17.05.2017 Views

Pan-Pacific Conference XXXIV. Designing New Business Models in Developing Economies

This publication represents the Proceedings of the 34th Annual Pan-Pacific Conference being held in Lima, Peru May 29-31, 2017. The Pan-Pacific Conference has served as an important forum for the exchange of ideas and information for promoting understanding and cooperation among the peoples of the world since 1984. Last year, we had a memorable conference in Miri, Malaysia, in cooperation with Curtin University Sarawak, under the theme of “Building a Smart Society through Innovation and Co-creation.” Professor Pauline Ho served as Chair of the Local Organizing Committee, with strong leadership support of Pro Vice-Chancellor Professor Jim Mienczakowski and Dean Jonathan Winterton.

This publication represents the Proceedings of the 34th Annual Pan-Pacific Conference being held in Lima, Peru May 29-31, 2017. The Pan-Pacific Conference has served as an important forum for the exchange of ideas and information for promoting understanding and cooperation among the peoples of the world since 1984. Last year, we had a memorable conference in Miri, Malaysia, in cooperation with Curtin University Sarawak, under the theme of “Building a Smart Society through Innovation and Co-creation.” Professor Pauline Ho served as Chair of the Local Organizing Committee, with strong leadership support of Pro Vice-Chancellor Professor Jim Mienczakowski and Dean Jonathan Winterton.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Can Ethics Be Used as a Tool of Information Security Management?<br />

Kyung Hoon Yang<br />

Department of Information Systems, School of <strong>Bus<strong>in</strong>ess</strong> Adm<strong>in</strong>istration, University of Wiscons<strong>in</strong>, La Crosse,<br />

yang.kyun@uwlax.edu<br />

Young-Chan Lee<br />

Management Science, Division of Economics & Commerce, Dongguk University, 707 Seokjang-dong, Gyeongju,<br />

Gyeongbuk, Korea 780-714<br />

chanlee@dongguk.ac.kr<br />

Abstract<br />

The objectives of this study are twofold. The first is to f<strong>in</strong>d<br />

whether ethics related to <strong>in</strong>formation society are differently<br />

recognized from other bus<strong>in</strong>ess ethical issues and whether<br />

its <strong>in</strong>fluential factors are also different. The second is how<br />

sense of security, sense of ethics <strong>in</strong> <strong>in</strong>formation society,<br />

sense of knowledge-shar<strong>in</strong>g, and onl<strong>in</strong>e user participation<br />

relate to each other.<br />

The authors found that the perception of <strong>in</strong>formation ethics<br />

is differently recognized from other ethics such as sexual<br />

discrim<strong>in</strong>ation, racial discrim<strong>in</strong>ation, price discrim<strong>in</strong>ation,<br />

bribery, harmful products, telecommunication, pollution<br />

issues, and <strong>in</strong>tellectual property protection issues.<br />

For this research, the authors used the protection<br />

motivation theory and built a model that shows the<br />

relationship between several ethical issues and knowledge<br />

shar<strong>in</strong>g, security and participation <strong>in</strong> the virtual<br />

community. This was verified by a survey with 497<br />

samples. We expect these f<strong>in</strong>d<strong>in</strong>gs will be helpful for<br />

future researchers and practitioners.<br />

Key words: Ethics, Knowledge shar<strong>in</strong>g, security,<br />

Protection Motivation Theory<br />

I. Introduction<br />

In this paper, the authors <strong>in</strong>sist that <strong>in</strong>formation ethics and<br />

<strong>in</strong>formation security have a common goal. Ethics means<br />

different th<strong>in</strong>gs to different people accord<strong>in</strong>g to the<br />

situation, and there is a relationship among ethics, security,<br />

knowledge shar<strong>in</strong>g, knowledge acceptance and onl<strong>in</strong>e user<br />

participation. The Protection motivation theory (PMT),<br />

developed by Ross, was used to provide a theoretical<br />

background to demonstrate the relationship among<br />

knowledge shar<strong>in</strong>g, ethics and security. In this paper, the<br />

authors will argue that: 1) ethics of different fields have<br />

different factors and therefore a level of ethics of agency<br />

(people or organizations) can be different depend<strong>in</strong>g on the<br />

categories, 2) the sense of security and sense of ethics <strong>in</strong><br />

