Next Article in Journal
Linking Psychological Capital to Organizational Commitment: The Moderating Role of Perceived Aversive Leadership of Employees in Angola
Previous Article in Journal
Implementing Key Performance Indicators and Designing Dashboard Solutions in an Automotive Components Company: A Case Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Effect of Motivation on the Behavioral Intention to Protect Industrial Techniques of High-Tech Firms’ Employees

1
Seoul Business School, aSSIST University, Seoul 03767, Republic of Korea
2
Department of Business Economics, Health and Social Care, The University of Applied Sciences and Arts of Southern Switzerland, 6928 Manno, Switzerland
*
Author to whom correspondence should be addressed.
Adm. Sci. 2024, 14(8), 176; https://doi.org/10.3390/admsci14080176
Submission received: 23 July 2024 / Revised: 9 August 2024 / Accepted: 13 August 2024 / Published: 14 August 2024

Abstract

:
This study defines the intrinsic and extrinsic motivational factors that influence the prevention of industrial technology leakage by high-tech company employees. It also investigates how these factors affect the employees’ intention to prevent leakage. Based on the TPB (theory of planned behavior), this study analyzes the relationship between “attitude toward behavior”, “subjective norm”, and “perceived behavioral control”, which in turn influences the behavioral intention to prevent such leakage. Specifically, an online survey was conducted among office workers in South Korea’s high-tech industry. A total of 200 questionnaires were collected and analyzed. As the analysis results show, intrinsic motivation has a positive effect on attitude toward behavior, subjective norms, and perceived behavioral control. Extrinsic motivation has a positive effect on subjective norms and perceived behavioral control but a negative effect on attitudes toward behavior. This study also proved, based on the TPB, that the three variables impact the behavioral intention to prevent technology leakage. These results confirm that, in the high-tech sector, where employees are highly specialized and autonomous, technical security behaviors are primarily influenced by individual professional ethics and judgment rather than by organizational regulation or extrinsic motivation.

1. Introduction

Technology leakage is one of the major problems that severely hamper a company’s competitiveness in high-technology industries. A technology leak can result in a company losing its competitive advantage by exposing its core technology and confidential information to the outside world, which can lead to losses for the national economy. The recent surge in cross-border data and information flows has introduced new economic value and heightened the risk of technology breaches. Consequently, industrial technology outflow crimes are on the rise. Technology leaks also occur in various ways, including industrial espionage and cyberattacks (Kim 2021; McKinsey Global Institute 2016).
The Security Magazine (2024) report estimated the national loss from trade secret theft of industrial technology and other trade secrets to be 1–3% of gross domestic product. Other industrialized nations are also losing technology each year. The United States is estimated to lose approximately USD 250 billion annually due to technology leaks. Furthermore, Germany is estimated to experience 50,000 annual instances of unemployment resulting from industrial espionage. A total of 99 cases of industrial technology leakage were identified in South Korea between 2017 and February 2022. The estimated damage amount is approximately KRW 22 trillion. For instance, a total of 139 instances of industrial technology leaks were recorded in 2023. The breakdown of these leaks by technology was as follows: 15.1% in the machinery sector, 10% in semiconductors, and 7.9% in display technology (National Police Agency 2023).
In the case of industrial technology outflows, the majority of these technologies are not only high-tech in nature and currently occupying a leading position in the global market, they are also the core technologies of new industries that will determine future growth, such as bio-health and artificial intelligence. Consequently, leakage has a profound impact on the national economy. In response, countries are mobilizing their national capabilities to address this issue, ultimately supplementing related systems and strengthening punishment provisions (Kim and Shin 2010; Baele et al. 2018).
Industrial technology leaks from these high-tech companies often occur through insiders, particularly those occupying key technical roles who are directly engaged in research and development (Jung 2024). Given the high percentage of such leaks despite various efforts to protect industrial technology, management measures are of particular importance. Ultimately, strengthening industrial security awareness and systematic leakage prevention efforts among the organization’s employees is imperative to prevent technology leakage.
In light of the existing research on this subject, Ahmad et al. (2014) argued that regularly publicizing a company’s security policy to all employees and establishing an effective training system are necessary. Additionally, Yılmaz and Gönen (2018) observed that even the most minor security measures undertaken by individuals can assist in the prevention of direct industrial technology leaks. Consequently, cultivating a culture of security awareness throughout the organization is important. Ha and Lee (2024) emphasized the necessity of reforming the legal system for industrial protection, identified significant issues in industrial technology law and policy, and suggested potential measures for improvement. Chun and Lee (2014) analyzed cases of industrial technology leaks to identify common patterns and leak pathways and to provide policy implications. Adler and Kahan (2013) and Jung (2024) emphasized the necessity of establishing a consistent response system to protect industrial technology and the urgency of establishing a legal framework. Carrière et al. (1998) and Lee (2020) analyzed the impact of industrial security management activities on companies’ security performance, and Zhu et al. (2016) proposed the introduction of a technology value evaluation system.
As such, most existing research mainly comprises theoretical or legal studies on the importance of technology leakage prevention and management studies on employee compliance with security policies and corporate security performance. Clearly, macro-level policy and legislative considerations are crucial in effectively responding to serious criminal behavior such as intentionally leaking industrial technology (Hwang and Lee 2016; Hwang and Hu 2018; Sung 2024). Nevertheless, these studies are constrained in their capacity to develop practical technology leak prevention strategies and identify root causes. Practical measures must be developed based on in-depth research and empirical validation of the factors influencing industrial technology leaks. This should include a thorough examination of the security awareness, self-control, and organizational attachment of individual members of the organization who are subject to such leaks (Hoecht and Trott 2006; Lee 2020).
Therefore, this study aims to define the intrinsic and extrinsic motivational factors that influence the prevention of leakage by high-tech company employees. This study also investigates how these factors affect the employees’ intention to prevent leakage. Moreover, based on the theory of planned behavior (TPB), this study analyzes the relationship between “attitude toward behavior”, “subjective norm”, and “perceived behavioral control”, which in turn influences the behavioral intention to prevent leakage. Ultimately, this study elucidates the factors that influence the prevention behavior of organizational employees and suggests specific implications for how companies should manage their employees to prevent such leakage.

