References
- Anderson, C. & Agarwal, R. (2010). "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions." MIS quarterly, 34 (3), 613-643. https://doi.org/10.2307/25750694
- Angst, C. & Agarwal, R. (2009). "Adoption of Electronic Health Records in The Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion." MIS quarterly, 33 (2), 339-370. https://doi.org/10.2307/20650295
- Bilge, L. & Dumitras, T. (2012). Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World. Paper presented at the ACM Conference on Computer and Communications Security, October 16-18.
- Block, L. & Keller, P. (1995). "When to Accentuate the Negative: The Effects of Perceived Efficacy And Message Framing on Intentions to Perform a Health-Related Behavior." Journal Of Marketing Research, 32(2), 192-203.
- Boss, S., Galletta, D., Lowry, P., Moody, G. & Polak, P. (2015). "What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors." MIS Quarterly, 39(4), 837-864. https://doi.org/10.25300/MISQ/2015/39.4.5
- Buck, R., Anderson, E., Chaudhuri, A. & Ray, I. (2004). "Emotion and Reason in Persuasion: Applying The Ari Model And The CASE Scale." Journal of Business Research, 57(6), 647-656.
- Conzola, V. & Wogalter, M. (2001). "A Communication- Human Information Processing (C-Hip) Approach to Warning Effectiveness in the Workplace." Journal of Risk Research, 4 (4), 309-322. https://doi.org/10.1080/13669870110062712
- Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J., Metayer, D., Tirtea, R. & Schiffner, S. (2014). Privacy and Data Protection by Design - from Policy to Engineering. Attiki: ENISA.
- de Hoog, N., Stroebe, W. & de Wit, J. (2007). "The Impact of Vulnerability to And Severity of a Health Risk on Processing and Acceptance of Fear-Arousing Communications: A Meta- Analysis." Review of General Psychology, 11 (3), 258-285. https://doi.org/10.1037/1089-2680.11.3.258
- Fagan, M., Khan, M. & Buck, R. (2015a). "A Study of Users' Experiences and Beliefs About Software Update Messages." Computers in Human Behavior, 51, 504-519.
- Fagan, M., Khan, M. & Nguyen, N. (2015b). "How Does This Message Make You Feel? A Study of User Perspectives on Software Update/Warning Message Design." Human-centric Computing and Information Sciences, 5(1), 36.
- Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E. & Wagner, D. (2012). Android Permissions: User Attention, Comprehension, and Behavior. Paper presented at the Eighth Symposium on Usable Privacy and Security, July 11-13.
- Fishbein, M. & Ajzen, I. (1975). Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
- Great View Research (2023a). "Smart Home Market Size, Share & Trends Analysis Report By Products (Lighting Control, Security & Access Controls), By Application (New Construction, Retrofit), By Protocols (Wireless, Wired), By Region, And Segment Forecasts, 2023 - 2030." https://www.grandviewresearch.com/industryanalysis/smart-homes-industry (Retrieved on February 1, 2024)
- Great View Research (2023b). "Smart Home Security Camera Market Size, Share & Trends Analysis Report By Technology (Wired Camera,Wireless Camera), By Application (Doorbell Camera, Indoor Camera, Outdoor Camera), By Region, And SegmentForecasts, 2023 - 2030." https://www.grandviewresearch.com/industryanalysis/smart-home-security-camera-market (Retrieved on February 1, 2024)
- Hale, J., Lemieux, R. & Mongeau, P. (1995). "Cognitive Processing of Fear-Arousing Message Content." Communication Research, 22(4), 459-474. https://doi.org/10.1177/009365095022004004
- Hayes, A. (2024). "Smart Home: Definition, How They Work, Pros and Cons." Investopia, April 12.
- Johnston, A. & Warkentin, M. (2010). "Fear Appeals and Information Security Behaviors: An Empirical Study." MIS quarterly, 34(3), 549-566. https://doi.org/10.2307/25750691
- Kahneman, D. & Tversky, A. (1979). "Prospect Theory: An Analysis of Decision under Risk." Econometrica, 47, 263-292. https://doi.org/10.2307/1914185
- Kenrick, D., Neuberg, S. & Cialdini, R. (2005). "Attitudes and Persuasion," in Kenrick, D., Neuberg, S., & Cialdini, R. (ed.) Social Psychology: Unraveling the Mystery, Boston: Allyn & Bacon.
- Kim, M. (2016). "Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras." The Journal of the Korea Contents Association, 16(9), 329-338. https://doi.org/10.5392/JKCA.2016.16.09.329
- Kim, S. & Kim, J. (2023). "The Effect of Involvement and Message Framing in Smartphone Security Behavior." The Journal of Internet Electronic Commerce Research, 23(1), 1-15.
- Kim, H., Ding, X. & Lee, H. (2021). "An Empirical Investigation of Customer Loyalty in Chinese Smartphone Markets with Large-Scale Data: Apple, Samsung, and Xiaomi Cases." In Lee, W., Leung, C. & Nasridinov, A. (ed.) Big Data Analyses, Services, and Smart Data, Singapore: Springer.
