Factors Influencing the Introduction of Mobile Security Technology

Woong-Gyu Choi, Young-Jai Lee

Abstract


This research has reviewed the major composition concepts and the positive research results in the selected studies which were theoretically based on IDT (Innovation Diffusion Theory), IRM (Model of Innovation Resistance), TAM(Technology Acceptance Model), and IAPA(Information Asset Protection Activity) in order to improve the theoretical explanation of major characterized factors influencing on the introduction of MST (Mobile Security Technology). The characterized factors for the adaptation of MST and 17 hypotheses on the MST study models in order to test the effects on the intention to use are empirically verified by utilizing the analysis method of structure equation model. As a result of a study, First, the most influential characterized factors of IRM are shown as compatibility, complexity, relative advantage, information asset protection in order. Second, the char- acterized factors affecting intention to use are shown as relative advantage, compatibility, innovation resistance, performance expectancy. The results of this study are relevantly significant to establish the theoretical foundation of the study on the adaptation of MST and The verification of the characterized factors provide strategic implication for the introduction of MST and policy direction which alleviates informational gap between new MST and previous Security Technology to diffusion agency.


Full Text:

PDF

References


Adams, D. A., Nelson, R. R. and Todd, P. A.,“Perceived Usefulness, Ease of Use, and Usage of Information Techno- logy : a Replication,” MIS Quarterly, Vol. 16, No. 2, pp. 227-247, 1992.

Agarwal, R. and Karahanna, E., “Time Flies when youʼre having Fun : Cogni- tive Absorption and Beliefs about Information Technology Usage,” MIS Quarterly, Vol. 24, No. 4, pp. 665-694, 2000.

Agrifoglio, R., Black, S. and Metallo, C., “Twitter acceptance : The role of intrinsic motivation,” Working Papers on Information Systems, Vol. 10, No. 9, 2010.

Ariss, S. S., “Computer Monitoring : Benefits and Pitfalls Facing Manage- ment,” Information and Management, Vol. 39, No. 7, pp. 553-558, 2001.

Bae, B. R., “Understanding and utilizing of structural equation model,” Daekyung Publishing Company, 2002.

Bagozzi, R. P. and Yi, Y., “On the ev- aluation of structural equation models,” Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp. 74-94, 1988.

Baron, R. M. and Kenny, D. A., “The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations,” Journal of Personality and Social Psychology, Vol. 51, No. 6, pp. 1173-1182, 1986.

Beatty, R. C., Shim, J. P., and Jones, M. C., “Factors Influencing Corporate Web Site Adoption : A Time-Based Assessment,” Information and Manage- ment, Vol. 38 No. 6, pp. 337-354, 2001.

Bentler, P. M. and Bonett, D. G., “Sig- nificance Tests and Goodness of Fit in the Analysis of Covariance Structures,” Psychological Bulletin, Vol. 88, pp. 588-606, 1980.

Bentler, P. M., “On the Fit of Models Covariance and Methodology to the Bulletin,” Psychological Bulletin, Vol. 112, pp. 400-404, 1992.

Brancheau, J. C. and Wetherbe, J. C., “The adoption of spreadsheet software testing innovation diffusion theory in the context of end-user computing,” Information System Research, Vol. 1, No. 2, pp. 115-143, 1990.

Browne, M. W. and Cudeck, R., Alternative Ways of Assessing Model Fit, In K. A. Bollenand J. S. Long (Eds.), Testing Structural Equation Models, Newbury Park, CA : Sage, pp. 133-162, 1993.

Choi, C. H., “A Study of the Rela- tionship of Organizational Structure and Innovation : An Application of LISREL,” KAPA, Vol. 28, No. 2, pp. 469-480, 1994.

Choi, E. H., “Smart Work Security Issues and Responses,” KT AIT, 2011.

Cooper, R. B. and Zmud, R. W., ”Information Technology Implementation Research : A Technological Diffusion Approach,” Management Science, Vol. 36 No. 2, pp. 123-139, 1990.

Damanpour, F. and Evan, W. M. “Organizational Innovation and Performance : The Problem of Organizational Lag,” Administrative Science Quarterly, Vol. 29, No. 3, pp. 392-409. 1984.

Damanpour, F., “Organizational Innovation : A Meta‐Analysis of Effects of Determinants and Moderators,” Academy of Management Journal, Vol. 34, No. 3, pp. 555-590, 1991.

Davis, F. D., “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” Management Information Systems Qu- arterly, Vol. 13, No. 3, pp. 319-340, 1989.

Delone, W. H. and McLean, E. R., “Measuring e-Commerce Success : Applying the DeLone and McLean Information Systems Success Model,” International Journal of Electronic Commerce, Vol. 9, No. 1, pp. 31-47, 2004.

