과제정보
I am grateful to Professor Dan J. Kim (University of North Texas) and Assistant Professor Kunsu Park (KIMEP University) for their help. I also acknowledge the valuable suggestions and insightful comments of the Editor in Chief, the Associate Editor and the Anonymous Reviewers. This research was supported by the research grant of the Korea Sanhak Foundation in 2017.
참고문헌
- Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66-84. https://doi.org/10.1111/j.1540-4560.1977.tb01883.x
- Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165. https://doi.org/10.1002/asi.20459
- Craney, T. A., and Surles, J. G. (2002). Model-dependent variance inflation factor cutoff values. Quality Engineering, 14(3), 391-403. https://doi.org/10.1081/QEN-120001878
- Chellappa, R. K., and Sin, R. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6(2), 181-202. https://doi.org/10.1007/s10799-005-5879-y
- Chin, W. W., Gopal, A., and Salisbury, W. D. (1997). Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation. Information Systems Research, 8(4), 342-367. https://doi.org/10.1287/isre.8.4.342
- Choi, B. M., Park, M. J., and Chai, S. M. (2015). An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption. Information System Review, 17(3), 77-94 (In Korean). https://doi.org/10.14329/isr.2015.17.3.077
- Croog, S. H., and Richards, N. P. (1977). Health Beliefs and Smoking Patterns in Heart Patients and Their Wives: A Longitudinal Study. American Journal of Public Health, 67(10), 921-930. https://doi.org/10.2105/AJPH.67.10.921
- Derlega, V. J., and Chaikin, A. L. (1977). Privacy and self-disclosure in social relationships. Journal of Social Issues, 33(3), 102-115. https://doi.org/10.1111/j.1540-4560.1977.tb01885.x
- Dinev, T., and Hart, P. (2004). Internet privacy concerns and their antecedents - Measurement validity and a regression model. Behavior and Information Technology, 23(6), 413-423. https://doi.org/10.1080/01449290410001715723
- Dinev, T., and Hart, P. (2006a). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Dinev, T., and Hart, P. (2006b). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7-29. https://doi.org/10.2753/JEC1086-4415100201
- Dinev, T., Hart, P., and Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance - An empirical investigation. Journal of Strategic Information Systems, 17(3), 214-233. https://doi.org/10.1016/j.jsis.2007.09.002
- Fishbein, M., and Ajzen, I. (1977). Belief, attitude, intention and behavior: An introduction to theory and research. Philosophy and Rhetoric, 10(2), 130-132.
- Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.1177/002224378101800104
- Jarvenpaa, S. L., and Leidner, D. E. (1999). Communication and trust in global virtual teams. Organization Science, 10(6), 791-815. https://doi.org/10.1287/orsc.10.6.791
- Hair, Jr. J. F., Hult, G. T. M., Ringle, C. M., Sartedt, M. (2013). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). SEGE Publications, Inc.
- Hall, E. T. (1976). Beyond Culture. New York: Anchor Press.
- Hall, E. T., and Hall, M. R. (1990). Understanding Cultural Differences. Yarmouth, ME: Intercultural Press.
- Havlena, W. J., and DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Sciences, 22(4), 927-939. https://doi.org/10.1111/j.1540-5915.1991.tb00372.x
- Hofstede, G. (1994). Cultures and Organizations: Software of the Mind: Intercultural. London: HarperCollins.
- Kim, D. (2008). Self-Perception-Based Versus Transference-Based Trust Determinants in Computer-Mediated Transactions: A Cross-Cultural Comparison Study. Journal of Management Information Systems, 24(4), 13-45. https://doi.org/10.2753/MIS0742-1222240401
- Laufer, R. S., and Wolfe, M. (1977). Privacy as a concept and a social issue - multidimensional developmental theory. Journal of Social Issues, 33(3), 22-42. https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
- Lim, S, H., Sung, J., Kim, D., and Kim, D. J. (2017). A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services. Asia Pacific Journal of Information Systems, 27(3), 156-175. https://doi.org/10.14329/apjis.2017.27.3.156
- McCoy, S., Galletta, D. F., and King, W. R. (2005). Integrating national culture into IS research: The need for current individual-level measures. Communications of the ACM, 15(12), 211-224.
- Margulis, S. T. (1977). Conceptions of privacy: current status and next steps. Journal of Social Issues, 33(3), 5-21. https://doi.org/10.1111/j.1540-4560.1977.tb01879.x
- Margulis, S. T. (2003a). On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues, 59(2), 411-429. https://doi.org/10.1111/1540-4560.00071
- Margulis, S. T. (2003b). Privacy as a social issue and behavioral concept. Journal of Social Issues, 59(2), 243-261. https://doi.org/10.1111/1540-4560.00063
- Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
- Milne, G. R., and Boza, M. E. (1999). Trust and concern in consumers' perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5-24. https://doi.org/10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
- Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335-361. https://doi.org/10.1111/j.1083-6101.2007.00328.x
- Nelson, R. J. (1975). Behaviorism, finite automata, and stimulus response theory. Theory and Decision, 6(3), 249-267. https://doi.org/10.1007/BF00136197
- Nunnally, J. C. (1978). Psychometric theory, 2nd edn. McGraw-Hill, New York
- Nunnally, J. C., and Bernstein, I. H. (1994). Psychometric theory, 3rd edn. McGraw-Hill, New York
- Pavlou, P. A., and Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37-59. https://doi.org/10.1287/isre.1040.0015
- Podsakoff, P., and Organ, D. (1986). Self-Reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531-533. https://doi.org/10.1177/014920638601200408
- Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903. https://doi.org/10.1037/0021-9010.88.5.879
- Song, S. H. (2011). Empirical Study on the Analysis for the Growth of Courier Service Industry Focusing on Electronic Commerce. Journal of Distribution and Management Research, 14(2), 107-125 (In Korean). https://doi.org/10.17961/JDMR.14.2.201106.107
- Smith, H. J., Milberg, J. S., and Burke, J. S. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. https://doi.org/10.2307/249477
- Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016. https://doi.org/10.2307/41409970
- Squicciarini, C. A., Xu, H., and Zhang, X. (2011). CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology, 62(3), 521-534. https://doi.org/10.1002/asi.21473
- Phelps, J., D'Souza, G., and Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2-17. https://doi.org/10.1002/dir.1019
- Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27-41. https://doi.org/10.1509/jppm.19.1.27.16941
- Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478. https://doi.org/10.2307/30036540
- Wixom, B. H., and Watson, H. J. (2001). An empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), 17-41. https://doi.org/10.2307/3250957
- Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. Proceedings of the 28th Annual International Conference on Information Systems, Montreal, Canada, Paper 125.
- Xu, H., Dinev, T., Smith, J., and Hart P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824. https://doi.org/10.17705/1jais.00281
- Xu, H., Teo, H.-H., Tan, B. C. Y., and Agarwal, R. (2010). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174. https://doi.org/10.2753/MIS0742-1222260305