- Kim, H., Hong, S. & Park, S. (2016a). "A Study on Personal Information Protection Guideline : Through Research Case Study Analysis in Internet of Things Environment." Journal of Security Engineering, 13(2), 155-168.
- Kim, H., Kim, I. & Lee, H. (2016b). "Third- Party Mobile App Developers' Continued Participation in Platform-Centric Ecosystems: An Empirical Investigation of Two Different Mechanisms." International Journal of Information Management, 36, 44-59. https://doi.org/10.1016/j.ijinfomgt.2015.09.002
- Kim, H., Lee, Y. & Lee, H. (2019). "Negative Transition of Smart Device Utility: Empirical Study on IT-Enabled Work Flexibility, After-Hours Work Connectivity, and Work-Life Conflict." Informatization Policy, 26(4), 36-61. https://doi.org/10.22693/NIAIP.2019.26.4.036
- Kim, H., Shin, B. & Lee, H. (2013). "The Mediating Role of Psychological Contract Breach in IS Outsourcing: Inter-Firm Governance Perspective." European Journal of Information Systems, 22, 529-547.
- Korea Development Institute (2016). "Three-Year Implementation Plan for the Internet of Things (IoT) Information Security Roadmap." https://eiec.kdi.re.kr/skin_2016/common/epicdownload.jsp?num=143619&filenum=2 (Retrieved on April 20, 2024).
- Korea Information Security Industry Association (2022). Survey on Information Security. Seoul: Korea Information Security Industry Association.
- Lee, B., Sohn, Y., Seo, D., Jwa, B., Hong, H. & Lee, J. (2013). "A Research Synthesis of Fear Appeal Studies over the Past 40 Years: A Meta-Analysis of Fear Appeals in Korea." The Korean Journal of Advertising and Public Relations, 15 (3), 126-155.
- Lee, H. (2019). "IoT is the Prey of Hackers... Security 'Red Flag'." AI TIMES, April 8.
- Lee, H. (2021). "Smart Home Camera User's Update Motivation :Intended Privacy Protection Behavior Using Fear Appeals And Message Framing." Master's Thesis, Department of Business Administration, Yonsei University.
- Lee, J., Kim, H. & Lee, H. (2023). "An Empirical Study on the User Experience Model of Music Streaming Service." Informatization Policy, 30 (3), 92-121. https://doi.org/10.22693/NIAIP.2023.30.3.092
- Lee, K., Kim, B. & Cho, J. (2018). "Negative Transition of Smart Device Utility: Empirical Study on ITEnabled Work Flexibility, After-Hours Work Connectivity, and Work-Life Conflict." Journal of KIISE, 45(4), 321-331. https://doi.org/10.5626/JOK.2018.45.4.321
- Lee, S. (2023). "Poor IoT Security, Private Lives of 400,000 People were Exposed." SisaIN , January 13.
- Leventhal, H. (1970). "Findings and theory in the study of fear communications." In Berkowitz, L. (ed.) Advances in Experimental Social Psychology, 119-186. New York: Academic Press.
- Li, Y., Kim, H. & Lee, H. (2022). "Why Do Users Participate in Hashtag Challenges in a Shortform Video Platform? The Role of Para-Social Interaction." Informatization Policy, 29 (3), 82-104. https://doi.org/10.22693/NIAIP.2022.29.3.082
- Lipkus I. (2007). "Numeric, Verbal, and Visual Formats of Conveying Health Risks: Suggested Best Practices and Future Recommendations." Medical Decision Making, 27(4), 696-713. https://doi.org/10.1177/0272989X07307271
- Lyu, J. & Kwon, S. (2021). "A Study on the Privacy Paradox in the IoT-based Smart Home Camera Usage Environment: Focusing on a Comparative Study of User Experience." Journal Of Information Technology Applications & Management, 28(6), 145-161.
- Majeed, A. (2017). Internet of Things(IoT): A Verification Framework. Paper presented at the 2017 IEEE 7th Annual, Computing and Communication Workshop and Conference, January 9-11.
- Mathur, A. & Chetty, M. (2017). Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates. Paper presented at the Thirteenth Symposium on Usable Privacy and Security, July 12-14.
- Meyerowitz, B. & Chaiken, S. (1987). "The Effect of Message Framing on Breast Self-Examination Attitudes, Intentions, and Behavior." Journal of Personality and Social Psychology, 52(3), 500.
- Microsoft (2012). Microsoft Security Intelligence Report Volume 13 (January - June 2012) , Washington: Microsoft.
- Milne, S., Orbell, S. & Sheeran, P. (2002). "Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions," British Journal of Health Psychology, 7, 163-184. https://doi.org/10.1348/135910702169420
- Moller, A., Michahelles, F., Diewald, S., Roalter, L., & Kranz, M. (2012). Update Behavior in App Markets and Security Implications: A Case Study in Google Play. Paper presented at the 3rd International Workshop Held in Conjunction with Mobile HCI, September 21-24.