2. Literature Review and Hypothesis Development

2.1. Motivation and Theory of Planned Behavior

Motivation is the most powerful psychological factor influencing all aspects of human life and behavior (Conner and Armitage 1998). Motivation is the driving force behind behavior, influencing its direction and persistence (Atkinson 1964). In other words, motivation has the ability to provide the energy and direction for behavior. Consequently, motivation is goal-directed behavior, which encompasses not only behavioral aspects but also emotional states (Youn 1999; Hagger and Chatzisarantis 2009a). Motivation is the process of directing and sustaining an organization’s members to voluntarily engage in goal-directed behavior (Landy and Becker 1987; Manning 2011). In other words, it can be understood as the process of guiding members in a certain direction to achieve organizational goals (Robbins and Judge 2011). These motivation theories include intrinsic and extrinsic motivation and the theories of attribution, expected value, self-determination, self-efficacy, achievement goals, and future time perspective, as shown in Table 1.
The most important theories of personal motivation are the intrinsic and extrinsic motivation theories. This is because the primary motivating factors for human behavior derive from two distinct sources: intrinsic motivation, which values intrinsic rewards and self-purposive experiences, and extrinsic motivation, which is activated when extrinsic rewards are accessible (Deci 1971; Hagger and Chatzisarantis 2007). In intrinsic/extrinsic motivation theory, motivation is divided into intrinsic and extrinsic. Intrinsic motivation refers to those aspects of an individual that are driven from within, such as excitement, interest, engagement, seeking adventure and novelty, the pursuit of excellence, the desire for knowledge, the desire to improve, and goal orientation (Fair and Silvestri 1992; Vansteenkiste and Lens 2006). Extrinsic motivation is defined as a form of motivation that is driven by external rewards (Vansteenkiste and Lens 2006), such as external attention, praise, recognition, feedback, and grades.
These intrinsic and extrinsic motivators affect employees’ performance, organizational effectiveness, and employees’ creative behavior on the organizational side of the business. Regarding major previous studies, Pandya (2024) analyzed the impact of intrinsic and extrinsic motivation on organizational performance. A balanced integration of intrinsic and extrinsic motivational strategies has been proven to result in enhanced job satisfaction, higher productivity, and better organizational performance. Sahyunu et al. (2023) examined the impact of intrinsic and extrinsic motivation on employee performance, and their findings indicated that both have a significant impact. It was demonstrated that effectively harnessing both types of motivation can help achieve the highest levels of organizational performance. Delaney and Royal (2017) proposed a framework for enhancing strategies for motivating employees to increase engagement and optimize performance. In their employee engagement strategy, they emphasized the importance of intrinsic and extrinsic motivation in employee engagement.
These intrinsic and extrinsic motivational factors have been linked and studied as influences that explain behavioral intention in the TPB. The Theory of Reasoned Action (TRA) (Ajzen and Fishbein 1980), which explains how an individual’s attitudes and the expectations of those around them influence their behavioral intentions and actual behavior, states that humans generally behave rationally; however, this is limited by the assumption that individuals act solely of their own volition, so they may behave differently in real-world situations. To overcome these constraints, Ajzen (1991) proposed the TPB. In consideration of these human behavioral intentions, Ajzen (1991) suggested that attitudes toward behavior, subjective norms, and perceived behavioral control influence participation intentions and behavior.
First, attitudes toward participation are based on the anticipated outcomes of engaging in a specific action and the value judgments that individuals hold about those outcomes. This is the degree to which one rates the behavior positively or negatively overall. In other words, attitudes toward engagement represent a consistent set of learned and formed tendencies of response or behavior toward a particular object or situation (Fishbein and Ajzen 1975). Subjective norms are defined as an individual’s perception and acceptance of the views of others regarding one’s behavior (Fishbein 1963). Ajzen (1985) explains that subjective norms represent an individual’s perception of whether to perform a particular behavior in relation to those around them who are important to the individual and within their in-group. The concept of perceived behavioral control is an important concept in the TPB and refers to an individual’s perception of how easy or difficult it is for them to perform a particular behavior. According to Ajzen (1991), this concept refers to the extent to which individuals believe that they can control certain behaviors through their own will and ability.

2.2. Motivation and TPB in Relation to Technology Protection

In reviewing the existing literature based on motivation theory in industrial technology and information security, Deci (1971) argued that attitude toward behavior, subjective norms, and perceived behavioral control variables positively influence the intention to prevent leakage. Deci et al. (1999) found that monetary rewards are not always the most effective means of aligning human behavior and that extrinsic motivators can sometimes lead to poor task performance by lowering intrinsic motivation. Safa and Solms (2016) also emphasized the importance of internal and external motivational factors that influence information security policy compliance.
Intrinsic motivation refers to a state in which an individual is motivated by internal rewards, such as interest, pleasure, or a challenge in the behavior itself (Deci and Ryan 1985a). Individuals who are internally motivated to take action are more likely to persist and perform better than those who are externally motivated (Deci and Ryan 2000; Hagger and Chatzisarantis 2009b). These intrinsic motivations influence industrial technology leakage and security behavior.
In response, Workman and Gathegi (2007) argued that ethical factors within intrinsic motivations for security behavior have a significant effect on reinforcing security behavior. Kranz and Haeussinger (2014) demonstrated that compliance with industrial security policies is less about relying on extrinsic motivators, such as norms and sanctions, and more reliant on policies that foster intrinsic motivators, such as a sense of ethics and the communication environment. In a study on the influence of security perceptions on the relationship between intrinsic and extrinsic motivation and security behaviors in organizations, Lee (2020) found that extrinsic rewards alone are insufficient to induce sustainable security activities, and that higher intrinsic motivation increases security behaviors.
As evidenced by previous research, intrinsic motivation in the domain of industrial technology leakage also influences attitudes toward behavior, subjective norms, and perceived behavioral control. In light of these findings, this study formulated the following hypotheses:
H1. 
Intrinsic motivation to protect industrial technology has a positive effect on high-tech employees’ attitudes toward their behavior.
H2. 
Intrinsic motivation to protect industrial technology has a positive effect on subjective norms among high-tech employees.
H3. 
Intrinsic motivation to protect industrial technology has a positive effect on perceived behavioral control among high-tech employees.
Extrinsic motivation refers to the state in which an individual is motivated to perform a particular behavior due to external factors such as rewards, recognition, or the attainment of goals (Deci and Ryan 1985a; Singh 2016). Goel and Rashmi (2023) found that extrinsic motivators such as penalty severity, security breach detection, and normative beliefs positively influence compliance with information security policies. As Fischer et al. (2019) and Padayachee (2012) posit, extrinsic motivational factors that influence security behavior will also influence the factors of planned behavior. In light of these findings, the following hypotheses were formulated:
H4. 
Extrinsic motivation to protect industrial technology has a positive effect on attitudes toward the behavior among high-tech employees.
H5. 
Extrinsic motivation to protect industrial technology has a positive effect on the subjective norms of high-tech employees.
H6. 
Extrinsic motivation to protect industrial technology has a positive effect on perceived behavioral control among high-tech employees.

2.3. Behavioral Intention to Protect Industrial Techniques

Behavioral intention is the probability that an individual will engage in a specific behavior based on their perception of the situation. Fishbein and Ajzen (1975) argued that behavioral intention is an important variable in behavioral theory and refers to the subjective state of mind before a belief is formed, which can influence direct action and lead to the execution of a specific behavior. Ajzen (1991) explained that behavioral intention is a person’s willingness or the extent of effort that they are willing to invest in performing a specific behavior. Thus, a clear belief and commitment to a particular behavior can influence future behavioral decisions (Hungerford and Volk 1990). According to Ajzen and Fishbein (1980), behavioral intentions play an important role in predicting and understanding the emergence of various social behaviors. They suggest that the match between behavioral intent and actual behavior is not always perfect, but that intent to engage can be used as a predictor of behavior when actual behavior is not directly observable.
According to the TPB, individuals with strong intentions are more likely to make an effort to achieve their goals that is aligned with their behaviors (Norman et al. 2005). Consequently, the stronger an individual’s intention to carry out a behavioral goal or plan, the more accurately their behavior can be predicted (Ajzen and Driver 1992). The TPB presents behavioral intentions as a direct determinant of behavior. This is based on the premise that intentions are shaped by an individual’s attitudes toward the behavior in question, subjective norms, and perceived behavioral control (Ajzen 1988, 1991). Ajzen (1988) referred to perceived behavioral control as being similar to self-efficacy. Individuals who hold positive attitudes and subjective norms regarding the performance of a behavior perceive that they are in control of the behavior when they have the opportunity and resources to perform it. This perception is self-efficacy, which pursues the same line of thought as behavioral intention in that it influences positive behavior.
In the literature on organizational behavior, studies related to behavioral intention and the TPB include those conducted by Huang (2023), in which the effects of career stagnation on organizational commitment and turnover intention were examined through attitudes, subjective norms, and perceived behavioral control. Kim and Mou (2020) analyzed the factors affecting information security policy compliance behavior based on the TPB. Based on the TPB model, Otchengco and Akiate (2021) found that attitude, subjective norms, and perceived behavioral control positively influence innovation behavior intention in a manufacturing company.
A review of the existing literature on technology leakage and the information security behavior of organizational members by Sommestad and Hallberg (2013) suggests that the TPB is a valid framework for predicting and explaining information security policy compliance and violation behavior. They found that the key components of attitude, subjective norms, and perceived behavioral control have a significant impact on intentions to comply with information security policies. Ifinedo (2012) suggested that subjective norms, perceived behavioral control, and attitudes in the TPB influence intention in information security behavior. In light of these findings, this study formulated the following hypotheses:
H7. 
High-tech firm employees’ attitudes toward acting to protect industrial technology have a positive effect on their behavioral intentions.
H8. 
The subjective norms of high-tech employees regarding the protection of industrial technology have a positive effect on their behavioral intentions.
H9. 
The perceived behavioral control over industrial technology protection has a positive effect on high-tech employees’ behavioral intentions.

