Browse > Article
http://dx.doi.org/10.5859/KAIS.2016.25.3.197

A Study on Factors Influencing Privacy Decision Making on the Internet: Focus on Dual-Calculus Model  

Kim, Sanghee (부산대학교 경영연구소)
Kim, Jongki (부산대학교 경영학과)
Publication Information
The Journal of Information Systems / v.25, no.3, 2016 , pp. 197-215 More about this Journal
Abstract
Purpose This study aims to investigate the factors that influence decision making in relation to providing personal information on the internet with respect to the integration of the privacy calculus theory and protection motivation theory based on the dual-calculus model proposed by Li(2012). Design/methodology/approach The privacy calculus theory and protection motivation theory have been applied to explain privacy behavior to a certain degree but few studies have been conducted to explain privacy behavior based on the integration of these two theories. Although Li(2012) proposed the dual-calculus model, he only proposed its framework and did not carry out an empirical study. Therefore, this study proposes a research model that integrates these two theories and examines the relationship between the two theories through an empirical study. Findings According to the results of empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between coping appraisal and privacy risk in the risk calculus process. Thus, the results verify that external threat played a decisive role in increasing the risk level of a consumer's privacy. It can be discussed the ways to enhance the privacy behavior of consumer on the internet through these findings.
Keywords
Dual-Calculus Model; Privacy Calculus; Risk Calculus; Protection Motivation Theory; Information Disclosure Intention;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Acquisti, A., "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proceedings of the 5th ACM Electronic Commerce Conference, 2004, pp. 21-29.
2 Barclay, D., Thompson, R., and Higgins, C., "The Partial Least Squares (PLS) Approach to Causal Modeling, Personal Computer Adoption and Use as an Illustration," Technology Studies, Vol. 2, No. 2, 1995, pp. 285-324.
3 Chenoweth, T., Minch, R., and Gattiker, T., "Application of Protection Motivation Theory to Adoption of Protective Technologies," Proceedings of the 42nd Hawaii International Conference on System Science, 2009.
4 Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling," in Modern Methods for Business Research, Marcoulides, G. A. (ed.), Lawrence Erlbaum Associates: New Jersey, 1998.
5 Cohen, J. O., Statistical Power Analysis for the Behavioral Sciences(2nd ed.), Lawrence Erlbaum: New Jersey, 1988.
6 Culnan, M. J. and Bies, J. R., "Consumer Privacy: Balancing Economic and Justice Considerations," Journal of Social Issues, Vol. 59, No. 2, 2003, pp. 323-342.   DOI
7 Dinev, T. and Hart, P., "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, Vol. 17, No. 1, 2006, pp. 61-80.   DOI
8 Hair, J. F., Hult, G. T. M., Ringle, C. M., and Sarstedt, M., A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), SAGE Publication, 2013.
9 Ifinedo, P., "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security, Vol. 31, 2012, pp. 83-95.   DOI
10 Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.   DOI
11 Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C., "Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior," International Journal of Human-Computer Studies, Vol. 71, 2013, pp. 1163-1173.   DOI
12 Krasnova, H. and Veltri, N. F., "Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA," Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010, pp. 1-10.
13 Lee, Y., "Understanding Anti-plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective," Decision Support Systems, Vol. 50, 2011, pp. 361-369.   DOI
14 Nunnally, J. C. and Bernstein, I. H., Psychometric Theory(3rd ed.), McGraw-Hill: New York, 1994.
15 Stone, E. F. and Stone, D. L., "Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms," Research in Personnel and Human Resources Management, Vol. 8, No. 3, 1990, pp. 349-411.
16 Li, H., Sarathy, R., and Xu, H., "Understanding Situational Online Information Disclosure as a Privacy Calculus," Journal of Computer Information Systems, 2010, pp. 1-29.
17 Li, H., Sarathy, R., and Xu, H., "The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors," Decision Support Systems, Vol. 51, No. 3, 2011, pp. 434-445.   DOI
18 Li, Y., "Theories in Online Information Privacy Research: A Critical Review and an Integrated Framework," Decision Supports Systems, Vol. 54, 2012, pp. 471-481.   DOI
19 Liang, H. and Xue, Y., "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems, Vol. 11, No. 7, 2010, pp. 394-413.   DOI
20 Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology, Vol. 91, 1975, pp. 93-114.   DOI
21 Rogers, R. W., "Cognitive and Physiological Processes in Fear-based Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A sourcebook, Cacioppo, J. and Petty, R. (eds.), Guilford Press: New York, 1983, pp. 153-176.
22 김영렬, "개인 정보 보호 의식 측정 정도의 개발과 개인정보 중요성에 관한 인지도 조사," 한국산업정보학회논문지, 제15권, 제5호, 2010, pp. 259-271.
23 Segars, A. and Grover, V. "Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis," MIS Quarterly, Vol. 17, No. 4, 1993, pp. 517-525.   DOI
24 Smith, H. J., Dinev, T., and Xu, H., "Information Privacy Research: An Interdisciplinary Review," MIS Quarterly, Vol. 35, No. 4, 2011, pp. 989-1015.   DOI
25 Stevens, J., Applied Multivariate Statistics for the Social Sciences, Lawrence Erlbaum Associates: New Jersey, 1992.
26 Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C., "PLS Path Modeling," Computational Statistics & Data Analysis, Vol. 48, No. 1, 2005, pp. 159-205.   DOI
27 Workman, M., Bommer, W. H., and Straub, D., "The Amplification Effects of Procedural Justice on a Threat Control Model of Information Systems Security Behaviours," Behaviour & Information Technology, Vol. 28, No. 6, 2009, pp. 563-575.   DOI
28 Xu, H., Teo, H., Tan, B. C. Y., and Agarwal, R., "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Service," Journal of Management Information Systems, Vol. 26, No. 3, 2010, pp. 135-173.   DOI
29 Xu, H., Luo, X., Carroll, J. M., and Rosson, M. B., "The Personalization Privacy Paradox: An Exploratory Study of Decision Making Process for Location-Aware Marketing," Decision Support Systems, Vol. 51, No. 1, 2011, pp. 42-52.   DOI
30 김상현, 박현선, "프라이버시 보호인식 및 보호 행동의도에 미치는 영향 요인과 프라이버시 침해경험의 조절효과에 관한 연구," 인터넷전자상거래연구, 제13권, 제4호, 2013, pp. 79-105.
31 김종기, 이동호, "전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구," 경영정보학연구, 제15권, 제2호, 2005, pp. 65-96.
32 김종기, 김상희. "스마트폰 위치기반서비스에서 정보제공의도: 프라이버시 계산 관점을 중심으로," 정보시스템연구, 제21권, 제4호, 2012, pp. 55-79.
33 김종기, 김상희, "온라인 환경에서 프라이버시 행동의도에 미치는 영향," 정보화정책, 제20권, 제3호, 2013, pp. 63-85.
34 김종기, 김진성, "전자상거래에서 정보 프라이버시 염려를 유발하는 원인과 보호반응에 관한 연구: 주인-대리인 이론을 중심으로," 정보시스템연구, 제23권, 제4호, 2014, pp. 119-145.