A Study on Acceptance Factors of Financial Mydata Service from Information Security Perspectives
Consumers’ enhanced intention to adopt the Mydata service or their voluntary provision of personal information is a very essential element in the stable growth of the Mydata industry along with the creation of corporate values. The growing leakage of customer information according to the rising value of data can have negative impacts on the use of Mydata service and shrink quality custom service needs based on the personal information provided by financial consumers. This study set out to identify security risks that financial consumers could recognize and security factors that could supplement them and investigate the effects of these security factors on consumers’ intention to adopt the Mydata service, thus providing useful implications for increasing the acceptance of financial consumers and finding a strategy to expand safe utilization. The findings raise a need to guarantee the stability and transparency of information provided by customers as information subjects, and they should be essential requirements for the Mydata service. The security factors applied to guarantee them should include convenience in terms of financial service.
Bandura, A., “Self-efficacy: Toward a unifying theory of behavioral change,” Psycho logical Review, Vol. 84, No. 2, pp. 191-215, 1977.
Brinkley, D. L., and Schell, R. R., Concepts and Terminology for Computer Security, Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, Calif, 1995.
Buellingen, F. and Woerter, M., “Development perspectives, firm strategies and applications in mobile commerce,” Journal of Business Research, Vol. 57, No. 12, pp. 1402-1408, 2004.
Chen, L. and Lee, D. M., “An empirical study on the factors influecing the acceptance of mobile easy payment service,” Journal of Korea Contents Association, Vol. 17, No. 8, pp. 1-13, 2017.
Chenoweth, T., Minch, R., and Tabor, S., “Expanding views of technology acceptance: Seeking factors explaining security control adoption,” AMCIS 2007, Vol. 7, p. 321, 2007.
Davis, F. D., “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, Vol. 13, No. 3, pp. 319-339, 1989.
Davis, F. D., Bagozzi, R. P., and Warahaw, P. R., “User acceptance of computer technology: A comparison of two theoretical models,” Management Science, Vol. 35, No. 8, pp. 982-1003, 1989.
Financial Services Commission, Compr ehensive plan for data utilization and information protection in the financial sector, pp. 3-25, Korea’s FSC, 2018.
Hsiao, C. H. and Yang, C., “The intellectual development of the technology acceptance model: A co-citation analysis,” International Journal of Information Management, Vol. 31, No. 2, pp. 128-136, 2011.
Jung, H. J., “A proposal of software quality measurement model and testcase on the basis of ISO/IEC 25010,” The Journal of Korean Institute of Information Technology, Vol. 9, No. 10, pp. 197-205, 2011.
Kim, D. H., Kim, D. Y., and Oh, J. S., “An empirical study on the factors influencing acceptance of convergence services: Focusing on telematics service,” The Journal of Society for e-Business Studies, Vol 18, No 4, pp. 241-255, 2013.
Kim, D. U. and Oh, J. S., “A structure on mobile service quality,” Journal of Korea Service Management Society, Vol. 7. No. 3, pp. 51-82, 2006.
Kim, J. G., Noh, S. C., and Lee, D. H., “A study of web application security quality architecture management process referenced ISO/IEC9000 Model,” Journal of Information and Security, Vol. 12, No. 3, pp. 11-17, 2012.
Lee, H. J., Roh, E. H., and Han, K. S., “A study on factors affecting the investment intention of information security,” Journal of Digital Contents Society, Vol. 19, No 8, pp. 1515-1525, 2018.
No, K. S., The proper methods of statistical analysis for dissertation, pp. 334-350, Hanbit Academy, inc., Seoul, 2019.
Pavlou, P., “Integrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation,” AMCIS 2001 Proceedings, No. 159, pp. 816 -822 2001.
Rogers, R. W., “A protection motivation theory of fear appeals and attitude change,” The journal of psychology, Vol. 91, No. 1, pp. 93-114, 1975.
Rogers, R. W., Cognitive and psycho logical processes in fear appeals and attitude change: A revised theory of protection motivation, pp. 153-176, Guliford Press, NY, 1983.
Seo, K. K., “Factor Analysis of the Cloud Service Adoption Intension of Korean Firms: Applying the TAM and VAM,” The Society of Digital Policy & Management, Vol. 11, No. 12, pp. 155-160, 2013.
Sharma, S., “Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling,” Information Systems Frontiers, Vol. 21, No. 4, pp. 815-827, 2019.
Venkatesh, V. and Davis, F. D., “A theoretical extension of the technology acceptance model: Four longitudinal field studies,” Management Science, Vol. 46, No. 2, pp. 186-204, 2000.
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., “User acceptance of information technology: Toward a unified view,” MIS quarterly, Vol. 27, No. 3, pp. 425-478, 2003.
Yeo, K. S., Kim, C. J., and Choi, J. h., “An empirical study on security quality evaluation model for portal information system,” The Journal of Korean Institute of Information Technology, Vol. 12, No. 7, pp. 67-77, 2014.
- There are currently no refbacks.