A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services)

Taehwan Park, Suhwan Kim, Jaeyoung Jang


Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found.
Based on social identity theory, we conduct the research about factors on SNS users’ intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn’t have a significant impact to the intention to share information security knowledge on SNS.
With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses. 

Full Text:



Ajzen, I., “Constructing a TPB questionnaire : Conceptual and methodological considerations,” chuang.epage.au.edu.tw, 2002.

Ashforth, B. E. and Mael, F., “Social identity theory and the organization,” Academy of management review, 1989.

Bandura, A., “Self-Efficacy Mechanisms in Human Agency,” American Psychologist, Vol. 37, No. 2, pp. 122-147, 1982.

Bandura, A., “Social Foundations of Thought and Action,” Prentice Hall, Englewood Cliffs, NJ, 1986.

Bandura, A., “Social Learning Theory,” Prentice Hall, Englewood Cliffs, NJ, 1977.

Bhattacharya, C. B., Rao, H. and Glynn, M. A., “Understanding the Bond of Identification : An Investigation of its Correlates among Art Museum Members,” Journal of Marketing, Vol. 59, No. 4, pp. 46-57, 1995.

Bock, G. W. and Kim, Y. G., “Breaking the Myths of Rewards : an Exploratory Study of Attitudes about Knowledge Sharing,” Information Resources Management Journal, Vol. 15, No. 2, pp. 14-21, 2002.

Brewer, M. B., “The Social Self : On Being the Same and Different at the Same Time,” Personality and Social Psychology Bulletin, Vol. 17, pp. 475-82, 1991.

Cha, J. and Kim, Y., “An Analytical Review of Interrater Reliability & Agreement,” The Korean Academic Society of Business Administration, Vol. 23, pp. 75-102, 1994.

Chai, S. and Kim, M., “A socio-technical approach to knowledge contribution behavior : An empirical investigation of social networking sites users,” International Journal of Information Management, Vol. 32, pp. 118-126, 2012.

Chin, W. W., Marcolin, B. L., and Newsted, P. R., “A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects : Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study,” Information systems research, Vol. 14, No. 2, pp. 189-217, 2003.

Chiu, C., Hsu, M., and Wang, E. T. G., “Understanding knowledge sharing in virtual communities : an integration of social capital and social cognitive theories,” Decision Support Systems, Vol. 42, No. 3, pp. 1872-1888, 2006.

Choi, N., Kim, D., Goo, J., and Whitmore, A., “Knowing is doing : An empirical validation of the relationship between managerial information security awareness and action,” Information Management and Computer Security, Vol. 16, No. 5, pp. 484-501, 2008.

Davenport, T. H. and Prusak, L., “Working Knowledge : How Organizations Manage What They Know,” Harvard Business School Press, Boston, 1998.

Deaux, K., “Focusing on the self : Challenges to Self-Definition and Their Consequences for Mental Health,” The Social Psychology of Mental Health : Basic Mechanisms and Applications, edited by Diane N. Ruble, Philip R. Costanzo, and Mary Ellen Oliveri. New York : Guilford, pp. 301-27, 1992.

Dominick, J. R., “Who Do You Think You Are? Personal Home Pages and Self-Presentation on the World Wide Web,” Journalism and Mass Communication Quarterly, Vol. 76, No. 4, pp. 646-658, 1999.

Drevin, L., Kruger, H. A., and Steyn, T., “Value Focused Assessment of IGT Security Awareness in an Academic Environment,” Computers and Security, Vol. 26, pp. 36-43, 2007.

Fornell, C. and Larcker, D. F., “Structural equation models with unobservable variables and measurement error : Algebra and statistics,” Journal of marketing research, 1981.

Frank, J., Shamir, B., and Briggs, W., “Security-related Behavior of PC Users in Organizations,” Information and Management, Vol. 21, No. 3, pp. 127-135, 1991.

Gruen, T. W., Summers, J. O., and Acito, F., “Relationship marketing activities, commitment, and membership behaviors in professional associations,” Journal of Marketing, Vol. 64, pp. 34-49, 2000.

