Browse > Article
http://dx.doi.org/10.9723/jksiis.2019.24.4.079

A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior  

Park, KyungA (Chonnam National University)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.24, no.4, 2019 , pp. 79-98 More about this Journal
Abstract
In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.
Keywords
Reasonal action theory; Planned behavior theory; Protection motivation theory; Self-efficacy;
Citations & Related Records
Times Cited By KSCI : 10  (Citation Analysis)
연도 인용수 순위
1 Tsai, H. Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J. and Cotten, S. R., "Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective," Computers and Security, Vol. 59, pp. 138-150, 2016.   DOI
2 Venkatesh, V. and Davis, F. D., "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000.   DOI
3 Venkatesh, V., Moris, M., Davis, G. B. and Davis, F. D., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003.   DOI
4 Bandura, A., "Self-efficacy; Toward a Unifying Theory of Behavioral Change," Psychological Review, Vol. 84, pp. 191-215, 1977.   DOI
5 Vealey, R. S., "Conceptualization of Sport-Confidence and Competitive Orientation; Preliminary Investigation and Instrument Development," Journal of Sport Psychology, Vol. 8, pp. 221-246, 1986.   DOI
6 Schunk, D. H., "Social Cognitive Theory and Self-Regulated Learning," In Zimmerman, B. J. and Schunk, D. H. (Eds.), Self-Regulated Learning and Academic Achievement, Springer, New York, 1989.
7 Shi, H. Y., "Empirical Study on Information Security Behavior Intent of Smartphone Users," Doctoral Dissertation, Yeungnam University, 2013.
8 Dilshodjon Gafurov., Shin, H. Y. and Kim, K. S., "Smartphone Users's Behavior on Information Security In Information Service Usages: Application of Protection Motivation Theory," Journal of Marketing Studies, Vol. 2 No. 3, pp. 53-76, 2014.
9 Bandura, A., "Social Foundations of Thought and Action: A Social Cognitive Theory," Englewood Cliffs, NJ: Prentice-Hall, 1986.
10 Bulgurcu, B., Cavusoglu, H. and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, pp. 523-548, 2010.   DOI
11 Agarwal, R. and Prasad, J., "A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology," Information Systems Research, Vol. 9, No. 2, pp. 204-215, 1998.   DOI
12 Lee, K. H., Han, K. S. and Jung, J. S., "A Study of Influencing Factors for Compliance Intention of Personal Information Protection Policy of Public Institution Employees," Entrue Journal of Information Technology, Vol. 15, No. 1, pp. 75-94, 2016.
13 Shin, H. S., "The Effect of User Characteristics of Mobile Media on Recognition and Acceptance," Doctoral Dissertation, Sogang University, 2011.
14 Rogers, E. M., Diffusion of Innovation, 5th ed. NY, The Free Press, 2003.
15 Catherine, L. A. and Ritu, A., "Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly, Vol. 34, No. 3, pp. 613-644, 2010.   DOI
16 Woo, H. J., "Exploring the Relationship Between the Perceived Risk to Cyber Security and the Behavioral Intention to Technology Acceptance and Sustainable Use for Promoting Personal Information Security," Journal of Communication, Science, Vol. 14 No. 2, pp. 220-257, 2013.
17 Yim, M. S., "The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees," Journal of Digital Convergence, Vol. 11 No. 1, pp. 27-38, 2013.   DOI
18 Kim, J. K. and Kim, S. H., "Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory," Informatization Policy, Vol. 20, No. 3, pp. 63-85, 2013.
19 Goldsmith, R. and Hofacker, C., "Measuring Consumer Innovativeness," Journal of the Academy of Marketing Science, Vol. 19, No. 3, pp. 209-221, 1991.   DOI
20 Rhee, H. S., Kim, C. T. and Young U. R., "Self-Efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior," Computers and Security, Vol. 28, No. 8, pp. 816-826, 2009.   DOI
21 Davis, F., "Perceived Usefulness, Perceived Ease of Use, and Use Acceptance of Information Technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-340, 1989.   DOI
22 Yang, J. G., Kang, K. S. and Yu, Y. M., "A Study on Vendor Managed Inventory to Apply Technology Acceptance Model," Journal of the Korea Industrial Information Systems Research, Vol. 21, No. 2, pp. 45-57, 2016.   DOI
23 Chin, W. W., Marcolin, B. L. and Newsted, P. R., "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, Vol. 14, No. 2, pp. 189-217, 2003.   DOI
24 Choi, Y. M. and Kwon, H. G., "Effects of Relationship Benefits on Trust, Flow and Customer Loyalty of Social Commerce: Focus of Self-Determination," Journal of the Korea Industrial Information Systems Research, Vol. 24, No. 3, pp. 39-50, 2019.   DOI
25 Kim, S. H. and Kim, J. K., "Impact of Privacy Concern and Institutional Trust on Privacy Decision Making: A Comparison of E-Commerce and Location-Based Service," Journal of the Korea Industrial Information Systems Research, Vol. 22, No. 1, pp. 69-87, 2017.   DOI
26 Jang, J. H., Mok,, H. J., Kim, Y. S., Choi, J. S. and Choi, C. J., "Analysis of the Recognition Level of Personal Information Protection of Public Institutions in the Local Governments," The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 11, No. 3, pp. 345-350, 2016.   DOI
27 Bulgurcu, B., Cavusoglu, H. and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, pp. 523-548, 2010.   DOI
28 Shin, I. S., "Effects and Causality of Measures for Personal Information: Empirical Studies on Firm and Individual Behaviors and Their Implications," Korea Institute of Information Security and Cryptology, Vol. 26, No. 2, pp. 523-531, 2016.   DOI
