The Impact of Potential Risks on the Use of Exploitable Online Communities: The Case of South Korean Cyber-Security Communities
Abstract
:1. Introduction
2. Theoretical Background
2.1. Online Community and Cyber-Security Community
2.2. The Theory of Planned Behaviour (TPB)
2.3. Prospect Theory
2.4. Perceived Risk Theory
3. Research Model and Hypotheses Development
4. Research Methodology
4.1. Measurement Development
4.2. Data Collection
4.3. Sample /Selection
5. Data Analysis and Results
5.1. Measurement Model Validation
5.2. Structural Model Validation
6. Discussions
6.1. Empirical Findings and Contributions
6.2. Theoretical Implications
6.3. Practical Implications
6.4. Limitations
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Constructs | Items | Source |
---|---|---|
Intention | I intend to use cyber-security communities in the near future. I intend to use cyber-security communities to learn information protection skills in the near future. I intend to use cyber-security community frequently in the near future. | [75] |
Attitude | Using cyber-security communities is a good idea. Using cyber-security communities is a wise idea. I like the idea of using cyber-security communities. Using cyber-security communities would be pleasant. | [75] |
Subjective norm | People who are important to me would think that I should use cyber-security communities. People who influence me would think that I should use cyber-security communities. People whose opinions are valuable to me would prefer that I use cyber-security communities. | [75,76] |
Perceived behavioural control | I would be able to use cyber-security communities. Using cyber-security communities is entirely within my control. I have the resources, knowledge and ability to make use of cyber-security communities. | [75] |
Performance risk | The probability of something going wrong with the performance of cyber-security communities is high. Cyber-security communities may not perform well due to slow download speeds, servers being down or website maintenance. Considering the expected level of service performance of cyber-security communities, using cyber-security communities would be risky. | [45,55] |
Security threats | I am worried about using cyber-security communities because third parties may view the information I provide in these communities either intentionally or accidentally. I am worried about using cyber-security communities because the sensitive information I provide during my use of these communities may not reach its systems either intentionally or accidentally. Using cyber-security communities could pose potential threats to sensitive information because my personal information could be used without my knowledge either intentionally or accidentally. | [45] |
Privacy concerns | I feel that it is dangerous to share sensitive information (e.g., credit card number) with cyber-security communities (reverse coded). I would feel totally safe providing sensitive information about myself to cyber-security communities (reverse coded). I would feel secure sending sensitive information to cyber-security communities (reverse coded). The security and privacy issues related to sensitive information have been a major obstacle to my use of cyber-security communities. Overall, cyber-security communities are safe places to share sensitive information (reverse coded). | [77] |
Time risk | Using cyber-security communities would be inconvenient for me because I would have to waste a lot of time searching or downloading them. Considering the time investment involved, using cyber-security community would be a waste of time. The possible time losses from using cyber-security communities is high. | [45,55] |
Social risk of malicious use | Using cyber-security communities for malicious purposes (e.g., hacking) negatively affects the way others think about you. Using cyber-security communities for malicious purposes (e.g., hacking) can cause social losses because friends would think less highly of you. Using cyber-security communities for malicious purposes (e.g., hacking) may result in the loss of people close to you who have a negative attitude towards hackers. | [45,55] |
Psychological risk | Using cyber-security communities could cause unnecessary concerns and stress. Using cyber-security communities could cause unwanted anxiety and confusion. Using cyber-security communities could cause discomfort. | [45,55] |
Perceived value | Considering the hacking information required, using cyber-security communities is a good deal. Considering the time and effort involved, using cyber-security communities is worthwhile to me. Considering the risk involved, using cyber-security communities is still valuable. Overall, using cyber-security communities delivers value. | [78] |
References
- Korea Internet & Security Agency. 2030 Future Social Changes and Cyber Threat Prospects of 8 Promising ICT Technologies. KISA Insight 2022, 1, 1–47. [Google Scholar]
- National Intelligence Service; Ministry of Science and ICT; Ministry of Public Administration and Security; Korea Communications Commission; Financial Services Commission. National Information Security White Paper. Available online: https://www.kisa.or.kr/20303/form?postSeq=--12--1&page=1 (accessed on 1 March 2022).
