Premium
User behaviour towards protective information technologies: the role of national cultural differences
Author(s) -
Dinev Tamara,
Goo Jahyun,
Hu Qing,
Nam Kichan
Publication year - 2009
Publication title -
information systems journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 2.635
H-Index - 89
eISSN - 1365-2575
pISSN - 1350-1917
DOI - 10.1111/j.1365-2575.2007.00289.x
Subject(s) - context (archaeology) , order (exchange) , knowledge management , information technology , structural equation modeling , hofstede's cultural dimensions theory , information system , cultural diversity , information security , business , computer science , public relations , psychology , social psychology , political science , computer security , geography , archaeology , finance , machine learning , law , operating system
Computer technologies that protect data and systems from viruses, unauthorized access, disruptions, spyware and other threats have become increasingly important in the globally networked economy and society. Yet little is known about user attitudes and behaviour towards this category of information technologies. Comparative studies across different cultures in this context are even rarer. In this study, we examine the cross‐cultural differences between South Korea and the United States in user behaviour towards protective information technologies. We develop a theoretical model of user behaviour based on the framework of the theory of planned behaviour and national cultural dimensions and indices. We posit that cultural factors moderate the strength of the relationships in the behavioural model in the context of protective information technologies. The model was then empirically tested using structural equation modelling techniques in conjunction with multi‐group analysis. Most of the hypothesized moderating effects of national cultural factors were found to be statistically significant. Our findings suggest that cultural factors should be considered in order to design effective information security policies, practices and technologies in global networks where multiple cultures coexist. Theoretical and practical implications of the study are discussed.