Eder, L. B. and Igbaria, M., “Determinants of Internet Diffusion and Infusion,” Omega, Vol. 21, No. 3, pp. 233-242, 2001.

ETRI, “Smartphone Threats and Security Technology,” Electronics and Telecommunications Trends, Vol. 25, No. 3, pp. 72-80, 2010.

Fornell, C. and Larcker, D. F., “Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.

Ghosh, A. K. and Swaminatha, T. M., “Software security and privacy risks in mobile e-commerce,” Communications of the ACM, Vol. 44, No. 2, pp. 51-57, 2001.

Hair, J. F., Jr., Black, W. C., Babin, B. J. and Anderson, R. E., “Multiva- riate data analysis(7th ed.), Upper Saddle River,” NJ : Prentice-Hall, 2010.

Hayduck, L., “Structural Equation Mo- deling with LISREL : Essentials and Advances,” Johns Hopkins University Press, Baltimore, 1987.

Hong, K. H., “A Study on the Effect of Information Security Controls and Processes on the Performance of Information Security,” Dept. of Management Information Systems Graduate School, Kookmin University, 2003.

Hong, S. I., Choi, H. J., and Lee, J. K., “Social Motivational Factors Influencing the Intention to Use of Blog,” Korea Contents Association, Vol. 10 No. 1, pp. 122-137, 2010.

Hsu, C. L. and Lin, J. C. C., “Accep- tance of blog usage : The roles of technology acceptance, social influence and knowledge sharing motivation,” Information and Management, Vol. 45, No. 1, pp. 65-74, 2008.

Hu, F. and Liu, Y., “An empirical examination on mobile services adop- tion in rural China,” International Journal of Digital Content Technology and its Application, Vol. 5, No. 1, pp. 328-334, 2011.

Jaccard, J. and Wan, C. K., “LISREL Approaches to Interration Effects in Mulitple Regresstion,” Thousand Oaks, Galif, 1996.

Jarvenpaa, S. L. and Lang, L. R., “Managing the Paradoxes of Mobile Technology,” Information Systems Mana- gement, Vol. 22, No. 4, pp. 7-23, 2005.

James, L. R., Mulaik, S. A. and Brett, J. M., “Casual Analysis : Assumptions, Models, and Data,” Beverly Hills : Sage, 1982.

Jeong, G. H., Yoon, H. S. and Park, J. C., “An Empirical Study on Predicting User Acceptance of Blog,” KIECA, Vol. 9, No. 4, pp. 505-521, 2009.

Ji, S. G., Lee, G. D., “The Relationship of Individual Disposition, Inno- vation Resistance and Innovation Performance,” The Korean Academic Association of Business Administration, Vol. 52, No. 1, 2005.

Joreskong, K. G. and Sorbom, D., “LISREL 7; A Guide to the Program and Application,” SPSS Publication, 1989.

Jung, Y., Perez-Mira, B. and Wiley- Patton, S., “Consumer adoption of mobile TV : Examining psychological flow and media content,” Computers in Human Behavior, Vol. 25, No. 1, pp. 123-129, 2009.

Kang, D. H., Kim, J. N. and Jo, H. S., “Trends of Mobile Threats and Security Service Technology,” Journal of KIISE, Vol. 28, No. 6, pp. 51-56, 2010.

Karahanna, E., Straub, D. and Chervany, N., “Information Technology Adoption Across Time : A Cross- Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs,” MIS Quarterly, Vol. 23, No. 2, pp. 183-213, 1999.

Kim, H. G., “The Impact of User Perception on Usage Intention : Focusing on the Moderating Role of Attitude of Acceptance and Resistance,” Journal of Information Technology Applications and Management Vol. 16, No. 2, pp. 65-67, 2009.

Kim, J. H. and Shin, Y. S., “The Roles of Mediated to Consumer' Resistance in the Internet Service Acceptance Processing,” Korean Industrial Economic Association, pp. 85-98, 2002.

Kim, K. K., Shin, H. K., Park, S. S. and Kim, B. S., “A Study on the Effects of the Information Asset Protection Performance on the Or- ganization Performance : Management Activity and Control Activity,” Information Management Research, Vol. 40, No. 3, pp. 61-77, 2009.

Kim, K. Y. and Kang, D. H., “The SmartPhone Security Technology of open collaborative environment,” Korea Institute of Information Security and Cryptology, Vol. 19, No. 5, pp. 10-104, 2009.

Kim, S. H. and Park, S. Y., “Influencing Factors for Compliance Intention of Information Security Policy,” The Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 33-51, 2011.

Korea Internet and Security Agency, “Internet and security,” 2010.