3. Research Methods

3.1. Research Model

This study empirically analyzes the influence of employees’ motivation on industrial technology protection behavior in high-tech companies. The independent variables are intrinsic and extrinsic motivation, and the dependent variable is behavioral intention to prevent industrial technology leakage. The mediating variables are attitudes toward the behavior, subjective norms, and perceived behavioral control. Considering the path analysis based on the structural equation model, the research model was designed as illustrated in Figure 1.

3.2. Measurement Variable and Data Collection

A survey was conducted to collect data for the models. The survey was developed by adapting questions from previous studies (see Table 2). Subsequently, the manipulated variables of the survey components that would comprise the survey were defined. The term “motivational influencing factors on industrial technology protection behavior” refers to the factors that affect the motivation of employees in high-tech enterprises, which are expressed by the intention and effectiveness of such behavior. This refers to the factors that individuals should consider in order to enhance their industrial technology protection.
This study examined the impact of employee motivation on industrial technology protection behavior in high-tech companies based on the TPB, a model that extends the TRA, a psychological theory used to understand and predict human behavioral intentions and actual behavior developed by Ajzen (1991), and categorized them into attitude toward behavior, subjective norms, and perceived behavioral control.
“The attitude toward behavior” refers to the positive judgment an individual makes regarding the implementation of industrial technology protection measures. It refers to an individual’s positive or negative judgment about performing a particular behavior. Accordingly, attitudes toward behavior were defined as an influencing factor for effective industrial technology protection behavior. “Subjective norms” refers to the degree to which an individual’s expectation or recognition is influenced by a governing group to protect or not protect an industrial technology. This study identifies subjective norms as a significant influencing factor for effective industrial technology protection behavior.
“Perceived behavioral control” refers to the degree of difficulty or ease an individual perceives in protecting industrial technology and performing a particular behavior. Accordingly, the variable of perceived behavioral control was defined as a key factor influencing the effectiveness of industrial technology protection behavior. A closer examination of the relationship between behavioral intention and the three factors reveals that the more favorable attitudes there are toward the behavior, the more subjective norms that respect the behavior, and the easier performing the behavior is perceived to be, the stronger the individual’s intention to perform the behavior. In other words, the above three factors influence behavioral intention, which in turn leads to actual behavior.
Self-determination theory (motivation theory) divides behavior into intrinsic and extrinsic motivations. Intrinsic motivation is motivation that stems from personal satisfaction, such as personal pleasure, interest, and joy. Extrinsic motivation, on the other hand, is motivated by outcomes or rewards, such as monetary rewards, social approval, increased self-esteem, or the avoidance of penalties.
“Intrinsic motivation” refers to motivation that is perceived to be rewarding in and of itself, without reference to external rewards. In light of these considerations, the variable of intrinsic motivation was identified as a key influencing factor in shaping attitudes toward behavior, subjective norms, and perceived behavioral control with regard to effective industrial technology protection behavior. This was in alignment with the TPB within the context of a high-tech, industry-based environment.
“Extrinsic motivation” refers to the motivation to obtain a reward for industrial technology protection behavior, such as money, incentives, and prestige. In light of the aforementioned considerations, the variables of extrinsic motivation were defined as factors that influence effective industrial technology protection behavior. This was based on the TPB, which posits that an individual’s attitude toward a behavior, subjective norms, and perceived behavioral control are key determinants of that behavior. The theory was applied in a high-tech, industry-based environment. The dependent variable, “behavioral intention to protect industrial technology leakage”, refers to a person’s intention to voluntarily protect industrial technology or how much effort they are willing to put into it.
These variables were defined as the questions in the questionnaire, which consisted of 21 questions in total. However, the factor analysis resulted in the rejection of one intrinsic motivation factor, one extrinsic motivation factor, and one perceived behavioral control factor. For data analysis, SPSS 26.0 was employed to analyze the demographic characteristics and descriptive statistics, and to conduct exploratory factor analysis. For the path analysis of our hypotheses, AMOS 24.0 was used for confirmatory factor analysis (CFA) based on the structural equation model, model validation, and path analysis. A final CFA was also performed using AMOS.

3.3. Demographic Information from the Data

This study used an online survey and the random sample method of office workers in high-tech industries. The data for this survey were collected between 29 April and 6 May 2024. The survey subjects were members of high-tech companies in South Korea, and companies composed of large companies and SMEs (small and medium-sized companies). Dang et al. (2018) argued that the size of a company can be classified based on its total assets, total sales, and market capitalization, and as per the National Statistical Office in South Korea (2024), large companies mean total assets of 10 trillion or more based on corporate total assets. Accordingly, this study conducted a random survey of a total of 48 companies with total assets of KRW 10 trillion or more and other SMEs. A total of 220 surveys were collected and analyzed, with 8 being excluded on the grounds of dishonesty. This resulted in 200 valid samples (see Table 3).

4. Results

4.1. Reliability and Validity Results

A descriptive statistical analysis was conducted to determine the descriptive statistics of the variables (see Table 4). First, the mean of intrinsic motivation is 3.90, with a standard deviation of 0.575. The mean value for extrinsic motivation is 3.06, with a standard deviation of 0.793. For attitudes, the mean is 4.22, with a standard deviation of 0.596. The mean value for norms is 3.82, with a standard deviation of 0.710. Awareness has a mean of 3.52 and a standard deviation of 0.788. For behavioral intentions, the mean is 3.87, with a standard deviation of 0.645. A normality test was conducted on both the univariate and multivariate forms. Skewness and kurtosis were employed to ascertain the normality of the data. The skewness statistic indicates the degree of asymmetry in a data set. In contrast to a normal distribution, which is symmetrical around the mean, a positive skewness indicates that the data are clustered to the left of the mean, while a negative skewness indicates that the data are clustered to the right, thus resulting in an asymmetrical distribution. A variable is considered to be normally distributed if the skewness does not exceed an absolute value of 3 and the kurtosis does not exceed that of 8 (Kline 2005). A normality check of the responses indicated that the assumption of univariate normality was not invalidated by skewness and kurtosis.
As illustrated in Table 5, factor rotation—Varimax rotation—was conducted using the orthogonal rotation method for exploratory factor analysis, and the Kaiser–Meyer–Olkin (KMO) test and Bartlett’s Test of Sphericity were performed in unison. The KMO Measure of Sampling Adequacy demonstrated an adequate level of suitability at 0.735, and Bartlett’s Test of Sphericity exhibited a value below 0.05, thereby confirming the appropriateness of employing factor analysis. The factor loadings were good, ranging from 0.624 to 0.923, and all above 0.6, and the construct validity (CV) was significant, ranging from 0.700 to 0.949. The average variance extracted (AVE) values ranged from 0.534 to 0.767, and Cronbach’s α values ranged from 0.650 to 0.896. These results indicate that the convergent validity of the instrument is satisfactory.
The goodness-of-fit analysis of the structural equation model of measurement revealed a χ2 (df) of 234.019. The Comparative Fit Index (CFI) value was 0.928, and the Tucker–Lewis Index (TLI) value was 0.906, both of which were significant at levels above 0.9. The Root Mean Squared Error of Approximation (RMSEA) value of 0.079 and the Standardized Root Mean Square Residual (SRMR) value of 0.047, both of which are significant below 0.1, indicate that the measurement model fit the constructs statistically significantly (see Table 6).
Pearson correlation analysis was employed to ascertain the degree of correlation between the variables. The statistical analysis indicates that all factors are significantly correlated, as demonstrated in Table 7. To evaluate discriminant validity, the correlation coefficient squared was also calculated for each variable. The analysis indicates that the value does not exceed the AVE.

