JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Effects of Lifelog Experience on Technology Satisfaction and Perception of Right to be Forgotten
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Effects of Lifelog Experience on Technology Satisfaction and Perception of Right to be Forgotten
Yoon, Il-han; Kwon, Sun-dong;
  PDF(new window)
 Abstract
This study examined the life-log related ICT in terms of both positive effects and adverse effects. As results, from the perspective of positive effects, experience of using life-log related ICT affects the usefulness of ICT, whereas usefulness of ICT affects satisfaction of ICT. From the perspective of adverse effects, experience of using life-log related ICT affects concern over privacy, whereas concern over privacy affects the awareness of the right to be forgotten. And, Internet privacy efficacy moderates the impact of experience of using life-log related ICT and the impact of concern over privacy.
 Keywords
Ambivalence of information technologies;Lifelog;Right to be forgotten;
 Language
Korean
 Cited by
 References
1.
A.L. Allen, "Dredging up the past: Lifelogging, memory, and surveillance", The University of Chicago Law Review, Vol.75. No.1, pp. 47-74, 2008.

2.
C. Conley, "The Right to Delete", In AAAI Spring Symposium: Intelligent Information Privacy Management, 2010.

3.
V. Bush, "As we may think", The atlantic monthly, Vol.176. No.1, pp. 101-108, 1945.

4.
R. Whitaker, "The end of privacy: How total surveillance is becoming a reality", The New Press, 1999.

5.
F. Webster and K. Robbins, "Information Technology: A Luddite Analysis", Ablex, N.J. 1986.

6.
C.G. Bell, and J. Gemmell, "Total recall: How the e-memory revolution will change everything", New York: Dutton, 2009.

7.
E. Schmidt, and J. Cohen, "The new digital age, Reshaping the Future of People", Nations and Business Hodder And Stoughton Limited, 2013.

8.
White house, "CONSUMER DATA PRIVACY IN A NETWORKED WORLD: A FRAMEWORK FOR PROTECTING PRIVACY AND PROMOTING INNOVATION IN THE GLOBAL DIGITAL ECONOMY", from http://www.whitehouse.gov/sites/default/files/privacy-final.pdf, 2012

9.
J. Gemmell, G. Bell, R. Lueder, S. Drucker, and C. Wong, "MyLifeBits: fulfilling the Memex vision", In Proceedings of the tenth ACM international conference on Multimedia, ACM, pp. 235-238, 2002.

10.
A.J. Sellen, A. Fogg, M. Aitken, S. Hodges, C. Rother, and K. Wood, "Do life-logging technologies support memory for the past?: an experimental study using sensecam", In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, pp. 81-90, 2007.

11.
D. Stuttard, and M. Pinto, "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws", John Wiley & Sons, 2011.

12.
J.S. Huh, "A Study on the Problem of SNS's Infringement of Personal Information and its Countermeasures", Journal of Media Law, Ethics and Policy Research, Vol.9. No.2, pp. 75-103, 2010.

13.
J. Jarvis, "Public parts: How sharing in the digital age improves the way we work and live", Simon and Schuster, 2011.

14.
C.O. Ross, E. S. Sisic, M. Arseneault, J.M. M.G. Simmering, and R.R. Orr, "Personality and motivations associated with Facebook use", Computers in Human Behavior, Vol.25. No.2, pp. 578-586, 2009. crossref(new window)

15.
D.J. Solove, "The future of reputation: Gossip, rumor, and privacy on the Internet", Yale University Press, 2007.

16.
V. Mayer-Schonberger, "Delete: the virtue of forgetting in the digital age", Princeton University Press, 2011.

17.
J. Palfrey, and U. Gasser, "Born digital: Understanding the first generation of digital natives", Basic Books, 2013.

18.
J. Bonneau, and S. Preibusch, "The privacy jungle: On the market for data protection in social networks", In Economics of information security and privacy, Springer US, pp. 121-167, 2010.