KPCB, “Internet Trends,” http://www. slideshare.net/kleinerperkins/kpcb-internet-trends-2012, 2012.

Kwon, J. S., “The Relationships among the Organizational Justice, Resistance to Innovation and Defensive Behavior of Employee,” Korean Academy of Organization and management, Vol. 25, No. 1, pp. 223-244, 2001.

Lai, V. S., “Critical Factors of ISDN Implementation : An Exploratory Study,” Information and Management, Vol. 33, No. 2, pp. 97-97, 1997.

Lee, B. K. et al., “A Research on Discovering New Vulnerabilities and Analyzing Methods in Domestic Mobile Environment,” KISA, 2010.

Lee, B. K. et al., “A Research on Issues and Developmental Needs of the Future Internet in the Context of Security Technologies and Information Security,” KISA, 2010.

Lee, D. M., “Factors Influencing Adoption of Corporate Web Site Over Time : Innovation Diffusion Theory Perspective,” Asia Pacific Journal of Information Systems, Vol. 13, No. 4, pp. 257-277, 2003.

LEE, H. S. and LIM, J. H., “SPSS 16.0 manual,” Seoul : Bobmunsa, 2009.

Lee, J. T., “An Introduction to Infor- mation Security,” Seoul : Life and Power press, 2007.

Lee, K. H., “Risk Management and Information Security : Case Study,” KERIS, 2006.

Lee, S. G., Kang, M. C. and Kim, B. Y., “An Analytical Study of ICT Adoption based on Diffusion Innovation Theory,” The Journal of Information Systems, Vol. 14, No. 2, pp. 257-276, 2005.

Lim, J. U., Oh, J, I., “A Study on the Effect of the Introduction Chara- cteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use : From the Perspective of the Innovation Diffu- sion Theory,” Asia Pacific Journal of Information Systems Vol. 22, No. 3, pp. 100-124, 2012.

Lindqvist J. and Laura Takkinen, “Privacy Management for Secure Mobility,” WPES’06, 2006.

Luarn, P. and Lin, H., “Toward an understanding of the behavioral intention to use mobile banking,” Computers in Human Behavior, Vol. 21, No. 6, pp. 873-891, 2005.

Mayers, B. L., Kappelman, L. A. and Pry butok, V. R., “A Comprehensive Model for Assessing the Quality and Productivity of the Information System Function : Toward a Theory for Information Systems Assessment,” Information Resource Management Journal, Vol. 10, No. 1, pp. 6-25, 1997.

Mick, D. G. and Fournier, S., “Para- doxes of Technology : Consumer Cognizance, Emotions and Coping Strategies,” Journal of Consumer Research, Vol. 25, pp. 123-143, 1998.

Moore, G. and Benbasat, I., “Development of an Instrument to Measure the Perceptions of Adopting and Information Technology,” Information Systems Research, Vol. 2, No. 3, pp. 192-222, 1991.

Moulton, R. T. and Moulton, M. E., “Electronic Communications Risk Management : A Checklist for Business Managers,” Computers and Security, Vol. 15, No. 5, pp. 377-386, 1996.

NIST, “SP 800-64, Security Considerations in the Information System Development Life Cycle,” 2005.

Nunnally, J. C., “Psychometric Theory,” McGraw-Hill, New York, NY, 1994.

O’Callaghan, R., Kaufmann, P. J. and Konsynski, B. R., “Adoption Corre- lates and Share Effects of Electronic Data Interchange Systems in Marketing Channels,” Journal of Marketing, Vol. 56, pp. 45-56, 1992.

Osborne, K., “Cost-Effective IT Security,” Datapro, pp. 1-8, 1996.

Park, J. G., “Integrative Adoption Model of New Media,” Korean Society for Journalism and Communication Studies, Vol. 55, No. 5, pp. 448-497, 2011.

Park, J. G., “Twitter Adoption Model : Integrative Approach to Innovation Diffusion Theory, Technology Acceptance Model, and Model of Innovation Resistance,” Internet and Information Security, Vol. 3, No. 1, pp. 35-63, 2012.

Plouffe, C. R., Hulland, J. S. and Vandenbosch, M., “Research report : Richness versus parsimony in modeling technology adoption decisions : Understanding merchant adoption of a smart card-based payment system,” Information Systems Research, Vol. 12, No. 2, 2001.

Post, G. and Karan, A., “Management Tradeoffs in Anti-virus Strategies,” Information and Management, Vol. 37, No. 1, pp. 13-24, 2000.

Ram, S., “A model of innovation resistance, Advances in Consumer Research,” Vol. 14, No. 1, pp. 208-212, 1987.

