DOI QR코드

DOI QR Code

Ethical Consciousness: Passive Privacy Intrusion versus Active Privacy Intrusion on a SNS

윤리의식: SNS상의 수동적 개인정보 침해와 능동적 개인정보 침해

  • Sanghui Kim (School of Business Administration, Chungbuk National University) ;
  • DongBack Seo (Department of Management Information Systems, Chungbuk National University)
  • 김상희 (충북대학교 경영대학원) ;
  • 서동백 (충북대학교 경영정보학과 )
  • Received : 2022.10.05
  • Accepted : 2022.11.09
  • Published : 2022.11.30

Abstract

People have adopted Social Networking Sites (SNSs) as a part of their daily lives. When a person uses SNSs, (s)he intentionally or unintentionally discloses her/his personal information. Although using SNSs can provide benefits to a person such as maintaining relationships with people who does not see often, it also opens a dark side. Someone can use one's disclosed information without the acknowledgement of the information owner. It is called a privacy intrusion on SNSs, which has become a social problem and needs attention. This study examined factors affecting privacy intrusion intention on SNSs. This study classifies privacy intrusions into passive intrusion (collector) and active intrusion (distributor). The results reveal that low ethical consciousness positively affects enjoyment in both of collecting and distributing someone's personal information on SNSs. A person who has the low ethical consciousness also tends to raise her/his curiosity of collecting someone's private information on SNSs. Apart from low ethical consciousness, this study discloses how enjoyment, curiosity, experience of being a victim of privacy intrusion, experience of intruding others' privacies, and self-efficacy of collecting or distributing others' private information are related to passive or/and active privacy intrusion on SNSs with survey data.

사람들은 SNS를 일상적으로 사용하고 있다. SNS를 사용함에 있어 사람들은 의도적이든 그렇지 않든 자신의 개인정보를 노출하고 있다. SNS은 사람들이 자주 볼 수 없는 사람들과 소통할 수 있게 하는 등 장점을 제공하긴 하지만, 어두운 면도 가지고 있다. SNS 사용자 중에 일부는 정보제공자의 동의없이 SNS상에 있는 개인정보를 도용하기도 해 사회적인 문제로 대두되고 있다. 본 논문은 SNS상의 개인정보 침해에 영향을 미치는 요인에 대한 연구이다. 본 논문에서 SNS상에서 개인정보 침해는 수동적과 능동적 침해로 나눈다. 수동적 침해는 정보제공자의 동의 없이 정보를 수집하는 것을 말하는 것이며 능동적 침해는 정보제공자의 동의없이 정보를 유포하는 행위를 말한다. 본 연구를 통해 낮은 윤리의식이 수동적 침해와 능동적 침해를 즐거움으로 생각하는 것에 긍정적으로 영향을 미친다는 결과를 도출했다. 또한 낮은 윤리의식을 가진 사람일수록 다른 사람의 개인정보를 수집하는 것에 호기심이 많다라는 결론도 도출했다. 본 연구는 낮은 윤리의식 이외에도 즐거움, 호기심, 개인정보 침해의 피해자로서의 경험과 가해자로서의 경험 그리고 타인의 개인정보를 수집하거나 유포할 수 있다는 자기효능감이 수동적 그리고 능동적 개인정보 침해에 미치는 영향을 설문 자료를 통해 조사하였다.

Keywords

Acknowledgement

이 논문은 2022학년도 충북대학교 학술연구영역 사업의 연구비 지원에 의하여 연구 되었음.

