DOI QR코드

DOI QR Code

Understanding the Japanese History Problem on Trust in Technology Adoption of Workplace Surveillance Cameras: A Moderated Mediation Model in Korean and Chinese Context

한 · 중 데이터로 살펴본 직장 내 CCTV 도입 신뢰에 대한 일본 과거사의 점화효과 연구: 보안 취약성 지각의 조절된 매개 모형

  • 최성원 (연세대학교 미래캠퍼스 경영학부) ;
  • 장리팡 (연세대학교 대학원 경영학) ;
  • 김미정 (연세대학교 대학원 경영학) ;
  • 박종현 (연세대학교 대학원 사학과)
  • Received : 2023.11.30
  • Accepted : 2023.12.22
  • Published : 2023.12.31

Abstract

Purpose - In the Korean and Chinese social landscape, it is vital to appreciate the significance of the Japanese history problem. The current study investigated whether the perception of the Japanese history problem affects decisions regarding technology adoption in organizations by comparing South Korea and China. Design/methodology/approach - The study involved 305 Korean and 379 Chinese participants who responded to scenarios and surveys regarding the adoption of workplace surveillance cameras supplied by a Japanese company. Findings - Using a moderated mediation model based on protection motivation theory (PMT), we found that past experiences of privacy invasion significantly reduced trust in the adoption of surveillance cameras at work. This relationship was mediated by respondents' perceptions of security vulnerability. The current study, however, did not confirm any significant moderating effect of the Japanese history problem priming on trust in the adoption of workplace surveillance cameras. Research implications - This suggests that the Japanese history problem may have a limited impact on organizational technology adoption decisions, different from the political consumerism behavior driven by public anti-Japanese affectivity. The current study reaffirms the validity and applicability of PMT and provides both theoretical insights and practical recommendations.

