Browse > Article
http://dx.doi.org/10.7469/JKSQM.2011.39.3.432

Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives  

Jee, Bum-Suk (School of Management, Kyung Hee University)
Fan, Liu (School of Management, Kyung Hee University)
Lee, Sang-Chul (Dept. of Business Administration, Korea Christian University)
Suh, Yung-Ho (School of Management, Kyung Hee University)
Publication Information
Abstract
The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.
Keywords
Protection Motivation Theory; Personal Information Security; Health Psychology Theory; Threat; Behavior Theory;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Rosenstock I., V., Strecher, and M., Becker (1994), "The Health Belief Model and HIV risk behavior change", In R.J. DiClemente & J.L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press.
2 Stanton, J.M., P.R., Mastrangelo, K.R., Stam and J., Jolton (2004), "Behavioral information security: two end user survey studies of motivation and security practices," Proceedings of the Tenth America' Conference on Information Systems, New York, 2004.
3 Steers, R.M., R.T., Mowday and D.L., Shapiro (2004), "The future of work motivation theory," Academy of Management Review, Vol.29(3), pp. 379-387.
4 Venkatesh, V. (2000), "Determinants of perceived ease of use : Integrating control, intrinsic motivation, and emotion into the technology acceptance model", Information System Research, Vol.11 No. 4, pp.342-365.   DOI   ScienceOn
5 Weinstein, N.D. (2000), "Perceived probability, perceived severity, and health-protective behavior," Health Psychology, Vol. 19 No. 1, pp. 65-74.
6 Woon, I., G.W., Tan, and R., Low (2005), "A protection motivation theory approach to home wireless security," International Conference on Information Systems, pp. 367-390.
7 Workman, M., W.H., Bommer and D., Straub (2008), "Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in Human Behavior, Vol. 24 No. 6, pp. 2799-2816.   DOI   ScienceOn
8 Lee, Y. (2011), "Understanding anti-plagiarism software adoption : An extended protection motivation theory perspective," Decision Support Systems, Vol.50, pp.361-369.   DOI   ScienceOn
9 Liang, H. and Y. Xue (2009), "Avoidance of information technology threats: A theoretical perspective," MIS Quarterly, Vol.33 No. 1, pp.71-90.
10 Liang, H. and Y. Xue (2010), "Understanding Security Behaviors in Personal Computer Usage: A threat Avoidance Perspective," Journal of the Associaton for Information Systems, Vol. 7 No. 2, pp. 393-413.
11 Maddus, J.E. and R.W., Rogers (1983), "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change," Journal of Experimental Social Psychology, Vol. 19, pp. 469-479.   DOI
12 Ng, B.Y., A., Kankanhalli and Y.C., Xu (2009), "Studing users' omputer security behavior; A health belief perspective," Decision Support System, Vol. 46 No. 4, pp. 815-825.   DOI   ScienceOn
13 Oliver, R.L. and P.K., Berger (1979), "A path analysis of preventive health care decision models," Journal of Consumer Research, Vol.6 No. 2, pp. 113-122.   DOI   ScienceOn
14 Rhodes, K. (2001), "Operations security awareness: the mind has no firewall," Computer Security Journal, Vol. 16 No. 2, pp. 27-36.
15 Rippetoe, P.A. and R.W., Rogers (1987), "Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat," Journal of Personality and Social Psychology, Vol. 52 No. 3, pp. 596-604.
16 Rogers, R.W. (1975), "A protection motivation theory of fear appeals and attitude change," Journal of Psychology, Vol. 91, pp. 93-114.   DOI   ScienceOn
17 Rogers, R.W. (1983), "Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation," in Social Psychophysiology: A Source Book, R. Petty (ed.), New York : Guilford Press, pp. 153-176.
18 Rosenstock, I.M. (1974), "The health belief model and preventive health behavior," Health education Monographs, Vol. 2, pp. 354-386.
19 Chung, W., H. Chen, W. Chang and S. Chou (2006), "Fighting cybercrime: a review and the taiwan experience," decision support systems, Vol. 41, pp. 669-682.   DOI   ScienceOn
20 Chin, W.W., B.L. Marcolin and P.R. Newsted (2003), "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study," Information Systems Research, Vol. 14 No. 2, pp. 189-217.   DOI   ScienceOn
21 Claar, C.L. (2011), "The adoption of computer security: An analysis of home personal computer user behavior using the health belief model," All graduate theses and dissertations, utah state university, Logan, Utah.
22 Compeau, D.R., C.A. Higgins, and S. Huff (1999), "Social cognitive theory and individual reactions to computing technology: a longitudinal study," MIS Quarterly, Vol. 23 No. 2, pp. 145-158.   DOI   ScienceOn
23 Davis, F.D. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, Vol. 13 No. 3, pp. 319-338.   DOI   ScienceOn
24 Dinev, T. and Q. Hu (2007), "The centrality of awareness in the formation of user behavioral intention toward protective information technologies," Journal of the Association for Information Systems, Vol. 8 No. 7, pp. 386-408.
25 Elliot, A.J. (2006), "The hierarchical model of approach-avoidance motivation," Motivation and Emotion Vol. 30, pp. 111-116.   DOI   ScienceOn
26 Elliot, A.J. and M.V., Covington (2001). "APPROACH AND AVOIDANCE MOTIVATION," Educational Psychology Review, Vol. 13(2), pp. 73-92.   DOI   ScienceOn
27 Fishbein, M. and I., Ajzen (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
28 Jayanti, R.K. and A.C., Burns (1998), "The antecedents of preventive health care behavior: an empirical study," Academy of Marketing Science Journal, Vol. 26 No. 1, pp.6-15.   DOI   ScienceOn
29 Kankanhalli, A., H.H., Teo, B.C.Y. Tan and K.K., Wei (2003), "An integrative study of information systems security effectiveness," International Journal of Information Management, Vol.23, pp. 139-154.   DOI   ScienceOn
30 LaRose, R., N., Rifon, S., Liu and D., Lee (2005), "Online safety strategies: a content analysis and theoretical assessment," The 55th Annual Conference of the International Communication Association, New York City.
31 방송통신위원회, 행정안전부, 지식경제부(2011), 2011 국가정보 보호백서
32 한국인터넷진흥원(2010), 정보보호 관련 대국민 홍보 방안 연구
33 Ajzen, I. (1991), "The theory of Planned behavior," Organizational Behavior & Decision Processes, Vol. 50, pp. 179-211.   DOI
34 Anderson, C.L. and R. Agarwal (2006), "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions," in International Conference on Information Systems, pp. 1543-1561. Milwaukee, WI.
35 Bagchi, K. and G. Udo (2003), "An analysis of the growth of computer and internet security breaches," Communications of the AIS, Vol. 12, pp. 684-700.
36 Bagozzi, R.P. and Y. Yi (1998), "On the Evaluation of Structural Equation Models," Journal of the Academy of Marketing Science, Vol. 16 No. 2, pp. 74-94.
37 Bandura, A. (1977), "Self-efficacy: Toward a unifying theory of behavior change," Psychological Review, Vol. 84, pp. 191-215.
38 Carver, C.S. and T.L., White (1994), "Behavioral inhibition, behavioral activation, and affective responses to impending reward and punishment: the bis/bas scales," Journal of Personality and Social Psychology, Vol. 67, pp. 319-333.