DOI QR코드

DOI QR Code

A Study on the Dual Mediating Effects of Individual Optimistic Bias and Information Security Intent in the Relationship between Information Security Attitude and Information Security Behavior of Social Welfare College Students

사회복지 전공대학생의 정보보안 태도와 정보보안 행위와의 관계에서 개인의 낙관적 편견과 정보보안 의도의 이중 매개효과

  • Yun, Il-Hyun (Dept. of School of Social Work, Gwangju University)
  • Received : 2021.11.08
  • Accepted : 2021.12.20
  • Published : 2021.12.31

Abstract

This study empirically verified whether there is a dual mediating effect of individual optimistic bias and information security intention in the relationship between information security attitude and information security behavior of social welfare college students. The subjects were 295 college students majoring in social welfare. Spss Process macro was used for analysis. As a result. first there was a significant positive correlation between the variables. Second in the relationship between information security attitude and information security behavior, individual optimistic bias and information security intent each had a simple mediating effect. Third when an individual's optimistic bias and information security intent were simultaneously input, each had a simple mediating effect. Fourth there was a double mediating effect between individual optimistic bias and information security intent. This study provided basic data for the expansion of information security model and information security education of social welfare students.

본 연구는 사회복지 전공대학생의 정보보안 태도와 정보보안 행위와의 관계에서 개인의 낙관적 편견과 정보보안 의도의 이중 매개효과가 있는지 실증 검증하는 데 있다. 사회복지 전공대학생 295명을 대상으로 하였다. 수집된 자료는 SPSS Process macro를 활용하여 빈도분석, 기술통계 분석, 요인분석과 신뢰도 분석, 상관분석, 부트스트랩을 이용하여 분석하였다. 그 결과 첫째, 변인 간에는 모두 유의한 상관관계가 있었다. 둘째, 정보보안 태도와 정보보안 행위의 관계에서 개인의 낙관적 편견과 정보보안 의도는 각각 단순 매개효과가 있었다. 셋째, 정보보안 태도와 정보보안 행위의 관계에서 개인의 낙관적 편견과 정보보안 의도를 동시 투입하였을 때 각각 단순 매개효과가 있었다. 넷째, 개인의 낙관적 편견과 정보보안 의도는 이중 매개효과가 있었다. 본 연구는 사회복지 전공대학생들의 정보보안에 대한 정보보안 태도, 개인의 낙관적 편견, 정보보안 의도, 정보보안 행위를 활용한 모델의 확장성과 사회복지 정보보안 교육을 위한 기초 자료를 제공하였다.

Keywords

Acknowledgement

This Study was conducted by research funds from Gwangju University in 2021.