Keywords

References

  1. 고형석 (2003), "가상공간과 개인정보보",. 인터넷전자상거래연구, 3(2), 37-64.
  2. 김경규.류성렬.김문오.김효진 (2009), "모바일 웹 브라우징 서비스의 사용 의도에 영향을 미치는 요인: 자기효능감과 사회적 영향", Journal of Information Technology Applications and Management, 16(1), 149-168.
  3. 김상현.박현선 (2013), "프라이버시 보호인식 및 보호행동의도에 미치는 영향 요인과 프라이버시 침해경험의 조절효과에 관한 연구", 인터넷전자상거래연구, 13(4), 79-105.
  4. 김용복 (2013), "일본 우경화, 한일관계 그리고 동아시아: 과거사 갈등과 영토분쟁", 경제와 사회, 99, 36-62.
  5. 김종기.김상희 (2013), "온라인 사용자의 프라이버시 보호행동에 대한 연구: 프라이버시 역설 관점에서", 인터넷전자상거래연구, 13(1), 41-64.
  6. 나윤규 (2010), "확장된 기술수용모형(ETAM)을 이용한 인터넷 쇼핑몰 패션상품 구매행동 연구: 지각된 가치와 위험 및 신뢰의 영향을 중심으로", 인터넷전자상거래연구, 10(3), 27-49.
  7. 박용완.김희영 (2016), "스마트폰 분실 위험과 경쟁 제품에 대한 점화(priming)가 모바일 결제서비스에 대한 소비자 태도에 미치는 영향", 경영학연구, 45(3), 849-868.
  8. 반현.최원석.신성혜 (2004), "유권자의 투표 선택과 뉴스 미디어의 점화효과: 17 대 총선의 선거 이슈를 중심으로", 한국방송학보, 18(4), 398-443.
  9. 손승혜.최윤정.황하성 (2011), "기술수용모델을 이용한 초기 이용자들의 스마트폰 채택 행동 연구", 한국언론학보, 55(2), 227-251.
  10. 양승호.황윤성.박재기 (2016), "통합기술수용이론(UTAUT)에 의한 핀테크 결제서비스 사용의도에 관한 연구", 경영경제연구, 38(1), 183-209.
  11. 이선민.전승우 (2022), "진보와 보수, 소비자 불매운동을 향한 서로 다른 시선: 노재팬 불매운동에 관한 신문기사 프레임 분석", 소비문화연구, 25(3), 37-56. https://doi.org/10.17053/JCC.2022.25.3.003
  12. 이원덕 (2005), "한일 과거사 갈등의 구조와 해법 모색", 세계지역연구논총, 23(2), 197-220.
  13. 이응규 (2003), "보안에 대한 우려와 거래 파트너가 인터넷 뱅킹 사용에 미치는 영향: 확장되고 수정된 기술수용모형", 대한산업공학회 춘계공동학술대회 논문집, 2003(5), 44-52.
  14. 이정기.최믿음.박성복 (2012), "대학생들의 신문 이용동기와 기술수용모델 변인이 유료 모바일 뉴스 콘텐츠 수용의도에 미치는 영향", 미디어 경제와 문화, 10(3), 129-172.
  15. 장기영 (2017), "안보위협이 과거사 인식에 미치는 영향: 한일 일본군 위안부 협상 타결에 관한 국내여론 분석", 국제정치논총, 57(4), 45-73.
  16. 장두영.이충기 (2020), "COVID-19 위험인식과 건강의식이 보호동기와 행동의도에 미치는 영향", 호텔경영학연구, 29(7), 191-208.
  17. 장영일.정유수 (2018), "기술수용모형(TAM)을 통한 암호화 화폐 투자요인 분석", e-비즈니스연구, 19(2), 139-158.
  18. 정보희.김한구 (2016), "소비자의 지위추구동기가 자국 브랜드 제품선호에 미치는 영향: 애국심 점화의 조절효과를 중심으로", 마케팅논집, 24(1), 125-144.
  19. 조은희.조성겸 (2013), "사회조사에서 사진자료의 점화효과 분석", 한국콘텐츠학회논문지, 13(5), 126-134. https://doi.org/10.5392/JKCA.2013.13.05.126
  20. 조재희 (2014), "건강관련 앱의 지속적 이용에 대한 인지적.사회적 요인: 사회적 영향을 포함한 확장된 기술수용모델(TAM II)을 중심으로", 홍보학 연구, 18(1), 212-241.
  21. 최성원 (2021), "동일방법편의 확인 및 대응을 위한 CFA 마커 테크닉의 고찰과 용례", 경영교육연구, 36(2), 245-265.
  22. 허수동 (2015), "일본 과거사 문제와 한중의 대응", 일본문화연구, 53, 431-447.
  23. 황상현.이진영 (2022), "패널자료를 활용한 대학생 중도탈락 결정요인 분석", 아태비즈니스연구, 13(3), 361-373.
  24. Abbas, F. A. M. and B. Al-Shargabi (2020), "Secure and lightweight encryption model for IoT surveillance camera", International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 1840-1847. https://doi.org/10.30534/ijatcse/2020/143922020
  25. Bansal, G., F. M. Zahedi and D. Gefen (2015), "The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern", European Journal of Information Systems, 24(4), 624-644. https://doi.org/10.1057/ejis.2014.41
  26. Bargh, J. A., M. Chen and L. Burrows (1996), "Automaticity of social behavior: Direct effects of trait construct and stereotype activation on action", Journal of Personality and Social Psychology, 71(2), 230-244. https://doi.org/10.1037/0022-3514.71.2.230
  27. Bryan, C. J., C. S. Dweck, L. Ross, A. C. Kay and N. O. Mislavsky (2009), "Political mindset: Effects of schema priming on liberal-conservative political positions", Journal of Experimental Social Psychology, 45(4), 890-895. https://doi.org/10.1016/j.jesp.2009.04.007
  28. Dhagarra, D., M. Goswami and G. Kumar (2020), "Impact of trust and privacy concerns on technology acceptance in healthcare: An Indian perspective", International Journal of Medical Informatics, 141, 104164.
  29. Dinev, T. and P. Hart (2006), "An extended privacy calculus model for e-commerce transactions", Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
  30. Doberstein, C., E. Charbonneau, G. Morin and S. Despatie (2022), "Measuring the acceptability of facial recognition-enabled work surveillance cameras in the public and private sector", Public Performance and Management Review, 45(1), 198-227. https://doi.org/10.1080/15309576.2021.1931374
  31. Floyd, D. L., S. Prentice-Dunn and R. W. Rogers (2000), "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, 30(2), 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
  32. Glidden-Tracey, C. and A. K. Greenwood (1997), "A validation study of the Spanish Self-Directed Search using back-translation procedures", Journal of Career Assessment, 5(1), 105-113. https://doi.org/10.1177/106907279700500107
  33. Gonzalez-Bailon, S., D. Lazer, P. Barbera, M. Zhang, H. Allcott, T. Brown and J. A. Tucker (2023), "Asymmetric ideological segregation in exposure to political news on Facebook", Science, 381(6656), 392-398. https://doi.org/10.1126/science.ade7138
  34. Granic, A. and N. Marangunic (2019), "Technology acceptance model in educational context: A systematic literature review", British Journal of Educational Technology, 50(5), 2572-2593. https://doi.org/10.1111/bjet.12864
  35. Herath, T. and H. R. Rao (2009), "Protection motivation and deterrence: A framework for security policy compliance in organisations", European Journal of Information Systems, 18(3), 106-125. https://doi.org/10.1057/ejis.2009.6
  36. Hermans, D., J. De Houwer and P. Eelen (2001), "A time course analysis of the affective priming effect", Cognition and Emotion, 15(2), 143-165. https://doi.org/10.1080/02699930125768
  37. Hou, Y. and C. W. Poliquin (2023), "The effects of CEO activism: Partisan consumer behavior and its duration", Strategic Management Journal, 44(3), 672-703. https://doi.org/10.1002/smj.3451
  38. Hwang, Y., H. Shin, K. Kim and S. H. Jeong (2023), "The effect of augmented reality and privacy priming in a fashion-related app: An application of technology acceptance model", Cyberpsychology Behavior and Social Networking, 26(3), 214-220. https://doi.org/10.1089/cyber.2022.0071
  39. Hyun, K. D., J. Kim and S. Sun (2014), "News use, nationalism, and Internet use motivations as predictors of anti-Japanese political actions in China", Asian Journal of Communication, 24(6), 589-604. https://doi.org/10.1080/01292986.2014.944922
  40. Ifinedo, P. (2012), "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory", Computers and Security, 31(1), 83-95. https://doi.org/10.1016/j.cose.2011.10.007
  41. Josiassen, A., F. Kock, A. G. Assaf and A. Berbekova (2023), "The role of affinity and animosity on solidarity with Ukraine and hospitality outcomes", Tourism Management, 96, 104712.
  42. Klein, A. and H. Moosbrugger (2000), "Maximum likelihood estimation of latent interaction effects with the LMS method", Psychometrika, 65(4), 457-474. https://doi.org/10.1007/BF02296338
  43. Kyroglou, G. and M. Henn (2022), "Pulled in and pushed out of politics: The impact of neoliberalism on young people's differing political consumerist motivations in the UK and Greece", International Political Science Review, 43(2), 279-294. https://doi.org/10.1177/0192512120935521
  44. Lai, P. C. (2017), "Security as an extension to TAM model: Consumers' intention to use a single platform E-Payment", Asia-Pacific Journal of Management Research and Innovation, 13(3), 110-119. https://doi.org/10.1177/2319510X18776405
  45. Lee, Y. (2011), "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective", Decision Support Systems, 50(2), 361-369. https://doi.org/10.1016/j.dss.2010.07.009
  46. Le, T. and J. Zhang (2022, August 10). "From a History Problem to a History of Problems", Tokyo Review.
  47. Little, T. D., J. A. Bovaird and K. F. Widaman (2006), "On the merits of orthogonalizing powered and product terms: Implications for modeling interactions among latent variables", Structural Equation Modeling, 13(4), 497-519. https://doi.org/10.1207/s15328007sem1304_1
  48. Martin, K. and R. E. Freeman (2003), "Some problems with employee monitoring", Journal of Business Ethics, 43(4), 353-361. https://doi.org/10.1023/A:1023014112461
  49. Maslowsky, J., J. Jager and D. Hemken (2015), "Estimating and interpreting latent variable interactions: A tutorial for applying the latent moderated structural equations method", International Journal of Behavioral Development, 39(1), 87-96. https://doi.org/10.1177/0165025414552301
  50. McCaughey, J. W., I. Mundir, P. Daly, S. Mahdi and A. Patt (2017), "Trust and distrust of tsunami vertical evacuation buildings: Extending protection motivation theory to examine choices under social influence", International Journal of Disaster Risk Reduction, 24(4), 462-473. https://doi.org/10.1016/j.ijdrr.2017.06.016
  51. Minton, E. A., T. B. Cornwell and L. R. Kahle (2017), "A theoretical review of consumer priming: Prospective theory, retrospective theory, and the affective-behavioral-cognitive model", Journal of Consumer Behaviour, 16(4), 309-321. https://doi.org/10.1002/cb.1624
  52. Neilson, L. A. (2010), "Boycott or buycott? Understanding political consumerism", Journal of Consumer Behaviour, 9(3), 214-227. https://doi.org/10.1002/cb.313
  53. Patel, K. J. and H. J. Patel (2018), "Adoption of internet banking services in Gujarat: An extension of TAM with perceived security and social influence", International Journal of Bank Marketing, 36(1), 147-169. https://doi.org/10.1108/IJBM-08-2016-0104