4.2. Analysis Results of Structural Model

The goodness-of-fit of the structural model was analyzed (see Table 8, Figure 2), and the resulting χ2 (df) value was 149.764, with a corresponding χ2/degrees of freedom value of 1.498. The model demonstrates satisfactory performance, with a Goodness-of-Fit Index (GFI) of 0.923 and a Normal Fit Index (NFI) of 0.923. The Root Mean Square Residual (RMR) is 0.027, the Adjusted Goodness-of-Fit Index (AGFI) is 0.882, and the RMSEA is 0.050, indicating that the model’s goodness-of-fit is significant. The CFI, which indicates the explanatory power of the model without being affected by the sample, is 0.972, and the TLI, which determines the explanatory power of the structural model, is 0.962. These values indicate that the basic model is a good fit.
Hypothesis testing was conducted through path analysis of the structural equation model, which resulted in the rejection of one of the nine hypotheses. Among the behavioral planning theories, subjective norms (0.739) had no effect on behavioral intention; thus, the hypothesis was rejected. On the other hand, intrinsic motivation had a positive effect on attitude toward the behavior (6.219, p < 0.001), subjective norms (5.713, p < 0.001), and perceived behavioral control (6.040, p < 0.001). Extrinsic motivation had a negative effect on attitude toward the behavior (−3.571), a positive effect on the subjective norms (2.246, p < 0.05), and a positive effect on perceived behavioral control (3.245, p < 0.01). Attitude toward the behavior (7.263, p < 0.001) and perceived behavioral control (4.604, p < 0.001) had a positive effect on behavioral intention.

4.3. Mediated Effect

As presented in Table 9, to assess the significance of the indirect effect, a bootstrapping method was employed to derive the direct, indirect, and total effects. Our path analysis revealed that neither intrinsic nor extrinsic motivational factors served as mediators of subjective norms on behavioral intention. Ultimately, the findings indicate that intrinsic and extrinsic motivation in industrial security are more effective when they mediate attitudes toward behavior and perceived behavioral control for behavioral intentions to emerge. Furthermore, for extrinsic motivation, attitudes toward behavior have a negative effect, which influences the behavioral intention. Consequently, attitudes toward behavior based on extrinsic motivators do not necessarily have a positive effect on behavioral intention, in contrast to intrinsic motivators.

5. Discussions

This study employs the intrinsic and extrinsic motivation theories and the TPB with the aim of determining the intrinsic and extrinsic motivation factors for individual employees preventing industrial technology leakage in high-tech companies. It presents empirical results on the impact of motivational factors on technology leakage prevention behavioral intentions, which are mediated by attitudes toward the behavior, subjective norms, and perceived behavioral control factors. This analysis has led to the following key findings:
First, subjective norms do not influence the behavioral intention of high-tech employees to prevent industrial technology leakage. In this regard, Armitage and Conner (2001) have already highlighted that subjective norms exert a relatively weak influence compared to other factors in the TPB. In the TPB, the subjective norms are the concept of perceived social pressure from others to perform a behavior (Ajzen 1991; Rivis and Sheeran 2003). Consequently, behavioral intentions exhibit differences that are contingent upon the strength of the pressure, as it is not the individual’s subjective norms that influence behavior but rather the pressure of social norms perceived by others. This is because employees in high-tech companies have a high degree of professionalism and autonomy. Consequently, their behavior is driven by their own professional ethics and professional judgment rather than social pressure. A high level of awareness regarding information protection is an intrinsic motivator for individuals engaged in the process of advanced technological development. Furthermore, strong security policies and training programs also have a direct influence on individual behavior. Consequently, the analysis indicates that the behavioral intentions to prevent industrial technology leakage among advanced firms are more likely to be influenced by intrinsic than extrinsic motivational factors.
Second, the findings indicated that extrinsic motivation has a negative impact on attitudes toward behavior. As Deci and Ryan (2000) argued, when humans receive external rewards for an activity that they find enjoyable or satisfying, their interest and willingness to engage in the activity can diminish and even shift to a negative attitude. Moreover, Deci et al. (1999) posited that individuals tend to adopt a negative attitude when they perceive extrinsically motivated rewards as an externally controlling factor. Ultimately, the findings indicate that in terms of industrial technology leak protection behavior, employees in high-tech companies may perceive extrinsic motivators as a form of pressure or stress rather than as positive feedback or rewards. The working environment in high-tech companies is such that a high work intensity and competition create constant performance pressure, which in turn makes extrinsic motivation an additional burden. Furthermore, strict security protocols can create a heightened psychological burden and a fear of noncompliance. This study found that even when extrinsic motivation is stimulated for positive purposes, employees are more likely to perceive it as a source of stress rather than a positive influence. This supports the idea that an emphasis on extrinsic motivators may have a negative effect on fostering behavior to protect companies from industrial technology leaks.
Hence, these results reveal that intrinsic motivation has a stronger influence on employees’ behavioral intentions to prevent industrial technology leakage in high-tech companies than extrinsic motivation. Hagger and Chatzisarantis (2009a) and Kor and Mullan (2011) have argued that the TPB is strongly linked to self-determination, one of individuals’ most intrinsic motivators. The current study established that intrinsic motivational factors exert a stronger influence on attitudes toward behavior, subjective norms, and perceived behavioral control in preventing leaks among high-tech company employees.

