DOI QR코드

DOI QR Code

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory

개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로

  • Received : 2017.02.08
  • Accepted : 2017.03.28
  • Published : 2017.03.31

Abstract

Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

Keywords

References

  1. 김상현, 박현선, "프라이버시 보호인식 및 보호 행동의도에 미치는 영향 요인과 프라이버시 침해경험의 조절효과에 관한 연구," 인터넷전자상거래연구, 제13권, 제4호, 2013, pp. 79-105.
  2. 김상희, "정보제공의도와 실제 정보제공행동 간의 프라이버시 역설에 대한 연구," 부산대학교 박사학위 논문, 2015
  3. 김상희, 김종기, "프라이버시 염려와 제도적 신뢰가 프라이버시 의사결정에 미치는 영향-전자상거래와 위치기반서비스의 비 교," 한국산업정보학회지, 제22권, 제1호, 2017, pp. 69-87.
  4. 김종기, 김상희, "스마트폰 위치기반서비스에서 정보제공의도: 프라이버시 계산 관점을 중심으로," 정보시스템연구, 제21권, 제4호, 2012, pp. 55-79.
  5. 김종기, 김상희, "행동경제학 관점에서 프라이버시 역설에 관한 연구," 정보화정책, Vol. 22, No. 3, 2015, pp. 16-35. https://doi.org/10.22693/NIAIP.2015.22.3.016
  6. 민진영, 김범수, "프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로," Information Systems Review, Vol. 15, No. 1, 2013, pp. 105-122.
  7. 백상용, "한국 TAM 실증연구의 동일방법편의 분석," 정보시스템연구, 제21권, 제1호, 2012, pp. 1-17.
  8. 유일, 신정신, 이경근, 최혁라, "프라이버시 염려 영향요인이 인터넷 사용자의 신뢰와 온라인 거래의도에 미치는 영향," Journal of Information Technology Applications and Management, Vol. 15, No. 4, 2008, pp. 37-59.
  9. 이동주, 방영석, 배윤수, "온라인상의 개인정보 제공에 있어서 정보 투명성의 역할 -프라이버시 계산 모형을 중심으로-," 정보화정책, 제17권, 제2호, 2010년, pp. 68-85.
  10. 통계청, 전자상거래 및 사이버쇼핑 동향, 2014.
  11. 통계청, 2016년 8월 온라인쇼핑 동향, 2016.
  12. 한국인터넷진흥원, 대국민 정보프라이버시 성향 분석을 위한 도구개발, 2009.
  13. 한국인터넷진흥원, 정보통신서비스 제공자를 위한 개인정보보호 법령 해설서, 2012.
  14. 한국정보보호진흥원, 개인정보의 경제적 가치 분석에 관한 고찰, 2007.
  15. 행정자치부고시, 개인정보의 안전성 확보조치 기준, 2016.
  16. Acquisti, A. and Gross, R., "Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook," PET'06 Proceeding of the 6th Intenational Conference on Privacy Enhancing Technologies, 2006, pp. 36- 58.
  17. Acquisti, A. and Grossklags, J., "Privacy and Rationality in Individual Decision Making," IEEE Security and Privacy, Vol. 3, No. 1, 2005, pp. 26-33.
  18. Ajzen, I., "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol. 50, Iss. 2, 1991, pp. 179-211 https://doi.org/10.1016/0749-5978(91)90020-T
  19. Altman, I., The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, Monterey, CA: Brooks/Cole Publishing, 1975.
  20. Awad, N. F. and Krishnan, M. S., "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization," MIS Quarterly, Vol. 30, Iss. 1, 2006, pp. 13-28. https://doi.org/10.2307/25148715
  21. Barbey, A. K., and Sloman, S. A., "Base-rate Respect: From Ecological Validity to Dual Processes," Behavioral and Brain Sciences, Vol. 30, Iss. 3, 2007, 241- 297.
  22. Bauer, R. A., "Consumer Behavior as Risk Taking," In Dynamic Marketing for a Changing World, Hancock, R. S. (ed.), American Marketing Association, Chicago, 1960, pp. 389-398.
  23. Bellman, S., Johnson, E. J., Kobrin, S. J. and Lohse, G., "International Differences in Information Privacy Concerns: A Global Survey of Consumers," Information Society, Vol. 20, No. 5, 2004, pp. 313-324. https://doi.org/10.1080/01972240490507956
  24. Buchanan, T., Paine, C., Joinson, A. N. and Reips, U., "Development of Measures of Online Privacy Concern and Protection for Use on the Internet," Journal of the American Society for Information Science and Technology, Vol. 58, Iss. 2, 2007, pp. 157-165. https://doi.org/10.1002/asi.20459
  25. Campbell, J. E. and Carlson, M., "Panopticon. com: Online Surveillance and the Commodification of Privacy," Journal of Broadcasting & Electronic Media, Vol. 46, No. 4, 2002, pp. 586-606. https://doi.org/10.1207/s15506878jobem4604_6
  26. Chellappa, R. K. and Sin, R., "Personalization Versus Privacy: An Empirical Examination of the Online Consumer's Dilemma," Information Technology and Management, Vol. 6, Iss. 2, 2005, pp. 181-202. https://doi.org/10.1007/s10799-005-5879-y
