Browse > Article

Empirical Study on Internet Users' Information Privacy Concerns and Information Protection Behavior  

Um, Myoung-Yong (성균관대학교 경영학과)
Rhee, Moon-Ki (성균관대학교 경영학과)
Kim, Tae-Ung (성균관대학교 경영전문대학원)
Publication Information
The Journal of Korean Association of Computer Education / v.18, no.1, 2015 , pp. 69-79 More about this Journal
Abstract
This research aims to empirically explore the antecedents that could impact on internet users' information protection behavior. 282 of sample data collected from internet users was used to test the hypotheses. The results of this research reveal that the internet users' information privacy concerns has a significant impact on self-efficacy, perceived usefulness, and information protection behavior. In addition, we found that perceived usefulness and information protection behavior are significantly influenced by self-efficacy. However, contrary to expectations, perceived usefulness has no statistically significant effect on information protection behavior. These findings provide significant implications for online companies and internet uses as well as educational stakeholders that give educations about information protection.
Keywords
Information Privacy; Perceived Usefulness; Information Protection;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Culnan, M. J. (2000). Protecting Privacy Online: Is Self-Regulation Working? Journal of Public Policy and Marketing, 19(1), 20-26.   DOI
2 박남수, 이현주, 천혜선 (2014), 소셜네트워크 서비스 프라이버시 위험이 사용자저항에 미치는 영향, e-비즈니스 연구, 15(3), 323-338.
3 장성호, 이기동 (2014), 소셜네트워크서비스 프라이버시 위험이 사용자저항에 미치는 영향, e-비즈니스 연구, 15(3), 85-105.
4 정철호, 남수현 (2011), SNS 이용자의 프라이버시 염려도와 수용후 행동 간의 구조적 관계에 관한 연구, 경영정보연구, 30(3), 78-114.
5 Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.   DOI
6 Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196.   DOI
7 Campbell, A.J. (1997). Relationship Marketing in Consumer Markets: A Comparison of Managerial and Consumer Attitudes about Information Privacy. Journal of Direct Marketing, 11(3), 44-57.   DOI
8 Westin, A. F. (1967). Privacy and Freedom. Athenaum, New York.
9 Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323-342.   DOI
10 Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36-49.   DOI
11 Bandura. A. (1997). Self-Efficacy: Toward a Unifving Theory of Behavioral Change, Psychological Review, 84(2), 191-215.   DOI
12 Bandura. A. (1994). Self-efficacy, Encyclopedia of. Human Behavior, Vol 4, V.S. Rama-chaudran, ed., New York: Academic Press, 17-81.
13 Salomon, G. (1984). Television is "easy" and print is "tough": The differential investment of mental effort in learning as a function of perceptions and attributions. Journal of Educational Psychology, 76(4), 647-658.   DOI
14 Vealey, R. S. (1986). Conceptualization of sport-confidence and competitive orientation: Preliminary investigation and instrumentation development. Journal of Sport Psychology, 8(3), 221-246.   DOI
15 장익진, 최병구 (2014), 위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석, 한국전자거래학회지, 19(3), 65-89.   DOI
16 Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.   DOI
17 Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science, 46(2), 186-204.   DOI
18 TTA (2014). 정보통신기술협회,정보통신용어사전, http://word.tta.or.kr/
19 김성태 (2010). 신정보정책론: 이론과 전략. 법문사.
20 Phillip, H. B. (2005). Prevention strategies for the next wave of cyber crime. Network Security, 10. 12-15.
21 Chin, W. W. (1998). The partial least squares approach for structural equation modeling. in G.A. Marcoulides (Ed.), Modern methods for business research (pp. 295-236). London: Lawrence Erlbaum Associates.
22 Fornell, C., & Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.   DOI
23 Hair, J., Anderson, R., Tatham, R., & Black, W. (1998) Multivariate Data Analysis, 5th ed., California: Prentice-Hall International Inc.
24 Meyers-Levy, J., & Sternthal, B. (1991). Gender differences in the use of message cues and judgments. Journal of Marketing Research, 28(1), 84-96.   DOI
25 Ong, C. S., & Lai, J. Y. (2006). Gender difference in perceptions and relationship among dominants of e-learning acceptance. Computers in Human Behavior, 22(5), 816-829.   DOI