Gundlach, M., Zivnuska, S., Stoner, J., “Understanding the relationship between individualism-collectivism and team performance through an integration of social identity theory and the social relations model,” Human Relations, 2006.

Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C., “Multivariate analysis,” Englewood : Prentice Hall International, 1998.

Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C., “Multivariate Data Analysis,” 5th Edn., Prentice Hall, Upper Saddle River, New Jersey, USA, 2006.

Heide, J. B. and Miner, A. S., “The Shadow of The Future Effects of Anticipated Interaction and Frequency of Contact on Buy-Seller Cooperation,” Academy of Management Journal, Vol. 35, No. 2, pp. 265-291, 1992.

Hogg, M. A. and Dominic, A., “Social Identifications : A Social Psychology of Intergroup Relations and Group Processes,” London : Routledge, 1988.

Hogg, M. A., Deborah, J. T. and Katherine, M. W., “A Tale of Two Theories : A Critical Comparison of Identity Theory with Social Identity Theory,” Social Psychology Quarterly, Vol. 58, No. 4, pp. 255-269, 1995.

Hwang, H. S., Son, S. H., and Choe, Y. J., “Exploring Factors Affecting Smart-Phone Addiction-Characteristics of Users and Functional Attributes,” Korean Journal of Broadcasting and Telecommunication Studies, Vol. 25, No. 2, pp. 277-313, 2011.

Jan, E. S. and Peter, J. B., “Identity Theory and Social Identity Theory,” Social Psychology Quarterly, Vol. 63, No. 3, pp. 224-237, 2000.

Jang, J. Y., Park, T. H., and Kim, B. S., “The Life Cycle Model Considering Legal and Technical Characteristics of Personal Data,” The Journal of Society for e-Business Studies, Vol. 17, No. 3, pp. 43-60, 2012.

Jing, Z., Kathleen, A., James, G. A., Sejin, H., and Richard, W., “Trust, empathy, social identity, and contribution of knowledge within patient online communities,” Behaviour and Information Technology, Vol. 32, No. 10, pp. 1041-1048, 2013.

Kankanhalli, A., Tan, B. C. Y., and Wei, K. K., “Contributing Knowledge to Electronic Knowledge Repositories : An Empirical Investigation,” MIS Quarterly, Vol. 28, No 1, pp. 113-143, 2005.

Kim, J. K. and Kang, D. Y., “The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 18, No. 4, pp. 123-133, 2008.

Kim, S. H. and Song, Y. M., “An Empirical Study on Motivational Factors Influencing Information Security Policy Compliance and Security Behavior of End-Users(Employees) in Organizations,” The e-Business Studies, Vol. 12, No. 3, pp. 327-349, 2011.

Kim, Y. J. and Kim, J. W., “Effecting Factors on Producing Blog Contents : Comparison of Power Blogers and General Blogers,” Entrue Journal of Information Technology, Vol. 10, No. 1, pp. 7-18, 2011.

Kim, Y. K. and Koo, S. H., “The Effect of Influence Factors of Knowledge Sharing Behavior on Knowledge Sharing Behavior and Community Loyalty in Online Community,” Korean Strategic Marketing Association, Vol. 19, No. 2, pp. 1-19, 2011.

Koh, J. and Kim, Y. G., “Sense of Virtual Community : A Conceptual Framework and Empirical Validation,” International Journal of Electronic Commerce, Vol. 8, No. 2, pp. 75-93, 2003.

Koh, J., Shin, S. J., and Kim, H. W., “The Antecedents of Need for Self-Presentation and the Effect on Digital Item Purchase Intention in an Online Community,” The Korea Society of Management information Systems, Vol. 18, No. 1, pp. 117-144, 2008.

Leach, J., “Improving User Security Behavior,” Computers and Security, Vol. 22, No. 8, pp. 685-692, 2003.

Leary, M. R. and Kowalski, R. M., “Impression management : A literature review and two-component model,” Psychological bulletin, Vol. 107, No. 1, pp. 34-47, 1990.

