• Title/Summary/Keyword: Information Security Intention

Search Result 312, Processing Time 0.019 seconds

Structural Relationships among Tourism Information, Payment Service, Satisfaction, and Intention to Reuse: Focused on the Ctrip APP in China (관광정보서비스, 결재서비스, 만족도, 재이용의도의 구조적 관계: 중국 시에청을 대상으로)

  • Lee, Yanling;Kim, Yeong-Gug
    • Asia-Pacific Journal of Business
    • /
    • v.9 no.2
    • /
    • pp.123-136
    • /
    • 2018
  • The purpose of this study is to investigate the effects of six factors (accuracy, perceived usefulness, perceived ease of use, security, instant accessibility, and ease of use) on re-use intention; and then to help to establish future marketing strategy. In order to achieve the study's objectives, this study conducted an online questionnaire on the Internet, Wenjuanxing. The total of 270 copies through APP-Wechat (Wicket), and 245 were used for analysis. For statistical processing, SPSS22.0 is used to analyze the influence relationship amongst factors for mobile tourism information service, a variety of analysis, such as factor analysis, reliability analysis, mass regression analysis, simple regression analysis were employed. The results of this study are summarized as follows. As a result of analyzing the factors affecting the satisfaction of consumers using chinese Ctrip mobile app, the perceived usefulness and perceived ease of use of mobile tourism information service attributes have a significant effect on user satisfaction. The accuracy of mobile information service were found to have no significant effect on satisfaction. The security, immediacy of access, and usability of the payment service of mobile APP were found to have a significant effect on satisfaction. And customer satisfaction has a significant effect on re-use intention.

  • PDF

A Study of Personal Characteristics Influencing Cloud Intention (클라우드 사용의도에 영향을 미치는 개인특성 연구)

  • Kim, Jin Bae;Cho, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.135-157
    • /
    • 2019
  • Information technology has economic, social and cultural impacts is closely linked to our lives. This information technology is becoming a key to the change of human civilization through connecting people and objects on the earth. In addition, future information technology is becoming more intelligent and personalized with the development of computing technology, and due to the rapid development of alcohol, environment without time and space constraint is realized, Is spreading. Since existing portable storage media are made of physical form, there is a limit to usage due to the risk of loss and limitation of capacity. Cloud services can overcome these limitations. Due to the problems of existing storage media, it is possible to overcome the limitations of storing, managing and reusing information through cloud services. Despite the large number of cloud service users, the existing research has focused mainly on the concept of cloud service and the effect of introduction on the companies. This study aims to conduct a study on individual characteristics that affect the degree of cloud use. We will conduct research on the causes of IT knowledge, personal perception of security, convenience, innovation, economical trust, and platform dependency affecting the intention to use the cloud. These results show that the variables affecting individual 's use of cloud service are influenced by individuals, and this study can be used as a basic data for individuals to use cloud service.

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

Determinants of Intention to Use Electronic Channel of Automobile Insurance: Applying the UTAUT Model (자동차 보험 거래에 있어서 전자적 채널 이용 의도의 영향 요인: UTAUT 모델의 응용)

  • Lee, Min-Hwa
    • The Journal of Information Systems
    • /
    • v.22 no.1
    • /
    • pp.181-200
    • /
    • 2013
  • Electronic channel of automobile insurance has emerged as an attractive way of lowering costs and saving time to do the transaction for customers. Electronic channel refers to using web sites to find useful information on insurance products, buy automobile insurance, and ask for services related to the insurance. This study suggests a modified model of the UTAUT and examines the factors influencing intention to use electronic channel in the transaction of automobile insurance. Based on 203 responses from potential automobile insurance buyers, the results showed that performance expectancy, effort expectancy, social influence, service expectancy, and security risk are significantly related to intention to use electronic channel. The results also showed that age as a moderator influences the effects of performance expectancy and effort expectancy on intention to use electronic channel. The study results would improve the understanding of the factors to which managers of insurance companies should pay attention in order to increase their sales through electronic channel.

How Do We Manage the Information Security Workforce of the Administrative Agencies? (행정기관의 정보보호 담당인력을 어떻게 관리할 것인가?)

