메뉴 건너뛰기




Volumn 24, Issue 1, 2014, Pages 61-84

Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service

Author keywords

Email authentication service; Information security; Internal and external coping strategies; Protection motivation theory; Security service adoption; Technology acceptance

Indexed keywords

AUTHENTICATION SERVICES; COPING STRATEGIES; PROTECTION MOTIVATION THEORY; SECURITY SERVICES; TECHNOLOGY ACCEPTANCE;

EID: 84889663520     PISSN: 13501917     EISSN: 13652575     Source Type: Journal    
DOI: 10.1111/j.1365-2575.2012.00420.x     Document Type: Article
Times cited : (134)

References (55)
  • 2
    • 19744380329 scopus 로고    scopus 로고
    • Spamming, phishing, authentication, and privacy
    • Bellovin, S.M. (2004) Spamming, phishing, authentication, and privacy. Communications of the ACM, 47, 144-144.
    • (2004) Communications of the ACM , vol.47 , pp. 144-144
    • Bellovin, S.M.1
  • 3
    • 0002042337 scopus 로고    scopus 로고
    • Issues and opinion on structure equation modeling
    • Chin, W.W. (1998) Issues and opinion on structure equation modeling. MIS Quarterly, 22, vii-xvi.
    • (1998) MIS Quarterly , vol.22 , pp. 7-16
    • Chin, W.W.1
  • 4
    • 60049095429 scopus 로고    scopus 로고
    • Knowing is doing: an empirical validation of the relationship between managerial information security awareness and action
    • Choi, N., Kim, D., Goo, J. & Whitmore, A. (2008) Knowing is doing: an empirical validation of the relationship between managerial information security awareness and action. Information Management & Computer Security, 16, 484-501.
    • (2008) Information Management & Computer Security , vol.16 , pp. 484-501
    • Choi, N.1    Kim, D.2    Goo, J.3    Whitmore, A.4
  • 5
    • 0001960725 scopus 로고
    • Test validation
    • Thorndike, R.L. (ed.) American Council on Education, Washington, DC, USA.
    • Cronbach, L.J. (1971) Test validation. In: Educational Measurement (2nd Edition), Thorndike, R.L. (ed.), pp. 443-507. American Council on Education, Washington, DC, USA.
    • (1971) Educational Measurement (2nd Edition) , pp. 443-507
    • Cronbach, L.J.1
  • 6
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use and user acceptance of information technology
    • Davis, F.D. (1989) Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly, 13, 319-340.
    • (1989) MIS Quarterly , vol.13 , pp. 319-340
    • Davis, F.D.1
  • 7
    • 84936823933 scopus 로고
    • User acceptance of computer technology: a comparison of two theoretical models
    • Davis, F.D., Bagozzi, R.P. & Warshaw, P.R. (1989) User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35, 982-1002.
    • (1989) Management Science , vol.35 , pp. 982-1002
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 8
    • 33645133251 scopus 로고    scopus 로고
    • An extended privacy calculus model for e-commerce transactions
    • Dinev, T. & Hart, P. (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61-80.
    • (2006) Information Systems Research , vol.17 , pp. 61-80
    • Dinev, T.1    Hart, P.2
  • 9
    • 23844486347 scopus 로고    scopus 로고
    • In search of coherence: a review of e-mail research
    • Ducheneaut, N. & Watts, L.A. (2005) In search of coherence: a review of e-mail research. Human-Computer Interaction, 20, 11-48.
    • (2005) Human-Computer Interaction , vol.20 , pp. 11-48
    • Ducheneaut, N.1    Watts, L.A.2
  • 10
    • 0036206977 scopus 로고    scopus 로고
    • An investigation of the determinants of investment risk behavior in employer-sponsored retirement plans
    • Dulebohn, J.H. (2002) An investigation of the determinants of investment risk behavior in employer-sponsored retirement plans. Journal of Management, 28, 3-26.