6. Conclusions

6.1. Research Implications

The findings indicate three specific implications for high-tech companies with regard to the prevention of future high-tech security leaks. First, enhancing intrinsic motivation may have a positive impact on behavioral intentions to prevent technology leaks. Research on motivation theory suggests that proactive security behaviors can be pursued over the long term by improving an individual’s intrinsic motivation rather than their extrinsic motivation. Intrinsic motivation enhances an individual’s autonomy and self-determination to engage in activities that they naturally find enjoyable and satisfying. To achieve this, companies need to grant their employees autonomy and provide them with the opportunity to participate in decisions related to their work. This is a crucial factor in strengthening employees’ intrinsic motivation.
Furthermore, companies need to facilitate an understanding among their employees regarding the manner in which their work contributes to the company’s goals and vision. Such an approach fosters a sense of importance and value among employees, which in turn contributes to increased intrinsic motivation. Furthermore, providing employees with avenues for personal understanding, growth, and development through ongoing technical security education and training programs is crucial. This can make employees feel more positive about their jobs, which can ultimately have a positive impact on their intentions to engage in technology leak prevention behaviors.
Second, to achieve this, organizations should continue to emphasize the importance of security policies and technology leak prevention through strong internal communications. Furthermore, it is important to raise security awareness among employees through regular meetings, newsletters, training sessions, etc. Additionally, executives and team leaders need to demonstrate exemplary conduct and unwavering compliance with security policies. This creates a positive social pressure on employees, thereby facilitating the influence of subjective norms on behavioral intentions to prevent technical leaks.
Leaders’ demonstration of a willingness to assume responsibility for security compliance conveys a significant message to employees. This can contribute to strengthening security awareness throughout the organization. Moreover, cultivating an atmosphere where employees can influence each other through constructive feedback and recognition regarding security compliance is crucial. For instance, positive social norms can be reinforced by offering incentives to employees who comply well with security policies or by hosting sessions to share best practices.
Third, extrinsic motivation can negatively impact attitudes. Therefore, it is important to minimize it and direct it in a positive direction. Extrinsic motivation can evidently have a detrimental impact on individual autonomy, thereby leading to increased stress and performance pressure. Consequently, it is imperative for companies to enhance their extrinsic reward systems. Rather than merely offering financial incentives, implementing a reward system that fosters a sense of empowerment among employees would be more beneficial. The negative impact of extrinsic motivation can be mitigated by providing non-financial rewards for project completion, such as team-building activities, additional learning opportunities, or time off.
In addition, extrinsic motivation can increase stress and performance pressure, thus underscoring the importance of implementing an effective stress management program. Employers are recommended to provide employees with resources to help them manage stress effectively, such as job stress management workshops, counseling services, or flexible work hours. Additionally, by ensuring that rewards and feedback are fair and transparent, employees feel that their efforts are being properly valued, and extrinsic motivation has a smaller negative impact on their motivation. This can assist employees in maintaining a positive attitude toward their work, which in turn has a positive impact on their intentions to engage in technology breach prevention behaviors.

6.2. Limitations and Future Directions

The findings and implications of this study enhance our comprehension of the technology leakage prevention behavior of individuals in high-tech industries and identify more precise implications for the management of employees in companies to prevent industrial technology leakage. Nevertheless, this study has the following limitations:
First, the specific nature of the sample and the limitations of generalization are limitations. As this study was conducted in South Korean high-tech companies, limitations exist in terms of generalizing the results to other countries or industries. The economic, cultural, social, and legal environments of each country are different, which can result in variations in organizational culture regarding technology leaks. In addition, the perception and management of technology leaks vary depending on the size and type of organization. Research should take these differences into account. This study should be expanded to other countries and industries in the future to compare results.
Second, while this study focuses on intrinsic and extrinsic motivation as the main variables, it does not fully consider other important variables that may affect technology leakage prevention, including personal factors such as personal profit, financial incentives, and career factors such as job satisfaction, competition, and work pressure. This may be a limitation of the explanatory power of the findings. In the future, conducting qualitative research, such as interviews or case studies, would be beneficial to collect more variables to build a more in-depth research model and analyze the interaction of each variable. Further research is required.
Third, this study is constrained by its inability to provide insights into how intrinsic motivation, extrinsic motivation, behavioral attitudes, subjective norms, and perceived behavioral control vary over time. Given the potential for behavioral intentions to change over time in relation to the prevention of technology leakage, adopting a long-term perspective is crucial. Future research could analyze the long-term effects of intrinsic motivation, extrinsic motivation, behavioral attitudes, subjective norms, and perceived behavioral control by conducting a follow-up study to observe changes over time.

Author Contributions

Conceptualization, S.L.; methodology, S.L.; software, S.L.; validation, S.L. and B.K.; formal analysis, B.K.; investigation, S.L. and U.V.I.; resources, S.L. and U.V.I.; data curation, B.K.; writing—original draft preparation, S.L. and B.K.; writing—review and editing, U.V.I. and B.K.; visualization, B.K.; supervision, B.K. and U.V.I.; project administration, U.V.I. and B.K.; funding acquisition, S.L. and U.V.I. All authors have read and agreed to the published version of the manuscript.

Funding

This paper is written with support for research funding from aSSIST University.

