Browse > Article
http://dx.doi.org/10.13088/jiis.2013.19.1.125

Personal Information Overload and User Resistance in the Big Data Age  

Lee, Hwansoo (Department of Management Science, KAIST)
Lim, Dongwon (Department of Management Science, KAIST)
Zo, Hangjung (Department of Management Science, KAIST)
Publication Information
Journal of Intelligence and Information Systems / v.19, no.1, 2013 , pp. 125-139 More about this Journal
Abstract
Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.
Keywords
Big data; Personal Information Overload; Information Privacy Concerns; User Resistance;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Beaudoin, C. E., "Explaining the relationship between Internet use and interpersonal trust : Taking into account motivation and information overload", Journal of Computer- Mediated Communication, Vol.13, No.3(2008), 550-568.   DOI
2 Dinev, T. and P. Hart, "An extended privacy calculus model for e-commerce transactions", Information Systems Research, Vol. 17, No.1(2006), 61-80.   DOI   ScienceOn
3 Furneaux, B. and M. Wade, "The end of the information system life : a model of is discontinuance", SIGMIS Database, Vol.41, No2(2010), 45-69.   DOI
4 Featherman, M. S. and P. A. Pavlou, "Predic ting e-services adoption : a perceived risk facets perspective", International Journal of Human-Computer Studies, Vol.59, No.4 (2003), 451-474.   DOI   ScienceOn
5 Fogel, J. and E. Nehmad, "Internet social network communities : Risk taking, trust, and privacy concerns", Computers in Human Behavior , Vol.25, No.1(2009), 153-160.   DOI   ScienceOn
6 Havlena, W. J. and W. S. DeSarbo, DeSarbo, On the Measurement of Perceived Consumer Risk", Decision Sciences, Vol.22, No.4 (1991), 927-939.   DOI
7 Jo, D. H., J. W. Park, and H. J. Chun, "The relationships among perceived value, usediffusion, loyalty of mobile instant messaging service", Journal of Intelligence and Information Systems, Vol.17, No.4(2011), 193-212.
8 Kim, H., I. Son, and D. Lee, "The Viral Effect of Online Social Network on New Products Promotion : Investigating Information Diffusion on Twitter", Journal of Intelligence and Information Systems, Vol.18, No.2(2012), 107-130.
9 Kim, M. S., H. J. Kim, M. O. Kim, and H. J. Kim, "A Study on the User Resistance to IPTV", The Journal of Society for e-Business Studies, Vol.15, No.2(2010), 205-217.
10 Kim, S. S. and N. K. Malhotra,, "A Longitudinal Model of Continued Is Use : An Integrative View of Four Mechanisms Underlying Postadoption Phenomena", Management Science, Vol.51, No.5(2005), 741-755.   DOI   ScienceOn
11 Ku, G. T. and H. J. Choi, "A Study of the impact of information overload on emotional and physical health", Korean Political Communication Association, Vol.16, No.1(2010), 5-32.
12 Lapointe, L. and S. Rivard, "A multilevel model of resistance to information technology implementation", MIS Quarterly, Vol.29, No.3(2005), 461-491.   DOI
13 Mason, R. O., "Four ethical issues of the information age", MIS Quarterly, Vol.10, No.1 (1986), 5-12.   DOI   ScienceOn
14 Ahn, C. W. and S. G. Hwang, "Big Data technologies and main issues", J ournal of Korean Institute of Information Scientist and Engineers, Vol.30, No.6(2012), 10-17.   과학기술학회마을
15 Bhattacherjee, A., "Understanding Information Systems Continuance : An Expectation- Confirmation Model", MIS Quarterly, Vol. 25, No.3(2001), 351-370.   DOI   ScienceOn
16 Norberg, P. A., D. R. Horne, and D. A. Horne, "The privacy paradox : Personal information disclosure intentions versus behaviors", Journal of Consumer Affairs, Vol.41, No.1 (2007), 100-126.   DOI   ScienceOn
17 Pavlou, P. A. and D. Gefen, "Building Effective Online Marketplaces with Institution- Based Trust", Information Systems Research, Vol.15, No.1(2004), 37-59.   DOI   ScienceOn
18 Ryu, I., K. Y. Nah, and H. R. Choi, "A Study on the Factor of User Resistance to Electronic Commerce", The Journal of Information Technology, Vol.2, No.1(1999), 108-130.
19 Peslak, A. R., "PAPA revisited : A current empirical study of the Mason framework", Journal of Computer Information Systems, Vol.46, No.3(2006), 117-123.
20 Ram, S., "A Model of Innovation Resistance", Advances in Consumer Research, Vol.14, No.1(1987), 208-212.
21 Sanford, C. and H. Oh, "The role of user resistance in the adoption of a mobile data service", Cyber psychology, Behavior, and Social Networking, Vol.13, No.6(2012), 663-672.
22 Schultz, U. and Vandenbosch, B., "Information overload in a groupware environment: Now you see it, now you don't", Journal of Organizational Computing and Electronic Commerce, Vol.8, No.2(1998), 127-148.   DOI   ScienceOn
23 Watters, A., "The age of exabytes : Tools and approaches for managing big data", 2012.
24 Lee, Y. and O. Kwon, "Model based approach to estimating privacy concerns for context- aware services", Journal of Intelligence and Information Systems, Vol.16, No.2(2009), 97-111.
25 Korea Communication Commision National Internet Development Agency of Korea, "Survey on Internet users' SNS use", 2009.
26 McKinsey Global Institute, "Big data : The next frontier for innovation, competition, and productivity", 2011.