• Title/Summary/Keyword: Information Security Intention

Search Result 312, Processing Time 0.021 seconds

Antecedents of Continuous Use and Purchase Intention: In the Context of Mobile Application Store

  • Kim, Yoo-Jung;Han, Jin-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.65-76
    • /
    • 2015
  • This study investigates predictors of continuance intention and purchase intention in mobile application(App) stores. This study identifies the structural relationships among app store quality, user habit, switching costs, user loyalty, continuance intention, and purchase intention in mobile application stores. The results indicate that user loyalty increases continuance intention and purchase intention and that user habit positively affects perceived switching costs and user loyalty. App store quality is a formative construct including quality of content, ease of use, and security. App store quality affects user habit positively. This study theoretically and practically contributes to the integration of influential factors for continuance intention as well as purchase intention.

An Empirical Study on the Impact of Cryptocurrency Value Characteristics on Investment Intention : Focusing on the Value-based Adoption Model (VAM) (암호화폐 가치 특성이 투자 의도에 미치는 영향에 관한 실증적 연구 : 가치 기반 수용모델을 중심으로)

  • Kim Sangil;Seo Jaeseok;Kim Jeongwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.141-157
    • /
    • 2024
  • This study examines the impact of cryptocurrency value characteristics on cryptocurrency investment intention. Stock craze and information provided through various media, including YouTube, play an essential role in helping investors recognize the value of cryptocurrency and develop positive investment intentions. In this study, we applied the Value-Based Adoption Model (VAM) to verify the relationship between cryptocurrency value characteristics and investment intention. We surveyed 500 cryptocurrency investors to assess network externalities, awareness, compatibility, cost benefits (fees), technicality, security, perceived value, and investment intentions. SEM (Structural Equation Modeling) using AMOS 26.0 was used for data analysis. Results show that network externalities, awareness, compatibility, cost benefits (fees), security, and perceived value significantly impact investment intention. This study provides insights that help investors accurately perceive cryptocurrencies and develop strategies to increase investment intentions. It also contributes to improving investors' decision-making ability. This comprehensive approach will foster the growth of the cryptocurrency market and strengthen investor confidence.

Moral Disengagement in Information Security Context: A Study of Antecedents and Outcomes (정보보안 상황에서의 도덕적 해방: 선행요인과 결과요인에 대한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.1-13
    • /
    • 2013
  • Every big online security breach seems to end in a big lecture. Thus, although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus of extant security research is on technical issues. The purpose of this study is to explain why insiders breach security policy by applying the moral disengagement theory. There are no consistent, widely accepted theories or theoretical frameworks in the literatures as to why insiders breach of information security, and therefore no clear, effective guidance on what to do to prevent employees from violating information security policy in organization. To do this, we theorize that moral disengagement may play a mediating role connecting stable individual differences to intention to breach security policy, because of some of the individual differences. We found that policy awareness and perceived punishment have a negatively significant effect on moral disengagement. However, negative affectivity has a positively significant influence on moral disengagement. Furthermore, moral disengagement has a positive effect on intention to breach security policy. Conclusions and implications are discussed.

A Study on the Intention to Use Biometric Authentication When Using Mobile Easy Payment Service: Focusing on the Comparison of Experienced and Non-Experienced Persons (모바일 간편결제 서비스 이용 시 생체인증 사용의도에 관한 연구: 경험자와 비경험자 비교를 중심으로)

  • Jae-Seung Ju;Won-Boo Lee
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.1-22
    • /
    • 2021
  • In the newly encountered economy caused by the Corona virus Disease-19, remote transaction becomes a new normal that disrupt traditional economic order. In the middle of the disruption, mobile tech is placed and remote finance on mobile is highly noticed and considered as an infra-tech to support the new ecology, In mobile finance. remote payment is becoming the most common service and personal identification on it is critical to operate the new service. There are various means of remotely identifying a person. Recently the use of biometric information is increasing. In this study, a correlation analysis was conducted on factors that effects to biometrics usage and the intention to use in remote personal identification. Variables for critical factor in the remote identification were classified into 4 groups such as Performance expectancy, Effort expectancy, Social influence, and Security. The empirical analysis based on the Unified Theory of Acceptance and Use of Technology (UTAUT) was conducted. The relationship between variables and the intention to use is also analyzed. In the study, stepwise regression analysis was conducted four times in which variables were adjusted in individual stage. As a result, the analysis suggests that performance expectancy, effort expectancy, social influence, security have positive effects for intention to use. Additionally, effort expectancy and security have moderating effects to intention to use depends on biometric authentication experience. The analysis has shown positive effect of variables grouped on the intention to use them. It also suggests that the intention to use biometric authentication will quickly grow. This study is expected to make a contribution to utilize and improve the use of biometric information in mobile payment.