  27. Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling," In Modern Methods for Business Research, Marcoulides, G. A. (ed.), 1998, pp. 295-336. New Jersey: Lawrence Erlbaum.
  28. Chin, W. W., Frequently Asked Questions: Partial Least Squares & PLS-Graph, http://disc-nt.cba.uh.edu/chin/plsfaq.htm, 2000.
  29. Cohen, J. O., Statistical Power Analysis for the Behavioral Sciences (2nd ed.), Hillsdale, New Jersey: Lawrence Erlbaum Associates, 1988.
  30. Culnan, M. J., "Consumer Awareness of Name Removal Procedures: Implication for Direct Marketing," Journal of Interactive Marketing, Vol. 9, Iss. 2, 1995, pp. 10-19.
  31. Culnan, M. J., "Protecting Privacy Online: Is Self-Regulation Working?," Journal of Public Policy & Marketing, Vol. 19, No. 1, 2000, pp. 20-26. https://doi.org/10.1509/jppm.19.1.20.16944
  32. Culnan, M. J. and Bies, J. R. "Consumer Privacy: Balancing Economic and Justice Considerations," Journal of Social Issues, Vol. 59, No. 2, 2003, pp 323-342. https://doi.org/10.1111/1540-4560.00067
  33. Cunningham, S. M., The Major Dimension of Perceived Risk : Risk Taking and in Formation Handling in Consumer Behavior, Harvard University Press, Boston, 1967.
  34. Davis, F. D., Bagozzi, R. P. and Warshaw, P. R., "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, Vol. 35, No. 8, 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
  35. Dienes, Z., & Perner, J., "A Theory of Implicit and Explicit Knowledge," Behavioral and Brain Sciences, Vol. 22, Iss. 5, 1999, pp. 735-808. https://doi.org/10.1017/S0140525X99002186
  36. Dinev, T. and Hart, P., "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, Vol. 17, No. 1, 2006, pp. 61-80. https://doi.org/10.1287/isre.1060.0080
  37. Dinev, T., Hart, P. and Mullen, M. R., "Internet Privacy Concerns and Beliefs about Government Surveillance-An Empirical Investigation," The Journal of Strategic Information System, Vol. 17, Iss. 3, 2008, pp. 214-233. https://doi.org/10.1016/j.jsis.2007.09.002
  38. Eberl, M., "An Application of PLS in Multy-Group Analysis: The Need for Differentiated Corporate Level Marketing in the Mobile Communications Industry," In Handbook of Partial Least Squares:Concepts, Methods and Application, Esposito Vinzi, V., W. W., Chin, J., Henseler and H., Wang (eds.), Berlin, Springer, pp. 655-690, 2010.
  39. Evans, J. St. B. T., "Dual-processing Accounts of Reasoning, Judgment and Social Cognition," Annual Review of Psychology, Vol. 59, Iss. 1, 2008, pp. 255-278. https://doi.org/10.1146/annurev.psych.59.103006.093629
  40. Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
  41. Garfinkel, S., Database Nation: The Death of Privacy in the 21st Century, Sebastopol, CA: O'Reilly, 2000.
  42. Goes, P. B., "Editor's Comments: Information Systems Research and Behavioral Economics," MIS Quarterly, Vol. 37, No. 3, 2013, pp. iii-viii.
  43. Javenpaa, S. L., Tracinsky, M. and Vitale, M, "Consumer Trust in An Internet Store," Information Technology and Management, Vol. 1, Iss. 1, 2000, pp. 45-71. https://doi.org/10.1023/A:1019104520776
  44. Jupiter Research, Seventy Percent of US Consumers Worry about Online Privacy, But Few Take Protective Action, Press Release, 2002.
  45. Kahneman, D., Thinking, Fast and Slow, The New York Review of Books, 2011.
  46. Keil, M., Tan, B. C. Y., Wei, K. K., Saarinen, T., Tuunainen, V. and Wassenaar, A., "A Cross-cultural Study on Escalation of Commitment Behavior in Software Projects," MIS Quarterly, Vol. 24, No. 2, pp. 299-325, 2000. https://doi.org/10.2307/3250940
  47. Kobsa, A. and Teltzrow, M., "Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users' Data Sharing Behavior," In Privacy Enhancing Technologies, Springer Verlag, Martin, D. and Serjantov, A. (eds.) Heidelberg, Germany, 2005, pp. 329-343, DOI 10.1007/11423409_21.
