Acknowledgement
This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2020S1A5A2A03041137).
References
- Acquisti, Alessandro and Jens Grossklags (2005), "Privacy and rationality in individual decision making," IEEE Security & Privacy, 3 (1), 26-33.
- Adomavicius, Gediminas and Tuzhilin Alexander (2005), "Personalization technologies: A process-oriented perspective," Communications of the ACM, 48 (10), 83-90. https://doi.org/10.1145/1089107.1089109
- Awad, Naveen Farag and Mayuram S. Krishnan (2006), "The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to Be profiled online for personalization," MIS Quarterly, 30 (1), 13-28. https://doi.org/10.2307/25148715
- Balaji, M.S., Khong Kok Wei, and Chong Alain Yee Loong (2016), "Determinants of negative word-of-mouth communication using social networking sites," Information & Management, 53 (4), 528-40. https://doi.org/10.1016/j.im.2015.12.002
- Balta-Ozkan, Nazmiye, Rosemary Davidson, Martha Bicket, and Lorraine Whitmarsh (2013), "Social barriers to the adoption of smart homes," Energy Policy, 63, 363-74. https://doi.org/10.1016/j.enpol.2013.08.043
- Chen, Pei-Yu and Chris Forman (2006), "Can vendors influence switching costs and compatibility in an environment with open standards?" MIS Quarterly, 541-62. https://doi.org/10.2307/25148772
- Choi, Sujeong (2016), "The flipside of ubiquitous connectivity enabled by smartphone-based social networking service: Social presence and privacy concern," Computers in Human Behavior, 65, 325-33. https://doi.org/10.1016/j.chb.2016.08.039
- Chun, Heasun, Hyunjoo Lee, and Daejoong Kim (2012), "The integrated model of smartphone adoption: Hedonic and utilitarian value perceptions of smartphones among Korean college students," Cyberpsychology, Behavior, and Social Networking, 15 (9), 473-9. https://doi.org/10.1089/cyber.2012.0140
- Culnan, Mary J. and Pamela K. Armstrong (1999), "Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation," Organization Science, 10 (1), 104-15. https://doi.org/10.1287/orsc.10.1.104
- Demiris, George and Brian K. Hensel (2008), "Technologies for an aging society: A systematic review of "smart home" applications," Yearbook of Medical Informatics, 17 (1), 33-40. https://doi.org/10.1055/s-0038-1638580
- Dinev, Tamara and Paul Hart (2006), "An extended privacy calculus model for E-commerce transactions," Information Systems Research, 17 (1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Ding, Ding and Klaus Gebel (2012), "Built environment, physical activity, and obesity: What have we learned from reviewing the literature?" Health & Place, 18 (1), 100-5. https://doi.org/10.1016/j.healthplace.2011.08.021
- Farooq, M. Umar, Muhammad Waseem, Sadia Mazhar, Khairi Anjum, and Talha Kamal (2015), "A review on Internet of Things (IoT)," International Journal of Computer Applications, 113 (1), 1-7. https://doi.org/10.5120/19787-1571
- Featherman, Mauricio S. and Paul A. Pavlou (2003), "Predicting Eservices adoption: A perceived risk facets perspective," International Journal of Human-Computer Studies, 59 (4), 451-74. https://doi.org/10.1016/S1071-5819(03)00111-3
- Gutierrez, Anabel, Simon O'Leary, Nripendra P. Rana, Yogesh K. Dwivedi, and Tatiana Calle (2019), "Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor," Computers in Human Behavior, 95, 295-306. https://doi.org/10.1016/j.chb.2018.09.015
- Hair, Joe F., Christian M. Ringle, and Marko Sarstedt (2011), "PLS-SEM: Indeed a silver bullet," Journal of Marketing Theory and Practice, 19 (2), 139-52. https://doi.org/10.2753/MTP1069-6679190202
- Han, Sang-Lin and Hyo-Ju Park (2016), "Effects of technology readiness on user perceptions and use intention of mobile social commerce," Asia Marketing Journal, 18, 25-44. https://doi.org/10.15830/amj.2016.18.2.25
- Jeong, Kyeong-Ah, Gavriel Salvendy, and Robert W. Proctor (2010), "Smart home design and operation preferences of Americans and Koreans," Ergonomics, 53 (5), 636-60. https://doi.org/10.1080/00140130903581623
- Ji, Pan and Paul S. Lieber (2010), "Am I safe? Exploring relationships between primary territories and online privacy," Journal of Internet Commerce, 9 (1), 3-22. https://doi.org/10.1080/15332861.2010.487413
- Jozani, Mohsen, Emmanuel Ayaburi, Myung Ko, and Kim-Kwang Raymond Choo (2020), "Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective," Computers in Human Behavior, 107, 106-260.
