Browse > Article
http://dx.doi.org/10.22693/NIAIP.2021.28.1.064

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers  

Jang, Chul-Ho (Personal Data Strategy Team, Korea Internet & Security Agency)
Cha, Yun-Ho (Personal Data Strategy Team, Korea Internet & Security Agency)
Publication Information
Informatization Policy / v.28, no.1, 2021 , pp. 64-76 More about this Journal
Abstract
The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.
Keywords
personal information manager; personal information protection activity; multinomial logit model; threat appraisal; coping appraisal;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Bae, J. (2016). "An empirical study on the effect of leakage threat of personal information on protective behavior intention in big data environment : Based on health psychology theory and protection motivation theroy." The e-business studies, 17(3), 191-208.   DOI
2 Bandura, A. (2001). "Social Cognitive theory : An Agentive Perspective" Annual Review of Psychology, 52, 1-26.   DOI
3 Bulgurcu, Burcu Cavusoglu, Hasan Benbasat & Izak (2010). "Information Security Policy Compliance : An Empirical Study of Rationality-Based Beliefs and Information Security Awareness." MIS Quarterly, 34(3), 523-A7.   DOI
4 Crossler, R. & Blanger, F. (2014). "An extended perspective on individual security behavior : Protection motivation theory and a unified security practices(USP) instrument." ACM SIGMIS Databases, 45(4), 51-71.   DOI
5 Floyd, D. L., Prentice-Dunn,S. & Rogers, R.W. (2000). "A meta analysis of research on protection motivation theory." Journal of Applied Social Psychology, 30, 407-429.   DOI
6 Gurung, Anil, Xin Luo & Qinyu Liao (2009). "Consumer motivations in taking action against spyware : an empirical investigation." Information Management & Computer Security, 17(3), 276-289.   DOI
7 Ifinedo, P. (2012). "Understanding information systems security policy compliance : An integration of the theory of planned behavior and the protection motivation theory." Computers & Security, 31(1), 83-95.   DOI
8 Kim, M. & Kim, S. (2014). "A study on Intention to Accept the Right to be Forgotten Associated with Exposure of Personal Data." Korean Journal of Journalism & Communication Studies, 58(2), 307-336.
9 Kim, S & Lee, K. (2011). An empirical study on perception factors influencing information security behavior. Paper prsented at the Korea IT service society, Nov.30.
10 Kim, S. & Park, H. (2013). "An Analysis of Influence Factor on Privacy Protection Awareness and Protection Behavior and moderating Effect of Privacy Invasion Experience." Internet e-commerce Studies, 13(4), 79-105.
11 Kim, J. & Kim, S. (2013). "Privacy Behavioral Intention in Online Environment : Based on Protection Motivation Theory." Informatization policy, 20(3), 63-85.
12 Kim, J., Kim, S. & Kwon, D. (2016), "Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory." Journal of information systems, 25(3), 1-30.   DOI
13 Lee, H., Roh, E. & Han, K. (2018). "A study on factors affecting the investment intention of information security." Korea digital contents society, 19(8), 1515-1525.   DOI
14 Lee, K., Han, K. & Jung, J. (2016). "A study of influencing factors for compliance intention of personal information protection policy of public institution employees." Entrue Journal of Information Technology, 15(1), 75-94.
15 Ministry of the Interior and Safety & Personal Information Protection Commission (2020). 2019 Survey on the Personal information Protection. Seoul
16 Park, J. (2019). "A study on the influence of the perception of personal information security of youth on security attitude and security behavior." Journal of the Korea industrial information systems society, 24(4), 79-98.
17 Park, C. & Lee, S. (2014). "A study of the user privacy protection behavior in online Environment : Based on protection motivation theory." Journal of Internet Computing and Services, 15(2), 57-71.   DOI
18 Rogers, R. W. (1975). "A protection motivation theory of fear appeals and attitude change." Journal of Psychology, 91(1), 93-114.   DOI
19 Tian, Y., Park, M. & Chai, S. (2020). "A Study on the Factors of Online Information Security Behavior Failure : Focused on the Elderly." Journal of information systems, 29(1), 51-74.   DOI
20 Rogers, R. W. (1983). "Cognitive and physiological processes in fear appeals and attitude change : A revised theory of protection motivation." Social Psychophysiology : A sourcebook. 153-177. New York : Guilford Press.
21 Wooldridge, J. (2010). Econometric analysis of cross section and panel data. MIT press.
22 Workman, M. & Bommer, W. H. & Straub, D. (2009). "The Amplification Effects of Procedural Justice on a Threat Control Model of Information Systems Security Behaviours." Behaviour & Information Technology, 28(6), 563-575.   DOI
23 Youn, Seounmi (2005). "Teenagers' perceptions of online privacy and coping behaviors : a risk-benefit appraisal approach." Journal of Broadcasting & Electronic Media, 49(1), 86-110.   DOI