vol.67, No.10(1977), pp.921-930.   DOI   ScienceOn
12 Crossler, R. E., "Protection Motivation Theroy : Understanding Determinants to Backing Up Personal Data", Proceedings of the 43rd hawaii International conference on System Sciences, (2010), pp.1-10.
13 Doria, M. F., N. Pidgeon, and P. Hunter, "Perceptions of Drinking Water Quality and Risk and Its Effects on Behaviour : A Crossnational Study", Science of the Total Environment, Vol.407(2009), pp.5455-5464.   DOI   ScienceOn
14 Floyed D. L., S. Prentice-Dunn, and R. W. Rogers, "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, Vol.30(2000), pp. 407-429.   DOI   ScienceOn
15 Johnston, A. C. and M. Warkentin, "Fear appeals and information security behaviors : An empirical study", MIS Quarterly, Vol. 34, No.3(2010), pp.549-566.   DOI
16 노성호, 김지선, "범죄의 두려움에 대한 경험적 연구", 피해자학연구, 제6권(1998), pp. 169-205.
17 박철현, "범죄피해경험, 이웃통합 그리고 범죄의 두려움 : 대학생에 대한 심층면접결과를 중심으로", 피해자학연구, 제13권, 제1호(2005), pp.51-77.
18 양호일, 환경디자인 행태학, 유림문화사, (1990), p.39.
19 우형진, "텔레비전 뉴스 시청이 시청자의 건강증진의지에 미치는 영향에 관한 연구", 한국언론학보, 제51권, 제2호(2007), pp.308-320.
20 Weinstein, N. D., "Testing four competing theories of health-protective behavior", Health Psychology, Vol.12(1993), pp.324-333.   DOI   ScienceOn
21 Woon, M. Y., G. W. Tan, and R. T. Low, "A protection motivation theory approach to home wireless security", Proceedings of the Twenty-Sixth International Conference on Information Systems, 2005.
22 Zajonc, R. B., "Attitudinal effects of mere exposure", Journal of Personality and Social Psychology, Vol.9(1968), pp.1-27.
23 Zhang, L. and W. C. McDowell, "Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords", Journal of Internet Commerce, Vol.8, No.3/4(2009), pp.180-197.   DOI   ScienceOn
24 Mohamed, N. and I. H. Ahmad, "Information privacy concerns, antecedents and privacy measure use in social networking sites : Evidence from Malaysia", Computer in Human Behavior, Vol.28. No.6(2012), pp.2366-2375.   DOI   ScienceOn
25 Obermiller, C., "The Baby Is Sick/The Baby Is Well : A Test of the Environmental Communication Appeals", Journal of Advertising, Vol.24, No.2(1995), pp.55-71.
26 Prentice-Dunn, S. and R. W. Rogers, "Protection motivation theory and preventive health : Beyond the health belief model, Health Education Research", Theory and Practice, Vol.1(1986), pp.153-161.
27 Richardson, R., 2011 CSI Computer Crime and Security Survey, Computer Security Institute, 2012.
28 Rippetoe, P. A. and R. W. Rogers, "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping With a Health Threat", Journal of Personality and Social Psychology, Vol.52(1987), pp.596-604.   DOI
29 이민규, 김영은, "질병 관련 인터넷 정보 이용 효과 연구", 언론과학연구, 제9권(2009), pp. 506-539.
30 이정모 외, 인지심리학, 학지사, (1999), pp. 24-32.
31 김익수, 정진혁, 이형찬, 이정현, "모바일 악성 코드 분석방법과 대응방안", 한국통신학회논문지, 제35권, 제4호(2010), pp.599-609.
32 김준홍, "범죄피해 위협과 보호행동을 예측하는 요인들의 성차", 한국공안행정학회보, 제40호(2010), pp.72-113.