- Alhogail, A. Enhancing information security best practices sharing in virtual knowledge communities. VINE J. Inf. Knowl. Manag. Syst. 2020, 51, 550–572. [Google Scholar] [CrossRef]
- Agrawal, V. Information Security Risk Management Practices: Community-Based Knowledge Sharing. Ph.D. Thesis, Norwegian University of Science and Technology, Trondheim, Norway, 2018. [Google Scholar]
- Yue, W.T.; Wang, Q.-H.; Hui, K.-L. See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums. MIS Q. 2019, 43, 73–95. [Google Scholar] [CrossRef]
- Tamjidyamcholo, A.; Bin Baba, M.S.; Shuib, N.L.M.; Rohani, V.A. Evaluation model for knowledge sharing in information security professional virtual community. Comput. Secur. 2014, 43, 19–34. [Google Scholar] [CrossRef]
- Agrawal, V.; Wasnik, P.; Snekkenes, E.A. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice. In Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management—KMIS, Funchal, Portugal, 1–3 November 2017; pp. 50–60. [Google Scholar] [CrossRef]
- David, D.P.; Keupp, M.M.; Mermoud, A. Knowledge absorption for cyber-security: The role of human beliefs. Comput. Hum. Behav. 2020, 106, 106255. [Google Scholar]
- Safa, N.S.; Von Solms, R.; Furnell, S. Information security policy compliance model in organizations. Comput. Secur. 2016, 56, 70–82. [Google Scholar] [CrossRef]
- Cheung, M.F.; To, W. The influence of the propensity to trust on mobile users’ attitudes toward in-app advertisements: An extension of the theory of planned behavior. Comput. Hum. Behav. 2017, 76, 102–111. [Google Scholar] [CrossRef]
- Heirman, W.; Walrave, M. Predicting adolescent perpetration in cyberbullying: An application of the theory of planned behavior. Psicothema 2012, 24, 614–620. [Google Scholar]
- Pelaez, A.; Chen, C.-W.; Chen, Y.X. Effects of Perceived Risk on Intention to Purchase: A Meta-Analysis. J. Comput. Inf. Syst. 2019, 59, 73–84. [Google Scholar] [CrossRef]
- Yang, Q.; Pang, C.; Liu, L.; Yen, D.C.; Tarn, J.M. Exploring consumer perceived risk and trust for online payments: An empirical study in China’s younger generation. Comput. Hum. Behav. 2015, 50, 9–24. [Google Scholar] [CrossRef]
- Bruckman, A.S. Should You Believe Wikipedia? Online Communities and the Construction of Knowledge; Cambridge University Press: Cambridge, UK, 2022. [Google Scholar]
- Malinen, S. Understanding user participation in online communities: A systematic literature review of empirical studies. Comput. Hum. Behav. 2015, 46, 228–238. [Google Scholar] [CrossRef]
- Jordan, T.; Taylor, P.A. Hacktivism and Cyber Wars: Rebels with a Cause; Routledge: London, UK, 2004. [Google Scholar]
- Holt, T.J. Lone hacks or group cracks: Examining the social organization of computer hackers. In Crimes of the Internet; Smalleger, F., Pittaro, M., Eds.; Pearson Prentice Hall: Upper Saddle River, NJ, USA, 2009; pp. 336–355. [Google Scholar]
- Benjamin, V.; Valacich, J.S.; Chen, H. DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics. MIS Q. 2019, 43, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Gharibshah, J.; Li, T.C.; Vanrell, M.S.; Castro, A.; Pelechrinis, K.; Papalexakis, E.E.; Faloutsos, M. InferIP: Extracting actionable information from security discussion forums. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Sydney, Australia, 31 July–3 August 2017; pp. 301–304. [Google Scholar]
- Gharibshah, J.; Gharibshah, Z.E.; Papalexakis, E.; Faloutsos, M. An empirical study of malicious threads in security forums. In Proceedings of the Companion Proceedings of the 2019 World Wide Web Conference, San Francisco, CA, USA, 13–17 May 2019; pp. 176–182. [Google Scholar]
- Hackerone. The 2018 Hacker Report. 2018. Available online: https://ma.hacker.one/rs/168-NAU-732/images/the-2018-hacker-report.pdf (accessed on 23 February 2022).