- Kim, Ji Yoon and Sang Yong Kim (2014), "The effect of perceived risk, hedonic value, and self-construal on attitude toward mobile SNS," Asia Marketing Journal, 16 (1), 149-68.
- Kim, Dongyeon, Kyuhong Park, Yongjin Park, and Jae-Hyeon Ahn (2019), "Willingness to provide personal information: Perspective of privacy calculus in IoT services," Computers in Human Behavior, 92, 273-81. https://doi.org/10.1016/j.chb.2018.11.022
- Lee, Yong-Ki, Jong-Hyun Park, Namho Chung, and Alisha Blakeney (2012), "A unified perspective on the factors influencing usage intention toward mobile financial services," Journal of Business Research, 65 (11), 1590-9. https://doi.org/10.1016/j.jbusres.2011.02.044
- Lee, Haein, Hyejin Park, and Jinwoo Kim (2013), "Why do people share their context information on social network services? A qualitative study and an experimental study on users' behavior of balancing perceived benefit and risk," International Journal of Human-Computer Studies, 71 (9), 862-77. https://doi.org/10.1016/j.ijhcs.2013.01.005
- Li, Yuan (2012), "Theories in online information privacy research: A critical review and an integrated framework," Decision Support Systems, 54 (1), 471-81. https://doi.org/10.1016/j.dss.2012.06.010
- Li, Han, Rathindra Sarathy, and Heng Xu (2011), "The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors," Decision Support Systems, 51 (3), 434-45. https://doi.org/10.1016/j.dss.2011.01.017
- Marikyan, Davit, Savvas Papagiannidis, and Eleftherios Alamanos (2019), "A systematic review of the smart home literature: A user perspective," Technological Forecasting and Social Change, 138, 139-54. https://doi.org/10.1016/j.techfore.2018.08.015
- McNealy, Jasmine and Mullis Michaela Devyn (2019), "Tea and turbulence: Communication privacy management theory and online celebrity gossip forums," Computers in Human Behavior, 92, 110-8. https://doi.org/10.1016/j.chb.2018.10.029
- Nepomuceno, Marcelo Vinhal, Michel Laroche, and Marie-Odile Richard (2014), "How to reduce perceived risk when buying online: The interactions between intangibility, product knowledge, brand familiarity, privacy and security concerns," Journal of Retailing and Consumer Services, 21 (4), 619-29. https://doi.org/10.1016/j.jretconser.2013.11.006
- Oh, Yun Kyung and Jung-Min Kim (2022), "What improves customer satisfaction in mobile banking apps? An application of text mining analysis," Asia Marketing Journal, 23 (4), 28-37.
- Omarzu, Julia (2000), "A disclosure decision model: Determining how and when individuals will self-disclose," Personality and Social Psychology Review, 4 (2), 174-85. https://doi.org/10.1207/S15327957PSPR0402_05
- Petronio, Sandra (2010), "Communication privacy management theory: What do we know about family privacy regulation?" Journal of Family Theory & Review, 2 (3), 175-96. https://doi.org/10.1111/j.1756-2589.2010.00052.x
- Pi, Shih-Ming, Hsiu-Li Liao, Su-Houn Liu, and Chia-Yu Hsieh (2010), "The effects of user perception of value on use of blog services," Social Behavior and Personality: International Journal, 38 (8), 1029-40. https://doi.org/10.2224/sbp.2010.38.8.1029
- Eva-Maria, Schomakers, Hannah Biermann, and Martina Ziefle (2021), "Users' preferences for smart home automatione investigating aspects of privacy and trust," Telematics and Informatics, 64, 101689. https://doi.org/10.1016/j.tele.2021.101689
- Sharma, Shwadhin and Robert E. Crossler (2014), "Disclosing too much? situational factors affecting information disclosure in social commerce environment," Electronic Commerce Research and Applications, 13 (5), 305-19. https://doi.org/10.1016/j.elerap.2014.06.007
- Sherry Jr, F. John, McGrath Mary Ann, and J. Levy Sidney (2013), "The dark side of the gift," Journal of Business Research, 28 (3), 225-44. https://doi.org/10.1016/0148-2963(93)90049-U
- Shih, Dong-Her, Sheng-Fei Hsu, David C. Yen, and Chia-Chia Lin (2012), "Exploring the individual's behavior on self-disclosure online," International Journal of Human-Computer Interaction, 28 (10), 627-45. https://doi.org/10.1080/10447318.2011.654198
- Shmargad, Yotam and Jameson KM. Watts (2016), "When online visibility deters social interaction: The case of digital gifts," Journal of Interactive Marketing, 36, 1-14. https://doi.org/10.1016/j.intmar.2016.01.004
- Statista. (2021), "Smart home report 2021. Statista digital market outlook - market report," (December 31), https://www.statista.com/study/42112/smart-home-report/.
- Tojib, Dewi and Yelena Tsarenko (2012), "Post-adoption modeling of advanced mobile service use," Journal of Business Research, 65 (7), 922-8. https://doi.org/10.1016/j.jbusres.2011.05.006
- Vailshery and Lionel Sujay (2021), "IoT connected devices worldwide 2030," (January 22), https://www.statista.com/statistics/802690/worldwide-connected-devices-by-accesstechnology/.
- Wang, Tien, Duong Trong Danh, C. Charlie, and Chen. (2016), "Intention to disclose personal information via mobile applications: A privacy calculus perspective," International Journal of Information Management, 36 (4), 531-42. https://doi.org/10.1016/j.ijinfomgt.2016.03.003
- Weissman, Cale Guthrie (2015), "Internet of Things survey results: IoT adoption is already significant," But Security Worries Persist. January 14 https://www.businessinsider.com/bi-intelligence-iot-survey-businesses-remain-wary-ofsecurity-and-privacy-2015-1.
- Wooten, David B. (2000), "Qualitative steps toward an expanded model of anxiety in gift-giving," Journal of Consumer Research, 27 (1), 84-95. https://doi.org/10.1086/314310
- Xu, Heng, Xin Robert Luo, John M. Carroll, and Mary Beth Rosson (2011), "The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing," Decision Support Systems, 51 (1), 42-52. https://doi.org/10.1016/j.dss.2010.11.017
- Xu, Heng, Hock-Hai Teo, Bernard CY. Tan, and Ritu Agarwal (2009), "The role of push-pull technology in privacy calculus: The case of location-based services," Journal of Management Information Systems, 26 (3), 135-74. https://doi.org/10.2753/MIS0742-1222260305
- Zhao, Ling, Yaobin Lu, and Sumeet Gupta (2012), "Disclosure intention of location-related information in location-based social network services," International Journal of Electronic Commerce, 16 (4), 53-90. https://doi.org/10.2753/jec1086-4415160403
- Zheng, Serena, Noah Apthorpe, Marshini Chetty, and Nick Feamster (2018), "User perceptions of smart home IoT privacy," Proceedings of the ACM on Human-Computer Interaction, 2, 1-20. CSCW.