Institutional Review Board Statement

Ethic Committee Name: The Research Ethics Committee of aSSIST University Approval Code: The Statistics Act No. 33, 34 Approval Date: 22 July 2024.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data are not publicly available due to the privacy of respondents.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Adler, Barry E., and Marcel Kahan. 2013. The technology of creditor protection. University of Pennsylvania Law Review 161: 1773–814. [Google Scholar]
  2. Ahmad, Atif, Rachelle Bosua, and Rens Scheepers. 2014. Protecting organizational competitive advantage: A knowledge leakage perspective. Computers & Security 42: 27–39. [Google Scholar]
  3. Ajzen, Icek. 1985. From Intentions to Actions: A Theory of Planned Behavior. Berlin/Heidelberg: Springer. [Google Scholar]
  4. Ajzen, Icek. 1988. Attitudes, Personality, and Behavior. Chicago: Dorsey Press. [Google Scholar]
  5. Ajzen, Icek. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes 50: 179–211. [Google Scholar] [CrossRef]
  6. Ajzen, Icek. 2006. Constructing a TpB Questionnaire: Conceptual and Methodological Considerations. Working Paper. Amherst: University of Massachusetts. Available online: http://www-unix.oit.umass.edu/~aizen/pdf/tpb.measurement.pdf (accessed on 15 June 2024).
  7. Ajzen, Icek, and Beverly Driver. 1992. Application of the theory of planned behavior to leisure choice. Journal of Leisure Research 24: 207–24. [Google Scholar] [CrossRef]
  8. Ajzen, Icek, and Martin Fishbein. 1980. Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs: Prentice Hall. [Google Scholar]
  9. Armitage, Christopher, and Mark Conner. 2001. Efficacy of the theory of planned behavior: A meta-analytic review. British Journal of Social Psychology 40: 471–99. [Google Scholar] [CrossRef] [PubMed]
  10. Atkinson, John W. 1964. An Introduction to Motivation. Princeton: Van Nostrand. [Google Scholar]
  11. Baele, Stephane, David Lewis, Anke Hoeffler, Olivier Sterck, and Thibaut Slingeneyer. 2018. The ethics of security research: An ethics framework for contemporary security studies. International Studies Perspectives 19: 105–27. [Google Scholar] [CrossRef]
  12. Bandura, Albert. 1977. Social Learning Theory. Englewood Cliffs: Prentice-Hall. [Google Scholar]
  13. Carrière, Jean-Bernard, Jacqueline Dionne-Proulx, and Yves Beauchamp. 1998. Strategic management of new technologies and prevention of industrial accidents: Theoretical framework and empirical analyses. Human Factors and Ergonomics in Manufacturing & Service Industries 8: 1–22. [Google Scholar]
  14. Chun, Yongtae, and Julak Lee. 2014. An analysis on the industrial technology leakage cases in South Korea. British Journal of Business and Management Research 1: 103–14. [Google Scholar] [CrossRef]
  15. Conner, Mark, and Christopher Armitage. 1998. Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology 28: 1429–64. [Google Scholar] [CrossRef]
  16. Dang, Chongyu, Zhichuan Frank Li, and Chen Yang. 2018. Measuring firm size in empirical corporate finance. Journal of Banking & Finance 86: 159–76. [Google Scholar]
  17. Deci, Edward L. 1971. Effects of externally mediated rewards on intrinsic motivation. Journal of Personality and Social Psychology 18: 105–11. [Google Scholar] [CrossRef]
  18. Deci, Edward L., and Richard M. Ryan. 1985a. Intrinsic Motivation and Self-Determination in Human Behavior. New York: Plenum. [Google Scholar]
  19. Deci, Edward L., and Richard M. Ryan. 1985b. The general causality orientations scale: Self-determination in personality. Journal of Research in Personality 19: 109–34. [Google Scholar] [CrossRef]
  20. Deci, Edward L., and Richard M. Ryan. 2000. The “What” and “Why” of goal pursuits: Human needs and the self-determination of behavior. Psychological Inquiry 11: 227–68. [Google Scholar] [CrossRef]
  21. Deci, Edward L., Richard Koestner, and Richard Ryan. 1999. A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. Psychological Bulletin 125: 627–68. [Google Scholar] [CrossRef] [PubMed]
  22. Delaney, Mark, and Michael Royal. 2017. Breaking engagement apart: The role of intrinsic and extrinsic motivation in engagement strategies. Industrial and Organizational Psychology 10: 127–40. [Google Scholar] [CrossRef]
  23. Dweck, Carol S. 1986. Motivational processes affecting learning. American Psychologist 41: 1040–48. [Google Scholar] [CrossRef]
  24. Eccles, Jacquelynne, and Allan Wigfield. 2002. Motivational beliefs, values, and goals. Annual Review of Psychology 53: 109–32. [Google Scholar] [CrossRef] [PubMed]
  25. Fair, Ellen, and Leonard Silvestri. 1992. Effects of rewards, competition and outcome on intrinsic motivation. Journal of Instructional Psychology 19: 3–8. [Google Scholar]
  26. Fischer, Carmen, Charlotte Malycha, and Ernestine Schafmann. 2019. The influence of intrinsic motivation and synergistic extrinsic motivators on creativity and innovation. Frontiers in Psychology 10: 137. [Google Scholar] [CrossRef]
  27. Fishbein, Martin. 1963. An investigation of the relationships between beliefs about an object and the attitude toward that object. Human Relations 16: 233–39. [Google Scholar] [CrossRef]
  28. Fishbein, Martin, and Icek Ajzen. 1975. Belief, Attitude, Intention, and Behavior. An Introduction to Theory and Research. Reading: Addison-Wesley. [Google Scholar]
  29. Goel, Nidhi, and Kumari Rashmi. 2023. Impact of motivation on employee engagement: A literature review. Journal of Statistics and Management Systems 26: 537–47. [Google Scholar] [CrossRef]
  30. Guay, Frédéric, Robert J. Vallerand, and Céline Blanchard. 2000. On the assessment of situational intrinsic and extrinsic motivation: The Situational Motivation Scale (SIMS). Motivation and Emotion 24: 175–213. [Google Scholar] [CrossRef]
  31. Ha, Reeda, and Hwansoo Lee. 2024. Legal improvements to protect and manage industrial technology. Korean Security Journal 78: 29–52. [Google Scholar] [CrossRef]
  32. Hagger, Martin S., and Nikos L. D. Chatzisarantis. 2007. Self-Determination Theory and the Theory of Planned Behavior: An Integrative Approach toward a More Complete Model of Motivation. In Psychology of Motivation. Edited by Lois V. Brown. Hauppauge: Nova Science Publishers, pp. 83–98. [Google Scholar]
  33. Hagger, Martin S., and Nikos L. D. Chatzisarantis. 2009a. Integrating the theory of planned behaviour and self-determination theory in health behaviour: A meta-analysis. British Journal of Health Psychology 14: 275–302. [Google Scholar] [CrossRef] [PubMed]
  34. Hagger, Martin S., and Nikos L. D. Chatzisarantis. 2009b. Intrinsic Motivation and Self-Determination in Exercise and Sport. Champaign: Human Kinetics. [Google Scholar]
  35. Heider, Fritz. 1958. The Psychology of Interpersonal Relations. New York: Wiley. [Google Scholar]
  36. Hoecht, Andreas, and Paul Trott. 2006. Innovation risks of strategic outsourcing. Technovation 26: 672–81. [Google Scholar] [CrossRef]
  37. Huang, Yung-Chuan. 2023. Integrated concepts of the UTAUT and TPB in virtual reality behavioral intention. Journal of Retailing and Consumer Services 70: 103127. [Google Scholar] [CrossRef]
  38. Hungerford, Harold, and Trudi Volk. 1990. Changing learner behavior through environmental education. Journal of Environmental Education 21: 8–21. [Google Scholar] [CrossRef]
  39. Husman, Jenefer, and Willy Lens. 1999. The role of the future in student motivation. Educational Psychologist 34: 113–25. [Google Scholar] [CrossRef]
  40. Hwang, Hyundong, and Changmoo Lee. 2016. A study on the relationship between industrial technology leakage, self-control, and organizational attachment. Journal of Korean Security Guard Association 47: 119–38. [Google Scholar]
  41. Hwang, Inho, and Sungho Hu. 2018. A study on the influence of information security compliance intention of employee: Theory of planned behavior, Justice Theory, and Motivation Theory Applied. Digital Convergence Research 16: 225–36. [Google Scholar]
  42. Ifinedo, Princely. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security 31: 83–95. [Google Scholar]
  43. Jung, Jeyong. 2024. Analysis of the US industrial technology leak response system and legislation. Crime Investigation Research 19: 233–57. [Google Scholar] [CrossRef]
  44. Kim, Jongki, and Jian Mou. 2020. Meta-analysis of information security policy compliance based on theory of planned behavior. Journal of Digital Convergence 18: 169–76. [Google Scholar]