References

  1. Agarwal, R. and E. Karahanna, "Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage", MIS quarterly, Vol.24, No.4, 2000, pp. 665-694.  https://doi.org/10.2307/3250951
  2. Ahn, S. M., J. Y. Jang, J. D. Kim, and B. S. Kim, "Factors affecting the intention to invade privacy on social network service", Information Systems Review, Vol.16, No.2, 2014, 1-23. 
  3. Ainley, M. and J. Ainley, "Student engagement with science in early adolescence: The contribution of enjoyment to students' continuing interest in learning about science", Contemporary Educational Psychology, Vol.36, No.1, 2011, 4-12.  https://doi.org/10.1016/j.cedpsych.2010.08.001
  4. Ajzen, I., "Constructing a TPB questionnaire: Conceptual and methodological considerations", 2002, Available at http://www.uni-bielefeld.de/ikg/zick/ajzen%20construction%20a%20tpb%20questionnaire.pdf. 
  5. Akers, R. L., Deviant behavior: A social learning approach (2nd Ed.), Wadsworth, California, 1973. 
  6. Antil, J. H., "Conceptualization and operationalization of involvement", Advances in Consumer Research, Vol.11, No.1, 1984, pp. 203-209. 
  7. Bandura, A., "Self-efficacy: Toward a unifying theory of behavioral change", Psychological review, Vol.84, No.2, 1977, pp. 191-215.  https://doi.org/10.1037/0033-295X.84.2.191
  8. Bandura, A., "Self-efficacy mechanism in human agency", American Psychologist, Vol.37, No.2, 1982, pp. 122-147.  https://doi.org/10.1037/0003-066X.37.2.122
  9. Bandura, A., Social foundations of thought and action: A social cognitive theory, Prentice-Hall, New Jersey, 1986. 
  10. Belanger, F., J. S. Hiller, and W. J. Smith, "Trustworthiness in electronic commerce: The role of privacy, security, and site attributes", The Journal of Strategic Information Systems, Vol.11, No.3-4, 2002, pp. 245-270.  https://doi.org/10.1016/S0963-8687(02)00018-5
  11. Blackwell, C., "A security architecture to protect against the insider threat from damage, fraud and theft", In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, ACM, 2009, p. 45. 
  12. Bloch, P. H., "An exploration into the scaling of consumer's involvement with a product class", Advances in Consumer Research, Vol.8, No.1, 1981, pp. 61-65. 
  13. Broussard, S. C. and M. E. B. Garrison, "The relationship between classroom motivation and academic achievement in elementary school-aged children", Family and Consumer Sciences Research Journal, Vol.33, No.2, 2004, pp. 106-120.  https://doi.org/10.1177/1077727X04269573
  14. Byeon, Y. G., Consideration of teaching and learning theories (2nd Ed.), Hakjisa, Seoul 2005. (in Korean). 
  15. Carroll, J. M. and J. C. Thomas, "Fun", ACM SIGCHI Bulletin, Vol.19, No.3, 1988, pp. 21-24.  https://doi.org/10.1145/49108.1045604
  16. Childers, T. L., C. L. Carr, J. Peck, and S. Carson, "Hedonic and utilitarian motivations for online retail shopping behavior", Journal of Retailing, Vol.77, No.4, 2002, pp. 511-535.  https://doi.org/10.1016/S0022-4359(01)00056-2
  17. Chin, W. W., "The partial least squares approach to structural equation modeling", Modern Methods for Business Research, Vol.295, No.2, 1998, pp. 295-336. 
  18. Cho, K. I., "Track 4: The research for the leveles and moral of teenagers in cyber space lncluding the development of evalutation methods for them", Korean Association of Computer Education, Vol.17, No.2, 2013, pp. 151-156. 
  19. Chu, B. W., Information ethics education, Ulyuck, Seoul, 2001. (in Korean) 
  20. Chu, B. W., "Definition of information ethics and access", Korea Communications Standards Commission, 2003. (in Korean) 
  21. Compeau, D. R. and C. A. Higgins, "Computer self-efficacy: Development of a measure and initial test", MIS quarterly, Vol.19, No.2, 1995, pp. 189-211.  https://doi.org/10.2307/249688
  22. Conger, S., J. H. Pratt, and K. D. Loch, "Personal information privacy and emerging technologies", Information Systems Journal, Vol.23, No.5, 2013, pp. 401-417.  https://doi.org/10.1111/j.1365-2575.2012.00402.x
  23. Deci, E. L., Intrinsic Motivation, Plenum Press, New York, 1975. 
  24. Deci, E. L. and R. M. Ryan, "The general causality orientations scale: Self-determination in personality", Journal of Research in Personality, Vol.19, No.2, 1985, pp. 109-134.  https://doi.org/10.1016/0092-6566(85)90023-6
  25. Ellison, N. B., C. Steinfield, and C. Lampe, "The benefits of Facebook "Friends:" Social capital and college students' use of online social network sites", Journal of Computer-Mediated Communication, Vol.12, 2007, pp. 1143-1168, Available at https://doi.org/10.1111/j.1083-6101.2007.00367.x. 
