• Title/Summary/Keyword: protection motivation theory

Search Result 61, Processing Time 0.033 seconds

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

The Effect of Individual Risk Appraisal and Ability to Control on Information Privacy Concerns in Online Social Network (온라인 소셜네트워크에서 개인의 위험성평가와 자기통제력이 정보보안우려감에 미치는 영향)

  • Moon, Yun Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.294-301
    • /
    • 2017
  • Recently, online social networks have become one of the most representative Internet services and are being used increasingly, which allows people to share information and interact with other people. On the other hand, as the use of OSN is increased, there has been an increased incidence where illegally accessed personal information is used wrongfully. Accordingly, privacy has become a key concern by the users. Regarding the construct of information privacy concerns (IPC), this study explored the antecedents of IPC at the individual personal level - risk appraisal and perceived behavioral control - based on Protection Motivation Theory. Hence, the current paper investigated the moderating effect of gender in the relationship between individual characteristics and IPC. The hypothesized research model was examined with 233 questionnaires of OSN users. The results showed that the positive effects of risk appraisal and the negative effects of perceived behavioral control on IPC are supported. In addition, the moderate effects of gender between risk appraisal and IPC is only supported.

The Study of Evaluation of University Students' Health Behaviors (대학생의 건강행위 평가 연구)

  • Lee, Grace Changkeum;Park, Yeon-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.517-529
    • /
    • 2017
  • The purpose of this study is to develop and evaluate the scale for university students' health behaviors. This research is based on Roger's(1975) Protection Motivation Theory and Weinstein(1988)'s Precaution Adoption Process Model as theoretical frameworks. The contents of the scale were first abstracted from personal depth interviews of qualitative study on university students' health behavior experiences and review of its related literature. The initial items consisted of 76 behavior questions and 34 perception questions. After conducting the preliminary test, 33 behavior questions and 24 perception questions were selected for the final test by revisions on the basis of the result of the content validity test and the item understanding test. The questionnaires for the final test were distributed to 400 students enrolled in three universities. The questionnaires collected from 373 participants were analyzed by the SPSS program. From the examination of construct validity, item correlation, and factor relation turned out to be relevant. Five factors were determined from 27 items with a cumulative explained variance of 54.498 %. After examining reliability and validity of the collected dat, 27 items were finalized as the scale for university students' health behaviors.

Development and validation of women's environmental health scales in Korea: severity, susceptibility, response efficacy, self-efficacy, benefit, barrier, personal health behavior, and community health behavior scales

  • Kim, Hee Kyung;Kim, Hyun Kyoung
    • Women's Health Nursing
    • /
    • v.27 no.2
    • /
    • pp.153-165
    • /
    • 2021
  • Purpose: This study aimed to develop the following scales on women's environmental health and to examine their validity and reliability: severity, susceptibility, response efficacy, self-efficacy, benefit, barrier, personal health behavior, and community health behavior scales. Methods: The item pool was generated based on related scales, a wide literature review, and indepth interviews on women's environmental health according to the revised Rogers' protection motivation theory model. Content validity was verified by three nursing professionals. Exploratory factor analysis, convergent validity, and internal consistency reliability were examined. Results: The scales included 10 items on severity, 11 on susceptibility, 10 on response efficacy, 14 on self-efficacy, 8 on benefits, 10 on barriers, 17 on personal health behavior, and 16 on community health behavior. Convergent validity with the environmental behavior scale for female adolescents was supported. The Cronbach's α values for internal consistency were good for all scales: severity, . 84; susceptibility, .92; response efficacy, .88; self-efficacy, .90; benefits, .91; barriers, .85; personal health behavior, .90; and community health behavior, .91. Conclusion: The evaluation of the psychometric properties shows that these scales are valid and reliable measures of women's environmental health awareness and behaviors. These scales may be helpful for assessing women's environmental health behaviors, thereby contributing to efforts to promote environmental health.

