DOI QR코드

DOI QR Code

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim (Department of Management Information Systems, Sangji University) ;
  • Jungyeon Sung (School of business, Sungkyul University) ;
  • Daekil Kim (School of Communication and Media, Seoul Women's University) ;
  • Dan J. Kim (Department of Information Technology & Decision Sciences, University of North Texas)
  • 투고 : 2017.07.21
  • 심사 : 2017.09.26
  • 발행 : 2017.09.30

초록

The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.

키워드

참고문헌

  1. Armstrong, R. W., and Yee, S. M. (2001). Do Chinese trust Chinese? A study of Chinese buyers and sellers in Malaysia. Journal of International Marketing, 9(3), 63-86.  https://doi.org/10.1509/jimk.9.3.63.19925
  2. Anderson, R. E., and Srinivasan, S. S. (2003). E-satisfaction and e-loyalty: a contingency framework. Psychology and Marketing, 20(2), 123-128.  https://doi.org/10.1002/mar.10063
  3. Bhattacherjee, A. (2002). Individual trust in online firms: scale development and initial test. Journal of Management Information Systems, 19(1), 211-241.  https://doi.org/10.1080/07421222.2002.11045715
  4. Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165.  https://doi.org/10.1002/asi.20459
  5. Chang, H. H., and Chen, S. W. (2009). Consumer perception of interface quality, security, and loyalty in electronic commerce. Information and Management, 46(7), 411-417.  https://doi.org/10.1016/j.im.2009.08.002
  6. Comer, J. M., Plank, R. E., Reid, D. A., and Pullins, E. B. (1999). Methods in Sales Research: Perceived Trust in Business-to-Business Sales: A New Measure. Journal of Personal Selling and Sales Management, 19(3), 61-71. 
  7. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61-80.  https://doi.org/10.1287/isre.1060.0080
  8. Flaherty, K. E., and Pappas, J. M. (2000). The role of trust in sales person sales manager relationships. Journal of Personal Selling and Sales Management, 20(4), 271-278. 
  9. Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39-50. 
  10. Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725-737.  https://doi.org/10.1016/S0305-0483(00)00021-9
  11. Hair, Jr. J. F., Hult, G. T. M., Ringle, C. M., and Sartedt, M. (2013). A primer on partial least squares structural equation modeling (PLS-SEM), SEGE Publications, Inc. 
  12. Hilgard, E. R. (1990). The trilogy of mind: Cognition, affection, and conation. Journal of the History of the Behavioral Sciences, 16(2), 107-117.  https://doi.org/10.1002/1520-6696(198004)16:2<107::AID-JHBS2300160202>3.0.CO;2-Y
  13. Hoy, M. G., and Milne, G. (2010). Gender differences in privacy-related measures for young adult facebook users. Journal of Interactive Advertising, 10(2), 28-45.  https://doi.org/10.1080/15252019.2010.10722168
  14. Iachello, G., and Hong, J. (2007). End-user privacy in human computer interaction. Foundations and Trends in Human Computer Interaction, 1(1), 1-137.  https://doi.org/10.1561/1100000004
  15. Im, H. W., Im, J. W., and Lee, H. S. (2007). Exploratory study on efficient operation of parcel delivery logistics networks following the growth of online shopping. ASIA Marketing Journal, 9(2), 97-129. 
  16. Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS quarterly, 34(3), 549-566.  https://doi.org/10.2307/25750691
  17. Jeong, G. S. (2014). A study on measures to prevent personal information leakage from financial institutions. Journal of Information and Security, 14(4), 109-116. 
  18. Korea Internet and Security Agency (2012). A study on the level of knowledge of personal information protection, 98-99. 
  19. Kim, B., Im, J. I., and Cho, Y. H. (2014). Present state of mobile app personal information infringement and responding measures (finance, centering on Android operating system). Journal of the Institute of Internet, Broadcasting and Communication, 14(6) 267-272.  https://doi.org/10.7236/JIIBC.2014.14.6.267
  20. Kim, D. J., Ferrin, D. L., and Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems, 44(2), 544-564.  https://doi.org/10.1016/j.dss.2007.07.001
  21. Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13-45.  https://doi.org/10.2753/MIS0742-1222240401
  22. Lazarus, R. S. (1991). Emotion and Adoption. New York: Oxford Univ. Press. 
  23. Lim, S. H. (2016). An Investigation of the Psychology of Password Replacement by Email Users. Journal of The Korea Institute of Information Security and Cryptology, 26(5), 1251-1258.  https://doi.org/10.13089/JKIISC.2016.26.5.1251
  24. Liu, A. H., and Leach, M. P. (2001). Developing loyal customers with a value-adding sales force: Examining customer satisfaction and the perceived credibility of consultative salespeople. Journal of Personal Selling and Sales Management, 21(2), 147-156. 
  25. Louis Brandeis and Samuel Warren. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193-220.  https://doi.org/10.2307/1321160
  26. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.  https://doi.org/10.1287/isre.1040.0032
