Cited 2 time in
Meaningless procedures can be meaningful for information security: consumer use of single and multiple cues in information security inferences
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Park, Yong-Wan | - |
| dc.contributor.author | Herr, Paul M. | - |
| dc.contributor.author | Kim, Byung Cho | - |
| dc.date.accessioned | 2022-12-26T09:31:08Z | - |
| dc.date.available | 2022-12-26T09:31:08Z | - |
| dc.date.issued | 2023-09 | - |
| dc.identifier.issn | 0923-0645 | - |
| dc.identifier.issn | 1573-059X | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/2774 | - |
| dc.description.abstract | Exchanging and transferring digital information is an essential process in marketing. While digital information security has become a critical success factor, little empirical work has addressed underlying psychological processes of how consumers perceive and infer information security. We confirm that consumers hold a belief that security is positively correlated with usage complexity. We demonstrate that consumers' security evaluations can be enhanced by simply increasing usage complexity, irrespective of its relevance to actual security level. Moreover, neither consumer knowledge nor multiple cues associated with objective information security appeared to eliminate this complexity-security inference. Based on this trade-off relationship, we propose strategic implications for corporate reputation, product development, web authentication service, and global market expansion. | - |
| dc.format.extent | 13 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Kluwer Academic Publishers | - |
| dc.title | Meaningless procedures can be meaningful for information security: consumer use of single and multiple cues in information security inferences | - |
| dc.type | Article | - |
| dc.publisher.location | 네델란드 | - |
| dc.identifier.doi | 10.1007/s11002-022-09649-0 | - |
| dc.identifier.scopusid | 2-s2.0-85138134999 | - |
| dc.identifier.wosid | 000854669700001 | - |
| dc.identifier.bibliographicCitation | Marketing Letters, v.34, no.3, pp 449 - 461 | - |
| dc.citation.title | Marketing Letters | - |
| dc.citation.volume | 34 | - |
| dc.citation.number | 3 | - |
| dc.citation.startPage | 449 | - |
| dc.citation.endPage | 461 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | ssci | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Business & Economics | - |
| dc.relation.journalWebOfScienceCategory | Business | - |
| dc.subject.keywordPlus | PERCEIVED SECURITY | - |
| dc.subject.keywordPlus | KNOWLEDGE | - |
| dc.subject.keywordPlus | QUALITY | - |
| dc.subject.keywordPlus | PRICE | - |
| dc.subject.keywordPlus | CATEGORIZATION | - |
| dc.subject.keywordPlus | JUDGMENT | - |
| dc.subject.keywordAuthor | Inference making | - |
| dc.subject.keywordAuthor | Information security | - |
| dc.subject.keywordAuthor | Perceived complexity | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0534
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