29 Trustwave, Global Security Report, 2012.
30 Park, C. O. and Lee, S. W., "A Study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory," Journal of Internet Computing and Services, Vol. 15, No. 2, pp. 59-71, 2014.   DOI
31 Kim, H. J. and Ahn, H. S., "A Study on the Effect on Flow and Smartphone Addiction by Smartphone User's Self-determination," The Journal of Korean Association of Computer Education, Vol. 18, No. 2, pp. 35-45, 2015.   DOI
32 Bae, J. K., "An Empirical Study on the Effect of Leakage Threat of Personal Information on Protective Behavior Intention in Big Data Analysis," Proceedings of KIIT Summer Conference, Vol. 17, No. 3, pp. 90-93, 2016.
33 Kim, Y. R., "Measuring Individuals' Privacy Concerns and Survey of Privacy Recognition," Journal of the Korea Industrial Information Systems Society, Vol. 15, No. 5, pp. 259-271, 2010.
34 Park, G. J., Statistics on the Number of Domestic Internet Users and Users Worldwide in 2015, https://ceolink.tistory.com/250 (Accessed on July 21th, 2016)
35 Kim, S. W. and Kim, T. H., "Relationship Between Family, School, Internet Use Environmental Factors and Middle School Students' Internet Dependence: Inspecting Mediation Effect of Depression," Journal of Family Relations, Vol. 15, No. 4, pp. 25-49, 2011.
36 Kwon, D. S., Kim, J. H., Yu, C. H. and Kim, S. J., "An Empirical Study Applying the Self-Determination Factors to Flow and Satisfaction of SmartPhone," The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 197-220, 2011.   DOI
37 National Information Society Agency, "2018 Smartphone and Dependence Survey," Ministry of Science and ICT, 2019.
38 Siponen, M. and Vance, A., "Neutralization: New Insights into the Problem of Employe Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, pp. 487-502, 2010.   DOI
39 Fishbein, M. and Ajzen, I., "Belief, Attitude, Intention, and Behavior. An Introduction to Theory and Research, Reading," MA: Addison-Wesley, 1975.
40 Lee, G. O. and Song, Y. M., "The Study on Visit Behavior of Customer an Application of the Theory of Reasoned Action," Korea Journal of Tourism and Hospitality Research, Vol. 27, No. 5, pp. 397-411, 2013.
41 Lee, I. S., "A Study on the Effect of Food Service Employees' Job Related Information Technology on Perceived Ease of Use, Usefulness, System Use Activity and Performance," Doctoral Dissertation, Kyunghee University, 2012.
42 Ajzen, I. and Fishbein, M., "Understanding Attitudes and Predicting Social Behavior," Englewood-Cliffs, NJ: Prentice Hall, 1980.
43 Bandura, A., "Self-Efficacy in Changing Societies," Cambridge University Press, 1995.
44 Safa, N., Sokhak, M., Von Solms, R., Furnel, S., Ghani, N. A. and Herawan, T., "Information Security Conscious Care Behavior Formation in Organizations," Computer and Security, Vol. 53, pp. 65-78, 2015.   DOI
45 Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology, Vol. 91, pp. 93-114, 1975.   DOI
46 Kim, Witte., "Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)," Communications Monographs, Vol. 61, No. 2, pp. 113-134, 1994.   DOI
47 Rogers, R., "Protection Motivation Theory of Fear Appeal and Attitude Change," Journal of Psychology, Vol. 91, No. 1, pp. 93-114, 1975.   DOI
48 Park, J. Y., Kim, J. D. and Kim, B. S., "Online Users' Password Security Behavior: the Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior," Journal of Information Technology Services, Vol. 16, No. 3, pp. 147-165, 2017.   DOI
49 Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, pp. 549-566, 2010.   DOI
50 Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D. and Polak, P., "What Do Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors," MIS Quarterly, Vol. 39, No. 4, pp. 837-864, 2015.   DOI
51 Mwagwabi, F., McGill, T. and Dixon, M., "Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines," The 47th Hawaii International Conference on System Sciences(HICSS), pp. 3188-3197, 2014.
52 Chen, Y. and Zahedi, F. M., "Individuals' Internet Security Perceptions and Behaviors: PolyContextual Contrasts Between the United States and China," MIS Quarterly, Vol. 40, No. 1, pp. 205-222, 2016.   DOI