  48. Krasnova, H., Veltri, N. F. and Gunther, O., "Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture," Business & Information Systems Engineering, Vol. 4, Iss. 3, 2012, pp. 127-135. https://doi.org/10.1007/s12599-012-0216-6
  49. Li, H., Sarathy, R. and Xu, H., "Understanding Situational Online Information Disclosure as a Privacy Calculus," Journal of Computer Information Systems, Vol. 51, Iss. 1, 2010, pp. 62
  50. Li, Y., "Theories in Online Information Privacy Research: A Critical Review and An Integrated Framework," Decision Support Systems, Vol. 54, Iss. 1, 2012, pp. 471-481. https://doi.org/10.1016/j.dss.2012.06.010
  51. Lu, Y., Tan, B. C. Y. and Hui, K.-L., "Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits," In Proceedings of 25th International Conference on Information Systems, Agarwal, R., Kirsch, L. J. and DeGross, J. I. (eds.), Washington, DC, 2004, pp. 272-281.
  52. Malhotra, N. K., Kim, S. S. and Agarwal, J., "Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model," Information Systems Research, Vol. 15, No. 4, 2004. pp. 336-355. https://doi.org/10.1287/isre.1040.0032
  53. Mayer, R. C., Davis, J. H., and Schoorman, F. D., "An Integrative Model of Organizational Trust," The Academy of Management Review, Vol. 20, No. 3, 1995, pp. 709-734. https://doi.org/10.5465/amr.1995.9508080335
  54. McKnight, D. H., Cummings, L. I. and Chervany, N. I., "Initial Trust Formation in New Organisational Relationships," Academy of Management Review, Vol. 23 No. 3, 1998, pp. 473-90. https://doi.org/10.5465/amr.1998.926622
  55. McKnight, D. H., Choudbury, V. and Kacmar, C., "Developing and Validating Trust Measures for Ecommerce: An Integrative Typology," Information Systems Research, Vol. 13 No. 3, 2002, pp. 334-61. https://doi.org/10.1287/isre.13.3.334.81
  56. Metzger, M. J., "Communication Privacy Management in Electronic Commerce," Journal of Computer-Mediated Communication, Vol. 12, Iss. 2, 2007, pp. 335-361. https://doi.org/10.1111/j.1083-6101.2007.00328.x
  57. Moon, Y., "Intimate Exchanges: Using Computers to Elicit Self-Disclosure From Consumers," Journal of Consumer Research, Vol. 26, No. 4, 2000, pp. 323-339. https://doi.org/10.1086/209566
  58. Norberg, P. A., Horne, D. R. and Horne, D. A., "The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors," Journal of Consumer Affairs, Vol. 41, Iss. 1, 2007, pp. 100-126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
  59. Nowak, G. and Phelps, J., "Understanding Privacy Concerns: An Assessment of Consumer Information-Related Knowledge and Beliefs," Journal of Direct Marketing, Vol. 6, No. 4, 1992. pp 28-39. https://doi.org/10.1002/dir.4000060407
  60. Pavlou, P. A., "State of the Information Privacy Literature: Where Are We Now and Where Should We Go?," MIS Quarterly, Vol. 35, Iss. 4, 2011, pp. 977-988. https://doi.org/10.2307/41409969
  61. Pavlou, P. A. and Gefen, D. "Building Effective Online Marketplaces with Institutionbased Trust," Information Systems Research, Vol. 15, Iss. 1, 2004, pp. 37-59. https://doi.org/10.1287/isre.1040.0015
  62. Petronio, S. S., Boundaries of Privacy: Dialectics of Disclosure (xix, pp. 268). Albany, NY: State University of New York Press, 2002.
  63. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y. and Podsakoff, N. P., "Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies," Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879 -903. https://doi.org/10.1037/0021-9010.88.5.879
  64. Sarstedt, M., Henseler, J. and Ringle, C. M. "Multi-Group Analysis in Partial Least Squares (PLS) Path Modeling: Alternative Methods and Empirical Results," Advances in International Marketing, Vol. 22, pp. 195-218, 2011.
  65. Schoeman, F. D., Philosophical Dimensions of Privacy: An Anthology, New York: Cambridge University Press, 1984.
