DOI QR코드

DOI QR Code

The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW

스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인

  • 장재영 (연세대학교 정보대학원) ;
  • 김지동 (연세대학교 정보대학원) ;
  • 김범수 (연세대학교 정보대학원)
  • Received : 2013.11.12
  • Accepted : 2014.05.12
  • Published : 2014.06.30

Abstract

Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

References

  1. 김예진, 이규백, "시지각적 특성에 따른 경계의 모호성에 관한 연구", 기초조형학연구, 제13권, 제5호(2012), pp.57-67.
  2. 김여라, "신종플루 뉴스 이용 정도가 개인 및 공중에 대한 건강보호 행위의도에 미치는 영향에 관한 연구 : 보호동기이론을 중심으로", 한국언론정보학회, 통권51호(2010), pp.5-25
  3. 김익수, 정진혁, 이형찬, 이정현, "모바일 악성 코드 분석방법과 대응방안", 한국통신학회논문지, 제35권, 제4호(2010), pp.599-609.
  4. 김준홍, "범죄피해 위협과 보호행동을 예측하는 요인들의 성차", 한국공안행정학회보, 제40호(2010), pp.72-113.
  5. 김지훈, 조시행, "사이버 환경에서의 보안위협", 한국정보보호학회논문지, 제20권, 제4호(2010), pp.11-20.
  6. 노성호, 김지선, "범죄의 두려움에 대한 경험적 연구", 피해자학연구, 제6권(1998), pp. 169-205.
  7. 박철현, "범죄피해경험, 이웃통합 그리고 범죄의 두려움 : 대학생에 대한 심층면접결과를 중심으로", 피해자학연구, 제13권, 제1호(2005), pp.51-77.
  8. 양호일, 환경디자인 행태학, 유림문화사, (1990), p.39.
  9. 우형진, "텔레비전 뉴스 시청이 시청자의 건강증진의지에 미치는 영향에 관한 연구", 한국언론학보, 제51권, 제2호(2007), pp.308-320.
  10. 이민규, 김영은, "질병 관련 인터넷 정보 이용 효과 연구", 언론과학연구, 제9권(2009), pp. 506-539.
  11. 이정모 외, 인지심리학, 학지사, (1999), pp. 24-32.
  12. 정만경, 서희석, "과거 및 현재의 모바일 악성 코드 증상에 따른 향후 전망 모바일 악성코드 연구", 2011년 한국컴퓨터교육학회 하계 학술발표논문지, 제15 권, 제2호(2011), pp.179-184.
  13. 정훈영, 서희석, "스마트폰 통신환경 변화에 따른 모바일 악성코드 감염경로 연구", 한국컴퓨터교육학회 하계 학술발표논문지, 제15권, 제2호(2011), pp.173-176.
  14. 장상근, "모바일 악성코드의 전략과 사례 분석을 통한 모바일 악성코드 진단법", 정보보호학회지, 제23권, 제2호(2013), pp.14-20.
  15. 한국인터넷진흥원, 모바일 접속환경을 위한 웹사이트 침해예방 연구, 2010.
  16. 한국인터넷진흥원, 2012년도 정보보호실태 조사, 2012.
  17. Ahnlab, "악성코드 분석 특집, 2012 Vol.26", ASEC REPORT, 2012.
  18. Ajzen, I. and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, 1980.
  19. Anderson, C. L. and R. Agarwal, "Practicing Safe Computing : A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions", MIS Quarterly, Vol.34, No.3(2010), pp.613-643. https://doi.org/10.2307/25750694
  20. Axelrod, L. J. and J. W. Newton, "Preventing Nuclear War : Beliefs and attitude of Disarmist and Deterrentist Behavior", Journal of Applied Psychology, Vol.21, No.1(1991), pp.29-40.
  21. Bandura, A., "Self efficacy : toward a unifying theory of behavioral change", Psychological Review, Vol.84(1977), pp.191-215. https://doi.org/10.1037/0033-295X.84.2.191
  22. Barden-O'Fallon, J. L., J. deGraft-Johnson, T. Bisika, S. Sulzbach, A. Benson, and A. O. Tsui, "Factors Associated with HIV/AIDS Knowledge and Risk Perception in Rural Malaw", AIDS and Behavior, Vol.8, No.2(2009), pp.131-140.
  23. Boer, H. and E. R. Seydel, "Protection motivation theory. In Predicting health behavior : Research and practice with social cognition models (ed)", Open University Press, (1996), pp.95-120.
  24. Campbell, K., L. A. Gordon, M. P. Loeb, and L. Zhou, "The Economic Cost of Publicly Announced Information Security Breaches : Empirical Evidence from the Stock Market", Journal of Computer Security, No.11(2003), pp.431-448.