  54. Ping, R. A. (1996), "Latent variable interaction and quadratic effect estimation: A two-step technique using structural equation analysis", Psychological Bulletin, 119(1), 166-175. https://doi.org/10.1037/0033-2909.119.1.166
  55. Polatoglu, V. N. and S. Ekin (2001), "An empirical investigation of the Turkish consumers' acceptance of Internet banking services", International Journal of Bank Marketing, 19(4), 156-165. https://doi.org/10.1108/02652320110392527
  56. Radel, R., P. Sarrazin, P. Legrain and L. Gobance (2009), "Subliminal priming of motivational orientation in educational settings: Effect on academic performance moderated by mindfulness", Journal of Research in Personality, 43(4), 695-698. https://doi.org/10.1016/j.jrp.2009.02.011
  57. Ratten, V. (2015), "A cross-cultural comparison of online behavioural advertising knowledge, online privacy concerns and social networking using the technology acceptance model and social cognitive theory", Journal of Science and Technology Policy Management, 6(1), 25-36. https://doi.org/10.1108/JSTPM-06-2014-0029
  58. Ravid, D. M., J. C. White, D. L. Tomczak, A. F. Miles and T. S. Behrend (2023), "A meta-analysis of the effects of electronic performance monitoring on work outcomes", Personnel Psychology, 76(1), 5-40. https://doi.org/10.1111/peps.12514
  59. Reynolds, I. and S. Kang (2023, August 18). "Why South Korea-Japan Ties Are Plagued by History", Bloomberg.
  60. Rogers, R. W. (1975), "A protection motivation theory of fear appeals and attitude change", Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
  61. Schoorman, F. D., R. C. Mayer and J. H. Davis (2007), "An integrative model of organizational trust: Past, present, and future", Academy of Management review, 32(2), 344-354. https://doi.org/10.5465/amr.2007.24348410
  62. Sengupta, A. (2022), "Perception and purchase behavior of young Indian consumers towards Chinese products under the backdrop of their economic and political rivalry", Journal of Public Affairs, 22(1), e2388.
  63. Stockmann, D. (2010), "Who believes propaganda? Media effects during the anti-Japanese protests in Beijing", China Quarterly, 2010(202), 269-289. https://doi.org/10.1017/S0305741010000238
  64. Thiel, C. E., J. Bonner, J. T. Bush, D. T. Welsh and N. Garud (2023), "Stripped of agency: The paradoxical effect of employee monitoring on deviance", Journal of Management, 49(2), 709-740. https://doi.org/10.1177/01492063211053224
  65. Venkatesh, V. and F. D. Davis (2000), "A theoretical extension of the technology acceptance model: Four longitudinal field studies", Management Science, 46(2), 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
  66. Wallace, J. L. and J. C. Weiss (2015), "The political geography of nationalist protest in China: Cities and the 2012 anti-Japanese protests", China Quarterly, 2015(222), 403-429. https://doi.org/10.1017/S0305741015000417
  67. Wang, E. S. (2022), "Contested fandom and nationalism: How K-Pop fans perform political consumerism in China", Global Media and China, 7(2), 202-218. https://doi.org/10.1177/20594364221093768
  68. Warnick, B. (2007), "Surveillance cameras in schools: An ethical analysis", Harvard Educational Review, 77(3), 317-343. https://doi.org/10.17763/haer.77.3.r2k76507rrjw8238
  69. Wong, W. H. and W. Y. Mo (2019), "A study of consumer intention of mobile payment in Hong Kong, based on perceived risk, perceived trust, perceived security and Technological Acceptance Model", Journal of Advanced Management Science, 7(2), 33-38. https://doi.org/10.18178/joams.7.2.33-38
  70. Yang, Q., Q. Mei, C. Fan, M. Ma and X. Li (2023), "Environment-aware worker trajectory prediction using surveillance camera in modular construction facilities", Buildings, 13(6), 1502.
  71. Yi, Y. (1990), "Cognitive and affective priming effects of the context for print advertisements", Journal of Advertising, 19(2), 40-48. https://doi.org/10.1080/00913367.1990.10673186
  72. Yoo, J. J. and W. N. Lee (2016), "Calling it out: The impact of national identity on consumer response to ads with a patriotic theme", Journal of Advertising, 45(2), 244-255. https://doi.org/10.1080/00913367.2015.1065778
  73. Zhao, L. and H. Xiaoyi (2021), "An analysis of the anti-Japanese national united front and its formation process from the perspective of game theory", International Journal of English and Cultural Studies, 4(1), 59-61. https://doi.org/10.11114/ijecs.v4i1.5225
  74. Zhou, H., X. Xing and Z. Lu (2022), "A study on the effect of user experience of fitness APP on product trust and purchase intention", Asia Pacific Journal of Business, 13(3), 1-18. https://doi.org/10.32599/apjb.13.3.202209.1