The Effect of Social Media Marketing Capability on International Patient Satisfaction through Perceived Risk in the Medical Tourism Context (의료기관의 소셜 미디어 마케팅 역량이 인지된 위험 및 의료관광 환자 만족도에 미치는 영향에 관한 연구)

  • ANVARJONOV NODIRBEK BAKHROMZHON UGLI;Um, Ki-Hyun
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.2
    • /
    • pp.203-221
    • /
    • 2023
  • Purpose: The purpose of the research is to explore the role of social media in attracting international patients for cosmetic services in South Korea during the COVID-19 pandemic. The study aims to conceptualize social media as an effective marketing tool for minimizing perceived risks associated with cosmetic services and increasing patient satisfaction. Methods: The study validated proposed hypotheses using the PROCESS macro for SPSS with overseas patients who received cosmetic treatment in private Korean plastic surgery clinics in Busan. Results: This study found that information delivery capability reduced perceived risk and contributed to patient satisfaction, while communication capability did not show any significant relationship with perceived risk and satisfaction. In addition, information delivery capability had a significant direct effect on patient satisfaction, but communication capability did not. Conclusion: It is expected that the outcomes of this study will broaden our understanding of the use of social media in reducing perceived risk and increasing satisfaction.

Comparing the Effects of Two Methods of Education (Online versus Offline) and Gender on Information Security Behaviors

  • Minjung Park;Sangmi Chai
    • Asia pacific journal of information systems
    • /
    • v.30 no.2
    • /
    • pp.308-327
    • /
    • 2020
  • The importance of information security is increasing, and various efforts are being made to improve users' information security behaviors. Among these various efforts, information security education is mainly aimed at providing users with information security knowledge and improving information security awareness. This study classified the types of information security education into offline and online to examine the effects of each education method on attitudes toward information security (perceived severity, vulnerability, self-efficacy and response-efficacy) and information security behaviors. A survey was conducted for users with information security education experiences. The results obtained by comparing the differences in the path coefficients of personal information security behaviors according to information security education experiences showed that security behaviors were more significant in the online experience group than the offline group. In addition, gender differences were analyzed, and it was found that females had a greater impact on information security attitudes than males. This study also found that among Internet users with online information security education experience, females tend to have more information security behavior than males, but there were contrasting results among users with offline information security education experiences. The results of this study finally address the necessity of reflecting users' personalities in the systematic design of information security education in the future. Furthermore, the results of this study support the need for an appropriate education system that sufficiently understands education types to maximize the effects of information security education.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

Development and Evaluation of a Exposure Prevention Program to Environmental Hazards for Mother with Young Child (영유아 자녀를 둔 여성의 환경유해인자 노출 예방프로그램 개발 및 효과)

  • Yang, Eunjung;Shin, Hyesook;Kim, Juhee
    • Journal of East-West Nursing Research
    • /
    • v.29 no.2
    • /
    • pp.161-171
    • /
    • 2023
  • Purpose: The purpose of this study is to verify the effectiveness of the Environmental Hazards Exposure Prevention Program for Mothers with Young Child (EHEPP-MYC) and to provide basic data for environmental health projects in the community. Methods: EHEPP-MYC was developed based on the protection motivation theory. A quasi-experimental design was applied to evaluate the effectiveness of the program. The number of study participants was 30 in the experimental group and 31 in the control group. The intervention applied to the experimental group consisted of lectures as the main method, current affairs programs, discussions, booklets, animations, and practical training. The program was held twice a week for a total of 4 sessions of 60 minutes each. The effect of applying the program was measured three times through surveys (before, immediately after, and two weeks after the intervention) and analyzed through repeated measures ANOVA. Results: The EHEPP-MYC had significant effects on preventive behavior, perceived severity, perceived vulnerability, self-efficacy, response efficacy, and response costs at three time points. Conclusion: EHEPP-MYC has been shown to be effective in promoting environmental hazards prevention behaviors among mothers of young child. EHEPP-MYC can be used as baseline data for projects developing programs to prevent exposure to environmental hazards and improve the environmental health of communities.