19.
M. McLuhan, "Understanding media: The extensions of man", MIT press, 1994.

20.
K.J. Song, "Feature: IT-based evolution of communication: SNS and smartphone that combines social media", Korea Local Information Research & Development Institute, Vol.64, pp. 4-9, 2010.

21.
L. Winner, "Do artifacts have politics", Daedalus, Vol.109, No.1, pp. 121-136, 1980.

22.
D.F. Noble, "Forces of Production: A Social History of Industrial Automation", Alfred. A. Knopf, New York, 1984.

23.
W.W. Chin, "The partial least squares approach to structural equation modeling", Modern methods for business research, Vol.295. No.2, pp. 295-336, 1998.

24.
K.M. Park, J.Y. Hwang, and K.H. Kwon, "The Impact of Competitive Strategy, Decentralization, and the Application of IT on Performance", Journal of Strategic Management, Vol.8. No.1, pp. 113-135, 2005.

25.
M.J. Kim, "Study on the Model for Information and Culture", KADO, 2009.

26.
S.W. Lee, B.M. Park, J.M. Kim, and S.W. Kim, "A case for flash memory ssd in enterprise database applications", In Proceedings of the 2008 ACM SIGMOD international conference on Management of data. ACM, pp. 1075-1086, 2008.

27.
J. Greenberg, "Understanding metadata and metadata schemes", Cataloging & classification quarterly, Vol.40, No.3-4, pp. 17-36, 2005. crossref(new window)

28.
R. Anderson, "Security engineering", John Wiley & Sons. 2008.

29.
D.J. Solove, "The digital person: Technology and privacy in the information age", NYU Press, 2004.

30.
F.D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS quarterly, Vol.13. No.3, pp. 319-340, 1989. crossref(new window)

31.
M. Fishbein, and I. Ajzen, "Belief, attitude, intention, and behavior: An introduction to theory and research", Reading, MA: Addison-Wesley, 1975.

32.
A.L. Lederer, J.M. Donna, P.S. Mark, and Z. Youlong, "The Technology Acceptance Model and the World Wide Web", Decision Support Systems, Vol.29. No.3, pp. 269-282, 2000. crossref(new window)

33.
R. Agarwal and J, Prasad, "The Role if Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technology," Decision science, Vol.28. No.3, pp. 557-582, 1997. crossref(new window)

34.
D.A. Adams, R.R. Nelson, and P.A. Todd, "Perceived Usefulness, Ease of Use, and Usage of Information Technology : A Replication", MIS Quarterly, Vol.16. No.2, pp. 227-248, 1992. crossref(new window)

35.
A.L. Cavaye, "User participation in system development revisited", Information & Management, Vol.28. No.5, pp. 311-323, 1995. crossref(new window)

36.
S.D. Warren, and L.D. Brandeis, "The right to privacy", Harvard law review, Vol.4. No.5, pp. 193-220, 1890. crossref(new window)

37.
A.F. Westin, "Privacy and freedom", Washington and Lee Law Review, Vol.25. No.1, pp. 166-170, 1968.

38.
J. Kang, "Information privacy in cyber-space transactions", Stanford Law Review, Vol.50. No.4, pp. 1193-1294, 1998. crossref(new window)

39.
M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993. crossref(new window)

40.
M.N. Lee and J.W. Shim, "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy", Media, gender&culture, Vol.12, pp. 165-190, 2009.

41.
J.Y. Shin, and H.D. Yang, "The Effects of Perceived Privacy Infringement and the Moderators on On-Line Community Activities in BLOG", Inspiring Insight in Business Society, Vol.35. No.1, pp. 81-108, 2006.

42.
KISA, "A study on Internet users use SNS Survey", 2009.

43.
F.Y. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, and G. Lai, "A study of the human flesh search engine: crowd-powered expansion of online knowledge", Computer, Vol.43. No.8, pp. 45-53, 2010.

