DOI QR코드

DOI QR Code

Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives

정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로

  • Jee, Bum-Suk (School of Management, Kyung Hee University) ;
  • Fan, Liu (School of Management, Kyung Hee University) ;
  • Lee, Sang-Chul (Dept. of Business Administration, Korea Christian University) ;
  • Suh, Yung-Ho (School of Management, Kyung Hee University)
  • Received : 2011.09.09
  • Accepted : 2011.09.22
  • Published : 2011.09.30

Abstract

The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.

Keywords

References

  1. 방송통신위원회, 행정안전부, 지식경제부(2011), 2011 국가정보 보호백서
  2. 한국인터넷진흥원(2010), 정보보호 관련 대국민 홍보 방안 연구
  3. Ajzen, I. (1991), "The theory of Planned behavior," Organizational Behavior & Decision Processes, Vol. 50, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  4. Anderson, C.L. and R. Agarwal (2006), "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions," in International Conference on Information Systems, pp. 1543-1561. Milwaukee, WI.
  5. Bagchi, K. and G. Udo (2003), "An analysis of the growth of computer and internet security breaches," Communications of the AIS, Vol. 12, pp. 684-700.
  6. Bagozzi, R.P. and Y. Yi (1998), "On the Evaluation of Structural Equation Models," Journal of the Academy of Marketing Science, Vol. 16 No. 2, pp. 74-94.
  7. Bandura, A. (1977), "Self-efficacy: Toward a unifying theory of behavior change," Psychological Review, Vol. 84, pp. 191-215.
  8. Carver, C.S. and T.L., White (1994), "Behavioral inhibition, behavioral activation, and affective responses to impending reward and punishment: the bis/bas scales," Journal of Personality and Social Psychology, Vol. 67, pp. 319-333.
  9. Chin, W.W., B.L. Marcolin and P.R. Newsted (2003), "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study," Information Systems Research, Vol. 14 No. 2, pp. 189-217. https://doi.org/10.1287/isre.14.2.189.16018
  10. Chung, W., H. Chen, W. Chang and S. Chou (2006), "Fighting cybercrime: a review and the taiwan experience," decision support systems, Vol. 41, pp. 669-682. https://doi.org/10.1016/j.dss.2004.06.006
  11. Claar, C.L. (2011), "The adoption of computer security: An analysis of home personal computer user behavior using the health belief model," All graduate theses and dissertations, utah state university, Logan, Utah.
  12. Compeau, D.R., C.A. Higgins, and S. Huff (1999), "Social cognitive theory and individual reactions to computing technology: a longitudinal study," MIS Quarterly, Vol. 23 No. 2, pp. 145-158. https://doi.org/10.2307/249749
  13. Davis, F.D. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, Vol. 13 No. 3, pp. 319-338. https://doi.org/10.2307/249008
  14. Dinev, T. and Q. Hu (2007), "The centrality of awareness in the formation of user behavioral intention toward protective information technologies," Journal of the Association for Information Systems, Vol. 8 No. 7, pp. 386-408.
  15. Elliot, A.J. (2006), "The hierarchical model of approach-avoidance motivation," Motivation and Emotion Vol. 30, pp. 111-116. https://doi.org/10.1007/s11031-006-9028-7
  16. Elliot, A.J. and M.V., Covington (2001). "APPROACH AND AVOIDANCE MOTIVATION," Educational Psychology Review, Vol. 13(2), pp. 73-92. https://doi.org/10.1023/A:1009009018235
  17. Fishbein, M. and I., Ajzen (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
  18. Jayanti, R.K. and A.C., Burns (1998), "The antecedents of preventive health care behavior: an empirical study," Academy of Marketing Science Journal, Vol. 26 No. 1, pp.6-15. https://doi.org/10.1177/0092070398261002
  19. Kankanhalli, A., H.H., Teo, B.C.Y. Tan and K.K., Wei (2003), "An integrative study of information systems security effectiveness," International Journal of Information Management, Vol.23, pp. 139-154. https://doi.org/10.1016/S0268-4012(02)00105-6
  20. LaRose, R., N., Rifon, S., Liu and D., Lee (2005), "Online safety strategies: a content analysis and theoretical assessment," The 55th Annual Conference of the International Communication Association, New York City.
  21. Lee, Y. (2011), "Understanding anti-plagiarism software adoption : An extended protection motivation theory perspective," Decision Support Systems, Vol.50, pp.361-369. https://doi.org/10.1016/j.dss.2010.07.009
  22. Liang, H. and Y. Xue (2009), "Avoidance of information technology threats: A theoretical perspective," MIS Quarterly, Vol.33 No. 1, pp.71-90.
  23. Liang, H. and Y. Xue (2010), "Understanding Security Behaviors in Personal Computer Usage: A threat Avoidance Perspective," Journal of the Associaton for Information Systems, Vol. 7 No. 2, pp. 393-413.
  24. Maddus, J.E. and R.W., Rogers (1983), "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change," Journal of Experimental Social Psychology, Vol. 19, pp. 469-479. https://doi.org/10.1016/0022-1031(83)90023-9
  25. Ng, B.Y., A., Kankanhalli and Y.C., Xu (2009), "Studing users' omputer security behavior; A health belief perspective," Decision Support System, Vol. 46 No. 4, pp. 815-825. https://doi.org/10.1016/j.dss.2008.11.010
  26. Oliver, R.L. and P.K., Berger (1979), "A path analysis of preventive health care decision models," Journal of Consumer Research, Vol.6 No. 2, pp. 113-122. https://doi.org/10.1086/208755
  27. Rhodes, K. (2001), "Operations security awareness: the mind has no firewall," Computer Security Journal, Vol. 16 No. 2, pp. 27-36.
  28. Rippetoe, P.A. and R.W., Rogers (1987), "Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat," Journal of Personality and Social Psychology, Vol. 52 No. 3, pp. 596-604.
  29. Rogers, R.W. (1975), "A protection motivation theory of fear appeals and attitude change," Journal of Psychology, Vol. 91, pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
  30. Rogers, R.W. (1983), "Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation," in Social Psychophysiology: A Source Book, R. Petty (ed.), New York : Guilford Press, pp. 153-176.
  31. Rosenstock, I.M. (1974), "The health belief model and preventive health behavior," Health education Monographs, Vol. 2, pp. 354-386.
  32. Rosenstock I., V., Strecher, and M., Becker (1994), "The Health Belief Model and HIV risk behavior change", In R.J. DiClemente & J.L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press.
  33. Stanton, J.M., P.R., Mastrangelo, K.R., Stam and J., Jolton (2004), "Behavioral information security: two end user survey studies of motivation and security practices," Proceedings of the Tenth America' Conference on Information Systems, New York, 2004.
  34. Steers, R.M., R.T., Mowday and D.L., Shapiro (2004), "The future of work motivation theory," Academy of Management Review, Vol.29(3), pp. 379-387.
  35. Venkatesh, V. (2000), "Determinants of perceived ease of use : Integrating control, intrinsic motivation, and emotion into the technology acceptance model", Information System Research, Vol.11 No. 4, pp.342-365. https://doi.org/10.1287/isre.11.4.342.11872
  36. Weinstein, N.D. (2000), "Perceived probability, perceived severity, and health-protective behavior," Health Psychology, Vol. 19 No. 1, pp. 65-74.
  37. Woon, I., G.W., Tan, and R., Low (2005), "A protection motivation theory approach to home wireless security," International Conference on Information Systems, pp. 367-390.
  38. Workman, M., W.H., Bommer and D., Straub (2008), "Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in Human Behavior, Vol. 24 No. 6, pp. 2799-2816. https://doi.org/10.1016/j.chb.2008.04.005