DOI QR코드

DOI QR Code

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors

핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서

  • 배재권 (계명대학교 경영대학 경영정보학전공)
  • Received : 2017.04.21
  • Accepted : 2017.08.07
  • Published : 2017.09.29

Abstract

Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

Keywords

References

  1. 강영모, 이영근, 권현정, 한경석, 정현수, "핀테크 기업의 정보보안체계 관한 연구", 중소기업정보기술융합학회 논문지, 제6권, 제2호, 2016, pp. 19-24.
  2. 곽관훈, "핀테크 관련 국내법제의 현황과 과제", 강원법학, 제49권, 제1호, 2016, pp. 259-286.
  3. 김상희, 김종기, "온라인 환경에서 프라이버시 의사결정에 영향을 미치는 요인에 관한 연구: 이중계산모델을 중심으로", 정보시스템연구, 제25권, 제3호, 2016, pp. 197-215.
  4. 김정은, 김성준, 권두순, "소셜 네트워크 서비스(SNS) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로", 정보시스템연구, 제25권, 제3호, 2016, pp. 1-30.
  5. 문병순, "핀테크의 동향과 과제 - 개인정보 보호 문제를 중심으로", 은행법연구, 제8권, 제1호, 2015, pp. 29-53.
  6. 박서기, "핀테크 산업 동향과 주요 비즈니스 모델에 대한 연구", 한국멀티미디어학회지, 제19권, 제1호, 2015, pp. 1-8.
  7. 박정국, "핀테크(Fintech)와 정보보안", 정보과학회지, 제1권, 특집호, 2015, pp. 23-32.
  8. 박혜영, "핀테크 사업 분야별 현황과 한국형 핀테크 산업 성장 방향 모색", 정보와 통신, 제33권, 제2호, 2016, pp. 73-78.
  9. 배재권, "개인용 클라우드 컴퓨팅 서비스의 정보보호 행위에 관한 연구", 로고스경영연구, 제12권, 제4호, 2014, pp, 77-92.
  10. 신세미, 김성준, 권두순, "건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보 보호행위에 관한 연구", 정보보호학회논문지, 제26권, 제6호, 2016, pp. 1619-1637. https://doi.org/10.13089/JKIISC.2016.26.6.1619
  11. 유재필, 허세경, "해외 사례를 통해 알아본 핀테크 보안 이슈 진단 및 보안 추진방향", 정보과학회지, 제1권, 특집호, 2015, pp. 33-36.
  12. 이경전, 허미리, 황보유정, 전정호, "핀테크의 이해", 정보시스템연구, 제25권, 제2호, 2016, pp. 173-189.
  13. 이병관, 손영곤, 이상록, 윤문영, 김민희, 김채린, "건강 관련 행동의 예측을 위한 사회인지이론의 유용성: 국내 건강신념모델 연구의 메타분석", 홍보학연구, 제18권, 제2호, 2014, pp. 163-206.
  14. 이우석, 홍보경, "핀테크의 현황과 법적 과제", 영산법률논총, 제12권, 제2호, 2015, pp. 219-256.
  15. 장국현, 황찬규, 송영우, "환경경영에서 건강신념모델을 이용한 병원환경이 대응성과 건강가치성을 통해 예방행동에 미치는 영향", 디지털산업정보학회논문지, 제12권, 제3호, 2016, pp. 231-257. https://doi.org/10.17662/KSDIM.2016.12.3.231
  16. 장유진, 김영욱, "행위단서, 공포 및 정부신뢰도가 위험인식 및 행동의도에 미치는 영향: 원전사고 이후 일본산 수산물 섭취 이슈 중심 분석", 광고학연구, 제27권, 제8호, 2016, pp. 7-32.
  17. 정준호, 김정숙, "핀테크(FinTech) 서비스의 발전과 주요 보안 이슈", 한국멀티미디어학회지, 제19권, 제1호, 2015, pp. 9-15.
  18. 지범석, 판류, 이상철, 서영호, "정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로", 품질경영학회지, 제39권, 제3호, 2011, pp. 432-443.
  19. 최창열, 함형범, "핀테크 기업의 비즈니스 모델에 대한 이론적 연구", e-비즈니스 연구, 제16권, 제4호, 2015, pp. 85-100.
  20. Ajzen, I., "The theory of planned behavior," Organizational Behavior and Human Decision Processes, Vol. 50, 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  21. Bae, J., "An Empirical Study on the Effect of Leakage Threat of Personal Information on Protective Behavior Intention in Big Data Environment: Based on Health Psychology Theory and Protection Motivation Theory," The e-Business Studies, Vol. 17 No. 3, 2016, pp. 191-208.
  22. Bandura, A., Self-efficacy: The exercise and control, New York: W. H. Freeman, 1997.
  23. Becker, M. H., and Rosenstock, I. M., Compliance with medical advice. In A. Steptoe & A. Mathews (Eds.), Health care and human behavior. London: Academic Press, 1984.
  24. Chin, W. W., "Issues and Opinion on Structural Equation Modeling," MIS Quarterly, Vol. 22, No. 1, 1998, pp. 7-16.
  25. Elliot, A. J., "Approach and Avoidance Motivation and Achievement Goal," Education Psychology, Vol. 34, No.1, 1999, pp. 169-189. https://doi.org/10.1207/s15326985ep3403_3
  26. Fishbein and Ajzen, Belief, attitude, intention, and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley, 1975.
  27. Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
