Acknowledgement
이 논문은 2018년 대한민국 교육부와 한국연구재단의 지원을 받아 수행된 연구임 (NRF-2018S1A3A2075114).
References
- 김기호, 이형용 (2017). 조절 초점에 따른 개인 특성이 스마트 결제시스템 수용에 미치는 영향. 지식경영연구, 18(4), 213-235. https://doi.org/10.15813/kmr.2017.18.4.009
- 김미량, 김재운, 황선환 (2010). 진지한 여가척도(SLIM)의 단일문항측정 적용검토. 한국여가레크리에이션학회지, 34(4), 147-156.
- 김병수 (2012). 모바일 소셜네트워크서비스 환경에서 지속사용 의도의 선행 요인에 관한 연구: 신뢰와 프라이버시 우려의 역할. 지식경영연구, 13(4), 83-100. https://doi.org/10.15813/KMR.2012.13.4.006
- 김은진, 박재진 (2016). 조절초점 이론과 TAM 모델의 결합을 통한 해외직구 소비자 행동 연구. 사회과학연구, 27(4), 47-66.
- 박지영, 곽기영 (2019). SNS 사용자의 자기노출 행동 동기요인. 경영학연구, 48(2), 561-587.
- 서봉군, 박도형 (2020). 온라인 메신저 서비스에서의 이모티콘 사용 동기: 조절초점 성향을 중심으로. 지식경영연구, 21(2), 101-118. https://doi.org/10.15813/KMR.2020.21.2.006
- 오선주 (2014). 사용자 유형에 따른 모바일 앱 구매요인에 관한 연구. Information Systems Review, 16(1), 73-88. https://doi.org/10.14329/isr.2014.16.1.073
- 유재호, 이애리, 김경규 (2016). 페이스북에서의 프라이버시 패러독스 현상 연구: 듀얼팩터이론을 중심으로. 지식경영연구, 17(1), 17-47.
- 이승호, 김창식, 곽기영 (2016). 인스타그램 고객의 지속적 사용의도 결정요인: 성별의 조절효과를 중심으로. 디지털산업정보학회지, 12(2), 61-72.
- 이애리, 안효영 (2016). 핀테크 사용에 대한 정보프라이버시 염려와 이용자 저항에 대한 연구: 조절초점성향과의 상호작용 효과 고찰. 정보보호학회논문지, 26(1), 209-226. https://doi.org/10.13089/JKIISC.2016.26.1.209
- 차훈상 (2012). 스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용. Asia Pacific Journal of Information Systems, 22(4), 7-29.
- Androulidakis, I., & Kandus, G. (2011, April). Mobile phone security awareness and practices of students in budapest. In Proceedings of the 6th International Conference on Digital Telecommunications, 17-22.
- Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74-94. https://doi.org/10.1007/BF02723327
- Beinat, E. (2001). Privacy and location-based services: Stating the policies clearly. GeoInformatics, 4, 14-17.
- Bhattacherjee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. MIS Quarterly, 25(3), 351-370. https://doi.org/10.2307/3250921
- Buck, C., Horbel, C., Kessler, T., & Christian, C. (2014). Mobile consumer apps: Big data brother is watching you. Marketing Review St. Gallen, 31(1), 26-35. https://doi.org/10.1365/s11621-014-0318-2
- Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
- Clarke, R. (2001). Person location and person tracking-Technologies, risks and policy implications. Information Technology & People, 14(2), 206-231. https://doi.org/10.1108/09593840110695767
- Crowe, E., & Higgins, E. T. (1997). Regulatory focus and strategic inclinations: Promotion and prevention in decision-making. Organizational Behavior and Human Decision Processes, 69(2), 117-132. https://doi.org/10.1006/obhd.1996.2675
- Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1003. https://doi.org/10.1287/mnsc.35.8.982
- Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Dogruel, L., Joeckel, S., & Vitak, J. (2017). The valuation of privacy premium features for smartphone apps: The influence of defaults and expert recommendations. Computers in Human Behavior, 77, 230-239. https://doi.org/10.1016/j.chb.2017.08.035
- Egele, M., Kruegel, C., Kirda, E., & Vigna, G. (2011, February). PiOS: Detecting privacy leaks in iOS applications. In NDSS, 177-183.
- Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... & Sheth, A. N. (2014). TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems(TOCS), 32(2), 1-29.
- Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.1177/002224378101800104
- Freitas, A. L., Liberman, N., & Higgins, E. T. (2002). Regulatory fit and resisting temptation during goal pursuit. Journal of Experimental Social Psychology, 38(3), 291-298. https://doi.org/10.1006/jesp.2001.1504
- George, D., & Mallery, M. (2003). Using SPSS for Windows step by step: A simple guide and reference. Pearson Education India.