  25. Chau, P. Y. K. and P. J. H. Hu, "Investigating healthcare professionals' decisions to accept telemedicine technology : an empirical test of competing theories", Information and Management, Vol.39(2002), pp.297-311. https://doi.org/10.1016/S0378-7206(01)00098-2
  26. Croog, S. H. and N. P. Richards, "Health Beliefs and Smoking Patterns in Heart Patients and Their Wives : A Longitudinal Study", American Journal of Public Health, Vol.67, No.10(1977), pp.921-930. https://doi.org/10.2105/AJPH.67.10.921
  27. Crossler, R. E., "Protection Motivation Theroy : Understanding Determinants to Backing Up Personal Data", Proceedings of the 43rd hawaii International conference on System Sciences, (2010), pp.1-10.
  28. Doria, M. F., N. Pidgeon, and P. Hunter, "Perceptions of Drinking Water Quality and Risk and Its Effects on Behaviour : A Crossnational Study", Science of the Total Environment, Vol.407(2009), pp.5455-5464. https://doi.org/10.1016/j.scitotenv.2009.06.031
  29. Floyed D. L., S. Prentice-Dunn, and R. W. Rogers, "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, Vol.30(2000), pp. 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
  30. Hair, J. F., B. Black, B. Babin, R. E. Anderson, and R. L. Tatham, Maltivariate data analysis(6th ed.), Pearson Prentice Hall, 2006.
  31. Johnston, A. C. and M. Warkentin, "Fear appeals and information security behaviors : An empirical study", MIS Quarterly, Vol. 34, No.3(2010), pp.549-566. https://doi.org/10.2307/25750691
  32. Krebs, B., "Hacking Home PCs Fueling Rapid Growth in Online Fraud", Washington Post, Technology Section, Special Reports, Cyber-Security, 2005.
  33. LaRose, R. and N. Rifon, "You Privacy Is Assured of Being Invaded", New Media and Society, Vol.8, No.4(2006), pp.1009-1030. https://doi.org/10.1177/1461444806069652
  34. Lee, D., R. Larose, and N. Rifon, "Keeping our network safe : a model of online protection behaviour", Behaviour and Information Technology, Vol.27, No.5(2008), pp.445-454. https://doi.org/10.1080/01449290600879344
  35. Lee, Y., "Understanding anti-plagiarism software adoption : An extended protection motivation theory perspective", Decision Support Systems, Vol.50(2011), pp.361-369. https://doi.org/10.1016/j.dss.2010.07.009
  36. Lee, Y. and K. Kozar, "Investigating factors affecting the adoption of anti-spyware systems", Communications of the ACM, Vol.48, No.8(2005), pp.72-77.
  37. Lee, Y. and K. R. Larsen, "Threat or coping appraisal : determinants of SMB executives' decision to adopt anti-malware software", European Journal of Information Systems, Vol.18, No.2(2009), pp.177-187. https://doi.org/10.1057/ejis.2009.11
  38. Loch, K. D., H. H. Carr, and M. E. Warkentin, "Threats to Information Systems : Today's Reality, Yesterday's Understanding", MIS Quarterly, Vol.16, No.2(1992), pp.173-186. https://doi.org/10.2307/249574
  39. Milne, S. E., S. Orbell, and P. Sheeran, "Combining motivational and volitional interventions to promote exercise participation : Protection motivation theory and implementation intentions", British Journal of Health Psychology, Vol.7(2002), pp.163-184. https://doi.org/10.1348/135910702169420