  28. Fulk, J., Steinfield, C. W., Schmitz, J., and Power, J. G. (1987), A Social Information Processing Model of Media Use in Organizations, Communication Research, Vol. 14, No. 5, pp. 529-552. https://doi.org/10.1177/009365087014005005
  29. Ifinedo, P., "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory," Computers & Security, Vol. 31, No. 1, 2012, pp. 83-95. https://doi.org/10.1016/j.cose.2011.10.007
  30. Jones, C. L, Jensen, J. D., Scherr, C. L., Brown, N. R., Christy, K., and Weaver, J.. "The Health Belief Model as an Explanatory Framework in Communication Research: Exploring Parallel, Serial, and Moderated Mediation," Health Commun, Vol. 30, No. 6, 2015, pp. 566-576. https://doi.org/10.1080/10410236.2013.873363
  31. Jones, K. O., Denham, B. E., and Springston, J. K., "Effects of mass and interpersonal communication on breast cancer screening: Advancing agenda-setting theory in health contexts", Journal of Applied Communication Research, Vol. 34, No. 1, 2006, pp. 94-113. https://doi.org/10.1080/00909880500420242
  32. Liang, H. and Xue, Y., "Avoidance of Information Technology Threats: A Theoretical Perspective," MIS Quarterly, Vol. 33, No. 1, 2009, pp. 71-90. https://doi.org/10.2307/20650279
  33. Liang, H. and Xue, Y., "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems, Vol. 11, No. 7, 2010, pp. 393-413.
  34. Ng, B. Y., Kankanhalli, A., and Xu, Y., "Studying Users' Computer Security Behavior: A Health Belief Perspective," Decision Support Systems, Vol. 46, No. 4, 2009, pp. 815-825. https://doi.org/10.1016/j.dss.2008.11.010
  35. Prati, G., Pietrantoni, L., and Zani, B., "A social-cognitive model of pandemic influenza H1N1 risk perception and recommended behaviors in Italy," Risk Analysis, Vol. 31, No. 4, 2011, pp. 645-656. https://doi.org/10.1111/j.1539-6924.2010.01529.x
  36. Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology: Interdisciplinary and Applied, Vol. 91, No. 1, 1975, pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
  37. Rogers, R. W., Cognitive and Physiological Process in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation, in Social Psychophysiology: A Source Book, R. Petty (ed.), New York: Guilford Press, 1983, pp. 153-176.
  38. Rosenstock, I. M., "Historical Origin of the Health Belief Model. In M. H. Becker(Ed.)," The Health Belief Model and personal health behavior, 1974, pp. 1-8.
  39. Rosenstock, I. M., Strecher, V. J. and Becker, M. H., The Health Belief Model and HIV Risk Behavior Change, In Diclemente and Peterson, Preventing AIDS: Theories and Methods of Behavioral Interventions, New York: Plenum Press, 1994, pp. 5-24.
  40. Stillman, M. J., "Women's health beliefs about breast cancer and breast selfexamination," Nursing Research, Vol. 26, No. 2, 1977, pp. 121-127. https://doi.org/10.1097/00006199-197703000-00016
  41. Volk, J. E., and Koopman, C., "Factors Associated with Condom use in Kenya: A Test of The Health Belief Model," AIDS Education and Prevention, Vol. 13, No. 6, 2001, pp. 495-508. https://doi.org/10.1521/aeap.13.6.495.21438
  42. Weinstein, N. D., "Perceived Probability, Perceived Severity, and Health Protective Behavior," Health Psychology, Vol. 19, No. 1, 2000, pp. 65-74. https://doi.org/10.1037/0278-6133.19.1.65
  43. Workman, M., Bommer, W. H., and Straub, D., "The amplification effects of procedural justice on a threat control model of information systems security behaviours," Behaviour & Information Technology, Vol. 28, No. 6, 2009, pp. 563-575. https://doi.org/10.1080/01449290802556021