<strong>in</strong>formation society are related to each other, 3) security is<br />

related to knowledge acceptance while ethics are related to<br />

knowledge transfer. For this purpose, <strong>in</strong> section two,<br />

literature related to ethics, security and knowledge shar<strong>in</strong>g<br />

was reviewed. In section three, the model and hypotheses<br />

are set up. In section four, the surveys are analyzed and the<br />

results discussed. In section five, a conclusion is made.<br />

II.<br />

Literature review: relationship between<br />

security and ethics<br />

When an <strong>in</strong>dividual is transferr<strong>in</strong>g their knowledge to<br />

another person, they are vulnerable to hav<strong>in</strong>g their<br />

expertise and knowledge stolen. Therefore, many<br />

83<br />

<strong>in</strong>dividuals protect themselves and their <strong>in</strong>formation <strong>in</strong><br />

different ways us<strong>in</strong>g different security measures. Some<br />

<strong>in</strong>dividuals protect their knowledge by us<strong>in</strong>g copyrights<br />

and patents to legally prevent others from lay<strong>in</strong>g claim to<br />

their ideas. Others are more concerned with the steal<strong>in</strong>g of<br />

<strong>in</strong>formation en route to the recipient, so their <strong>in</strong>formation is<br />

encrypted to prevent others from steal<strong>in</strong>g it. Companies<br />

emphasize security first when they are try<strong>in</strong>g to transfer<br />

knowledge with<strong>in</strong> the company from one area to another.<br />

Usually, policies are put <strong>in</strong> place so that employees do not<br />

have access to all company <strong>in</strong>formation. Only employees<br />

who need that <strong>in</strong>formation can access it, so that knowledge<br />

is kept on a “need to know” basis.<br />

The emphasized use of security over ethics dur<strong>in</strong>g the<br />

knowledge transfer process can lead to <strong>in</strong>dividuals mak<strong>in</strong>g<br />

decisions that are overly on the offensive.<br />

III.<br />

Research model and hypotheses<br />

1. Protection Motivation Theory<br />

The Protection Motivation Theory (PMT), developed by<br />

Rogers <strong>in</strong> 1975 and later revised by Rogers and Maddux <strong>in</strong><br />

1983, describes different ways that <strong>in</strong>dividuals cope with<br />

health threats. This theory can also be used to analyze why<br />

agents <strong>in</strong>clud<strong>in</strong>g companies and <strong>in</strong>dividuals make certa<strong>in</strong><br />

decisions about their security policies. The relationships<br />

among trust, security, and ethics <strong>in</strong> knowledge shar<strong>in</strong>g can<br />

be expla<strong>in</strong>ed based upon PMT.<br />

In PMT, threat appraisal and cop<strong>in</strong>g appraisal are two key<br />

factors. Threat appraisal concerns the process of evaluat<strong>in</strong>g<br />

the components of a fear appeal that are relevant to an<br />

<strong>in</strong>dividual’s perception of how threatened he or she feels.<br />

The PMT variables that capture threat appraisal are<br />

perceived vulnerability, perceived severity, and fear<br />

arousal. Perceived vulnerability assesses how personally<br />

susceptible an <strong>in</strong>dividual feels about the communicated<br />

threat. Perceived severity assesses how serious the<br />

<strong>in</strong>dividual believes that the threat would be to his or her<br />

own life. Fear arousal assesses how much fear the threat<br />

evokes for the <strong>in</strong>dividual. Fear is seen as an <strong>in</strong>terven<strong>in</strong>g<br />

variable; the more vulnerable an <strong>in</strong>dividual feels about a<br />

threat and the more serious he or she believes it to be, the<br />

more fear will be aroused and the greater the appraised<br />

threat will be. The greater the perceived threat, the more<br />

likely the <strong>in</strong>dividual is to be motivated to protect himself or<br />

herself; that is, the more likely a behavioral <strong>in</strong>tention to<br />

adopt a protective behavior will be formed.<br />

Cop<strong>in</strong>g appraisal evaluates the components of a fear appeal<br />

that are relevant to an <strong>in</strong>dividual’s assessment of the<br />

recommended cop<strong>in</strong>g response to the appraised threat. The<br />

PMT <strong>in</strong>cludes self-efficacy and response costs <strong>in</strong> the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!