- Mullinix, K., Leeper, T., Druckman, J. & Freese, J. (2015). "The Generalizability of Survey Experiments." Journal of Experimental Political Science, 2(2), 109-138.
- Mwagwabi, F., McGill, T. & Dixon, M. (2014). Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines. Paper presented at 2014 47th Hawaii International Conference on System Sciences, January 6-9.
- Nov, O. & Ye, C. (2008). "Users' Personality and Perceived Ease of Use of Digital Libraries: The Case For Resistance to Change." Journal of the American Society for Information Science and Technology, 59(5), 845-851. https://doi.org/10.1002/asi.20800
- Park, J. (2017). Designing Fear Appeal Cues to Enhance Security Protection of Users: Leveraging from Cognitive Bias of Humans. Paper presented at the 2017 KMIS Spring Conference, June 9-10.
- Park, J., Kim, J. & Kim, B. (2017). "Online Users' Password Security Behavior : The Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior." Journal of Information Technology Services, 16 (3), 147-165. https://doi.org/10.9716/KITS.2017.16.3.147
- Rogers, R. (1975). "A Protection Motivation Theory of Fear Appeals and Attitude Change." The Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
- Rogers, R. (1983). "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation." In Cacioppo, J. & Petty, R. (ed.) Social Psychophysiology: A Sourcebook, 153-176. New York: Guilford.
- Rothman, A., Salovey, P., Antone, C., Keough, K. & Martin, C. (1993). "The Influence of Message Framing on Intentions to Perform Health Behaviors." Journal of Experimental Social Psychology, 29(5), 408-433.
- Salman, O., Elhajj, I., Chehab, A. & Kayssi, A. (2017). Software Defined IoT Security Framework. Paper presented at the SDS 2017 4th Conference, May 8-11.
- Schneider, T., Salovey, P., Pallonen, U., Mundorf, N. & Smith, N. (2001). "Visual and Auditory Message Framing Effects on Tobacco Smoking." Journal of Applied Social Psychology, 31 (4), 667-682. https://doi.org/10.1111/j.1559-1816.2001.tb01407.x
- Statista (2024), "Number of Smart Homes forecast in the World from 2017 to 2025(in millions)." https://www.statista.com/statistics/1252975/smart-home-households-worldwide/, (Retrieved on March 8).
- Steindl, C., Jonas, E., Sittenthaler, S., Traut-Mattausch, E. & Greenberg, J. (2015). "Understanding Psychological Reactance New Developments and Findings," Zeitschrift fur Psychologie, 223 (4), 205-214. https://doi.org/10.1027/2151-2604/a000222
- Symantec Corporation (2013). "Internet Security Threat Report 2013 Volume 18, 2013." https://www.insight.com/content/dam/insight/en_US/pdfs/symantec/symantec-corp-internetsecurity-threat-report-volume-18.pdf, (Retrieved on March 2).
- Townsend, C. & Kahn, B. (2014). "The Visual Preference Heuristic: The Influence of Visual versus Verbal Depiction of Assortment Processing, Perceived Variety, and Choice Overload." Journal of Consumer Research, 40 (5), 993-1015. https://doi.org/10.1086/673521
- Tsai, H. Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J. & Cotten, S. R. (2016). "Understanding online safety behaviors: A protection motivation theory perspective." Computers & Security, 59, 138-150. https://doi.org/10.1016/j.cose.2016.02.009
- Tversky, A. & Kahneman, D. (1981). "The Framing of Decisions and The Psychology of Choice." Science, 211(4481), 453-458. https://doi.org/10.1126/science.7455683
- Tversky, A. & Kahneman, D. (1984). "Choice, Values and Frames." American Psychologist, 39 (4), 341-350. https://doi.org/10.1037/0003-066X.39.4.341
- Tversky, A. & Kahneman, D. (1986). "Rational Choice and the Framing of Decisions." Journal of Business, 59(4), S251-S278.
- Wash, R., Rader, E., Vaniea, K. & Rizor, M. (2014). Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences. Paper presented at the 10th Symposium on Usable Privacy and Security, July 9-11.
- Wilson, D., Purdon, S. & Wallston, K. (1988). "Compliance to Health Recommendations: A Theoretical Overview of Message Framing." Health Education Research, 3(2), 161-171. https://doi.org/10.1093/her/3.2.161
- Witte, K. (1992). "Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model." Communications Monographs, 59(4), 329-349. https://doi.org/10.1080/03637759209376276
- Witte, K. (1994). "Fear Control and Danger Control: A Test of the Extended Parallel Process Model (EPPM)." Communication Monographs, 61 (2), 113-134 https://doi.org/10.1080/03637759409376328
- Witte, K. & Allen, M. (2000). "A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns." Health Education & Behavior, 27(5), 591-615. https://doi.org/10.1177/109019810002700506
- Yoo, Y. (2022). "Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices." Journal of Convergence Security, 22 (4), 99-107.
- Zhang, L. & McDowell, W. (2009). "Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords." Journal of Internet Commerce, 8(3-4), 180-197.