  40. Mohamed, N. and I. H. Ahmad, "Information privacy concerns, antecedents and privacy measure use in social networking sites : Evidence from Malaysia", Computer in Human Behavior, Vol.28. No.6(2012), pp.2366-2375. https://doi.org/10.1016/j.chb.2012.07.008
  41. Obermiller, C., "The Baby Is Sick/The Baby Is Well : A Test of the Environmental Communication Appeals", Journal of Advertising, Vol.24, No.2(1995), pp.55-71.
  42. Prentice-Dunn, S. and R. W. Rogers, "Protection motivation theory and preventive health : Beyond the health belief model, Health Education Research", Theory and Practice, Vol.1(1986), pp.153-161.
  43. Richardson, R., 2011 CSI Computer Crime and Security Survey, Computer Security Institute, 2012.
  44. Rippetoe, P. A. and R. W. Rogers, "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping With a Health Threat", Journal of Personality and Social Psychology, Vol.52(1987), pp.596-604. https://doi.org/10.1037/0022-3514.52.3.596
  45. Rogers, R., "Protection motivation theory of fear appeal and attitude change", Journal of Psychology, Vol.91, No.1(1975), pp.93-114. https://doi.org/10.1080/00223980.1975.9915803
  46. Rogers, R. W., "Cognitive and Physiological Processes in Fear Appeals and Attitude Change : A Revised Theory of Protected Motivation", Social Psychophysiology : A Sourcebook, The Guilford Press, 1983.
  47. Schafer, R. B., E. Schaefer, G. Bultena, E. Hoiberg, "Coping with a health threat : a study of food safety", Journal of Applied Social Psychology, Vol.23(1993), pp.386-394. https://doi.org/10.1111/j.1559-1816.1993.tb01094.x
  48. Symantec, Internet Security Threat Report, Vol.18(2013).
  49. Symantec, Norton Report, 2013.
  50. Tanner, J. F., J. B. Hunt, and D. R. Eppright, "The protection motivation model : A normative model of fear appeal", Journal of Marketing, Vol.55(1991), pp.36-45. https://doi.org/10.2307/1252146
  51. Vance, A., M. Siponen, and S. Pahnila, "Motivation IS security compliance : Insights from Habit and Protection Motivation Theory", Information and Management, Vol.49 (2012), pp.190-198. https://doi.org/10.1016/j.im.2012.04.002
  52. Walker, E. A., A. Caba, C. B. Schechter, C. E. Basch, E. Blanco, T. DeWitt, M. R. Kalten, M. S. Mera, and G. Mojica, "Measuring Comparative Risk Perceptions in an Urban Minority Population : The Risk Perception Survey for Diabetes", The Diabetes Educator, Vol.33(2007), pp.103-110. https://doi.org/10.1177/0145721706298198
  53. Weinstein, N. D., "Testing four competing theories of health-protective behavior", Health Psychology, Vol.12(1993), pp.324-333. https://doi.org/10.1037/0278-6133.12.4.324
  54. Woon, M. Y., G. W. Tan, and R. T. Low, "A protection motivation theory approach to home wireless security", Proceedings of the Twenty-Sixth International Conference on Information Systems, 2005.
  55. Zajonc, R. B., "Attitudinal effects of mere exposure", Journal of Personality and Social Psychology, Vol.9(1968), pp.1-27.
  56. Zhang, L. and W. C. McDowell, "Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords", Journal of Internet Commerce, Vol.8, No.3/4(2009), pp.180-197. https://doi.org/10.1080/15332860903467508