Advanced SearchSearch Tips
An Empirical Research on Information Privacy Concern in the IoT Era
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of Digital Convergence
  • Volume 14, Issue 2,  2016, pp.65-72
  • Publisher : The Society of Digital Policy and Management
  • DOI : 10.14400/JDC.2016.14.2.65
 Title & Authors
An Empirical Research on Information Privacy Concern in the IoT Era
Park, Cheon-Woong; Kim, Jun-Woo;
  PDF(new window)
This study built the theoretical frameworks for empirical analysis based on the analysis of the relationship among the concepts of risk of information privacy, the experience of information privacy, the policy of information privacy and information control via the provision intention studies. Also, in order to analyze the relationship among the factors such as the risk of information privacy, intention to offer the personal information, this study investigated the concepts of information privacy and studies related with the privacy, established a research model about the information privacy. Followings are the results of this study: First, the information privacy risk, information privacy experience, information privacy policy, and information control have positive effects upon the information privacy concern. Second, the information privacy concern has the negative effects upon the provision intention of personal information.
IoT;Personal information;Information Privacy;Intention;IT Convergence;
 Cited by
3D 캐릭터 모델의 추상화와 리얼리즘이 언캐니 밸리 현상에 미치는 영향,장필식;정우현;현주석;

디지털융복합연구, 2016. vol.14. 10, pp.277-285 crossref(new window)
미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선,김대엽;

디지털융복합연구, 2016. vol.14. 6, pp.405-413 crossref(new window)
사물인터넷(IoT) 산업 진흥을 위한 정부의 역할에 관한 연구 -AHP를 활용한 정책 중요도 분석을 중심으로-,이용규;윤구홍;

디지털융복합연구, 2016. vol.14. 5, pp.47-55 crossref(new window)
SNS 이용자의 프라이버시 요인이 개인정보 제공의도에 미치는 영향,민현홍;황기현;

디지털융복합연구, 2016. vol.14. 12, pp.1-12 crossref(new window)
Personal Information Protection Commision, "Research of personal information protection measures due to the widespread use of smart devices", 2014.

Cheon-Woong Park, Jun-Woo Kim. An Empirical Research on Information Privacy and Trust Model in the Convergence Era, Journal of Digital Convergence, Vol. 13, No. 4, pp.219-225, 2015.

Gartner, "Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020", (

Min Kyung Sik, Park Hee Woon, Global Trends discussion on privacy in the IoT environment, Institute for Information & communications Technology Promotion, pp. 12-23, 2015. 06.17.

O. Garcia-Morchon, D. Kuptsov, A. Gurtov, K. Wehrle, Cooperative security in distributed networks, Comp. Commun. Vol. 36 No. 12, pp. 1284-1297, 2013. crossref(new window)

Na Sung Hyun, Privacy issues in IoT environment, Korea Information Society Development Institute, Premium Report, Vol. 15, No. 06, 2015.

Rodrigo Roman, Jianying Zhou, Javier Lopez. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, Vol. 57, pp. 2266-2279, 2013. crossref(new window)

Eleonora Borgia, The Internet of Things vision: Key features, applications and open issues, Computer Communications, Vol. 54, pp. 1-31, 2014. crossref(new window)

Son, J. Y. and Kim S. S, Internet Users' Information Privacy - Protective Responses: A Taxonomy and a Nomological Model, MIS Quarterly, Vol. 32, No. 2, pp. 503-529, 2008. crossref(new window)

Dinev, T. and Hart, P. Privacy Calculus Model in E-commerce-A Study of Italy and the United States, European Journal of Information Systems, 15, pp.389-402, 2006. crossref(new window)

Buchanan, T., Paine, C., Joinson, A. N., Reips, U. D. Development of Measures of Online Privacy Concern and Protection for Use on the Internet, Journal of the American Society for Information Sciences and Technology, Vol. 58, pp.157-165, 2007. crossref(new window)

Sanghyun Kim, Hyunsun Park. An Analysis of Influence Factors on Privacy Protection Awareness and Protection Behavior and moderating Effect of Privacy Invasion Experience, The Journal of Internet Electronic Commerce Research, Vol. 13, No.4, pp. 79-105, 2013.

Culnan, M. J. How Did They Get My Name? : An Exploratory Investigations of Consumer Attitudes toward Secondary Information Use, MIS Quarterly, Vol. 17, No. 3, pp.341-363, 1993. crossref(new window)

Smith, H. J., Milberg, S. J., and Burke, S. J. Information Privacy: Measuring Individuals Concerns about Organizational Practices, MIS Quarterly, Vol. 20, No. 6, pp.167-196, 1996. crossref(new window)

Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet Users Information Privacy Concerns : The Construct, the Scale, and Causal Model, Information System Research, Vol. 15, No. 4, pp.336-355, 2004. crossref(new window)

Yuan Li. The Impact of Disposition to Privacy, Website Reputation and Website Familiarity on Information Privacy Concerns, Decision Support Systems, Vol. 57, pp.343-354, 2014. crossref(new window)

Jun-Young Go, Keun-Ho Lee, "SNS disclosure of personal information in M2M environment threats and countermeasures", Journal of the Korea Convergence Society, Vol. 5, No. 1, pp. 29-34, 2014.

Hyeon-Ho Park, Hee-Ock Nho, Yong-Ho Kim, "The Impact of Perceived IT Threat on Convergence Information System Performance", Journal of the Korea Convergence Society, Vol. 6, No. 3, pp. 65-71, 2015.