    • (2002) Journal of Management , vol.28 , pp. 3-26
    • Dulebohn, J.H.1
  • 11
    • 84889684999 scopus 로고    scopus 로고
    • FTC FTC report to congress: privacy online: fair information practices in the electronic marketplace: federal trade commission.
    • FTC (2000) FTC report to congress: privacy online: fair information practices in the electronic marketplace: federal trade commission.
    • (2000)
  • 12
    • 23844488077 scopus 로고    scopus 로고
    • Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study
    • Gardner, M. & Steinberg, L. (2005) Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study. Developmental Psychology, 41, 625-635.
    • (2005) Developmental Psychology , vol.41 , pp. 625-635
    • Gardner, M.1    Steinberg, L.2
  • 13
    • 29444460597 scopus 로고    scopus 로고
    • A practical guide to factorial validity using PLS-graph: tutorial and annotated example
    • Gefen, D. & Straub, D. (2005) A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Communications of the Association for Information systems, 16, 91-109.
    • (2005) Communications of the Association for Information systems , vol.16 , pp. 91-109
    • Gefen, D.1    Straub, D.2
  • 14
    • 0002544658 scopus 로고    scopus 로고
    • Software security and privacy risks in mobile e-commerce
    • Anup K. Ghosh , Tara M. Swaminatha. (2001) Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44, 51-57.
    • (2001) Communications of the ACM , vol.44 , pp. 51-57
    • Ghosh, A.K.1    Swaminatha, T.M.2
  • 16
    • 84889647057 scopus 로고    scopus 로고
    • Harminka Latest SonicWALL email security statistics show rising threat from PDF and ZIP spam. HULIQ.
    • Harminka (2007) Latest SonicWALL email security statistics show rising threat from PDF and ZIP spam. HULIQ.
    • (2007)
  • 17
    • 0038880247 scopus 로고
    • Preference and belief: ambiguity and competence in choice under uncertainty
    • Heath, C. & Tversky, A. (1991) Preference and belief: ambiguity and competence in choice under uncertainty. Journal of Risk and Uncertainty, 4, 5-28.
    • (1991) Journal of Risk and Uncertainty , vol.4 , pp. 5-28
    • Heath, C.1    Tversky, A.2
  • 18
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness
    • Herath, T. & Rao, H.R. (2009a) Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47, 154-165.
    • (2009) Decision Support Systems , vol.47 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 19
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: a framework for security policy compliance in organisations
    • Herath, T. & Rao, H.R. (2009b) Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18, 106-125.
    • (2009) European Journal of Information Systems , vol.18 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 20
    • 33745046300 scopus 로고    scopus 로고
    • Understanding the adoption of multipurpose information appliances: the case of mobile data services
    • Hong, S.-J. & Tam, K.Y. (2006) Understanding the adoption of multipurpose information appliances: the case of mobile data services. Information Systems Research, 17, 162-179.
    • (2006) Information Systems Research , vol.17 , pp. 162-179
    • Hong, S.-J.1    Tam, K.Y.2
  • 22
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: an empirical study
    • Johnston, A.C. & Warkentin, M. (2010) Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34, 1-20.
    • (2010) MIS Quarterly , vol.34 , pp. 1-20
    • Johnston, A.C.1    Warkentin, M.2
  • 23
    • 0001094004 scopus 로고    scopus 로고
    • Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs
    • Karahanna, E., Straub, D.W. & Chervany, N.L. (1999) Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23, 183-213.
    • (1999) MIS Quarterly , vol.23 , pp. 183-213
    • Karahanna, E.1    Straub, D.W.2    Chervany, N.L.3
  • 24
    • 84990586591 scopus 로고
    • How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition
    • Kruegar, N.J. & Dickson, P.R. (1994) How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition. Decision Sciences, 25, 385-400.
    • (1994) Decision Sciences , vol.25 , pp. 385-400
    • Kruegar, N.J.1    Dickson, P.R.2
  • 25
    • 9744226442 scopus 로고    scopus 로고
    • Sources of influence on beliefs about information technology use: an empirical study of knowledge workers
    • Lewis, W., Agarwal, R. & Sambamurthy, V. (2003) Sources of influence on beliefs about information technology use: an empirical study of knowledge workers. MIS Quarterly, 27, 657-678.