  66. Sheehan, K. B. "An Investigation of Gender Differences in On-line Privacy Concerns and Resultant Behaviors," Journal of Interactive Marketing, Vol. 13, Iss. 4, 1999, pp. 24-38. https://doi.org/10.1002/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O
  67. Sloman, S. A. "The Empirical Case for Two Systems of Reasoning," Psychological Bulletin, Vol. 119, No. 1, 1996, pp. 3-22. https://doi.org/10.1037/0033-2909.119.1.3
  68. Slyke, C. V., Shim, J. T., Johnson, R. and Jiang, J. J., "Concern for Information Privacy and Online Consumer Purchasing," Journal of the Association for Information Systems, Vol. 7, Iss. 6, 2006, pp. 415-444. https://doi.org/10.17705/1jais.00092
  69. Smith, H. J., Dinev, T. and Xu, H., "Information Privacy Research: An Interdisciplinary Review," MIS Quarterly, Vol. 35, Iss. 4, 2011, pp. 989-1016. https://doi.org/10.2307/41409970
  70. Smith, H. J., Milberg, S. J. and Burke, S. J., "Information Privacy: Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly, Vol. 20, Iss. 2, 1996, pp. 167-196. https://doi.org/10.2307/249477
  71. Stanovich, K. E., West, R. F. and Toplak, M. E., "The Complexity of Developmental Predictions from Dual Process Models," Developmental Review, Vol. 31, Iss. 2-3, 2011, pp. 103-108. https://doi.org/10.1016/j.dr.2011.07.003
  72. Stewart, K. A. and Segars, A. H., "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research, Vol. 13, No, 1, 2002, pp. 36-49. https://doi.org/10.1287/isre.13.1.36.97
  73. Sun, R., Slusarz, P. and Terry, C., "The Interaction of the Explicit and the Implicit in Skill Learning: A Dual- Process Approach," Psychological Review, Vol. 112, No. 1, 2005, pp. 159-192. https://doi.org/10.1037/0033-295X.112.1.159
  74. Son, J. Y. & Kim, S. S., "Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model," MIS Quarterly, Vol. 32, No. 3, 2008, pp. 503-529. https://doi.org/10.2307/25148854
  75. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M. and Lauro, C., "PLS Path Modeling," Computational Statistics & Data Analysis, Vol. 48, No. 1, 2005, pp. 159-205. https://doi.org/10.1016/j.csda.2004.03.005
  76. Tsai, J. Y., Egelman, S., Cranor, L. and Acquisti, A., "The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study," Information System Research, Vol. 22, Iss. 2, 2011, pp. 254-268. https://doi.org/10.1287/isre.1090.0260
  77. Venkatesh, V. and Bala, H., "Technology Acceptance Model 3 and a Research Agenda on Interventions," Decision Sciences, Vol. 39, Iss. 2, 2008, pp. 273-315. https://doi.org/10.1111/j.1540-5915.2008.00192.x
  78. Warren, S. D. and Brandeis, D. L., "The Right to Privacy," Harvard Law Review, Vol. 4, No. 5, 1890, pp. 193-220.
  79. Wason, P. C. and Evans, J. St. B. T., "Dual Processes in Reasoning?," Cognition, Vol. 3, Iss. 2, 1975, pp. 141-154. https://doi.org/10.1016/0010-0277(74)90017-1
  80. Xu, H., Dinev, T., Smith, H. J. and Hart, P., "Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances," Journal of the Association for Information Systems, Vol. 12, Iss. 12, 2011, pp. 798-824. https://doi.org/10.17705/1jais.00281
  81. Xu, H. and Teo, H. H. "Alleviating Consumer's Privacy Concern in Location-based Services: A Psychological Control Perspective," Proceedings of the 25th Annual International Conference on Information Systems, Washington, D. C., United States, 2004, pp. 793-806.
  82. Xu, H., Teo, H. H., Tan, B. C. Y. and Agarwal, R., "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services," Journal of Management Information Systems, Vol. 26, Iss. 3, 2010, pp. 135-174. https://doi.org/10.2753/MIS0742-1222260305
  83. Zhao, L., Lu, Y. and Gupta, S., "Disclosure Intention of Location-Related Information in Location-Based Social Network Services," International Journal of Electronic Commerce, Vol. 16, No. 4, 2012, pp. 53-89. https://doi.org/10.2753/JEC1086-4415160403