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

A Study on Acceptance Factors of Financial Mydata Service from Information Security Perspectives (정보보호 관점의 금융 마이데이터 서비스 수용 요인에 관한 연구)

  • Lee, Seok Ho;Bae, Chang Hang
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.137-152
    • /
    • 2022
  • Consumers' enhanced intention to adopt the Mydata service or their voluntary provision of personal information is a very essential element in the stable growth of the Mydata industry along with the creation of corporate values. The growing leakage of customer information according to the rising value of data can have negative impacts on the use of Mydata service and shrink quality custom service needs based on the personal information provided by financial consumers. This study set out to identify security risks that financial consumers could recognize and security factors that could supplement them and investigate the effects of these security factors on consumers' intention to adopt the Mydata service, thus providing useful implications for increasing the acceptance of financial consumers and finding a strategy to expand safe utilization. The findings raise a need to guarantee the stability and transparency of information provided by customers as information subjects, and they should be essential requirements for the Mydata service. The security factors applied to guarantee them should include convenience in terms of financial service.

The Impacts of Perceived Attributes on Continuance of the Smart Phone App Store (스마트폰 앱스토어에 대한 지각특성이 지속이용에 미치는 영향)

  • Lee, Kook-Yong
    • Korean Management Science Review
    • /
    • v.30 no.3
    • /
    • pp.33-54
    • /
    • 2013
  • The purpose of this study is to examine the relationships between Product Quality (Popularity, Playfulness) and Information Quality (Informativeness, Reliability), System Quality (Ease of Use, Security), Trust and Continuance Intention in Smart Phone Application Market. To identify these affecting relationships, the secondary data or past studies were collected and theoretically arranged. I made the theoretical proposed model to explain the relationships between the constructs, identify the operational definitions and 13 Hypotheses were established, there was executed the survey of 250 customers of Smart Phone Application Market. Using the collected data, previous performances to confirm the construct validity and internal consistency by Cronbach's a was executed and Partial Least Square Analysis to confirm the hypotheses in proposed model was conducted using the Smart-PLS Software. As the result of test that make the relations of used variables clear, we can get the conclusion as followings; First, Product Popularity has the positive effect on Informativeness, except reliability of Information. Second, it was significantly tested the effect on the Ease of use and Security by Product Playfulness. Third, Informativeness and Ease of Use, Security of App Store have the significantly positive effects on the Users' Trust directly. From the empirical test, I suggest the strategic advices in App Store Companies. To increase the Users' Continuance Intention or Loyalty, it would be developed that a variety of methods and ways to raise the Product Popularity and Playfulness, Informativeness, Ease of Use and Security of App Store. It is necessary for sticking the Users to raise the positive trust building and Continuance Intention.

A Study on Security Policy Violations of Organization Members (조직 구성원들의 보안정책 위반에 관한 연구)

  • Kim, Jong-Ki;Oh, Da-Woon
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.95-115
    • /
    • 2018
  • This study aims to examine organization members' intention to violate security policies based on the Person-Environment Fit Model. This study investigated the effect of the relationship between organizational security environment and the individual security value on the intention of organizational security policy violation. The security environments are classified into the organizational information security culture and peers' behavior of security compliance, while the personal values are classified into reconstructing the conduct, distorting the consequence, and devaluing the organization as presented in the moral disengagement theory. Based on the concept of the moral disengagement theory, we measured the individual security values as a second order factor. This study found that the information security culture had a statistically significant impact on devaluing the organization, but did not have as much impact on reconstructing the conduct and distorting the consequence. Peers' behavior of security compliance had a significant impact on reconstructing the conduct, distorting the consequence and devaluing the organization, all of which also had relevant impact on the organizational members' intention of security policy violation.This study measured a persons' perception on security policy breach by presenting scenarios of password sharing that is common in many organizations. This study is expected to make practical contributions, as it deals with challenges that many organizations are actually faced with.

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

  • Wei, Liang-Cheng;Hsu, Carol;Wang, Kai
    • Asia pacific journal of information systems
    • /
    • v.26 no.1
    • /
    • pp.163-188
    • /
    • 2016
  • Compliance with information security policies has been an important managerial concern in organizations. Unlike traditional general deterrent theory, this study proposes whistle-blowing as an alternative approach for reducing internal information security policy violations. We build on the theories of planned behavior and rational choice as well as develop a theoretical model to understand the factors that influence whistle-blowing attitudes and intention at both the organizational and individual levels. Our empirical results reveal that altruistic and egoistic concerns are involved in the development of whistle-blowing attitudes. The results not only extend our understanding of whistle-blowing motivation but also offer directions to managers in promoting internal disclosure of information security breaches.

Meta-analysis of Information Security Policy Compliance Based on Theory of Planned Behavior (정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로)

  • Kim, Jongki;Mou, Jian
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.169-176
    • /
    • 2020
  • With widespread use of information technologies the importance of information security has been heightened. Security policies which deal with fundamental direction of information security are critical elements of information security management. Numerous studies have been conducted on users' intention to comply security policies. They were based on various theoretical foundations and the theory of planned behavior(TPB) was the most frequently used. This research employed one of the quantitatively synthesizing meta-analytic techniques called Two-Stage Structural Equation Modeling to investigate factors influencing information security policy compliance behavior based on TPB. Analysis results indicated that all three factors of TPB were significantly influencing the behavioral intention. Moreover, the overall fit indices of structural model exhibited satisfactory level.