Leary, M. R., “Self-Presentation : Impression Management and Interpersonal Behavior,” Boulder, CO : Westview Press, 1995.

Leary, M. R., Tambor, E. S., and Terdal, S. K., “Self-esteem as an interpersonal monitor : The sociometer hypothesis,” Journal of Personality and Social Psychology, Vol. 68, No. 3, pp. 518-530, 1995.

Lee, D. S., “Probleme der zivilrechtlichen Haftung im Hinblick auf die Information sausnutzung im Online-Banking-anhand der aktuellen deutschen Judikatur uber das Phishing-Risiko,” Institute for Law of Science and Technology, Vol. 19, No. 1, pp. 37-78, 2013.

Ma, M. and Agarwal, R., “Through a Glass Darkly : Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities,” Information Systems Research, Vol. 18, No. 1, pp. 42-67, 2007.

Maslow, A. H., “Motivation and personality,” New York : Harper & Row, 1954.

Melinda, L. K. and Katherine, T. B., “The Influence of Personality Traits and Information Privacy Concerns on Behavioral Intentions,” Journal of Computer Information Systems, pp. 15-24, 2008.

Organ, D. W., “Organizational Citizenship Behavior : The “Good Soldier” Syndrome,” Lexington, MA, England : Lexington Books/D. C. Heath and Com., Vol. 13, pp. 132, 1988.

Pandey, M. and Ravi, V., “Text and Data Mining to Detect Phishing Websites and Spam Emails,” Swarm, Evolutionary, and Memetic Computing, Vol. 8298, pp. 559-573, 2013.

Park, S. H. and Lee, J. H., “The proposal for SMishing protecting system through authentication and pre right verification,” The Journal of Korea Information and Communications Society, Vol. 23, No. 6, pp. 5-12, 2013.

Podsakoff, P. M. and Organ, D. W., “Self Reports in Organization Research : Problems and Prospects,” Journal of Management, Vol. 12, pp. 531-544, 1986.

Ramesh, G., Krishnamurthi, I. and Kumar, K. S., “An efficacious method for detecting phishing webpages through target domain identification,” Decision Support Systems, Vol. 61, pp. 12-22, 2014.

Report, “Analysis of the damage caused by Phishing and precautions for financial transactions,” Financial supervisory service, 2013.

Report, “Tweeter protects voice Phishing,” Korea POST, 2011.

Schlenker, B. R., Britt, T. W., Pennington, J., Murphy, R., and Doherty, K., “The triangle model of responsibility,” Psychological Review, Vol. 101, No. 4, pp. 632-652, 1994.

Shin, M. H., “The Self-Presentation Strategy and the Media Management Characteristics on Online Personal Media,” Korea Communication Association, Vol. 17, No. 3, pp. 33-59, 2009.

Tajfel, H. and Turner, J. C., “An Integrative Theory of Intergroup Conflict,” In W. G. Austin and S. Worchel(Eds.), The social Psychology of Intergroup Relations, Monterey, CA : Brooks/Cole, pp. 33-48, 1979.

Turkle, S., “Life on the Screen : Identity in the Age of the Internet,” Simon and Schuster, New York, 1995.

Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., and Wetherell, M. S., “Rediscovering the Social Group : A Self-Categorization Theory,” Oxford, England : Basil Blackwell, 1987.

Verkuyten, M. and Hagendoorn, L., “Prejudice and Self-Categorization : The Variable Role of Authoritarianism and In-group Stereotypes,” Personality and Social Psychology Bulletin, Vol. 24, No. 1, pp. 99-110, 1998.

White, R. W., “Motivation reconsidered : the concept of competence,” Psychological Review, Vol. 66, No. 5, pp. 297-333, 1959.

Woon, I. M. Y., Tan, G. W., and Low, R. T., “A Protection Motivation Theory Approach to Home Wireless Security,” Proceedings of the 2005 International Conference On Information Systems, pp. 367-380, 2005.


  • There are currently no refbacks.