    • (2003) MIS Quarterly , vol.27 , pp. 657-678
    • Lewis, W.1    Agarwal, R.2    Sambamurthy, V.3
  • 26
    • 77955121478 scopus 로고    scopus 로고
    • Understanding security behaviors in personal computer usage: a threat avoidance perspective
    • Liang, H. & Xue, Y. (2010) Understanding security behaviors in personal computer usage: a threat avoidance perspective. Journal of the Association for Information System, 11, 394-413.
    • (2010) Journal of the Association for Information System , vol.11 , pp. 394-413
    • Liang, H.1    Xue, Y.2
  • 27
    • 33847761422 scopus 로고    scopus 로고
    • Assimilation of enterprise systems: the effect of institutional pressures and mediating role of the top management
    • Liang, H., Saraf, N., Hu, Q. & Xue, Y. (2007) Assimilation of enterprise systems: the effect of institutional pressures and mediating role of the top management. MIS Quarterly, 31, 59-87.
    • (2007) MIS Quarterly , vol.31 , pp. 59-87
    • Liang, H.1    Saraf, N.2    Hu, Q.3    Xue, Y.4
  • 28
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: a theoretical perspective
    • Liang, H.G. & Xue, Y.J. (2009) Avoidance of information technology threats: a theoretical perspective. MIS Quarterly, 33, 71-90.
    • (2009) MIS Quarterly , vol.33 , pp. 71-90
    • Liang, H.G.1    Xue, Y.J.2
  • 29
    • 10644254580 scopus 로고    scopus 로고
    • Beyond concern - a privacy-trust-behavioral intention model of electronic commerce
    • Liu, C., Marchewka, J.T., Lu, J. & Yu, C.-S. (2005) Beyond concern - a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42, 289-304.
    • (2005) Information & Management , vol.42 , pp. 289-304
    • Liu, C.1    Marchewka, J.T.2    Lu, J.3    Yu, C.-S.4
  • 31
    • 0035736917 scopus 로고    scopus 로고
    • Self-presentational determinants of health risk behavior among college freshmen
    • Martin, K.A. & Leary, M.R. (2001) Self-presentational determinants of health risk behavior among college freshmen. Psychology & Health, 16, 17-27.
    • (2001) Psychology & Health , vol.16 , pp. 17-27
    • Martin, K.A.1    Leary, M.R.2
  • 32
    • 0033653826 scopus 로고    scopus 로고
    • Protection motivation and risk communication
    • Neuwirth, K., Dunwoody, S. & Griffin, R.J. (2000) Protection motivation and risk communication. Risk Analysis, 20, 721-734.
    • (2000) Risk Analysis , vol.20 , pp. 721-734
    • Neuwirth, K.1    Dunwoody, S.2    Griffin, R.J.3
  • 34
    • 0036015965 scopus 로고    scopus 로고
    • Web site usability, design, and performance metrics
    • Palmer, J.W. (2002) Web site usability, design, and performance metrics. Information Systems Research, 13, 151-167.
    • (2002) Information Systems Research , vol.13 , pp. 151-167
    • Palmer, J.W.1
  • 35
    • 67649951505 scopus 로고    scopus 로고
    • Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model
    • Pavlou, P.A. (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7, 101-134.
    • (2003) International Journal of Electronic Commerce , vol.7 , pp. 101-134
    • Pavlou, P.A.1
  • 36
    • 33847764616 scopus 로고    scopus 로고
    • Understanding and mitigating uncertainty in online exchange relationships: a principle-agent perspective
    • Pavlou, P.A., Liang, H. & Xue, Y. (2007) Understanding and mitigating uncertainty in online exchange relationships: a principle-agent perspective. MIS Quarterly, 31, 105-136.
