Browse > Article

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea  

Choi, Mi-Young (중소기업기술정보진흥원 경영개선부)
Lee, Sang-Yong Tom (한양대학교 경영대학)
Publication Information
Asia pacific journal of information systems / v.18, no.3, 2008 , pp. 45-65 More about this Journal
Abstract
The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.
Keywords
Online Information Privacy; Privacy Concerns; Conjoint Analysis; Expectancy Theory; Cluster Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Green, Paul E. and Abba M. Krieger "Segmenting Markets with Conjoint Analysis," Journal of Marketing, Vol. 55, No. 4, Oct. 1991, pp. 20-31   DOI   ScienceOn
2 Hirschman, E.C. "People as products: Analysis of a complex marketing exchange." Journal of Marketing, Vol. 51, No. 1, January 1987, pp. 98-108   DOI   ScienceOn
3 Homans, George Caspar. "Social Behavior: Its Elementary Forms.," Harcourt Brace Jovanovich, Inc. 1974
4 Milligan, Glenn W., and Martha C. Cooper, "An Examination of Procedures for Determining the Number of Clusters in a Data Set." Psychometrika, Vol. 50, No. 2, 1985, pp. 159-79   DOI
5 Smith, H. Jeff, Sandra J. Milberg and Sandra J. Burke "Information Privacy: Measuring Individuals' Concerns About Organizational Practices," MIS Quarterly, Vol. 20, No. 2, June 1996, pp. 167-196   DOI   ScienceOn
6 Stone, Eugene F. and Dianna L. Stone, "Privacy in organizations: theoretical issues, research findings, and protection mechanisms," Research in Personnel and Human Resources Management, Vol. 8, 1990, pp. 349-411
7 Woodman, Richard W., Daniel C. Ganster, Jerome Adams, Michael K. McCuddy, Paul D. Tolchinsky and Howard From kin "A Survey of Employee Perceptions of Information Privacy in Organizations," Academy of Management Journal, Vol. 25, No. 3, 1982, pp. 647-663   DOI   ScienceOn
8 Jupiter Media Metrix, "Seventy Percent of US Consumers Worry About Online Privacy, But Few Take Protective Action," Press Release, Vol. 3, June 2002
9 Stewart, Kathy A. and Albert H. Segars "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research, Vol. 13, No. 1, Mar 2002, pp. 36-49   DOI   ScienceOn
10 Hair, J.F, Anderson, R.E., Tatham, R.L., and Black, W.C., Multivarite Data Analy-sis with Readings, Fourth Edition, Prentice-Hall, Inc. 1995
11 Stone, Eugene F., Hal G. Gueutal, Donald G. Gardner and Stepherd McClure "A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations," Journal of Applied Psychology, Vol. 68, No. 3, 1983, pp. 459-468   DOI
12 최성재 남기민, 사회복지행정론, 나남, 2001
13 Hui, K.L., Teo, H.H., and Sang-Yong Tom Lee "The Value of Privacy Assurance: A Field Experiment," MIS Quarterly, Vol. 31, No. 1, March 2007, pp. 19-34   DOI
14 Fusilier, M.R. and Hoyer, W.D. "Variables affecting perceptions of invasion of privacy in a personnel selection situation." Journal of Applied Psychology, Vol. 65, No. 5, 1980, pp. 623-626   DOI
15 Vroom, V.H. Work and Motivation. NY: Wiley, 1964
16 이학식, 임지훈 SPSS 12.0 매뉴얼, 법문사, 2005
17 Emerson, R.M. "Exchange theory, Part II: Exchange relations and network structures." In J. Berger, M. Zelditch Jr., and B. Anderson (eds.), Social Theories in Progress. Boston: Houghton Miffl in, 1972, pp. 58-87
18 Green, P.E., and Wind, Y. "New ways to measure consumer judgments." Harvard Business Review, Vol. 53, No. 4, July-August 1975, pp. 107-117
19 Donnenwerth, G.V., and Foa, U.G. "Effect of resource class on retaliation to injustice in interpersonal exchange.," Journal of Personality and Social Psychology, Vol. 29, No. 6, 1974, pp. 785-793   DOI
20 Westin, Alan. Testimony before U.S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Commerce, Trade, and Consumer Protection, Hearing on "Opinion Surveys: What Consumers Have To Say About Information Privacy" May No. 8, 2001
21 Green, Paul E. and V. Srinivasan, "Conjoint Analysis in Marketing: New Developments with Implications for Research and Practice," Journal of Marketing, Vol. 54, No. 4, 1990, pp. 3-19   DOI   ScienceOn
22 Addelman, Sidney, "Orthogonal Main-Effect Plans for Asymmetrical Factorial Experiments," Technometrics, Vol. 4, No. 1, February 1962
23 Foa, Uriel G. "Interpersonal and Economic Resources," Science, Vol. 171, 1971, pp. 345-351   DOI   ScienceOn
24 Hann, I.H., Hui, K.L., Sang-Yong Tom Lee, and Ivan P.L. Png, "Overcoming Online Information Piracy Concerns: An Information Processing Theory Approach," Journal of Management Information Systems, Vol. 24, No. 2, Fall 2007, pp. 13-42
25 Laufer, Robert S. and Maxine Wolfe "Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory," Journal of Social Issues, Vol. 33, No. 3, 1977, pp. 22-42
26 민완기, 최정수, 장송자, "전자상거래 시장분 석을 위한 방법론 연구: Conjoint Analysis Method를 중심으로 통계분석연구," 제5권 제1호, 2000
27 Culnan, Mary J. and Pamela K. Armstrong, "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, Vol. 10, No. 1, January-February 1999, pp. 104-115   DOI   ScienceOn
28 Culnan, Mary J. "How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use," MIS Quarterly, Vol. 17, No. 3, Sept 1993. pp. 341-363   DOI   ScienceOn
29 Green, P.E. and Srinivasan, V. "Conjoint analysis in consumer research: Issues and outlook." Journal of Consumer Research, Vol. 5, No. 2, 1978, pp. 103-123   DOI   ScienceOn
30 Jourard, S.M. "Some psychological aspects of privacy. Law and Contemporary Problems," Vol. 31, Winter 1966, pp. 307-318