  • Jun, Hyo-Jung;Kim, Tae-Sung;Park, Ki Tae
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.55-66
    • /
    • 2019
  • The career development of information security workforce affiliated in administrative department is very different from workforce affiliated in private companies. Their career development attempts are made not by voluntary motivation but by involuntary job movement by the principle of internal relocation. So they are not directly linked to monetary compensation or advancement. Due to the nature of the organization, their work attitude is very passive and there is little intention to turnover. They do not need professionalism, but they must be retrained according to the law. In this paper, we investigate and analyze the roles and responsibilities of information security workforce of each administrative department. And we do questionnaire survey to find out current roles and responsibilities of them will not affect the demand for retraining. Through these research, we would like to discuss how to manage information security workforce affiliated in administrative departments.

Empirical Validation of Personal Information Violation Risks with Use Intention : Focusing on Domestic Smart Banking Services (개인정보 침해위험이 이용의도에 미치는 영향에 대한 연구 - 국내은행의 스마트뱅킹 서비스 중심으로)

  • Kim, Jeongwook;Jeon, Youngchan
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.3
    • /
    • pp.583-594
    • /
    • 2017
  • Purpose: The purpose of this study is how personal information protection risks affect the intention to use domestic smart banking services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting ease of use, usefulness and perceived security as a benefit factor, and considers perceived cost, technical complexity, and risk of personal information leakage as a sacrifice factor. Methods: The method of this study used questionnaire survey to collect 365 data on suer's perception on smart banking services, and also performed a structural equation modeling method using by AMOS 23. Results: The result of this paper shows that all hypothesis are accepted statistically significant except 1 hypothesis. Conclusion: This research is concluded that perceived value is affected on statistically positive impact on ease of use, usefulness and perceived security, and negative impact on perceived cost and risk of personal information violation, not statistically technical complexity.

A Study on the Effects of University Students' Personal Information Protection Awareness on Information Security Attitudes: Information Security, Personal Information Infringement, Personal Experience, Information Security Intent Multi-Mediation Effect Analysis (대학생의 개인정보보호 인식이 정보보안 태도 미치는 영향연구: 정보보안, 개인정보침해, 개인적 경험, 정보보안 의도 다중매개효과분석)

  • Yun, Il-Hyun
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.125-132
    • /
    • 2021
  • This study analyzed the multi-mediating effects of information security, personal information infringement, personal experience, and information security intention in the relationship between personal information protection and information security attitude. For this purpose, a survey was conducted on 221 students from G University. First, information security, personal information infringement, and information security awareness had a simple mediating effect. Second, information security, personal information infringement, personal experience, and information security consciousness had parallel multi- mediation effects. Third, personal information infringement and information security awareness had a simple mediating effect in the parallel multiple mediation state. Fourth, information security had a simple mediating effect, but it was found that there was no simple mediating effect in the parallel multiple mediation state. This study is meaningful in that it empirically compared the simple and multi-mediation effects.

A Comparative Study on the Mutual Influence between Institutional Mechanisms and Trust in Online Platform Environment (온라인 플랫폼 환경에서 제도적 메커니즘과 신뢰 간 상호 영향에 관한 비교 연구)

  • YoonHo Roh;Yeong-Hyeon Hwang
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.83-97
    • /
    • 2024
  • This study was conducted to examine the effect of institutional mechanisms on customers' trust and continuous purchase intention in open market platforms, The research frame was expanded by setting institutional situations into positive and negative areas in order to examine the relationship between institutional mechanisms and trust in multiple dimensions. The results of this study confirmed that the feedback system, dispute resolution, and intermediary trust factors affect trust in positive areas, and dispute resolution, information security, and intermediary trust affect buyer trust in negative areas. For the relationship between trust and repurchase intention, it was confirmed that if the institutional situation is positive, trust leads to repurchase intention, and in negative areas, trust does not lead to repurchase intention. The results of this study show that institutional mechanisms are a key factor in building trust in online platforms according to institutional circumstances and play a role in offsetting trust in platforms in negative areas.