  26. Falk, R. F. and N. B. Miller, A Primer for Soft Modeling, University of Akron Press, Ohio, 1992. 
  27. Fornell, C. and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error", Journal of Marketing Research, Vol.18, No.1, 1981, pp. 39-50.  https://doi.org/10.1177/002224378101800104
  28. Gefen, D. and D. Straub, "A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example", Communications of the Association for Information Systems, Vol.16, No.1, 2005, pp. 91-109. 
  29. Gottfried, A. E., "Academic intrinsic motivation in young elementary school children", Journal of Educational Psychology, Vol.82, No.3, 1990, pp. 525-538.  https://doi.org/10.1037/0022-0663.82.3.525
  30. Greenwald, A. G. and C. Leavitt, "Audience involvement in advertising: Four levels", Journal of Consumer Research, Vol.11, No.1, 1984, pp. 581-592.  https://doi.org/10.1086/208994
  31. Hidi, S., "Interest and its contribution as a mental resource for learning", Review of Educational Research, Vol.60, No.4, 1990, pp. 549-571.  https://doi.org/10.3102/00346543060004549
  32. Hidi, S. and K. A. Renninger, "The four-phase model of interest development", Educational Psychologist, Vol.41, No.2, 2006, pp. 111-127.  https://doi.org/10.1207/s15326985ep4102_4
  33. Hsu, M. H. and C. M. Chiu, "Internet self-efficacy and electronic service acceptance", Decision Support Systems, Vol.38, No.3, 2004, pp. 369-381.  https://doi.org/10.1016/j.dss.2003.08.001
  34. Ifinedo, P., "Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition", Information & Management, Vol.51, No.1, 2014, pp. 69-79.  https://doi.org/10.1016/j.im.2013.10.001
  35. Ivanov, A. V., Y. V. Chelysheva, A. G. Akhtyan, V. A. Vishnyakova, and V. P. Sorikhina, "Ethical concepts of pedagogy of consciousness as a foundation for the development of the school for the future", Astra Salvensis, Vol.6, No.S, 2018, pp. 453-462. 
  36. Kim, T. and M. Kang, "Measuring the effectiveness of teaching and actual condition of internet ethics of the undergraduate students", Journal of Information and Communication Convergence Engineering, Vol.14, No.5, 2010, pp. 1257-1269. 
  37. Kitkowska, A., M. Warner, Y. Shulman, E. Wastlund, and L. A. Martucci, "Enhancing privacy through the visual design of privacy notices: Exploring the interplay of curiosity, control and affect", In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 2020, pp. 437-456. 
  38. Koo, D. M. and S. H. Ju, "The interactional effects of atmospherics and perceptual curiosity on emotions and online shopping intention", Computers in Human Behavior, Vol.26, No.3, 2010, pp. 377-388.  https://doi.org/10.1016/j.chb.2009.11.009
  39. Korea Communications Standards Commission, "Manuals on Violation of Rights in the Cyberspace", 2012, Available at https://www.kocsc.or.kr/02_infoCenter/Edu_View.php?ko_board=edu&ba_id=5958. (in Korean) 
  40. Korea Internet and Security Agency, "Survey Report on Internet Ethical Culture", 2011, Available at http://isis.kisa.or.kr/board/?pageId=060100&bbsId=7&itemId=786&pageIndex=3. (in Korean) 
  41. Korea Internet and Security Agency, "Survey on Information Security (Individual), 2014, Available at Retrieved from http://isis.kisa.or.kr/board/?pageId=060200&bbsId=15&itemId=49&pageIndex=1. (in Korean) 
  42. Krapp, A., "Structural and dynamic aspects of interest development: Theoretical considerations from an ontogenetic perspective", Learning and Instruction, Vol.12, No.4, 2002, pp. 383-409.  https://doi.org/10.1016/S0959-4752(01)00011-1
  43. Lee, I., "Stealing one's personal information has become a daily thing", Hankyung news agency, June 7, 2020, Available at https://www.hankyung.com/society/article/2020060798271. (in Korean) 
  44. Lee, J. H. and S. C. An, "A comparative study on the legal system of cyberbullying", Dispute Resolution Studies Review, Vol.11, No.1, 2013, pp. 133-157. (in Korean)  https://doi.org/10.16958/DRSR.2013.11.1.133
  45. Lepper, M. R. and D. Green, The Hidden Costs of Reward: New Perspectives on the Psychology of Human Behavior, Erlbaum, New York, 1978. 
  46. Litman, J. A. and C. D. Spielberger, "Measuring epistemic curiosity and its diversive and specific components", Journal of Personality Assessment, Vol.80, No.1, 2003, pp. 75-86.  https://doi.org/10.1207/S15327752JPA8001_16