    • (2007) MIS Quarterly , vol.31 , pp. 105-136
    • Pavlou, P.A.1    Liang, H.2    Xue, Y.3
  • 37
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: a critical review of the literature and recommended remedies
    • Podsakoff, P.M., MacKenzie, S.B., Lee, J.-Y. & Podsakoff, N.P. (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.-Y.3    Podsakoff, N.P.4
  • 38
    • 84889633622 scopus 로고    scopus 로고
    • SmartPLS 2.0 (M3) Beta. Hamburg.
    • Ringle, C.M., Wende, S. & Will, S. (2005) SmartPLS 2.0 (M3) Beta. Hamburg.
    • (2005)
    • Ringle, C.M.1    Wende, S.2    Will, S.3
  • 39
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R.W. (1975) A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 93-114.
    • (1975) Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 40
    • 0002247369 scopus 로고
    • Cognitive and physiological process in fear appeals and attitude change: a revised theory of protection motivation
    • Petty, R. (ed.) Guilford Press, New York.
    • Rogers, R.W. (1983) Cognitive and physiological process in fear appeals and attitude change: a revised theory of protection motivation. In: Social Psychophysiology: A Source Book, Petty, R. (ed.), pp. 153-176. Guilford Press, New York.
    • (1983) Social Psychophysiology: A Source Book , pp. 153-176
    • Rogers, R.W.1
  • 41
    • 0002551409 scopus 로고    scopus 로고
    • Current technological impediments to business-to-consumer electronic commerce
    • Rose, G., Khoo, H. & Straub, D. (1999) Current technological impediments to business-to-consumer electronic commerce. Communications of the AIS, 1, 1-74.
    • (1999) Communications of the AIS , vol.1 , pp. 1-74
    • Rose, G.1    Khoo, H.2    Straub, D.3
  • 42
    • 0242530341 scopus 로고    scopus 로고
    • A refined view of download time impacts on e-consumer attitudes and patronage intentions toward e-retailers
    • Rose, G.M., Lee, J. & Meuter, M.L. (2001) A refined view of download time impacts on e-consumer attitudes and patronage intentions toward e-retailers. The International Journal on Media Management, 3, 105-111.
    • (2001) The International Journal on Media Management , vol.3 , pp. 105-111
    • Rose, G.M.1    Lee, J.2    Meuter, M.L.3
  • 43
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: measuring individuals' concerns about organizational practices
    • Smith, H.J., Milberg, S.J. & Burke, S.J. (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167-197.
    • (1996) MIS Quarterly , vol.20 , pp. 167-197
    • Smith, H.J.1    Milberg, S.J.2    Burke, S.J.3
  • 44
    • 84942798526 scopus 로고
    • Cognitive processes in health enhancement: investigation of a combined protection motivation and self-efficacy model
    • Stanley, M.A. & Maddux, J.E. (1986) Cognitive processes in health enhancement: investigation of a combined protection motivation and self-efficacy model. Basic and Applied Social Psychology, 7, 101-113.
    • (1986) Basic and Applied Social Psychology , vol.7 , pp. 101-113
    • Stanley, M.A.1    Maddux, J.E.2
  • 45
    • 84991128944 scopus 로고
    • Men's motivation to perform the testicle self-exam: effects of prior knowledge and an educational brochure
    • Steffen, V.J. (1990) Men's motivation to perform the testicle self-exam: effects of prior knowledge and an educational brochure. Journal of Applied Social Psychology, 20, 681-702.
    • (1990) Journal of Applied Social Psychology , vol.20 , pp. 681-702
    • Steffen, V.J.1
  • 46
    • 0036004583 scopus 로고    scopus 로고
    • An empirical examination of the concern for information privacy instrument. [Article]
    • Stewart, K.A. & Segars, A.H. (2002) An empirical examination of the concern for information privacy instrument. [Article]. Information Systems Research, 13, 36-49.
    • (2002) Information Systems Research , vol.13 , pp. 36-49
    • Stewart, K.A.1    Segars, A.H.2
  • 47
    • 84889663953 scopus 로고    scopus 로고
    • Symantec Corp Symantec Global Internet Security Threat Report Trends for 2009 (Vol. XV).