33 김지훈, 조시행, "사이버 환경에서의 보안위협", 한국정보보호학회논문지, 제20권, 제4호(2010), pp.11-20.   과학기술학회마을
34 정만경, 서희석, "과거 및 현재의 모바일 악성 코드 증상에 따른 향후 전망 모바일 악성코드 연구", 2011년 한국컴퓨터교육학회 하계 학술발표논문지, 제15 권, 제2호(2011), pp.179-184.
35 정훈영, 서희석, "스마트폰 통신환경 변화에 따른 모바일 악성코드 감염경로 연구", 한국컴퓨터교육학회 하계 학술발표논문지, 제15권, 제2호(2011), pp.173-176.
36 장상근, "모바일 악성코드의 전략과 사례 분석을 통한 모바일 악성코드 진단법", 정보보호학회지, 제23권, 제2호(2013), pp.14-20.
37 한국인터넷진흥원, 모바일 접속환경을 위한 웹사이트 침해예방 연구, 2010.
38 한국인터넷진흥원, 2012년도 정보보호실태 조사, 2012.
39 Ahnlab, "악성코드 분석 특집, 2012 Vol.26", ASEC REPORT, 2012.
40 김예진, 이규백, "시지각적 특성에 따른 경계의 모호성에 관한 연구", 기초조형학연구, 제13권, 제5호(2012), pp.57-67.
41 김여라, "신종플루 뉴스 이용 정도가 개인 및 공중에 대한 건강보호 행위의도에 미치는 영향에 관한 연구 : 보호동기이론을 중심으로", 한국언론정보학회, 통권51호(2010), pp.5-25   과학기술학회마을
42 Ajzen, I. and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, 1980.
43 Rogers, R., "Protection motivation theory of fear appeal and attitude change", Journal of Psychology, Vol.91, No.1(1975), pp.93-114.   DOI   ScienceOn
44 Rogers, R. W., "Cognitive and Physiological Processes in Fear Appeals and Attitude Change : A Revised Theory of Protected Motivation", Social Psychophysiology : A Sourcebook, The Guilford Press, 1983.
45 Schafer, R. B., E. Schaefer, G. Bultena, E. Hoiberg, "Coping with a health threat : a study of food safety", Journal of Applied Social Psychology, Vol.23(1993), pp.386-394.   DOI   ScienceOn
46 Symantec, Internet Security Threat Report, Vol.18(2013).
47 Symantec, Norton Report, 2013.
48 Tanner, J. F., J. B. Hunt, and D. R. Eppright, "The protection motivation model : A normative model of fear appeal", Journal of Marketing, Vol.55(1991), pp.36-45.   DOI   ScienceOn
49 Vance, A., M. Siponen, and S. Pahnila, "Motivation IS security compliance : Insights from Habit and Protection Motivation Theory", Information and Management, Vol.49 (2012), pp.190-198.   DOI   ScienceOn
50 Krebs, B., "Hacking Home PCs Fueling Rapid Growth in Online Fraud", Washington Post, Technology Section, Special Reports, Cyber-Security, 2005.
51 LaRose, R. and N. Rifon, "You Privacy Is Assured of Being Invaded", New Media and Society, Vol.8, No.4(2006), pp.1009-1030.   DOI
52 Lee, Y., "Understanding anti-plagiarism software adoption : An extended protection motivation theory perspective", Decision Support Systems, Vol.50(2011), pp.361-369.   DOI   ScienceOn
53 Anderson, C. L. and R. Agarwal, "Practicing Safe Computing : A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol.34, No.3(2010), pp.613-643.   DOI
54 Boer, H. and E. R. Seydel, "Protection motivation theory. In Predicting health behavior : Research and practice with social cognition models (ed)", Open University Press, (1996), pp.95-120.
55 Lee, D., R. Larose, and N. Rifon, "Keeping our network safe : a model of online protection behaviour", Behaviour and Information Technology, Vol.27, No.5(2008), pp.445-454.   DOI   ScienceOn
56 Hair, J. F., B. Black, B. Babin, R. E. Anderson, and R. L. Tatham, Maltivariate data analysis(6th ed.), Pearson Prentice Hall, 2006.