  47. Loewenstein, G., "The psychology of curiosity: A review and reinterpretation", Psychological Bulletin, Vol.116, No.1, 1994, p. 75. 
  48. Noh, D. I. and W. Choung, "Changing concept of privacy in cyberspace and the legal response thereto", Kyung Hee Law Journal, Vol.45, No.4, 2010, pp. 181-218. (in Korean) 
  49. Nunnally, J. C., Psychometric Theory (2nd Ed.), McGraw-Hill, New York, 1987. 
  50. Oh, T. W. and J. Y. Yu, "Changing concept of privacy in social networking service environment", Information and Communications Policy, Vol.23, No.4, 2011, pp. 26-42. (in Korean) 
  51. Personal Information Protection Commission (PIPC), "Personal Information Protection 2019 Survey", 2019, Available at Retrieved from https://www.korea.kr/archive/expDocView.do?docId=39046. (in Korean) 
  52. Personal Information Protection Commission (PIPC), "Statistical Cases of Personal Information Intrusion", 2022, Available at https://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1366. (in Korean) 
  53. Pizam, A., Y. Neumann, and A. Reichel, "Tourist satisfaction: Uses and misuses", Annals of Tourism Research, Vol.6, No.2, 1979, pp. 195-197.  https://doi.org/10.1016/0160-7383(79)90146-4
  54. Renninger, A., S. Hidi, and A. Krapp, The Role of Interest in Learning and Development, Psychology Press, New York, 2014. 
  55. Schiefele, U., "Interest, learning, and motivation", Educational Psychologist, Vol.26, No.3-4, 1991, pp. 299-323.  https://doi.org/10.1080/00461520.1991.9653136
  56. Schiefele, U., "Interest and learning from text", Scientific Studies of Reading, Vol.3, No.3, 1999, pp. 257-279.  https://doi.org/10.1207/s1532799xssr0303_4
  57. Sherif, M. and H. Cantril, The Psychology of ego-involvements: Social Attitudes and Identifications, Wiley, New York, 1947. 
  58. Smith, H. J., S. J. Milberg, and S. J. Burke, "Information privacy: Measuring individuals' concerns about organizational practices", MIS quarterly, Vol.20, No.2, 1996, pp. 167-196.  https://doi.org/10.2307/249477
  59. Son, M. J., "Current state of cyberbullying and countermeasures in Korea", Internet & Security Focus, Vol.3, 2013, pp. 6-22. (in Korean) 
  60. Sung, D. K., D. H. Kim, Y. S. Lee, and S. W. Lim, "A study on the cyber-violence induction factors of teenagers: Focused on individual inclination, cyber violence damage experience, and moral consciousness", Journal of Cybercommunication Academic Society, Vol.19, 2006, pp. 79-129. (in Korean) 
  61. Taddicken, M., "The 'privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure", Journal of Computer-Mediated Communication, Vol.19, 2014, pp. 248-273, Available at https://doi.org/10.1111/jcc4.12052. 
  62. Teo, H. H., K. K. Wei, and I. Benbasat, "Predicting intention to adopt interorganizational linkages: An institutional perspective", MIS quarterly, Vol.27, No.1, 2003, pp. 19-49.  https://doi.org/10.2307/30036518
  63. Thompson, R., D. W. Barclay, and C. A. Higgins, "The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration", Technology Studies, Vol.2, No.2, 1995, pp. 284-324. 
  64. Turner Jr, S. A. and P. J. Silvia, "Must interesting things be pleasant? A test of competing appraisal structures", Emotion, Vol.6, No.4, 2006, pp. 670-674.  https://doi.org/10.1037/1528-3542.6.4.670
  65. Van der Heijden, H., "User acceptance of hedonic information systems", MIS quarterly, Vol.28, No.4, 2004, pp. 695-704.  https://doi.org/10.2307/25148660
  66. Venkatesh, V., "Creation of favorable user perceptions: Exploring the role of intrinsic motivation", MIS quarterly, Vol.23, No.2, 1999, pp. 239-260.  https://doi.org/10.2307/249753
  67. Warren, S. D. and L. D. Brandeis, "The right to privacy", Harvard Law Review, Vol.4, No.5, 1890, pp. 193-220.  https://doi.org/10.2307/1321160
  68. Westin, A. F., Privacy and Freedom, Atheneum, New York, 1967. 
  69. Won, J. and D. Seo, "Self-disclosure and cyberbullying on SNS", Information Systems Review, Vol.19, No.1, 2017, pp. 1-23.  https://doi.org/10.14329/isr.2017.19.1.001
  70. Xu, H., T. Dinev, H. Smith, and P. Hart, "Examining the formation of individual's privacy concerns: Toward an integrative view", International Conference on Information Systems (ICIS) 2008 Proceeding, 2008, Paper 6, Available at https://aisel.aisnet.org/icis2008/6. 
  71. Yun, H., G. Lee, and D. J. Kim, "A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs", Information & Management, Vol.56, No.4, 2019, pp. 570-601. https://doi.org/10.1016/j.im.2018.10.001