44.
P. Kotler, K.L. Keller, F. Ancarani, and M. Costabile, "Marketing management", 14/e. Pearson, 2014.

45.
J.N. Sheth, and A. Parvatiyar, "The evolution of relationship marketing", International Business Review, Vol.4. No.4, pp. 397-418, 1995. crossref(new window)

46.
C. Flavian, M. Guinaliu, and R. Gurrea, "The role played by perceived usability, satisfaction and consumer trust on website loyalty", Information & Management, Vol.43. No.1, pp. 1-14, 2006. crossref(new window)

47.
R.E. Anderson, and S.S. Srinivasan, "E-satisfaction and e-loyalty: a contingency framework", Psychology and Marketing, Vol.20. No.2, pp. 123-138, 2003. crossref(new window)

48.
F.V Cespedes, and H.J. Smith, "Database marketing: new rules for policy and practice", Sloan Management Review, Vol.34. No.4, pp. 7-23, 1993.

49.
D.H. Holtzman, "Privacy lost: how technology is endangering your privacy", John Wiley & Sons, 2006.

50.
J.H. Park and S.H. Lee, "Path Analysis of User Attitudes and Behaviors Toward Information Privacy", Korea administrative argument, Vol.45. No.1, pp. 281-307, 2007.

51.
G.R. Milne, L.I. Labrecque, and C. Cromer, "Toward an understanding of the online consumer's risky behavior and protection practices", Journal of Consumer Affairs, Vol.43. No.3, pp. 449-473, 2009. crossref(new window)

52.
M.Z. Yao, and D.G. Linz, "Predicting self-protections of online privacy", CyberPsychology & Behavior, Vol.11. No.5, pp. 615-617, 2008. crossref(new window)

53.
M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993. crossref(new window)

54.
C. Fornell, and F.L. Bookstein, "Two structural equation models: LISREL and PLS applied to consumer exit-voice theory", Journal of Marketing research, Vol.19. No.4, pp. 440-452, 1982. crossref(new window)

55.
A. Rai, R. Patnayakuni, and N. Seth, "Firm performance impacts of digitally enabled supply chain integration capabilities", MIS quarterly, Vol.30. No.2, pp. 225-246, 2006. crossref(new window)

56.
R. Agarwal and E. Karahanna, "Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage", MIS quarterly, Vol.24. No.4, pp. 665-694, 2000. crossref(new window)

57.
R.F. Falk and N.B. Miller, A Primer on Soft Modeling. The University of Akron Press, Akron, OH, 1992.

58.
B.H. Wixom, and H.J. Watson, "An empirical investigation of the factors affecting data warehousing success", MIS quarterly, Vol.25. No.1, pp. 17-41, 2001 crossref(new window)

59.
D.L. Schacter, and P. Graf, "Effects of elaborative processing on implicit and explicit memory for new associations", Journal of experimental psychology: learning, memory, and cognition, Vol.12. No.3, pp. 432, 1986. crossref(new window)

60.
F. Werro, "The right to inform v. the right to be forgotten: A transatlantic clash", Georgetown University Law Center. Public Law and Legal Theory Research Paper Series, Paper 2, 2009.

61.
D. Lyon, "Surveillance as social sorting: Privacy, risk, and digital discrimination", Psychology Press, 2003.

62.
M. Igbaria, and J. Iivari, "The effects of self-efficacy on computer usage", Omega: International Journal of Management Science, Vol.23. No.6, pp. 587-605, 1995. crossref(new window)

63.
S.C. Park, G.S. Jung, and J.R. Lee, "An Empirical Study on Factors Affecting the Acceptance of Internet", Korean Management Review, Vol.29. No.4, pp. 885-909, 2000.

64.
KCC, "How will my information is exposed to Twitter??". from http://kcc.go.kr, 2011.

65.
T. Buchanan, C. Paine, A.N. Joinson, and U.D. Reips, "Development of measures of online privacy concern and protection for use on the Internet", Journal of the American Society for Information Science and Technology, