DOI QR코드

DOI QR Code

A Study on Acceptance Factors of Financial Mydata Service from Information Security Perspectives

정보보호 관점의 금융 마이데이터 서비스 수용 요인에 관한 연구

  • Lee, Seok Ho (Department of Information Security, WOORI FINANCIAL GROUP-WFIS) ;
  • Bae, Chang Hang (Department of Industrial Security, Chung-Ang University)
  • Received : 2022.03.09
  • Accepted : 2022.04.04
  • Published : 2022.05.31

Abstract

Consumers' enhanced intention to adopt the Mydata service or their voluntary provision of personal information is a very essential element in the stable growth of the Mydata industry along with the creation of corporate values. The growing leakage of customer information according to the rising value of data can have negative impacts on the use of Mydata service and shrink quality custom service needs based on the personal information provided by financial consumers. This study set out to identify security risks that financial consumers could recognize and security factors that could supplement them and investigate the effects of these security factors on consumers' intention to adopt the Mydata service, thus providing useful implications for increasing the acceptance of financial consumers and finding a strategy to expand safe utilization. The findings raise a need to guarantee the stability and transparency of information provided by customers as information subjects, and they should be essential requirements for the Mydata service. The security factors applied to guarantee them should include convenience in terms of financial service.

마이데이터 서비스에 대한 소비자 수용의도 향상, 즉 고객 정보의 자발적 제공은 기업 가치 창출과 함께 마이데이터 산업의 안정적 성장을 위해 매우 필요한 요소이며 데이터 가치 상승으로 인한 유출과 침해 증가는 이러한 마이데이터 서비스 이용에 부정적 영향을 미쳐 금융소비자의 개인정보 제공을 통한 양질의 맞춤형 서비스 수요를 감소시킬 수 있다. 본 연구는 금융소비자가 인지할 수 있는 보안위험과 이를 보완 할 수 있는 보안요인을 도출하고 이러한 보안요인이 마이데이터 서비스 수용의도에 어떠한 영향을 미치는지를 파악하여 금융소비자의 수용의도를 높이고 안전한 활용을 확대할 수 있는 전략을 도출하기 위한 유용한 시사점을 제공하고자 한다. 연구결과를 통해 마이데이터 서비스 필수 요건인 정보주체로부터 제공받은 정보의 안정성과 투명성 보장을 위해 적용하는 보안요인은 금융서비스라는 측면에서 편의성 또한 고려해야 함을 확인하였다.

Keywords

References

  1. Bandura, A., "Self-efficacy: Toward a unifying theory of behavioral change," Psycho logical Review, Vol. 84, No. 2, pp. 191-215, 1977. https://doi.org/10.1037/0033-295X.84.2.191
  2. Brinkley, D. L., and Schell, R. R., Concepts and Terminology for Computer Security, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, Calif, 1995.
  3. Buellingen, F. and Woerter, M., "Development perspectives, firm strategies and applications in mobile commerce," Journal of Business Research, Vol. 57, No. 12, pp. 1402-1408, 2004. https://doi.org/10.1016/S0148-2963(02)00429-0
  4. Chen, L. and Lee, D. M., "An empirical study on the factors influecing the acceptance of mobile easy payment service," Journal of Korea Contents Association, Vol. 17, No. 8, pp. 1-13, 2017. https://doi.org/10.5392/JKCA.2017.17.08.001
  5. Chenoweth, T., Minch, R., and Tabor, S., "Expanding views of technology acceptance: Seeking factors explaining security control adoption," AMCIS 2007, Vol. 7, p. 321, 2007.
  6. Davis, F. D., "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-339, 1989. https://doi.org/10.2307/249008
  7. Davis, F. D., Bagozzi, R. P., and Warahaw, P. R., "User acceptance of computer technology: A comparison of two theoretical models," Management Science, Vol. 35, No. 8, pp. 982-1003, 1989. https://doi.org/10.1287/mnsc.35.8.982
  8. Financial Services Commission, Compr ehensive plan for data utilization and information protection in the financial sector, pp. 3-25, Korea's FSC, 2018.
  9. Hsiao, C. H. and Yang, C., "The intellectual development of the technology acceptance model: A co-citation analysis," International Journal of Information Management, Vol. 31, No. 2, pp. 128-136, 2011. https://doi.org/10.1016/j.ijinfomgt.2010.07.003
  10. Jung, H. J., "A proposal of software quality measurement model and testcase on the basis of ISO/IEC 25010," The Journal of Korean Institute of Information Technology, Vol. 9, No. 10, pp. 197-205, 2011.
  11. Kim, D. H., Kim, D. Y., and Oh, J. S., "An empirical study on the factors influencing acceptance of convergence services: Focusing on telematics service," The Journal of Society for e-Business Studies, Vol 18, No 4, pp. 241-255, 2013. https://doi.org/10.7838/JSEBS.2013.18.4.241
  12. Kim, D. U. and Oh, J. S., "A structure on mobile service quality," Journal of Korea Service Management Society, Vol. 7. No. 3, pp. 51-82, 2006.
  13. Kim, J. G., Noh, S. C., and Lee, D. H., "A study of web application security quality architecture management process referenced ISO/IEC9000 Model," Journal of Information and Security, Vol. 12, No. 3, pp. 11-17, 2012.
  14. Lee, H. J., Roh, E. H., and Han, K. S., "A study on factors affecting the investment intention of information security," Journal of Digital Contents Society, Vol. 19, No 8, pp. 1515-1525, 2018. https://doi.org/10.9728/dcs.2018.19.8.1515
  15. No, K. S., The proper methods of statistical analysis for dissertation, pp. 334-350, Hanbit Academy, inc., Seoul, 2019.
  16. Pavlou, P., "Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation," AMCIS 2001 Proceedings, No. 159, pp. 816-822 2001.
  17. Rogers, R. W., "A protection motivation theory of fear appeals and attitude change," The journal of psychology, Vol. 91, No. 1, pp. 93-114, 1975. https://doi.org/10.1080/00223980.1975.9915803
  18. Rogers, R. W., Cognitive and psycho logical processes in fear appeals and attitude change: A revised theory of protection motivation, pp. 153-176, Guliford Press, NY, 1983.
  19. Seo, K. K., "Factor Analysis of the Cloud Service Adoption Intension of Korean Firms: Applying the TAM and VAM," The Society of Digital Policy & Management, Vol. 11, No. 12, pp. 155-160, 2013.
  20. Sharma, S., "Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling," Information Systems Frontiers, Vol. 21, No. 4, pp. 815-827, 2019. https://doi.org/10.1007/s10796-017-9775-x
  21. Venkatesh, V. and Davis, F. D., "A theoretical extension of the technology acceptance model: Four longitudinal field studies," Management Science, Vol. 46, No. 2, pp. 186-204, 2000. https://doi.org/10.1287/mnsc.46.2.186.11926
  22. Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User acceptance of information technology: Toward a unified view," MIS quarterly, Vol. 27, No. 3, pp. 425-478, 2003. https://doi.org/10.2307/30036540
  23. Yeo, K. S., Kim, C. J., and Choi, J. h., "An empirical study on security quality evaluation model for portal information system," The Journal of Korean Institute of Information Technology, Vol. 12, No. 7, pp. 67-77, 2014.