  45. Kim, Seonwook. 2021. Legislative improvement plan for the prevention of national core technology leakage by industrial spy. Wonkwang Law Review 37: 33–53. [Google Scholar] [CrossRef]
  46. Kim, Soonseok, and Jaechul Shin. 2010. The plan for core personnel management to prevent industrial technology leakage. Journal of Korean Security Science Association 25: 109–30. [Google Scholar] [CrossRef]
  47. Kline, Rex. 2005. Principles and Practice of Structural Equation Modeling, 2nd ed. New York: The Guilford Press. [Google Scholar]
  48. Kor, Kenny, and Barbara Mullan. 2011. Sleep hygiene behaviours: An application of the theory of planned behavior and the investigation of perceived autonomy support, past behavior and response inhibition. Psychology & Health 26: 1208–24. [Google Scholar]
  49. Kranz, Johann, and Felix Haeussinger. 2014. Why Deterrence Is Not Enough: The Role of Endogenous Motivations on Employees’ Information Security Behavior. Paper presented at the IS Security and Privacy, Thirty Fifth International Conference on Information Systems, Auckland, New Zealand, December 14–17. [Google Scholar]
  50. Landy, Frank, and William Becker. 1987. Motivation theory reconsidered. Research in Organizational Behavior 9: 1–38. [Google Scholar]
  51. Lee, Ganghook. 2020. Study on the risk of industrial technology infringement by insiders: Focusing on R&D workers. Security Research 63: 129–52. [Google Scholar]
  52. Li, Chunxiao, Yandan Wu, and YingHwa Kee. 2016. Validation of the volunteer motivation scale and its relations with work climate and intention among Chinese volunteers. Asian Journal of Social Psychology 19: 124–33. [Google Scholar] [CrossRef]
  53. Manning, Mark. 2011. When we do what we see: The moderating role of social motivation on the relation between subjective norms and behavior in the theory of planned behavior. Basic and Applied Social Psychology 33: 351–64. [Google Scholar] [CrossRef]
  54. McKinsey Global Institute. 2016. Digital Globalization: The New Era of Global Flows. Chicago: McKinsey & Company. [Google Scholar]
  55. National Police Agency. 2023. 2023 Year Special Crackdown on Economic Security Crimes; Seoul: National Police Agency Press Release.
  56. National Statistical Office in South Korea. 2024. Company Size Classification. Available online: https://kostat.go.kr/board.es?mid=a10502010000&bid=12282&tag=&act=view&list_no=414440&ref_bid= (accessed on 8 August 2024).
  57. Nicholls, John. 1984. Achievement motivation: Conceptions of ability, subjective experience, task choice, and performance. Psychological Review 91: 328–46. [Google Scholar] [CrossRef]
  58. Norman, Paul, Tim Clark, and Glen Walker. 2005. The Theory of Planned Behavior, Descriptive Norms, and the Mediation Role of Group Identification. Journal of Applied Social Psychology 35: 1008–29. [Google Scholar] [CrossRef]
  59. Otchengco, Alberto Magtoto, Jr., and Yuri Walter Dulay Akiate. 2021. Entrepreneurial intentions on perceived behavioral control and personal attitude: Moderated by structural support. Asia Pacific Journal of Innovation and Entrepreneurship 15: 14–25. [Google Scholar] [CrossRef]
  60. Padayachee, Keshnee. 2012. Taxonomy of compliant information security behavior. Computers & Security 31: 673–80. [Google Scholar]
  61. Pandya, Jainisha. D. 2024. Intrinsic & extrinsic motivation & its impact on organizational performance at Rajkot city: A review. Journal of Management Research and Analysis 11: 46–53. [Google Scholar]
  62. Quintal, Vanessa, Julie Lee, and Geoffrey Soutar. 2010. Risk, uncertainty and the theory of planned behavior: A tourism example. Tourism Management 31: 797–805. [Google Scholar] [CrossRef]
  63. Rivis, Amanda, and Paschal Sheeran. 2003. Social influence and the theory of planned behaviour: Evidence for a direct relationship between prototypes and young people exercise behaviour. Psychology and Health 18: 567–83. [Google Scholar] [CrossRef]
  64. Robbins, Stephen, and Timothy Judge. 2011. Organizational Behavior. Boston: Prentice Hall. [Google Scholar]
  65. Ryan, Richard, and Edward L. Deci. 2000a. Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology 25: 54–67. [Google Scholar] [CrossRef] [PubMed]
  66. Ryan, Richard, and Edward L. Deci. 2000b. Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. American Psychologist 55: 68–78. [Google Scholar] [CrossRef]
  67. Safa, Nader Sohrabi, and Rossouw Von Solms. 2016. An information security knowledge sharing model in organizations. Computers in Human Behavior 57: 442–51. [Google Scholar] [CrossRef]
  68. Sahyunu, La Ode Abdul Manan, Ghalib Suprianto, Sri Wiyati Mahrani, and Wa Ode Safariati. 2023. The effect of intrinsic and extrinsic motivation on employee performance at digital engineering consultant. IOSR Journal of Business and Management 25: 50–55. [Google Scholar]
  69. Security Magazine. 2024. Insider-Driven Data Loss Incidents Cost an Average of $15 Million. Available online: https://www.securitymagazine.com/articles/100483-insider-driven-data-loss-incidents-cost-an-average-of-15-million (accessed on 15 June 2024).
  70. Singh, Rajesh. 2016. The impact of intrinsic and extrinsic motivators on employee engagement in information organizations. Journal of Education for Library and Information Science 57: 197–206. [Google Scholar]
  71. Sommestad, Teodor, and Johan Hallberg. 2013. A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. In Security and Privacy Protection in Information Processing Systems. Edited by Lech J. Janczewski, Henry B. Wolfe and Sujeet Shenoi. IFIP Advances in Information and Communication Technology. Berlin: Springer, vol. 405, pp. 243–57. [Google Scholar] [CrossRef]
  72. Sung, Jinki. 2024. A study on the introduction of the technology valuation system to investigation on industrial technology leaks. Crime Investigation Research 19: 213–32. [Google Scholar] [CrossRef]
  73. Vansteenkiste, Maarten, and Willy Lens. 2006. Intrinsic versus extrinsic goal contents in self-determination theory: Another look at the quality of academic motivation. Educational Psychologist 41: 19–31. [Google Scholar] [CrossRef]
  74. Weiner, Bernard. 1985. An attributional theory of achievement motivation and emotion. Psychological Review 92: 548–73. [Google Scholar] [CrossRef] [PubMed]
  75. Workman, Michael, and John Gathegi. 2007. Punishment and ethics deterrents: A study of insider security contravention. Journal of the American Society for Information Science and Technology 58: 212–22. [Google Scholar] [CrossRef]
  76. Yılmaz, Ercan Nurcan, and Serkan Gönen. 2018. Attack detection/prevention system against cyber attack in industrial control systems. Computers & Security 77: 94–105. [Google Scholar]
  77. Youn, Yunsung. 1999. Teaching-learning theories and effective motivational strategies. Journal of Social Science 2: 209–35. [Google Scholar]
  78. Zhu, Sherry, Eric Guo, Max Lu, and Anna Yue. 2016. An Efficient Data Leakage Prevention Framework for Semiconductor Industry. Paper presented at the 2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Bali, Indonesia, December 4–7. [Google Scholar]
Figure 1. Research model.
Figure 1. Research model.
Admsci 14 00176 g001
Figure 2. Research result model (Note: * p < 0.05, ** p < 0.01, *** p < 0.001).
Figure 2. Research result model (Note: * p < 0.05, ** p < 0.01, *** p < 0.001).
Admsci 14 00176 g002
Table 1. Motivation theories.
Table 1. Motivation theories.
TheoriesKey ConceptsSources and
Representative Scholars
Intrinsic/extrinsic
motivation theory
The theory states that behavior is driven by intrinsic motivation, where individuals are motivated by the enjoyment or interest of the activity, and extrinsic motivation, where individuals are motivated by external rewards or punishments.Deci and Ryan (1985b, 2000)
Attribution theoryThe theory posits that individuals’ behaviors and emotions are shaped by their reasoning about the causes of their own and others’ behaviors, which they attribute to internal factors (ability, effort) or external factors (luck, circumstances).Heider (1958) and Weiner (1985)
Expectancy–value theoryThe theory posits that an individual’s behavior is motivated by the anticipation of success and the perceived value of that success.Eccles and Wigfield (2002)
