Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.3.681

An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection  

Lim, Jung-Ho (CYBERONE)
Kwon, Sun-Dong (Chungbuk National University)
Abstract
This paper studied the effects of risk cognition of personal information and self-expression information on conation of privacy protection. In the first study, 88 college students who volunteered for this research were surveyed about risk cognition of personal information and conation to protect it. In the second study, after an information-seeking expert collected and organized the self-expression information that 88 volunteers had expressed on SNS, and then showed the organized self-expression information to 88 volunteers, and then 88 volunteers were surveyed about risk cognition of self-expression information and conation to protect it. As results of the first data analysis, the risk cognition of personal information had the greatest influence on non-disclosure of personal information, followed by reduction of the disclosure scope and law institutionalization requirement. As results of the second data analysis, SNS users openly expressed their opinion or life-style, but when they realized that self-expression information can be accumulated and become sensitive information, they had conation to protect their self-expression information such as non-disclosure, reduction of disclosure scope, and law institutionalization requirement. The implication of this study is that we have overcome the limitations of existing researches that can not explain information protection behavior on SNS.
Keywords
Personal information; Self-express information; Non-disclosure of information; Reduction of disclosure scope; Law institutionalization requirement; cognition; conation;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Yusun Park, "Who Controls the User's Privacy on Social Networking Sites?," Journal of Industrial Property, 37, pp.337-375, 2012.
2 Mina Lee, Seungah Leek, Inhye Choi, "Analysis of the Facebook Profiles for Korean Users: Description and Determinants," Journal of Internet Computing and Services, 15(2), pp.73-85, 2014.   DOI
3 R. A. Ward, "Discovering Facebook: Social Network Subpoenas and the Stored Communications Act," Harvard Journal of Law & Technology, (24)2, pp.585, 2011.
4 KISA, 2010 Survey on the Internet Usage, 2010.
5 Hyun-Sun Park, Sanghyun Kim, "An Empirical Study on SNS users' Privacy Protection Behaviors," Business Management Review, 46(2), pp.69-91, 2013.
6 Mi-Na Lee, Jae-Woong Shim,"The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy," Media, Gender & Culture, 12, pp.165-190, 2009.
7 B. Johnson, "Facebook information should be regulated," The Guardian Thu 5 June, 2008.
8 Jaewan Moon, "The Korean Way of Balancing Two Fundamental Rights, the Right to Be Forgotten and the Right to Know," Journal of Media Law Ethics and Policy Research, 10(2), pp.1-37, 2011.
9 Mina Lee, Seungah Lee, Inhye Choi, "Analysis of the Facebook Profiles for Korean Users: Description and Determinants," Journal of Internet Computing and Services, 15(2), pp.73-85, 2014.   DOI
10 Hong-Je Lee, Hyeong-Seog Kho, Eun-Hee Roh, Kyeong-Seok Han, "A Study on the Factors of Experience and Habit on Information Security Behavior of New Services," Journal of Digital Contents Society, 19(1), pp.93-102, 2018.   DOI
11 Kyeong-Eun Min, Sung-Jun Kim, Du-Soon Kwon, "The Effects on Privacy Protection Behavior through Mobile Messenger Security Awareness and Security intention," Daehan Academy of Management Information Systems, 35(1), pp.207-233, 2016.
12 J. Cave, C. Marsden, and S. Simmons, Options for and Effectiveness of Internet Self and Co-regulation, RAND, 2008.
13 Minkyung Kim, Sooyoung Cho, "How Korean Government Agencies use SNS and How Visitors Respond? - A Content Analysis of 18 Korean Government Agencies' Facebook and Visitors' Comments," Journal of Public Relations, 19(3), pp.1-37, 2015.
14 Jeong Won Jeong, "The Posting and Retransmission of SNS Posts, and Defamation on the Internet," Journal of Law and Politics Research, 12(3), pp.839-862, 2012.
15 Yong-Suk Hwang, "The Analysis of Content Regulation on Social Network Service(SNS): Focusing on the Problem of Legal and Administrative Regulation," Korean Journal of Communication & Information, 58, pp.106-129, 2012.
16 I Kant, Kritik der Urteilskraft, Berlin und Libau, 1790.
17 H. Liang and Y. Xue, "Understanding security behaviors in personal computer usage: a threat avoidance perspective," Journal of the Association for Information Systems, 7(2), pp.393-413, 2010.
18 Min Jung Baek, Seyung Hee Sohn, "A Study on the Effect of Information Security Awareness and Behavior on the Information Security Performance in Small and Medium Sized Organization," Asia Pacific Journal of Small Business, 33(2), pp.113-132, 2011.
19 Il-han Yoon, Sun-dong Kwon, "Effects of Life-log Experience on Technology Satisfaction and Perception of Right to be Forgotten," Journal of The Korea Institute of Information Security & Cryptology, 26(3), pp.837-852, 2016.   DOI
20 R. W. Rogers, "A protection motivation theory of fear appeals and attitude change," Journal of Psychology, 91(1), pp.93-114, 1975.   DOI
21 A. Ellis, Reason and Emotion in Psychotherapy, Birch Lane Press Book, 1994.
22 R. L. Oliver, "Whence Consumer Loyalty?" Journal of Marketing, 63(4), pp.33-44, 1999.
23 T. J. Holt, "Examining the Role of Technology in the Formation of Deviant Subcultures." Social Science Computer Review, 28(4), pp. 466-481, 2010.   DOI
24 Sae-Bom Lee, Liu Fan, Sang-Chul Lee, Yung-Ho Suh, "Effects of Self Presentation and Privacy Concern on an Individual's Self Disclosure : An Empirical Study on Twitter," Korean Management Science Review, 29(2), pp.1-20, 2012.   DOI
25 S. Youn, "Teenagers' perceptions of online privacy and coping behaviors: A risk-benefit appraisal approach," Journal of Broadcasting & Electronic Media, 49(1), pp.86-110, 2005.   DOI
26 Dongwon Jo, "Hacking and leakage of personal information in the information culture based on its value production and user labour," Culture Research, 1(1), pp.84-116, 2012.
27 E. Goffman, The presentation of self in everyday life, New York:Doubleday, 1959.
28 Eun-mee Kim, June-Woong Rhee, Hyun-Mi Jang, "The Effects of Blog Motivations and the Perception Toward the Size of Audience on Blogging and the Intention to Continue Blogging Focusing on Bloggers as Interactive Media Users," Korean Journal of Broadcasting and Telecommunication Studies, 25(6), pp.162-203, 2011.
29 Cholong Wi, Sundong Kwon, "The Effect of Cognition of Personal Information Leakage Controllability on Affection and Conation: Focused on Comparing between External Hacking and Internal Leakage," Korea Business Review, 46(6), pp.1555-1576, 2017.
30 Wonchang Jang, Ilsoon Shin, "The Online Privacy Policy: Recognition, Confirmation and its Effects on Online Transaction Behavior," Journal of The Korea Institute of Information Security & Cryptology, 22(6), pp.1419-1427, 2012.
31 Kyo-Heon Kim, Doug-Woong Hahn, "Effects of Goal and Spontaneity of High Self-Disclosure and Anger Tendency on Physiological Arousal, Catharsis, and Self-Evaluation," Korean Journal of Health Psychology, 1(1), pp.66-88, 1996.