Ram, S. and Sheth, R., “Consumer Resistance To Innovation : The Marketing Problem and Its Solution,” Journal of Consumer Marketing, Vol. 6, No. 2, pp. 5-14, 1989.

Robertson, J., Sorbello, T. and Unsworth, K., “Innovation implementation : The role of technology diffusion agencies,” Journal of Technology Management and Innovation, Vol. 3, pp. 1-10, 2008.

Robertson, Thomas S. and Hubert Gatignon, “Competitive Effects on technology Diffusion,” Journal of Marketing, Vol. 50, No. 3, pp. 1-12, 1986.

Rogers, E. M. and Shoemaker, F., “Communication of Innovations : A Cross-Cultural Approach,” NewYork : Free Press, 1971.

Rogers, E. M., “Diffusion of Innovations(Third Edition),” The Free Press, New York, 1983.

Rogers, E. M., “Diffusion of Innovations(Forth Edition),” The Free Press, New York, 1995.

Rogers, E. M., “Diffusion of Innovations(Fifth Edition),” The Free Press, New York, 2003.

Samuel, W. and Zeckhasuer, R., “Status Quo Bias in Decision Making,” Journal of Risk and Uncertainty, Vol. 1, pp. 7-59, 1988.

Schein, E. H., “Organizational Culture and Leadership,” San Francisco : Jossey -Bass, 1985.

Scott, J., “The Measurement of Information Systems Effectiveness : Evaluating a Measuring Instrument,” Proceedings of the 15th International Conference on Information Systems, Vancouver, pp. 111-128, 1994.

Seo, B. M., “The Impact of Perceived Security Control on the Acceptance of Internet Banking,” The Journal of Society for e-Business Studies, Vol. 11, No. 1, pp. 25-52, 2006.

Seo, M. S., Ahn, J. W., Lee E. K. and Oh. D. Y., “Purchasing Avoi- dance of Digital Convergence Products : Focusing on the Customer’s Psychological Factors and the Innovation Resistance,” Journal of Korean Contents, pp. 270-284, 2009.

Seo, S. W., “THE ECONOMICS OF INFORMATION SECURITY,” Seoul National University Press, 2008.

Shang, S. and Seddon, P. B., “Assessing and Managing the Benefits of Enterprise Systems : The Business Manager’s Perspective,” Information Systems Journal, Vol. 12, No. 4, pp. 271-299, 2002.

Smith, S., Stephen, G. and Malampy, W., “A financial Management Approach for Selecting Optimal, Cost- Effective Safeguards Upgrades for Computer and Information Security Risk Management,” Computer and Security, Vol. 14, No. 1, pp. 28-29, 1995.

Solms, R., Eloff, J. J. P. and Solms, S. H., “Computer Security Manage- ment : A Framework for Effective Management Involvement,” Security, Vol. 12, No. 4, pp. 217-222, 1990.

Straub, E., “Understanding Technology Adoption : Theory and Future Directions for Informal learning,” Review of Educational Research, Vol. 79, No. 2, pp. 625-649, 2009.

Tomarken, A. J. and Waller N. G., “Potential problems with ‘well fitting’ models,” Journal of Abnormal Psychology, Vol. 112, No. 4, pp. 578- 598. r Studies, Vol. 45, No. 1, pp. 19- 45, 2003.

Tornatzky, L. G. and Klein, K. J., “Innovation characteristics and inno- vation adoption implementation : A meta-analysis of findings,” IEEE Transactions on Engineering Management, Vol. 29, No. 1, pp. 28-45, 1982.

Venkatesh, V. and Davis, F. D., “A theoretical extension of the technology acceptance model : Four longitudinal field studies,” Management Science, Vol. 46, No. 2, pp. 186-204, 2000.

Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D., “User acceptance of information technology : Toward a unified view,” Information Management, Vol. 27, No. 3, pp. 425- 478, 2003.

Verkasalo, H., C. Lopez-Nicolas, Molina-Castillo, F. J. and Bouwman, H., “Analysis of users and non-users of smart phone applications,” MIS Quarterly, Vol. 27, No. 3, pp. 242-255, 2003.

Wenbo, S., Jang I. J. and Yoo, H. S., “A improved authentication protocol for the forward security,” The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 17-27, 2007.

Whetten, D. A., “What constitutes a theoretical contribution?,” The Academy of Management Review, Vol. 14, No. 4, 1989.

Yoon, S. U.,“A study on the innovation resistance on social network service : Focusing on facebook non-users on their 20’s university students,” KRCRA, Vol. 13, No. 3, pp. 331-360, 2013.

Zaltman, G. and Wallendorf, M., “Consumer Behavior : Basic Findings and Management Implications,” New York, NY : John Wiley and Sons, 1983.


Refbacks

  • There are currently no refbacks.