- Xu, Z.; Hu, Q.; Zhang, C. Why computer talents become computer hackers. Commun. ACM 2013, 56, 64–74. [Google Scholar] [CrossRef]
- Chng, S.; Lu, H.Y.; Kumar, A.; Yau, D. Hacker types, motivations and strategies: A comprehensive framework. Comput. Hum. Behav. Rep. 2022, 5, 100167. [Google Scholar] [CrossRef]
- Biswas, B.; Mukhopadhyay, A.; Bhattacharjee, S.; Kumar, A.; Delen, D. A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums. Decis. Support Syst. 2022, 152, 113651. [Google Scholar] [CrossRef]
- Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Processes 1991, 50, 179–211. [Google Scholar] [CrossRef]
- Ajzen, I. The theory of planned behaviour: Reactions and reflections. Psychol. Health 2011, 26, 1113–1127. [Google Scholar] [CrossRef]
- Fishbein, M.; Ajzen, I. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Philos. Rhetor. 1977, 6, 244–245. [Google Scholar]
- Han, H.; Hsu, L.-T.; Sheu, C. Application of the Theory of Planned Behavior to green hotel choice: Testing the effect of environmental friendly activities. Tour. Manag. 2010, 31, 325–334. [Google Scholar] [CrossRef]
- Park, N.; Yang, A. Online environmental community members’ intention to participate in environmental activities: An application of the theory of planned behavior in the Chinese context. Comput. Hum. Behav. 2012, 28, 1298–1306. [Google Scholar] [CrossRef]
- Hasani, L.; Indonesia, U.; Santoso, H.; Junus, K. Instrument Development for Investigating Students’ Intention to Participate in Online Discussion Forums: Cross-Cultural and Context Adaptation Using SEM. J. Educ. Online 2021, 18. [Google Scholar] [CrossRef]
- Ha, N.; Nguyen, T. The effect of trust on consumers’ online purchase intention: An integration of TAM and TPB. Manag. Sci. Lett. 2019, 9, 1451–1460. [Google Scholar] [CrossRef]
- Chang, M.K. Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior. In Citation Classics from the Journal of Business Ethic; Springer: Dordrecht, The Netherlands, 2013; pp. 433–445. [Google Scholar]
- Serenko, A. Antecedents and Consequences of Explicit and Implicit Attitudes toward Digital Piracy. Inf. Manag. 2022, 59, 103559. [Google Scholar] [CrossRef]
- Shaikh, F.B.; Rehman, M.; Amin, A.; Shamim, A.; Hashmani, M.A. Cyberbullying Behaviour: A Study of Undergraduate University Students. IEEE Access 2021, 9, 92715–92734. [Google Scholar] [CrossRef]
- Lee, M.-C. Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electron. Commer. Res. Appl. 2009, 8, 130–141. [Google Scholar] [CrossRef]
- Tanveer, A.; Zeng, S.; Irfan, M.; Peng, R. Do Perceived Risk, Perception of Self-Efficacy, and Openness to Technology Matter for Solar PV Adoption? An Application of the Extended Theory of Planned Behavior. Energies 2021, 14, 5008. [Google Scholar] [CrossRef]
- Featherman, M.S.; Pavlou, P.A. Predicting e-services adoption: A perceived risk facets perspective. Int. J. Hum. Comput. Stud. 2003, 59, 451–474. [Google Scholar] [CrossRef] [Green Version]
- Kahneman, D.; Tversky, A. On the interpretation of intuitive probability: A reply to Jonathan Cohen. Cognition 1979, 7, 409–411. [Google Scholar] [CrossRef]
- Barberis, N. Thirty Years of Prospect Theory in Economics: A Review and Assessment. J. Econ. Perspect. 2013, 27, 173–196. [Google Scholar] [CrossRef] [Green Version]
- Abdellaoui, M.; Barrios, C.; Wakker, P.P. Reconciling introspective utility with revealed preference: Experimental arguments based on prospect theory. J. Econ. 2007, 138, 356–378. [Google Scholar] [CrossRef]
- Kim, H.-W.; Chan, H.C.; Gupta, S. Value-based Adoption of Mobile Internet: An empirical investigation. Decis. Support Syst. 2007, 43, 111–126. [Google Scholar] [CrossRef]
- Chu, B.; Holt, T.J.; Ahn, G.J. Examining the Creation, Distribution, and Function of Malware On-Line; National Institute of Justice: Washington, DC, USA, 2010.
