• Title/Summary/Keyword: Unethical Behavioral Model

Search Result 6, Processing Time 0.026 seconds

A Study on the Predictors of Intention to Pirate Software (소프트웨어 불법복제 의도에 미치는 영향요인에 관한 연구)

  • Kim, Joong Han
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.131-152
    • /
    • 2013
  • Many studies have reported that software piracy is prevalent in today's society. As software is more closely integrated with across industries, software piracy would put more burdens on national economy. In spite of software anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence strategies. For better understanding of unethical behavioral intention, a research model of potential determinants for the software piracy is developed and empirically tested. The results from the study show that the planned behavior model variables-attitude, subjective norms, and perceived behavioral control-have impact on intention to commit software piracy. In addition to the variables, past behavior, perceived benefits and risk were found to be significant predictors of attitude toward software piracy. However, neither attitude nor intention was influenced by facilitating conditions. Moreover, the effect of past piracy behavior on attitude was strongly mediated by perceived benefits. Implications for research and practice are discussed.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

A Comparative Study of Factors Influencing Software Piracy : Focused on Different Software User Groups (소프트웨어 사용자 집단에 따른 불법복제 의도에 미치는 요인 비교 연구)

  • Kim, Joong Han
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.15-31
    • /
    • 2015
  • Software piracy is widespread throughout the world. It has negative effects on the software industry and the intellectual property market. Despite various deterrent policies, the phenomenon has been getting severe. The current study investigated the antecedents of software piracy attitudes and intention. In order to identify factors and their relationship, a research model for illegal piracy behavior was developed and empirically examined through a path analysis using structural equation model. Also, this study employed a multiple group structural equation model to investigate differences in structural weights across PC software user group and smartphone application user group. It was revealed that perceived benefit, habit, social factor, self-efficacy had positive effect on attitude toward software piracy, whereas perceived risk had a decreasing influence on attitude. Relationships between piracy attitudes and intentions were significant as well. Furthermore, the cross validation between two groups showed the path coefficients of habit to attitude and attitude to intention were significantly different. Implications for research and practice are discussed.

A Study on Factors that Influence the Attitude to Pirate Smartphone Application (스마트폰 애플리케이션 불법적 사용 태도에 미치는 요인 연구)

  • Kim, Joong Han
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.19-34
    • /
    • 2014
  • As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.

Effects of Benefits and Risk Perception on Purchase Intention for Fur Apparel: A Multiple Mediation Model of Consumer Emotions (모피의류의 편익과 위험 지각이 구매의도에 미치는 영향과 소비자 감정의 다중 매개효과)

  • Lee, Jin-Myong
    • Human Ecology Research
    • /
    • v.55 no.6
    • /
    • pp.609-623
    • /
    • 2017
  • Fur apparel is a representative luxury item that displays wealth and social status; however, it is also recognized as an unethical product criticized for its animal maltreatment in the production process. Understanding consumer responses to an ambivalent object, such as fur apparel, is an important research topic both academically and practically. This study investigates the hierarchical effects of perceived benefits and risks of fur apparel on consumers' emotions and purchase intention by applying the ABC model of attitudes to identify the mediating effects of consumer emotions. An online survey was conducted on 390 female consumers that verified hypotheses through structural equation modeling and bootstrapping analysis using phantom variables. The initial results of the survey showed that the relationship between perceived conspicuous benefits and purchase intention towards fur apparel was partially mediated by positive emotion. Second, the relationship between perceived epistemic benefits and purchase intention was completely mediated by positive emotion. Third, the relationship between perceived ethical risk and purchase intention was completely mediated by positive and negative emotions. Fourth, perceived social risk did not affect the purchase intention of fur apparel significantly. The results support that cognitive beliefs about the subject have a significant positive effect on behavioral intentions through emotions as suggested in the ABC model of the attitude. This study provides an in-depth understanding of consumer responses to ambivalent objects by revealing the individual mediating effects of consumers' positive and negative emotions.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF