DOI QR코드

DOI QR Code

An Empirical Study on the Factors that Affect the Continuous Use Intention of i-PIN

아이핀(i-PIN)의 지속적 사용의도에 영향을 미치는 요인에 관한 실증적 연구

  • 임혁 (충북대학교 경영정보학과, BK21 Plus 빅데이터 서비스모델 최적화 사업팀) ;
  • 김태성 (충북대학교 경영정보학과, BK21 Plus 빅데이터 서비스모델 최적화 사업팀)
  • Received : 2015.08.27
  • Accepted : 2015.11.23
  • Published : 2015.12.31

Abstract

In 2005, Korean government created the Internet Personal Identification Number (i-PIN) for a new online personal identification system to protect citizens' personal information against criminal abuse. However, i-PINs have not been widely in use over a decade. Although many people joined the i-PIN service, its actual use rate has been low. This study intends to identify the factors necessary to boost the continuous use of i-PINs. It was shown that government support and perceived security had a positive effect on the perceived ease of use and perceived usefulness of the i-PIN, respectively. Perceived security also directly affected the continuous use intention of the i-PIN. The perceived ease of use significantly affected the perceived usefulness, but it did not affect the intention to continuously use the i-PIN. The factor that had the most significant influence on the continuous use intention of the i-PIN was perceived usefulness. To increase the i-PIN use rate, Korean government must reduce users' anxiety through strict security functions, and must attempt to help people use the i-PIN easily.

Keywords

References

  1. 고미현, 권순동, "인터넷 커뮤니티에서 사용자 참여가 밀착도와 지속적 이용의도에 미치는 영향", Asia Pacific Journal of Information Systems, 제18권 제2호, 2008, pp. 41-72.
  2. 구승환, 김동우, 박창묵, 김광호, "LTE 특성과 개인의 혁신성이 LTE 스마트폰 수용에 미치는영향", 한국디지털콘텐츠학회논문지, 제14권 제3호, 2013, pp. 291-301.
  3. 국가정보원, 미래창조과학부, 방송통신위원회, 안전행정부, 2014 국가정보보호백서, 2014.
  4. 권순동, "SEM에서 위계모형을 이용한 다중 공선성 문제 극복방안 연구 : 소셜커머스의 재구매의도 영향요인을 중심으로", Journal of Information Technology Applications and Management, 제22권 제2호, 2015, pp. 149-169. https://doi.org/10.21219/JITAM.2015.22.2.149
  5. 김범수, 이정, 김경규, "인지된 신뢰, 위험, 유용성 및 편의성이 전자정부 민원서비스사용의도에 미치는 영향", 정보화정책, 제13권 제4호, 2006, pp. 186-202.
  6. 김상현, 송영미, "정부포털 사이트 이용의도에 미치는 요인 : 모호성과 정부지원의 조절 효과", 정보시스템연구, 제18권 제1호, 2009, pp. 117-144.
  7. 김세윤, 김태성, "공인인증서의 신뢰 및 지속사용 의도에 관한 연구", 한국경영정보학회학술대회, 2014, pp. 1101-1105.
  8. 김영홍, "유출 피해 사례로 보는 주민등록번호 제도 개선의 필요성", '주민등록번호 어떻게 개편할 것인가' 토론회, 2014.
  9. 미래창조과학부, 2014년도 국가정보화에 관한 연차보고서, 2014.
  10. 박지형, 신건권, "스마트폰의 지각된 기능적 속성과 개인 혁신성이 사용자의 채택의도와 실제사용의도에 미치는 영향", 경영교육논총, 제26권 제5호, 2011, pp. 191-214.
  11. 배재권, "모바일 클라우드 이용자의 인지된 프라이버시, 인지된 보안성, 인지된 즐거움이 지속사용의도에 미치는 영향에 관한 연구", e-비즈니스연구, 제15권 제3호, 2013, pp. 3-27.
  12. 송영미, 김상현, "정보시스템 서비스품질이 정부 포탈사이트 이용의도에 미치는 영향에 관한 연구", 한국경영정보학회 학술대회, 2007, pp. 875-882.
  13. 신영진, "인터넷 본인확인수단(I-PIN)의 보급 및 적용에 따른 개선방안 연구-개인정보보호법 제정 전, 후 이용자의 인식변화를 중심으로", 한국정책학회보, 제22권 제3호, 2013, pp. 171-199.
  14. 염흥열, 이석래, "인터넷 상에서 주민등록번호 대체수단 발전방향", 전자공학회지, 제32권 제11호, 2005, pp. 1381-1393.
  15. 유재연, "아이핀, 가입.인증 절차 복잡해 사용 꺼려", 중앙선데이, 2014.
  16. 윤혜정, 장재빈, 이중정, "OTP에 대한 신뢰 및 재사용의도의 결정요인," 한국컴퓨터정책학회논문지, 제15권 제12호, 2010, pp. 163-173.
  17. 이병용, 김민용, "생체인식기술의 지속사용의도에 영향을 미치는 요인에 관한 연구", 한국전자거래학회지, 제16권, 제3호, 2011, pp. 1-22. https://doi.org/10.7838/jsebs.2011.16.3.001
  18. 임동범, 제갈돈, 박동진, "지방정부의 전자적 정책참여를 위한 정보기술수용에 관한 연구 : 인터넷 전자투표를 중심으로", 한국행정논집, 제21권 제2호, 2009, pp. 375-406.
  19. 장인용, 염흥열, "인터넷상의 본인확인수단인 아이핀의 활성화 방안 연구", 정보보호학회논문지, 제19권 제5호, 2009, pp. 81-94.
  20. 정찬주, 김윤정, 김진원, 박광진, "주민번호 대체수단(i-PIN) 개발을 위한 기술표준과 서비스 프레임워크", 정보보호학회논문지, 제18권, 제6호, 2008, pp. 20-27.
  21. 최광희, 안종찬, 이강신, 안승호, "인터넷상 주민번호 이용을 대체하기 위한 아이핀 2.0 서비스 프레임워크", 정보보호학회논문지, 제20권 제6호, 2010, pp. 88-95.
  22. 최광희, 정승욱, 이강신, 안승호, "국가 IDM을 위한 아이핀 발전 전략", 정보보호학회논문지, 제21권 제4호, 2011, pp. 40-46.
  23. 최윤성, 이윤호, 김승주, 원동호, "주민등록번호 대체수단에 대한 구현 취약점 분석", 정보보호학회논문지, 제17권 제2호, 2007, pp. 145-185.
  24. 한문정, 장규현, 홍석희, 임종인, "국가 개인식별번호체계 개선에 관한 연구", 정보보호학회논문지, 제24권 제4호, 2014, pp. 721-737. https://doi.org/10.13089/JKIISC.2014.24.4.721
  25. Aime, M. D., Carandriello, G., and Lioy, A., "Dependability in Wireless Network : Can We Rely on WiFi?", IEEE Security and Privacy, Vol. 5, No. 1, 2007, pp. 23-29. https://doi.org/10.1109/MSP.2007.4
  26. Arbore, A., Soscia, I., and Bagozzi, R. P., "The Role of Signaling Identity in the Adoption of Personal Technologies", Journal of the Association for Information Systems, Vol. 15, No. 2, 2014, pp. 86-110. https://doi.org/10.17705/1jais.00352
  27. Aubert, B. A. and Hamel, G., "Adoption of Smart Cards on the Medical Sector : The Canadian Experience", Social Science and Medicine, Vol. 53, No. 7, 2001, pp. 879-894. https://doi.org/10.1016/S0277-9536(00)00388-9
  28. Calantone, R. J., Griffith, D. A., and Yalcinkaya, G., "An Empirical Examination of a Technology Adoption Model for the Context of China", Journal of Internet Marketing, Vol. 14, No. 4, 2006, pp. 1-27.
  29. Carter, L., "E-Government Diffusion : A Comparison of Adoption Constructs", Transforming Government : People, Process and Policy, Vol. 2, No. 3, 2008, pp. 147-161. https://doi.org/10.1108/17506160810902167
  30. Carter, L. and Belanger, F., "The Utilization of E-Government Services : Citizen Trust, Innovation and Acceptance Factors", Information Systems Journal, Vol. 15, No. 1, 2005, pp. 5-25. https://doi.org/10.1111/j.1365-2575.2005.00183.x
  31. Chan, F. K. Y., Thong, J. Y. L., Venkatesh, V., Brown, S. A., Hu, P. J. H., and Tam, K. Y., "Modeling Citizen Satisfaction with Mandatory Adoption of an E-Government Technology", Journal of the Association for Information Systems, Vol. 11, No. 10, 2010, pp. 519-549. https://doi.org/10.17705/1jais.00239
  32. Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling", Modern Methods for Business Research, 1998, pp. 295-336.
  33. Chin, W. W. and Gopal, A., "Adoption Intention in GSS : Importance of Beliefs", ACM SIGMIS Database, Vol. 26, No. 2-3, 1995, pp. 42-64. https://doi.org/10.1145/217278.217285
  34. Colesca, S. E. and Dobrica, L., "Adoption and Use of E-Government Services : The Case of Romania", Journal of Applied Research and Technology, Vol. 6, No. 3, 2008, pp. 204-217.
  35. Davis, F. D., "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 319-340. https://doi.org/10.2307/249008
  36. Davis, F. D., Bagozzi, R. P., and Warshaw, P. R., "User Acceptance of Computer Technology : A Comparison of Two Theoretical Models", Management Science, Vol. 35, No. 8, 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
  37. DeLone, W. H. and McLean, E. R., "Information Systems Success : The Quest for the Dependent Variable", Information Systems Research, Vol. 3, No. 1, 1992, pp. 60-95. https://doi.org/10.1287/isre.3.1.60
  38. Dimitrova, D. V., Chen, Y. C., "Profiling the Adopters of E-Government Information and Services, The Influence of Psychological Characteristics, Civic Mindedness, and Information Channels", Social Science Computer Review, Vol. 24, No. 2, 2006, pp. 172-188. https://doi.org/10.1177/0894439305281517
  39. Elgarah, W. and Falaleeva, N., "Adoption of Biometric Technology : Information Privacy and TAM", Proceeings of the Eleventh Americas Conference on Information Systems, 2005, pp. 1208-1212.
  40. Falk, R. F. and Miller, N. B., A Primer for Soft Modeling, Ohio : University of Akron Press, 1992.
  41. Fornell, C. and Larcker, D., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
  42. Fu, J. R., Fam, C. K., and Chao, W. P., "Acceptance of Electronic Fax Filing : A Study of Taxpayer Intentions", Information and Management, Vol. 43, No. 1, 2006, pp. 109-126. https://doi.org/10.1016/j.im.2005.04.001
  43. Furnell, S. M., Dowland, A. S., Illingworth, H. M., and Reynolds, P. L., "Authentication and Supervision : A Survey of User Attitudes", Computer and Security, Vol. 19, No. 6, 2000, pp. 529-539. https://doi.org/10.1016/S0167-4048(00)06027-2
  44. Gefen, D., Karahanna, E., and Straub, D. W., "Trust and TAM in Online Shopping : An Integrated Model", MIS Quarterly, Vol. 27, No. 1, 2003, pp. 51-90. https://doi.org/10.2307/30036519
  45. Harbach, M., Fahl, S., Rieger, M., and Smith, M., "On the Acceptance of Privacy-Preserving Authentication Technology : The Curious Case of National Identity Cards", Privacy Enhancing Technologies, Vol. 7981, 2013, pp. 245-264. https://doi.org/10.1007/978-3-642-39077-7_13
  46. Herath, T., Chen, R., Wang, J., Banjara, K., and Rao, J. W. H. R., "Security Services as Coping Mechanisms : An Investigation into user intention to adopt an Email Authentication Service", Information Systems Journal, Vol. 24, No. 1, 2014, pp. 61-84. https://doi.org/10.1111/j.1365-2575.2012.00420.x
  47. Hu, P. J. H., Brown, S. A., Thong, J. Y. L., Chan, F. K. Y., and Tam, K. Y., "Determinants of Service Quality and Continuance Intention of Online Services : The Case of eTax", Journal of the American Society for Information Science and Technology, Vol. 60, No. 2, 2009, pp. 292-306. https://doi.org/10.1002/asi.20956
  48. Kim, H. W. and Kankanhalli, A., "Investigating User Resistance to Information Systems Implementation : A Status Quo Bias Perspective", MIS Quarterly, Vol. 33, No. 3, 2009, pp. 567-582. https://doi.org/10.2307/20650309
  49. Laudon, K. C. and Laudon, J. P., Management Information Systems, Managing the Digital Firm, Boston : Pearson, 2012.
  50. Liu, Y. and Zhou, C., "A Citizen Trust Model for E-government", 2010 IEEE International Conference on Software Engineering and Service Sciences, 2010, pp. 751-754.
  51. Loo, W. H., Yeow, P. H. P., and Chong, S. C., "User Acceptance of Malaysian Government Multipurpose Smartcard Applications", Government Information Quarterly, Vol. 26, No. 2, 2009, pp. 358-367. https://doi.org/10.1016/j.giq.2008.07.004
  52. Looi, H. C., "E-Commerce Adoption in Brunei Darussalam : A Quantitative Analysis of Factors Influencing Its Adoption", Communications of the Association for Information Systems, Vol. 15, No. 1, 2005, pp. 61-81.
  53. Ma, W. W. K., Andersson, R., and Streith, K. O., "Examining User Acceptance of Computer Technology : An Empirical Study of Student Teachers", Journal of Computer Assisted Learning, Vol. 21, No. 6, 2005, pp. 387-395. https://doi.org/10.1111/j.1365-2729.2005.00145.x
  54. Nam, C. S., Bahn, S. W., and Lee, R., "Acceptance of Assistive Technology by Special Education Teachers : A Structural Equation Model Approach", International Journal of Human-Computer Interaction, Vol. 29, No. 5, 2013, pp. 365-377. https://doi.org/10.1080/10447318.2012.711990
  55. Nunnally, J. C., Psychometric Theory, NY : McGrow-Hill, 1987.
  56. Petter, S., Straub, D., and Rai, A., "Specifying Formative Constructs in Information Systems Research", MIS Quarterly, Vol. 31, No. 4, 2007, pp. 623-656. https://doi.org/10.2307/25148814
  57. Phang, C. W., Sutanto, J., Kankanhalli, A., Yan, L., Tan, B. C. Y., and Teo, H. H., "Senior Citizens' Acceptance of Information Systems : A Study in the Context of e-Government Services", IEEE Transactions on Engineering Management, Vol. 53, No. 4, 2006, pp. 555-569. https://doi.org/10.1109/TEM.2006.883710
  58. Ringle, C. M., Wende, S., and Will, A., SmartPLS 2.0., www.smartpls.de, 2005.
  59. Shareef, M. A., Archer, N., and Dwivedi, Y. K., "Examining Adoption Behavior of Mobile Government", Journal of Computer Information Systems, Vol. 53, No. 2, 2012, pp. 39-49.
  60. Silvey, S. D., "Multicollinearity and Imprecise Estimation", Journal of the Royal Statistical Society, Vol. 31, No. 3, 1969, pp. 539-552.
  61. Smith, K. W., Sasaki, M. S., "Decreasing Multicollinearity : A Method for Models with Multiplicative Functions", Sociological Methods and Research, Vol. 8, No. 1, 1979, pp. 35-56. https://doi.org/10.1177/004912417900800102
  62. Srivastava, S. C. and Teo, T. S., "Citizen Trust Development for E-Government Adoption and Usage : Insights from Young Adults in Singapore", Communications of the Association for Information Systems, Vol. 25, No. 1, 2009, pp. 359-378.
  63. Taherdoost, H., Sahibuddin, S., and Jalaliyoon, N., "Smart Card Security; Technology and Adoption", International Journal of Security, Vol. 5, No. 2, 2011, pp. 74-84.
  64. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C., "PLS Modeling", Computational Statistics and Data Analysis, Vol. 48, No. 1, 2005, pp. 159-205. https://doi.org/10.1016/j.csda.2004.03.005
  65. Thompson, R., Barclay, D. W., and Higgins, C. A., "The Partial Least Squares(PLS) Approach to Causal Modeling : Personal Computer Adoption and Use as an Illustration", Technology Studies : Special Issue on Research Methodology, Vol. 2, No. 2, 1995, pp. 284-324.
  66. Vatanasombut, B., Igbaria, M., Stylianou, A. C., and Rodgers, W., "Information Systems Continuance Intention of Web-based Applications Customers : The Case of Online Banking", Information and Management, Vol. 45, No. 7, 2008, pp. 419-428. https://doi.org/10.1016/j.im.2008.03.005
  67. Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User Acceptance of Information Technology : Toward a Unified View", MIS Quarterly, Vol. 27, No. 3, 2003, pp. 425-478. https://doi.org/10.2307/30036540
  68. Wang, B. R., Park, J. Y., Chung, K. Y., and Choi, I. Y., "Influential Factors of Smart Health Users According to Usage Experience and Intention to Use", Wireless Personal Communications, Vol. 76, No. 4, 2014, pp. 2671-2683.
  69. Wang, Y. S., "The Adoption of Electronic Tax Filing Systems : An Empirical Study", Government Information Quarterly, Vol. 20, No. 4, 2003, pp. 333-352. https://doi.org/10.1016/j.giq.2003.08.005
  70. Wetzels, M., Odekerken-Schroder, G., and Oppen, C. V., "Using PLS Path Modeling for Assessing Hierarchical Construct Models : Guidelines and Empirical Illustration", MIS Quarterly, Vol. 33, No. 1, 2009, pp. 177-195. https://doi.org/10.2307/20650284
  71. Yoon, H. S. and OccenA, L., "Impacts of Customers' Perceptions on Internet Banking Use with a Smart Phone", Journal of Computer Information Systems, Vol. 53, No. 3, 2014, pp. 1-9.
  72. Zviran, M. and Erlich, Z., "Identification and Authentication : Technology and Implementation", Communication of the Association for Information Systems, Vol. 17, No. 4, 2006, pp. 90-105.