  27. McKnight, D. H., Choudhury, V., and Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information systems research, 13(3), 334-359.  https://doi.org/10.1287/isre.13.3.334.81
  28. Nicolaou, A. I. and McKnight, D. H. (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information systems research, 17(4), 332-351.  https://doi.org/10.1287/isre.1060.0103
  29. Nunnally, J. C., and Bernstein, I. H. (1994). Psychometric Theory, (3rd ed). McGraw-Hill, New York. 
  30. Mansfield, E. R., and Helms, B. P. (1982). Detecting multicollinearity. The American Statistician, 36(3a), 158-160. 
  31. McGrath, J. (1982). "Dilemmatics: The Study of Research Choices and Dilemma", in J.McGrath, J.Martin and R.Kulla(eds.), Judgment Calls in Research, Beverly Hills, CA: Sage Publications, 69-103 
  32. Mehrabian, A., and Russell, J. (1974). An Approach to Environmental Psychology. Cambrige, MA: MIT Press. 
  33. Park, M. J., and Lee, S. E. (2009). The effects of VMD appropriateness on consumers' emotional, cognitive, and behavioral responses: model verification based on the cognitive emotion theory and the emotional cognition theory. The Research Journal of the Costume Culture, 17(3), 459-471.  https://doi.org/10.29049/RJCC.2009.17.3.459
  34. Pavlou, P. A., and Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37-59.  https://doi.org/10.1287/isre.1040.0015
  35. Petronio, S. S. (2002). Boundaries of privacy: Dialectics of disclosure (xix, 268). Albany, NY: State University of New York Press. 
  36. Phelps, J., D'Souza, G., and Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: an empirical investigation. Journal of Interactive Marketing, 15(4), 2-17.  https://doi.org/10.1002/dir.1019
  37. Phelps, J., Nowak, G. J., and Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27-41.  https://doi.org/10.1509/jppm.19.1.27.16941
  38. Shin, E. M., and Kim, Y. E. (2011). Plan to study the utilization of risk management for sustainable growth of parcel delivery business. Journal of the Korea Logistics Research Association, 21(5), 201-222. 
  39. Simcock, P., Sudbury, L., and Wright, G. (2006). Age, perceived risk and satisfaction in consumer decision making: A review and extension. Journal of Marketing Management, 22(3-4), 355-377.  https://doi.org/10.1362/026725706776861163
  40. Smith, H. J., Milberg, J. S., and Burke, J. S. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196.  https://doi.org/10.2307/249477
  41. Song, S. H. (2011). Empirical analysis of parcel delivery industry's growth factors: centering on e-commerce growth. Journal of the Korea Research Academy of Distribution and Management, 14(2), 107-125. 
  42. Tang, Z., Hu, Y. J., and Smith, M. D. (2008). Gaining trust through online privacy protection: self-regulation, mandatory standards, or caveat emptor. Journal of Management Information Systems, 24(4), 153-173.  https://doi.org/10.2753/MIS0742-1222240406
  43. Tversky, A., and Kahneman, D. (1992). Advances in prospect theory: Cumulative representation of uncertainty. Journal of Risk and uncertainty, 5(4), 297-323.  https://doi.org/10.1007/BF00122574
  44. Tversky, A., and Kahneman, D. (1981). The Framing of Decisions and the Psychology of Choice. Science, 211(4481), 453-458.  https://doi.org/10.1126/science.7455683
  45. Xu, H., Dinev, T., Smith, J., and Hart, P. (2008). Examining the formation of individual's privacy concerns: toward an integrative view, International Conference on Information Systems (ICIS), 1-16. 
  46. Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. (2009). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26(3), 135-174.  https://doi.org/10.2753/MIS0742-1222260305
  47. Xu, H., Dinev, T., Smith, J., and Hart P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824.  https://doi.org/10.17705/1jais.00281
  48. Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444.  https://doi.org/10.17705/1jais.00092
  49. Walton, S. C., and Rice, R. E. (2013). Mediated disclosure on Twitter: the roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Computers in Human Behavior, 29, 1465-1474.  https://doi.org/10.1016/j.chb.2013.01.033
  50. Zajonc R. B., and Marku, H. (1982). Affective and cognitive factors in preference. Journal of Consumer Research, 9(2), 121-131.  https://doi.org/10.1086/208905
  51. Reisenzein, R. (2009). Emotional experience in the computational belief desire theory of emotion. Emotion Review, 1(3), 214-222.  https://doi.org/10.1177/1754073909103589
  52. Verhagen, T., and van Dolen, W. (2011). The influence of online store beliefs on consumer online impulse buying: A model and empirical application. Information and Management, 48(8), 320-327.  https://doi.org/10.1016/j.im.2011.08.001
  53. Yun, I. H., and Kwon, S. D. (2015). A study on the effects of information security compliance and responses to crises on trust in information security. Information Systems Review, 17(1), 141-169. https://doi.org/10.14329/isr.2014.17.1.141