• Title/Summary/Keyword: Perceived Information Security

Search Result 243, Processing Time 0.027 seconds

Exploring the Factors That Influence Unexpected Change of E-Customer Behaviour and Perceived Cybercrime Risk during COVID-19 in Saudi Arabia

  • Ibrahim, Rehab;Li, Alice;Soh, Ben
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.101-109
    • /
    • 2021
  • Cybercrimes are the biggest threat that can influence the future of e-commerce, particularly in difficult times such as the COVID-19 pandemic. This pandemic has resulted in noticeable changes in e-customer behaviour represented in three types: spending rates, types of goods bought, and the number of purchasing times. Moreover, the percentage of cybercrime in many countries, including Saudi Arabia, has increased during the pandemic. The increase in the number of cybercrimes during the COVID-19 crisis and the changes in consumer behaviour shows that there is an urgent need to conduct research on the factors that have led to this. This study will explore the most significant factors that have an effect on the unexpected change of customer behaviour and cybercrime perceived risk during the COVID-19 pandemic in Saudi Arabia. The finding of the study will hopefully contribute to attempts in finding safer methods for shopping online during COVID-19 and similar crisis.

Intension to Use Mobile Banking: An Integration of Theory of Planned Behaviour (TPB) and Technology Acceptance Model (TAM)

  • Amrutha Sasidharan;Santhi Venkatakrishnan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1059-1074
    • /
    • 2024
  • The paper is an attempt to study the individual's intention to use mobile banking. In light of the results obtained from the study, the proposed model offers a better fit with the data and explains the intention of individuals to use mobile banking services. Government support, trust, and compatibility significantly contribute to the Perceived behavioral control of a bank customer to use mobile banking while Perceived ease of use, Perceived usefulness, Security and privacy, and risk have a significant positive impact on the attitude of the individuals to utilize mobile banking service. The study uses primary data and the final instrument was administered to 950 respondents, across the country of which 904 data were used for the analysis after editing to accommodate the missing values. The study has adopted structural equation modeling approach to analyze the relationships between the variables in the study. The proposed framework in this study can be utilized to identify the factors that promote the adoption of mobile banking practices and the study also has the potential to provide updated and comprehensive literature on mobile banking, which can accelerate future research in this field.

Moderating Effect of Online Shopping Experience on Adoption of e-Governance in Rural India

  • Swapnil Undale;Harshali Patil
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.32-50
    • /
    • 2022
  • Technology acceptance is one of the most popular research areas. Rapid developments in technology are making human life more comfortable. However, still most of the rural area has been deprived of benefits of technological advancement. Seventy percent population of India resides in rural area. Leveraging the improved penetration of the internet; mobile friendly population in rural India has been increasingly shopping online in the last few years. e-Governance is one of the important vehicles to provide efficient services to the citizens by Governments. One major obstacle is acceptance of e-Governance platforms by the citizens. Considering the increasing trend of using e-Commerce in rural area, this paper attempts to investigate moderating effect of online shopping experience on intention to use e-Governance portals. We surveyed 365 villagers across Maharashtra: one of the leading states in India. The result confirmed online shopping experience moderates the relationship between: 'perceived security & privacy' and 'attitude'; 'perceived security & privacy' and 'intention to use'; 'Perceived usefulness' and 'attitude'; and, 'attitude' and 'intention to use'. In this study definition of moderating variable 'experience' is unique and different than most of the popular studies. We defined experience as: 'prior use of any application of technology similar to the target application of technology'. Whereas prior studies considered experience as prior experience with target application of the technology.

Smudge-Based Smart Device Fingerprint Authentication Attack Study (스머지 기반의 스마트 기기 지문 인증 공격 연구)

  • Kim, Seungyeon;Ku, Yeeun;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1113-1118
    • /
    • 2018
  • Fingerprint authentication is the most popular biometric in smart devices. However it has vulnerability to fake fingerprints. This paper shows that it is possible to pass fingerprint authentication of smartphone by creating counterfeit fingerprint without approval of legitimate users. As a technical countermeasure to prevent such a smudge-based attack, there has been proposed an under-screen Touch ID with a slide bar, which is a method of removing the fingerprint trail by dragging the UI to the side after fingerprint authentication on the touch screen. In this paper, we analyze how the proposed attack method and mitigation are perceived by actual user through 61 user survey.

The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees (정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.27-38
    • /
    • 2013
  • There are two elements of security policy that can have a bearing on its effectiveness: content and form. While the content of the security policy has been investigated extensively in the most of the previous studies, there is very little literature on the form of the security policy. Since the form of the policy influences its success, it is important to understand how to articulate the form of a security policy. Thus, the aim of this study is to investigate the relationship between security form and policy compliance of employees. Research results find that dimensions of security form have effect on attitude towards security compliance, subjective norm, perceived behavioral control, and perceived response costs, and besides attitude towards security compliance and subjective norm have an effect on persistent security compliance intention. The conclusions and implications are discussed.

A Study on countermeasure for privacy in mobile office (모바일 오피스 개인정보 보호 방안에 대한 연구)

  • Park, Yongjoon;Lee, Yunjung
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.178-188
    • /
    • 2015
  • The proliferation of devices such as tablets and smart phones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work due to perceived productivity gains and cost savings. However, despite many advantage, security breaches (e.g., information leakage) can happen for various reasons (e.g., loss or theft of devices, and malicious code) and privacy breaches can happen by using personal devices for business. We should carefully scrutinize security threats in this area. We present the security threats analysis and the technical approach in this area, and discuss privacy threats and countermeasures.

The Influence of Security and Risk Perception on the Reuse of Internet Banking (보안과 위험의 지각이 인터넷 뱅킹 재사용 의도에 미치는 영향)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.1
    • /
    • pp.77-93
    • /
    • 2007
  • Risk has been considered as one of very important topics in traditional consumer behavior theoretically and practically since its tendency of minimizing errors rather than maximizing utilization in addition to its intuitive appealing with very high explaining power. In addition to a traditional view of risk, importance of risk in online transactions such as Internet banking is due to technical instability in security of the Internet as well as temporal and spatial separation of transaction partners. Therefore, risk in online transactions should be analyzed by a very comprehensive way since it is very inherent in the Internet. The objective of this study is to suggest a research model for explaining the use of online transactions in some risk related variables including risk results, security result, perceived security, and social influence and show its validity by applying it to Internet banking users. In result, hypotheses suggested by our research model are shown to be valid ones.

The Impact of Internal Control on the Security and Usefulness of EDI System (EDI시스템에 있어서 내부통제가 정보시스템 보안성 및 유용성에 미치는 영향)

  • Han, In-Goo;Lee, Jae-Chang
    • Asia pacific journal of information systems
    • /
    • v.9 no.3
    • /
    • pp.143-157
    • /
    • 1999
  • EDI is one of the most important information technologies in todays business environment. This study is an exploratory study on the EDI control of Korean companies in their early stage of EDI implementation. The purpose of this study is to examine the impact of EDI controls on the security and usefulness of EDI systems for Korean companies who have adopted EDI. The data of fifty-one Korean companies for financial, manufacturing, and trade industries are collected by the mail survey and interview methods. The level of EDI control is mediocre on the average. The level of EDI security is low while that of EDI usefulness is mediocre. The empirical results show that the EDI controls in general improve the EDI security and usefulness significantly. Especially, the application and security control affect the EDI security significantly while the management, application, and security controls affect the EDI usefulness significantly. The gap between the level and perceived importance of control does not affect the EDI security but decreses the EDI usefulness at the marginal level of significance. The limitation of this study is that only a small number of companies are available for data collection because Korea is in the early stage of EDI implementation.

  • PDF

A Study on the Intention of Early Users of Digital Finance baesd Mydata Service Application (디지털금융 기반 마이데이터 앱 초기 사용자들의 이용의도에 관한 연구)

  • Lee, Tae Won;Sung, Haeng Nam
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.1-21
    • /
    • 2023
  • Purpose The purpose of this study is to investigate the intention of early application users in consideration of the characteristics of digital finance-based MyData service users. It is expected that user characteristics will affect the intention to use MyData service, which has not yet been advanced, and accordingly, it will examine how the characteristics of the initial users of MyData service and the intention to use it are connected. Design/methodology/approach The model used in this study is a value-based adoption model (VAM), and a lot of research has been conducted on information technology and online user acceptance and continuous use intention of online users. VAM has been proven useful through empirical analysis in many studies. The value-based acceptance model is a method of analyzing the intention to use Benefits and Sacrifices as the main elements of perceived value. It can be said to be a model that can analyze the benefits of use and the sacrifices to be made. Findings According to the analysis results of this study, it was found that usefulness, enjoyment, and reliability, which are the benefits of MyData service apps, had a positive effect on perceived value, which is partially consistent with existing research results. However, it was found that complexity, which is the sacrifice of MyData service apps, negatively affects perceived value and security has no negative impact. The results of security are considered to be complementary to financial institutions because MyData service deals with financial data based on personal information, and the research hypothesis is rejected because users' demands are relatively low. Therefore, MyData service apps should do more to increase benefits (usefulness, enjoyment, and reliability) than to reduce sacrifice (complexity) to users.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.