Browse > Article
http://dx.doi.org/10.4218/etrij.2017-0082

Determinants of the Intention to Protect Personal Information among Facebook Users  

Chon, Bum Soo (Department of Journalism & Communication, Hanyang University)
Lee, Jeong-Ki (Center for Teaching & Learning, Hanyang University)
Jeong, HyeonJu (Department of Advertising and Public Relations, Catholic Kwandong University)
Park, Jowon (Department of Journalism & Communication, Hanyang University)
Park, Jonghwa (School of Management Engineering, Ulsan National Institute of Science and Technology)
Publication Information
ETRI Journal / v.40, no.1, 2018 , pp. 146-155 More about this Journal
Abstract
This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability) had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.
Keywords
Facebook; Information protection; Intention to protect personal information; SNS privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Fishbein and I. Ajzen, Beliefs, Attitude, Intention and Behaviour: An Introduction to Theory and Research, Reading, MA, USA: Addison-Wesley, 1975.
2 F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, "User Acceptance of Computer Technology," Manage. Sci., vol. 35, no. 8, Aug. 1989, pp. 982-1003.   DOI
3 D. Boyd and N. Ellison, "Social Network Sites: Definition, History and Scholarship," J. Comput. Mediated. Commun., vol. 13, no. 1, Oct. 2007, pp. 210-230.   DOI
4 M. Thelwall, "Social Network Sites: Users and Uses," Adv. Comput., vol. 76, 2009, pp. 19-73.
5 J. Shah and E.T. Higgins, "Expectancy $\times$ Value Effects: Regulatory Focus as Determinant of Magnitude and Direction," J. Personality Soc. Psychol., vol. 73, no. 3, Sept. 1997, pp. 447-458.   DOI
6 N. Park, K.M. Lee, and P.H. Cheong. "University Instructors' Acceptance of Electronic Course Ware: An Application of the Technology Acceptance Model," J. Comput. Medicated Commun., vol. 13, no. 1, Oct. 2007, pp. 163-186.   DOI
7 D. Gefen and D.W. Straub, "Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model," MIS Quarterly, vol. 21, no. 4, Dec. 1997, pp. 389-400.   DOI
8 G. Choi and H. Chung, "Applying the Technology Acceptance Model to Social Networking Sites (SNS): Impact of Subjective Norm and Social Capital on the Acceptance of SNS," Int. J. Human Comput. Interaction, vol. 29, no. 10, Jan. 2013, pp. 619-628.   DOI
9 I. Ajzen, "The Theory of Planned Behavior," Organizational Behavior Human Decision Process., vol. 50, no. 2, Dec. 1991, pp. 179-211.   DOI
10 R. Rogers, "Cognitive and Psychological Processes in Fear-Based Attitude Change: A Revised Theory of Protection Motivation. In Social Psychophysiology: A Sourcebook, New York, USA: Guilford Press, 1983, pp. 153-176.
11 C.L. Anderson and R. Agarwal, "Practicing Safe Computing: A Multi-Method Empirical Examination of Home Computer User Security Behavioral Intention," MIS Quarterly, vol. 34, no. 3, 2010, pp. 613-643.   DOI
12 K.H. Beck and A. Frankel, "The Effects of Health Threat Seriousness and Personal Efficacy Upon Intentions and Behavior," J. Appl. Social Psychol., vol. 11, 1981, pp. 401-415.   DOI
13 Y.H. Lee, "Understanding Anti-Plagiarism Software Adaption: An Extended Protection Motivation Theory," Decision Support Syst., vol. 50, no. 2, 2011, pp. 361-369.   DOI
14 Y.H. Lee and K.R. Larsen, "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," Eur. J. Inform. Syst., vol. 18, 2009, pp. 177-187.   DOI
15 N. Mohamed and J.H. Ahmad, "Information Privacy Concerns, Antecedents and Privacy Measure Use in Social Networking Sites: Evidence from Malaysia," Comput. Human Behavior, vol. 28, no. 6, 2012, pp. 2366-2375.   DOI
16 V. Venkatesh and F.D. Davis, "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Manage. Sci., vol. 46, no. 2, 2000, pp. 186-204.   DOI
17 I. Ajzen, "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior," J. Appl. Soc. Psychol., vol. 32, 2002, pp. 665-683.   DOI
18 X. Wang and S.R. McClung, "Toward a Detailed Understanding of Illegal Digital Downloading Intentions: An Extended Theory of Planned Behavior Approach," New Media Soc., vol. 13, no. 4, 2011, pp. 663-677.   DOI
19 B. Bulgurcu, H. Cavusoglu, and I. Banbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, vol. 34, no. 3, 2010, pp. 523-548.   DOI
20 P. Ifinedo, "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Comput. Security, vol. 31, no. 1, 2012, pp. 83-95.   DOI
21 Y. Lu, T. Zhou, and B. Wang, "Exploring Chinese Users' Acceptance of Instant Messaging Using the Theory of Planned Behavior, the Technology Acceptance Model, and the Flow Theory," Comput. Human Behavior, vol. 25, no. 1, Jan. 2009, pp. 29-39.   DOI
22 M.C. Lee, "Factors Influencing the Adoption of Internet Banking: An Integration of TAM and TPB with Perceived Risk and Perceived Benefit," Electron. Commerce Res. Appl., vol. 8, no. 3, 2009, pp. 130-141.   DOI
23 F.D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, vol. 13, no. 3, Sept. 1989, pp. 318-339.
24 M. Hajli, "An Integrated Model for E-Commerce Adoption at the Customer Level with the Impact of Social Commerce," Int. J. Inform. Sci. Manage., Special Issue, 2012, pp. 77-97.
25 D. Gefen and D.W. Straub, "Consumer Trust in B2C E-Commerce and the Importance of Social Presence: Experiments in E-Products and E-Services," Omega, vol. 32, no. 6, 2004, pp. 407-424.   DOI
26 I.A. Junglas, N.A. Johnson, and C. Spitzmuller, "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services," Eur. J. Inform. Syst., vol. 17, no. 4, 2008, pp. 387-402.   DOI
27 S. Livingstone, K. Olafsson, and E. Staksrud, Social Networking, Age and Privacy, LSE, London, EU Kids Online, 2011.
28 Y. Al-Saggaf and S. Nielsen, "Self-Disclosure on Facebook Among Female Users and its Relationship to Feelings of Loneliness," Comput. Human Behavior, vol. 36, July 2014, pp. 460-468.   DOI