- Voiskounsky, A.E.; Smyslova, O.V. Flow-Based Model of Computer Hackers’ Motivation. CyberPsychology Behav. 2003, 6, 171–180. [Google Scholar] [CrossRef] [PubMed]
- Pogrebna, G.; Skilton, M. Cybersecurity Threats: Past and Present. In Navigating New Cyber Risks; Palgrave Macmillan: Cham, Switzerland, 2019; pp. 13–29. [Google Scholar]
- Holt, T.J.; Bossler, A.M. Examining the Relationship Between Routine Activities and Malware Infection Indicators. J. Contemp. Crim. Justice 2013, 29, 420–436. [Google Scholar] [CrossRef]
- Kaur, S.; Arora, S. Understanding customers’ usage behavior towards online banking services: An integrated risk–benefit framework. J. Financ. Serv. Mark. 2022, 1–25. [Google Scholar] [CrossRef]
- Martins, C.; Oliveira, T.; Popovič, A. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. Int. J. Inf. Manag. 2014, 34, 1–13. [Google Scholar] [CrossRef]
- Li, Z.; Sha, Y.; Song, X.; Yang, K.; Zhao, K.; Jiang, Z.; Zhang, Q. Impact of risk perception on customer purchase behavior: A meta-analysis. J. Bus. Ind. Mark. 2020, 35, 76–96. [Google Scholar] [CrossRef]
- Shiue, Y.-C.; Chiu, C.-M.; Chang, C.-C. Exploring and mitigating social loafing in online communities. Comput. Hum. Behav. 2010, 26, 768–777. [Google Scholar] [CrossRef]
- Wang, W.; Liu, X.; Chen, X.; Qin, Y. Risk assessment based on hybrid FMEA framework by considering decision maker’s psychological behavior character. Comput. Ind. Eng. 2019, 136, 516–527. [Google Scholar] [CrossRef]
- Jaspers, E.D.; Pearson, E. Consumers’ acceptance of domestic Internet-of-Things: The role of trust and privacy concerns. J. Bus. Res. 2022, 142, 255–265. [Google Scholar] [CrossRef]
- Sharma, G.; Bajpai, N.; Kulshreshtha, K.; Tripathi, V.; Dubey, P. Foresight for online shopping behavior: A study of attribution for “what next syndrome”. Foresight 2019, 21, 285–317. [Google Scholar] [CrossRef]
- Wu, I.-L.; Chiu, M.-L.; Chen, K.-W. Defining the determinants of online impulse buying through a shopping process of integrating perceived risk, expectation-confirmation model, and flow theory issues. Int. J. Inf. Manag. 2020, 52, 102099. [Google Scholar] [CrossRef]
- Cocosila, M.; Trabelsi, H. An integrated value-risk investigation of contactless mobile payments adoption. Electron. Commer. Res. Appl. 2016, 20, 159–170. [Google Scholar] [CrossRef]
- Yang, Y.; Liu, Y.; Li, H.; Yu, B. Understanding perceived risks in mobile payment acceptance. Ind. Manag. Data Syst. 2015, 115, 253–269. [Google Scholar] [CrossRef]
- Song, M.; Xing, X.; Duan, Y.; Cohen, J.; Mou, J. Will artificial intelligence replace human customer service? The impact of communication quality and privacy risks on adoption intention. J. Retail. Consum. Serv. 2022, 66, 102900. [Google Scholar] [CrossRef]
- Alexandrou, A.; Chen, L.-C. A security risk perception model for the adoption of mobile devices in the healthcare industry. Secur. J. 2019, 32, 410–434. [Google Scholar] [CrossRef]