    • Symantec Corp (2010) Symantec Global Internet Security Threat Report Trends for 2009 (Vol. XV).
    • (2010)
  • 48
    • 0034434546 scopus 로고    scopus 로고
    • Managing the costs of informational privacy: pure bundling as a strategy in the individual health insurance market
    • Thatcher, M.E. & Clemons, E.K. (2000) Managing the costs of informational privacy: pure bundling as a strategy in the individual health insurance market. Journal of Management Information Systems, 17, 29-58.
    • (2000) Journal of Management Information Systems , vol.17 , pp. 29-58
    • Thatcher, M.E.1    Clemons, E.K.2
  • 49
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: toward a unified view
    • Venkatesh, V., Morris, M.G., Davis, G.B. & Davis, F.D. (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, 27, 425-478.
    • (2003) MIS Quarterly , vol.27 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 50
    • 84878277951 scopus 로고    scopus 로고
    • An empirical exploration of the design pattern of phishing attacks
    • Upadhyaya, S.J. & Rao, H.R. (eds) Emerald Group Publishing Ltd., Bingley, England.
    • Wang, J., Chen, R., Herath, T. & Rao, H.R. (2009a) An empirical exploration of the design pattern of phishing attacks. In: Annals of Emerging Research in Information Assurance, Security and Privacy Services, Upadhyaya, S.J. & Rao, H.R. (eds), pp. 259-284. Emerald Group Publishing Ltd., Bingley, England.
    • (2009) Annals of Emerging Research in Information Assurance, Security and Privacy Services , pp. 259-284
    • Wang, J.1    Chen, R.2    Herath, T.3    Rao, H.R.4
  • 51
    • 70350752562 scopus 로고    scopus 로고
    • Visual e-mail authentication and identification services: an investigation of the effect on e-mail use
    • Wang, J., Chen, R., Herath, T. & Rao, H.R. (2009b) Visual e-mail authentication and identification services: an investigation of the effect on e-mail use. Decision Support Systems, 48, 92-102.
    • (2009) Decision Support Systems , vol.48 , pp. 92-102
    • Wang, J.1    Chen, R.2    Herath, T.3    Rao, H.R.4
  • 52
    • 77955101093 scopus 로고    scopus 로고
    • Chapter II: IT security governance and centralized security controls
    • Warkentin, M. & Vaughn, R. (eds) Idea Group Publishing, Hershey, PA, USA.
    • Warkentin, M. & Johnston, A.C. (2006) Chapter II: IT security governance and centralized security controls. In: Information Assurance and System Security: Managerial and Technical Issues, Warkentin, M. & Vaughn, R. (eds), pp. 16-24. Idea Group Publishing, Hershey, PA, USA.
    • (2006) Information Assurance and System Security: Managerial and Technical Issues , pp. 16-24
    • Warkentin, M.1    Johnston, A.C.2
  • 53
    • 84869780575 scopus 로고    scopus 로고
    • A Protection Motivation Theory Approach to Home Wireless Security. Paper presented at the Twenty-Fifth International Conference on Information Systems, Las Vegas, NV, USA.
    • Woon, I.M.Y., Tan, G.W. & Low, R.T. (2005) A Protection Motivation Theory Approach to Home Wireless Security. Paper presented at the Twenty-Fifth International Conference on Information Systems, Las Vegas, NV, USA.
    • (2005)
    • Woon, I.M.Y.1    Tan, G.W.2    Low, R.T.3
  • 54
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: a threat control model and empirical test
    • Workman, M., Bommer, W.H. & Straub, D. (2008) Security lapses and the omission of information security measures: a threat control model and empirical test. Computers in Human Behavior, 24, 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 55
    • 84871016866 scopus 로고    scopus 로고
    • Consumers Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal. Paper presented at the European Conference on Information Systems.
    • Xu, H. & Teo, H.H. (2005) Consumers Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal. Paper presented at the European Conference on Information Systems.
    • (2005)
    • Xu, H.1    Teo, H.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.