Self-determination theory The theory posits that intrinsic motivation is enhanced when three fundamental psychological needs are fulfilled: autonomy, competence, and relatedness.Deci and Ryan (1985b)
Self-efficacy theoryThe theory posits that an individual’s belief in their ability to successfully perform a particular task influences their subsequent behavior and motivation.Bandura (1977)
Achievement goal theoryThe theory posits that individuals are motivated by how they seek achievement, and that this motivation can be divided into two categories: mastery goals, which prioritize learning and growth, and performance goals, which prioritize comparison with others.Nicholls (1984) and
Dweck (1986)
Future time
perspective theory
The theory that an individual’s perspective on the future affects their motivations and behaviors in the present.Husman and Lens (1999)
Table 2. Variable definitions and measurement items.
Table 2. Variable definitions and measurement items.
FactorMeasurement ItemReference
Intrinsic
motivation
-
I think it is nice to have industrial technology protection behavior.
-
Because protecting industrial technology gives me a sense of satisfaction.
-
Because my value is to protect industrial technology.
-
Because I can develop myself by taking measures to protect industrial technology.
Deci and Ryan (1985a, 1985b)
Ryan and Deci (2000a, 2000b)
Guay et al. (2000)
Li et al. (2016)
Extrinsic
motivation
-
I think that if I do not demonstrate industrial technology protection behavior, others will disregard me.
-
I believe that there will be rewards (increased income, promotion) for protecting industrial technology.
-
People protect industrial technology due to pressure from their colleagues and others.
-
I believe that protecting industrial technology is the best way to gain recognition from your colleagues at work.
Attitude toward
behavior
-
Protecting industrial technology is an act worthy of consideration.
-
Protecting industrial technology is important.
-
Protecting industrial technology is necessary.
-
Protecting industrial technology is a beneficial practice.
Ajzen and Driver (1992),
Ajzen (2006),
Quintal et al. (2010)
Subjective
norm
-
My family thinks that I should protect industrial technology.
-
My colleagues think that I should protect industrial technology.
-
My friends and acquaintances think that I should protect industrial technology.
Perceived behavioral
control
-
I am able to take action to protect my industrial technology at any time.
-
It is my sole responsibility to protect industrial technology.
-
Protecting industrial technology can be achieved easily when I take a look at the surrounding environment.
Behavioral
intention
-
I am devoting my efforts to protect industrial technology.
-
I plan to take proactive measures to protect industrial technology.
-
I will do my best to protect industrial technology.
Table 3. Demographic information of survey participants.
Table 3. Demographic information of survey participants.
ClassificationFrequencyPercentage (%)
GenderMale13065.0
Female7035.0
Age20 to 29157.5
30 to 397638.0
40 to 497336.5
50 to 593015.0
60 to 6963.0
FieldElectronics (semiconductors, displays)4522.5
Information technology (IT)9346.5
Genetics and biotechnology2512.5
New materials3216.0
Other52.5
TitleSuperior to executives199.5
Department manager, Director3417.0
Manager, Deputy general manager8241.0
Staff, Associate, Assistant manager6532.5
Corporation sizeLarge companies9447.0
Small and Medium-sized enterprises10552.5
Other10.5
Work experienceLess than 5 years4723.5
5 to 10 years6834.0
10 to 20 years5527.5
More than 20 years3015.0
Experience in
industrial technology protection
Yes8241.0
No7437.0
I am not sure4422.0
Table 4. Descriptive statistical analysis results.
Table 4. Descriptive statistical analysis results.
VariableNMinimumMaximumMeanStandard DeviationSkewnessKurtosis
Intrinsic
motivation
200253.900.5750.013−0.079
Extrinsic
motivation
200153.060.793−0.3910.062
Attitude toward behavior200254.220.596−0.346−0.173
Subjective norm200253.820.710−0.065−0.271
Perceived
behavioral control
200253.520.788−0.113−0.381
Behavioral
intention
200253.870.6450.029−0.369
Table 5. Results of reliability and convergent validity test.
Table 5. Results of reliability and convergent validity test.
VariableMeasurement
Question
Factor
Loadings
C.R. (p)CVAVECronbach α
Intrinsic
motivation
IM10.805 0.8560.6640.777
IM20.7988.547 ***
IM30.7848.634 ***
Extrinsic
motivation
EM10.850 0.7600.6160.742
EM20.7825.882 ***
EM30.72614.170 ***
Attitude toward
behavior
AB10.876 0.9490.8220.896
AB 20.85713.044 ***
AB 30.83913.722 ***
Subjective normSN10.878 0.9080.7670.861
SN 20.82813.012 ***
SN 30.79913.004 ***
Perceived
behavioral control
PBC10.911 0.7000.5340.650
PBC 20.6967.638 ***
Behavioral
intention
BI10.887 0.9030.7570.835
BI20.88212.055 ***
BI30.83611.514 ***
*** p < 0.001.
Table 6. Goodness-of-fit of confirmatory factor analysis.
Table 6. Goodness-of-fit of confirmatory factor analysis.
χ2dfpTLICFIRMSEASRMR
ValueLower
Bound
Upper
Bound
234.0191040.0000.9060.9280.0790.0660.0930.047
Table 7. Correlation matrix and discriminant validity.
Table 7. Correlation matrix and discriminant validity.
Intrinsic
Motivation
Extrinsic
Motivation
Attitude toward BehaviorSubjective NormPerceived
Behavioral Control
Behavioral
Intention
Intrinsic
motivation
0.815
Extrinsic
motivation
0.0380.785
Attitude
toward behavior
0.504−0.1800.907
Subjective norm0.4350.1850.4520.767
Perceived
behavioral
control
0.4290.2430.2640.5140.731
Behavioral
intention
0.5920.0420.5930.6130.5660.870
Note: Square root of AVE is shown in bold.
Table 8. The analysis results for the hypotheses.
Table 8. The analysis results for the hypotheses.
PathS.E.βC.R. (p)Hypothesis
H1Intrinsic motivation -> Attitude toward behavior0.0900.5526.219 ***Accepted
H2Intrinsic motivation -> Subjective norm0.1120.5115.713 ***Accepted
H3Intrinsic motivation -> Perceived behavioral control0.1310.6946.040 ***Accepted
H4Extrinsic motivation -> Attitude toward behavior0.055−0.273−3.571 ***Accepted
H5Extrinsic motivation -> Subjective norm0.0710.1782.246 *Accepted
H6Extrinsic motivation -> Perceived behavioral control0.0700.2803.245 **Accepted
H7Attitude toward behavior -> Behavioral intention0.0760.5647.263 ***Accepted
H8Subjective norms -> Behavioral intention0.0830.0780.739Rejected
H9Perceived behavioral control -> Behavioral intention0.1040.5484.604 ***Accepted
Structural model fit: χ2 (df) 149.764, χ2/degree of freedom 1.498, RMR 0.027, GFI 0.923, AGFI 0.882, NFI 0.923, TLI 0.962, CFI 0.972, RMSEA 0.050. Note: * p < 0.05, ** p < 0.01, *** p < 0.001.
Table 9. Results of mediated effects.
Table 9. Results of mediated effects.
Dependent
Variable
Explanatory VariableDirect
Effect
Indirect
Effect
Total
Effect
Intrinsic
motivation
Attitude toward behavior0.558 ** 0.060
Subjective norm0.643 **
Perceived behavioral control0.789 **
Attitude toward behavior
-> Behavioral intention
0.309 **0.005
Subjective norms -> Behavioral intention 0.039
Perceived behavioral control -> Behavioral intention 0.378 **0.010
Extrinsic
motivation
Attitude toward behavior−0.197 ** 0.094
Subjective norm0.161 ** 0.007
Perceived behavioral control0.228 ** 0.016
Attitude toward behavior
-> Behavioral intention
−0.109 **
Subjective norms -> Behavioral intention 0.010
Perceived behavioral control -> Behavioral intention 0.109 **
Note: ** p < 0.01.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lee, S.; Kim, B.; Ivan, U.V. The Effect of Motivation on the Behavioral Intention to Protect Industrial Techniques of High-Tech Firms’ Employees. Adm. Sci. 2024, 14, 176. https://doi.org/10.3390/admsci14080176

AMA Style

Lee S, Kim B, Ivan UV. The Effect of Motivation on the Behavioral Intention to Protect Industrial Techniques of High-Tech Firms’ Employees. Administrative Sciences. 2024; 14(8):176. https://doi.org/10.3390/admsci14080176

Chicago/Turabian Style

Lee, Sangwoo, Boyoung Kim, and Ureta Vaquero Ivan. 2024. "The Effect of Motivation on the Behavioral Intention to Protect Industrial Techniques of High-Tech Firms’ Employees" Administrative Sciences 14, no. 8: 176. https://doi.org/10.3390/admsci14080176

APA Style

Lee, S., Kim, B., & Ivan, U. V. (2024). The Effect of Motivation on the Behavioral Intention to Protect Industrial Techniques of High-Tech Firms’ Employees. Administrative Sciences, 14(8), 176. https://doi.org/10.3390/admsci14080176

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop