Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.3.837

Effects of Lifelog Experience on Technology Satisfaction and Perception of Right to be Forgotten  

Yoon, Il-han (Chungbuk National University)
Kwon, Sun-dong (Chungbuk National University)
Abstract
This study examined the life-log related ICT in terms of both positive effects and adverse effects. As results, from the perspective of positive effects, experience of using life-log related ICT affects the usefulness of ICT, whereas usefulness of ICT affects satisfaction of ICT. From the perspective of adverse effects, experience of using life-log related ICT affects concern over privacy, whereas concern over privacy affects the awareness of the right to be forgotten. And, Internet privacy efficacy moderates the impact of experience of using life-log related ICT and the impact of concern over privacy.
Keywords
Ambivalence of information technologies; Lifelog; Right to be forgotten;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A.L. Allen, "Dredging up the past: Lifelogging, memory, and surveillance", The University of Chicago Law Review, Vol.75. No.1, pp. 47-74, 2008.
2 C. Conley, "The Right to Delete", In AAAI Spring Symposium: Intelligent Information Privacy Management, 2010.
3 V. Bush, "As we may think", The atlantic monthly, Vol.176. No.1, pp. 101-108, 1945.
4 R. Whitaker, "The end of privacy: How total surveillance is becoming a reality", The New Press, 1999.
5 F. Webster and K. Robbins, "Information Technology: A Luddite Analysis", Ablex, N.J. 1986.
6 C.G. Bell, and J. Gemmell, "Total recall: How the e-memory revolution will change everything", New York: Dutton, 2009.
7 E. Schmidt, and J. Cohen, "The new digital age, Reshaping the Future of People", Nations and Business Hodder And Stoughton Limited, 2013.
8 White house, "CONSUMER DATA PRIVACY IN A NETWORKED WORLD: A FRAMEWORK FOR PROTECTING PRIVACY AND PROMOTING INNOVATION IN THE GLOBAL DIGITAL ECONOMY", from http://www.whitehouse.gov/sites/default/files/privacy-final.pdf, 2012
9 J. Gemmell, G. Bell, R. Lueder, S. Drucker, and C. Wong, "MyLifeBits: fulfilling the Memex vision", In Proceedings of the tenth ACM international conference on Multimedia, ACM, pp. 235-238, 2002.
10 A.J. Sellen, A. Fogg, M. Aitken, S. Hodges, C. Rother, and K. Wood, "Do life-logging technologies support memory for the past?: an experimental study using sensecam", In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, pp. 81-90, 2007.
11 D. Stuttard, and M. Pinto, "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws", John Wiley & Sons, 2011.
12 J.S. Huh, "A Study on the Problem of SNS's Infringement of Personal Information and its Countermeasures", Journal of Media Law, Ethics and Policy Research, Vol.9. No.2, pp. 75-103, 2010.
13 J. Jarvis, "Public parts: How sharing in the digital age improves the way we work and live", Simon and Schuster, 2011.
14 C.O. Ross, E. S. Sisic, M. Arseneault, J.M. M.G. Simmering, and R.R. Orr, "Personality and motivations associated with Facebook use", Computers in Human Behavior, Vol.25. No.2, pp. 578-586, 2009.   DOI
15 D.J. Solove, "The future of reputation: Gossip, rumor, and privacy on the Internet", Yale University Press, 2007.
16 V. Mayer-Schonberger, "Delete: the virtue of forgetting in the digital age", Princeton University Press, 2011.
17 J. Palfrey, and U. Gasser, "Born digital: Understanding the first generation of digital natives", Basic Books, 2013.
18 J. Bonneau, and S. Preibusch, "The privacy jungle: On the market for data protection in social networks", In Economics of information security and privacy, Springer US, pp. 121-167, 2010.
19 M. McLuhan, "Understanding media: The extensions of man", MIT press, 1994.
20 K.J. Song, "Feature: IT-based evolution of communication: SNS and smartphone that combines social media", Korea Local Information Research & Development Institute, Vol.64, pp. 4-9, 2010.
21 L. Winner, "Do artifacts have politics", Daedalus, Vol.109, No.1, pp. 121-136, 1980.
22 D.F. Noble, "Forces of Production: A Social History of Industrial Automation", Alfred. A. Knopf, New York, 1984.
23 S.W. Lee, B.M. Park, J.M. Kim, and S.W. Kim, "A case for flash memory ssd in enterprise database applications", In Proceedings of the 2008 ACM SIGMOD international conference on Management of data. ACM, pp. 1075-1086, 2008.
24 W.W. Chin, "The partial least squares approach to structural equation modeling", Modern methods for business research, Vol.295. No.2, pp. 295-336, 1998.
25 K.M. Park, J.Y. Hwang, and K.H. Kwon, "The Impact of Competitive Strategy, Decentralization, and the Application of IT on Performance", Journal of Strategic Management, Vol.8. No.1, pp. 113-135, 2005.
26 M.J. Kim, "Study on the Model for Information and Culture", KADO, 2009.
27 J. Greenberg, "Understanding metadata and metadata schemes", Cataloging & classification quarterly, Vol.40, No.3-4, pp. 17-36, 2005.   DOI
28 R. Anderson, "Security engineering", John Wiley & Sons. 2008.
29 D.J. Solove, "The digital person: Technology and privacy in the information age", NYU Press, 2004.
30 F.D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS quarterly, Vol.13. No.3, pp. 319-340, 1989.   DOI
31 M. Fishbein, and I. Ajzen, "Belief, attitude, intention, and behavior: An introduction to theory and research", Reading, MA: Addison-Wesley, 1975.
32 A.L. Lederer, J.M. Donna, P.S. Mark, and Z. Youlong, "The Technology Acceptance Model and the World Wide Web", Decision Support Systems, Vol.29. No.3, pp. 269-282, 2000.   DOI
33 R. Agarwal and J, Prasad, "The Role if Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technology," Decision science, Vol.28. No.3, pp. 557-582, 1997.   DOI
34 A.F. Westin, "Privacy and freedom", Washington and Lee Law Review, Vol.25. No.1, pp. 166-170, 1968.
35 D.A. Adams, R.R. Nelson, and P.A. Todd, "Perceived Usefulness, Ease of Use, and Usage of Information Technology : A Replication", MIS Quarterly, Vol.16. No.2, pp. 227-248, 1992.   DOI
36 A.L. Cavaye, "User participation in system development revisited", Information & Management, Vol.28. No.5, pp. 311-323, 1995.   DOI
37 S.D. Warren, and L.D. Brandeis, "The right to privacy", Harvard law review, Vol.4. No.5, pp. 193-220, 1890.   DOI
38 J. Kang, "Information privacy in cyber-space transactions", Stanford Law Review, Vol.50. No.4, pp. 1193-1294, 1998.   DOI
39 M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993.   DOI
40 M.N. Lee and J.W. Shim, "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy", Media, gender&culture, Vol.12, pp. 165-190, 2009.
41 J.Y. Shin, and H.D. Yang, "The Effects of Perceived Privacy Infringement and the Moderators on On-Line Community Activities in BLOG", Inspiring Insight in Business Society, Vol.35. No.1, pp. 81-108, 2006.
42 KISA, "A study on Internet users use SNS Survey", 2009.
43 F.Y. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, and G. Lai, "A study of the human flesh search engine: crowd-powered expansion of online knowledge", Computer, Vol.43. No.8, pp. 45-53, 2010.   DOI
44 P. Kotler, K.L. Keller, F. Ancarani, and M. Costabile, "Marketing management", 14/e. Pearson, 2014.
45 F.V Cespedes, and H.J. Smith, "Database marketing: new rules for policy and practice", Sloan Management Review, Vol.34. No.4, pp. 7-23, 1993.
46 J.N. Sheth, and A. Parvatiyar, "The evolution of relationship marketing", International Business Review, Vol.4. No.4, pp. 397-418, 1995.   DOI
47 C. Flavian, M. Guinaliu, and R. Gurrea, "The role played by perceived usability, satisfaction and consumer trust on website loyalty", Information & Management, Vol.43. No.1, pp. 1-14, 2006.   DOI
48 R.E. Anderson, and S.S. Srinivasan, "E-satisfaction and e-loyalty: a contingency framework", Psychology and Marketing, Vol.20. No.2, pp. 123-138, 2003.   DOI
49 D.H. Holtzman, "Privacy lost: how technology is endangering your privacy", John Wiley & Sons, 2006.
50 J.H. Park and S.H. Lee, "Path Analysis of User Attitudes and Behaviors Toward Information Privacy", Korea administrative argument, Vol.45. No.1, pp. 281-307, 2007.
51 G.R. Milne, L.I. Labrecque, and C. Cromer, "Toward an understanding of the online consumer's risky behavior and protection practices", Journal of Consumer Affairs, Vol.43. No.3, pp. 449-473, 2009.   DOI
52 M.Z. Yao, and D.G. Linz, "Predicting self-protections of online privacy", CyberPsychology & Behavior, Vol.11. No.5, pp. 615-617, 2008.   DOI
53 M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993.   DOI
54 C. Fornell, and F.L. Bookstein, "Two structural equation models: LISREL and PLS applied to consumer exit-voice theory", Journal of Marketing research, Vol.19. No.4, pp. 440-452, 1982.   DOI
55 B.H. Wixom, and H.J. Watson, "An empirical investigation of the factors affecting data warehousing success", MIS quarterly, Vol.25. No.1, pp. 17-41, 2001   DOI
56 A. Rai, R. Patnayakuni, and N. Seth, "Firm performance impacts of digitally enabled supply chain integration capabilities", MIS quarterly, Vol.30. No.2, pp. 225-246, 2006.   DOI
57 R. Agarwal and E. Karahanna, "Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage", MIS quarterly, Vol.24. No.4, pp. 665-694, 2000.   DOI
58 R.F. Falk and N.B. Miller, A Primer on Soft Modeling. The University of Akron Press, Akron, OH, 1992.
59 D.L. Schacter, and P. Graf, "Effects of elaborative processing on implicit and explicit memory for new associations", Journal of experimental psychology: learning, memory, and cognition, Vol.12. No.3, pp. 432, 1986.   DOI
60 F. Werro, "The right to inform v. the right to be forgotten: A transatlantic clash", Georgetown University Law Center. Public Law and Legal Theory Research Paper Series, Paper 2, 2009.
61 D. Lyon, "Surveillance as social sorting: Privacy, risk, and digital discrimination", Psychology Press, 2003.
62 M. Igbaria, and J. Iivari, "The effects of self-efficacy on computer usage", Omega: International Journal of Management Science, Vol.23. No.6, pp. 587-605, 1995.   DOI
63 S.C. Park, G.S. Jung, and J.R. Lee, "An Empirical Study on Factors Affecting the Acceptance of Internet", Korean Management Review, Vol.29. No.4, pp. 885-909, 2000.
64 KCC, "How will my information is exposed to Twitter??". from http://kcc.go.kr, 2011.
65 T. Buchanan, C. Paine, A.N. Joinson, and U.D. Reips, "Development of measures of online privacy concern and protection for use on the Internet", Journal of the American Society for Information Science and Technology, Vol.58. No.2, pp. 157-165, 2007.   DOI