- Meland, P.H.; Nesheim, D.A.; Bernsmed, K.; Sindre, G. Assessing cyber threats for storyless systems. J. Inf. Secur. Appl. 2022, 64, 103050. [Google Scholar] [CrossRef]
- Wang, Y.; Gu, J.; Wang, S.; Wang, J. Understanding consumers’ willingness to use ride-sharing services: The roles of perceived value and perceived risk. Transp. Res. Part C Emerg. Technol. 2019, 105, 504–519. [Google Scholar] [CrossRef]
- Al-Gharibi, M.; Warren, M.; Yeoh, W. Risks of Critical Infrastructure Adoption of Cloud Computing by Government. Int. J. Cyber Warf. Terror. 2020, 10, 47–58. [Google Scholar] [CrossRef]
- Kalakota, R.; Whinston, A.B. Electronic Commerce: A Manager’s Guide; Addison-Wesley Professional: Reading, MA, USA, 1997. [Google Scholar]
- Gurung, A.; Raja, M. Online privacy and security concerns of consumers. Inf. Comput. Secur. 2016, 24, 348–371. [Google Scholar] [CrossRef]
- Chan, S.H.; Janjarasjit, S. Insight into hackers’ reaction toward information security breach. Int. J. Inf. Manag. 2019, 49, 388–396. [Google Scholar] [CrossRef]
- Ariffin, S.K.; Mohan, T.; Goh, Y.N. Influence of consumers’ perceived risk on consumers’ online purchase intention. J. Res. Interact. Mark. 2018, 12, 309–327. [Google Scholar] [CrossRef]
- Jiang, L.; Zhou, W.; Ren, Z.; Yang, Z. Make the apps stand out: Discoverability and perceived value are vital for adoption. J. Res. Interact. Mark. 2021. [Google Scholar] [CrossRef]
- Holbrook, M.B. Customer value and autoethnography: Subjective personal introspection and the meanings of a photograph collection. J. Bus. Res. 2005, 58, 45–61. [Google Scholar] [CrossRef]
- Grace-Farfaglia, P.; Dekkers, A.; Sundararajan, B.; Peters, L.; Park, S.-H. Multinational web uses and gratifications: Measuring the social impact of online community participation across national boundaries. Electron. Commer. Res. 2006, 6, 75–101. [Google Scholar] [CrossRef] [Green Version]
- Chen, C.M.; Wen, D.W.; Ou, Y.H.; Chao, W.C.; Cai, Z.X. Retrieving Potential Cybersecurity Information from Hacker Forums. Int. J. Netw. Secur. 2021, 23, 1126–1138. [Google Scholar]
- Armitage, C.J.; Conner, M. Efficacy of the theory of planned behaviour: A meta-analytic review. Br. J. Soc. Psychol. 2001, 40, 471–499. [Google Scholar]
- Han, T.-I.; Stoel, L. Explaining Socially Responsible Consumer Behavior: A Meta-Analytic Review of Theory of Planned Behavior. J. Int. Consum. Mark. 2017, 29, 91–103. [Google Scholar] [CrossRef] [Green Version]
- Anderson, J.C.; Gerbing, D.W. Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach. Psychol. Bull. 1988, 103, 411–423. [Google Scholar] [CrossRef]
- Nunnally, J.C. Psychometric Theory, 2nd ed.; McGraw-Hill: New York, NY, USA, 1978. [Google Scholar]
- Bagozzi, R.P.; Yi, Y. On the Evaluation of Structural Equation Models. J. Acad. Mark. Sci. 1988, 16, 74–94. [Google Scholar] [CrossRef]
- Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
- Ajzen, I. Constructing a Theory of Planned Behavior Questionnaire. 2006. Available online: http://people.umass.edu/~aizen/pdf/tpb.measurement.pdf (accessed on 10 December 2021).