References

  1. D. S. Jun & D. W. Kim. (2016). Perceived Severity and Its Effects on Awareness of Personal Information Rights. Journal & Article Management System, 30(1), 345-367. DOI : 10.18398/kjlgas.2016.30.1.345
  2. M. S. Kim & S. T. Kim. (2014). A Study on Intention to Accept the Right to be Forgotten Associated with Exposure of Personal Data. Korean Journal of Journalism and Communication Studies, (2), 307-336.
  3. (2021. 10. 13.). http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1366
  4. A. R. Lee, S. M. Son, H. J. Kim & B. S. Kim(2016). Improving Personal Data Protection in IoT Environments. Journal of The Korea Institute of Information Security & Cryptology, 26(4), 995-1012. DOI: 10.13089/JKIISC.2016.26.4.995
  5. http://lic.welfare.net/lic/ViewCertRegime.action#tab_01
  6. B. R. Lee. (2013). Human Rights Decisions on Protection of Personal Information and Case management in the Field of Social-welfare: Based on decisions recommended by National Human Rights Commission of Korea. Korea Public Land Law Association Public Land Law Review, (62), 467-490.
  7. G. B. Kwon. (2012). Informational Human Rights and the National Human Rights Commission. Constitutional studies, 18(2), 99-142.
  8. L. Tredinnick. (2008). Digital information culture: the individual and society in the digital age, Amsterdam: Elsevier.
  9. R. W. Lee, I. H. Hwang & S. H. Hu(2017). Exploratory research of information security strategy-focused on human factors. The Journal of General Education, 6, 103-124. DOI: 10.24173/jge.2017.12.6.4
  10. H. J. kwon. (2021). A Study on Factors Influencing Job Performance of Information Security Education Service: Cyber Security in Health and Medical Sector. Soongsil University.
  11. C. L. Anderson & R. Agarwal. (2010). Practicing Safe Computing : A Multi method Empirical Examination of Home Computer User Security Behavioral Intentions, MIS Quarterly, 34(3), 613-643. DOI: 10.2307/25750694
  12. C. O. Park & S. W. Lee. (2014). A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory. Journal of Internet Computing and Services, 15(2), 59-71. DOI: 10.7472/jksii.2014.15.2.59
  13. H. Y. Sin. (2013). An empirical study on information security behavior intent of smartphone users. Yeungnam University.
  14. D. O. Kang & M. H. Chang. (2016). The Influence of Information Security Behaviors on Information Security Performance in Shipping and Port Organization. Journal of Korean Navigation and Port Research, 40(4), 213-222. DOI: 10.5394/KINPR.2016.40.4.213
  15. J. G. Choi. (2014). An Empirical Study on the Relationship of Personal Optimistic Bias and Information Security Awareness and Behavior and Behavior in the Activity of Information Ethics. Seoul Venture University.
  16. K. E. Min, S. J. Kim & D. S. Kwon. (2016). The effects on privacy protection behavior through mobile messenger security awareness and security intention: Focus on Theory of Self-Determination. Management Information Systems review, 35(1), 207-233. DOI: 10.29214/damis.2016.35.1.011
  17. K. H. Lee, K. S. Han & J. S. Jung. (2016). A Study of Influencing Factors for Compliance Intention of Personal Information Protection Policy of Public Institution Employees. Entrue Journal of Information Technology, 15(1), 75-94.
  18. K. A. Park. (2019). A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior. Journal of the Korea Industrial Information Systems Research, 24(4), 79-98. DOI: 10.9723/jksiis.2019.24.4.079
  19. N. D. Weinstein. (1980). Unrealistic optimism about future life events, Journal of Personality and Social Psychology, 39(5), 806-820. DOI: 10.1037/0022-3514.39.5.806
  20. H. J. Woo. (2014). Exploring the Relationship between the Perceived Risk to Cyber Security and the Behavioral Intention to Technology Acceptance and Sustainable Use for Promoting Personal Information Security : focusing on Involvement, Protection Motivation, and Intention to Payment. Journal of Communication Science, 14(2), 220-257. DOI: 10.14696/jcs.2014.06.14.2.220
  21. J. K. Kim & S. H. Kim. (2013). Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory. Informatization Policy, 20(3), 63-85.
  22. M. S. Yim. (2013). The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees. Journal of Digital Convergence, 11(1), 27-38. https://doi.org/10.14400/JDPM.2013.11.1.027
  23. L. A. Catherine & A. Ritu. (2010). Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Quarterly, 34(3), 613-644. DOI: 10.2307/25750694
  24. Davis, F. (1989). Perceived Usefulness, Perceived Ease of Use, and Use cceptance of Information Technology. MIS Quarterly, 13(3), 319-340. DOI: 10.2307/249008
  25. S. J. Lee & M. J. Lee. (2008). An Exploratory Study on the Information Security Culture Indicator. Journal of Informatization policy, 15(3), 100-120.
  26. F. A. Hayes. (2018). Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach(2ed). New York, NY: The Guilford Press.
  27. H. S. Rhee, Y. Ryu & C. T. Kim. (2005). I Am Fine but You Are Not: Optimistic Bias and Illusion of Control on Information Security. ICIS 2005 Proceedings. DOI: 10.1016/j.cose.2011.12.001
  28. S. H. Park, S. H. Lee & E. M. Ham. (2008). The Relationship between Optimistic Bias about Health Crisis and Health Behavior. Journal of Korean Academy of Nursing, 38(3), 403-409. DOI: 10.4040/jkan.2008.38.3.403
  29. N. D. Weinstein, S. E. Marcus & R. P. Moser. (2005). Smokers' unrealistic optimism about their risk. Tobacco Control, 14(1), 55-59. DOI: 10.1136/tc.2004.008375