- Gutierrez, A., O'Leary, S., Rana, N. P., Dwivedi, Y. K., & Calle, T. (2019). Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor. Computers in Human Behavior, 95, 295-306. https://doi.org/10.1016/j.chb.2018.09.015
- Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing theory and Practice, 19(2), 139-152. https://doi.org/10.2753/MTP1069-6679190202
- Higgins, E. T. (1997). Beyond pleasure and pain. American Psychologist, 52(12), 1280-1300. https://doi.org/10.1037/0003-066X.52.12.1280
- Higgins, E. T., Idson, L. C., Freitas, A. L., Spiegel, S., & Molden, D. C. (2003). Transfer of value from fit. Journal of Personality and Social Psychology, 84(6), 1140-1153. https://doi.org/10.1037/0022-3514.84.6.1140
- Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information Technology and Management, 1(1-2), 45-71. https://doi.org/10.1023/A:1019104520776
- Jiang, Z., Heng, C. S., & Choi, B. C. (2013). Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595. https://doi.org/10.1287/isre.1120.0441
- Jozani, M., Ayaburi, E., Ko, M., & Choo, K. K. R. (2020). Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Computers in Human Behavior, 107, 106260. https://doi.org/10.1016/j.chb.2020.106260
- Jung, E. J., McKnight, D. H., Jung, E., & Lankton, N. K. (2011). The surprising lack of effect of privacy concerns on intention to use online social networks. In AMCIS.
- Kline, P. (2000). Test construction: Factor analytic and item analytic methods. In Handbook of psychological testing (2nd ed., pp. 161-181). London: Routledge.
- Krasnova, H., & Veltri, N. F. (2010, January). Privacy calculus on social networking sites: Explorative evidence from Germany and USA. In 2010 43rd Hawaii International Conference on System Sciences, IEEE, 1-10.
- Nagy, M. S. (2002). Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology, 75(1), 77-86. https://doi.org/10.1348/096317902167658
- Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22-42. https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
- Lee, A. Y., & Aaker, J. L. (2004). Bringing the frame into focus: the influence of regulatory fit on processing fluency and persuasion. Journal of Personality and Social Psychology, 86(2), 205-218. https://doi.org/10.1037/0022-3514.86.2.205
- Li, H., Sarathy, R., & Xu, H. (2010). Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1), 62-71.
- Li, H., Sarathy, R., & Xu, H. (2011). The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434-445. https://doi.org/10.1016/j.dss.2011.01.017
- Lockwood, P., Jordan, C. H., & Kunda, Z. (2002). Motivation by positive or negative role models: Regulatory focus determines who will best inspire us. Journal of Personality and Social Psychology, 83(4), 854-864. https://doi.org/10.1037/0022-3514.83.4.854
- McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359. https://doi.org/10.1287/isre.13.3.334.81
- Mosteller, J., & Poddar, A. (2017). To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors. Journal of Interactive Marketing, 39, 27-38. https://doi.org/10.1016/j.intmar.2017.02.003
- Oliver, R. L. (1980). A cognitive model of the antecedents and consequences of satisfaction decisions. Journal of Marketing Research, 17(4), 460-469. https://doi.org/10.2307/3150499
- Pentina, I., Zhang, L., Bata, H., & Chen, Y. (2016). Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior, 65, 409-419. https://doi.org/10.1016/j.chb.2016.09.005
- PWC (2014). Wearable technology future is ripe for growth-most notably among millennials. Available at: http://www.pwc.com/us/en/press-releases/2014/wearable-technology-future.html
- Robins, R. W., Hendin, H. M., & Trzesniewski, K. H. (2001). Measuring global self-esteem: Construct validation of a single-item measure and the Rosenberg Self-Esteem Scale. Personality and Social Psychology Bulletin, 27(2), 151-161. https://doi.org/10.1177/0146167201272002
- Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. https://doi.org/10.2307/249477
- Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
- Wang, E. S. T., & Lin, R. L. (2017). Perceived quality factors of location-based apps on trust, perceived privacy risk, and continuous usage intention. Behaviour & Information Technology, 36(1), 2-10.
- Wang, J., & Lee, A. Y. (2006). The role of regulatory focus in preference construction. Journal of Marketing Research, 43(1), 28-38. https://doi.org/10.1509/jmkr.43.1.28
- Wang, T., Duong, T. D., & Chen, C. C. (2016). Intention to disclose personal information via mobile applications: A privacy calculus perspective. International Journal of Information Management, 36(4), 531-542. https://doi.org/10.1016/j.ijinfomgt.2016.03.003
- Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220. https://doi.org/10.2307/1321160
- Wottrich, V. M., Van Reijmersdal, E. A., & Smit, E. G. (2018). The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns. Decision Support Systems, 106, 44-52. https://doi.org/10.1016/j.dss.2017.12.003
- Xu, H., & Teo, H. H. (2004). Alleviating consumers' privacy concerns in location-based services: A psychological control perspective. ICIS 2004 Proceedings, 64.
- Xu, H., Dinev, T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual's privacy concerns: Toward an integrative view. ICIS 2008 Proceedings, 6.
- Xu, H., Gupta, S., Rosson, M. B., & Carroll, J. M. (2012). Measuring mobile users' concerns for information privacy. 33rd International Conference on Information Systems, 1-16.
- Xu, H., Luo, X. R., Carroll, J. M., & Rosson, M. B. (2011). The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. Decision Support Systems, 51(1), 42-52. https://doi.org/10.1016/j.dss.2010.11.017
- Xu, H., Teo, H. H., Tan, B. C., & Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174. https://doi.org/10.2753/MIS0742-1222260305