- Taylor, S.; Todd, P.A. Assessing IT Usage: The Role of Prior Experience. J. MIS Q. 1995, 19, 561–570. [Google Scholar] [CrossRef] [Green Version]
- Pavlou, P.A.; Liang, H.; Xue, Y. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective. MIS Q. 2007, 31, 105. [Google Scholar] [CrossRef] [Green Version]
- Sirdeshmukh, D.; Singh, J.; Sabol, B. Consumer Trust, Value, and Loyalty in Relational Exchanges. J. Mark. 2002, 66, 15–37. [Google Scholar] [CrossRef]
Category | Frequency | Percent | |
---|---|---|---|
Gender | Male | 181 | 75.1 |
Female | 60 | 24.9 | |
Age | 15−19 | 17 | 7.1 |
20−29 | 147 | 61.0 | |
30−39 | 59 | 24.5 | |
Over 40 | 18 | 7.4 | |
Experience of using online hacker communities | Never | 77 | 32.0 |
More than once ever | 27 | 11.2 | |
More than once a year | 56 | 23.2 | |
More than once a month | 60 | 24.9 | |
More than once a week | 21 | 8.7 | |
Penetration tests or hacking attempts | Never | 65 | 27.0 |
1−10 times | 130 | 54.0 | |
11−20 times | 15 | 6.2 | |
21−50 times | 22 | 9.1 | |
≥51 times | 9 | 3.7 |
Construct | Alpha | AVE | CR | INT | ATT | SN | PBC | PVL | PPR | SCT | PVC | PLR | SOR | PR |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
INT | 0.943 | 0.719 | 0.884 | 0.847 | ||||||||||
ATT | 0.937 | 0.684 | 0.896 | 0.572 | 0.827 | |||||||||
SN | 0.886 | 0.528 | 0.769 | 0.227 | 0.050 | 0.726 | ||||||||
PBC | 0.874 | 0.577 | 0.800 | 0.314 | 0.073 | 0.066 | 0.759 | |||||||
PVL | 0.948 | 0.732 | 0.916 | 0.486 | 0.664 | 0.020 | 0.058 | 0.855 | ||||||
PPR | 0.887 | 0.550 | 0.784 | −0.211 | −0.482 | 0.078 | 0.108 | −0.319 | 0.741 | |||||
SCT | 0.911 | 0.607 | 0.821 | −0.332 | −0.589 | 0.077 | −0.018 | −0.371 | 0.536 | 0.770 | ||||
PVC | 0.975 | 0.734 | 0.943 | −0.266 | −0.467 | 0.027 | 0.005 | −0.311 | 0.414 | 0.557 | 0.856 | |||
PLR | 0.894 | 0.553 | 0.786 | −0.119 | −0.256 | −0.139 | 0.072 | −0.163 | 0.343 | 0.325 | 0.187 | 0.743 | ||
SOR | 0.900 | 0.574 | 0.801 | −0.138 | −0.082 | −0.222 | −0.043 | −0.110 | 0.177 | 0.106 | 0.078 | 0.251 | 0.757 | |
PR | 0.885 | 0.584 | 0.807 | −0.50 | −0.074 | −0.056 | 0.017 | 0.020 | 0.314 | 0.190 | 0.108 | 0.260 | 0.107 | 0.764 |
Attitude | Intention to Use | |||||
---|---|---|---|---|---|---|
Criterion Variable Predictors | Direct Effects | Indirect Effects | Total Effects | Direct Effects | Indirect Effects | Total Effects |
Performance risk | −0.138 * | −0.138 * | −0.058 * | −0.058 * | ||
Security threats | −0.236 ** | −0.074 * | −0.311 ** | −0.131 ** | −0.131 ** | |
Privacy concerns | −0.138 * | −0.138 * | −0.058 * | −0.585 * | ||
Psychological risk | −0.031 | −0.031 | −0.132 | −0.013 | ||
Perceived value | 0.489 ** | 0.489 ** | 0.192 * | 0.206 ** | 0.399 ** | |
Attitudes | 0.422 ** | 0.422 ** | ||||
Subjective norms | 0.191 ** | 0.191 ** | ||||
Perceived behavioural control | 0.268 ** | 0.268 ** | ||||
Privacy concerns | ||||||
Direct effects | Indirect effects | Total effects | ||||
Security threats | 0.535 ** | 0.535 ** | ||||
Subjective norms | ||||||
Direct effects | Indirect effects | Total effects | ||||
Social risk | −0.224 ** | −0.224 ** | −0.043 ** | −0.043 * | ||
Perceived behavioural control | ||||||
Direct effects | Indirect effects | Total effects | ||||
Time risk | −0.747 | −0.747 | −0.02 | −0.02 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jang, J.; Kim, B. The Impact of Potential Risks on the Use of Exploitable Online Communities: The Case of South Korean Cyber-Security Communities. Sustainability 2022, 14, 4828. https://doi.org/10.3390/su14084828
Jang J, Kim B. The Impact of Potential Risks on the Use of Exploitable Online Communities: The Case of South Korean Cyber-Security Communities. Sustainability. 2022; 14(8):4828. https://doi.org/10.3390/su14084828
Chicago/Turabian StyleJang, Jaeyoung, and Beomsoo Kim. 2022. "The Impact of Potential Risks on the Use of Exploitable Online Communities: The Case of South Korean Cyber-Security Communities" Sustainability 14, no. 8: 4828. https://doi.org/10.3390/su14084828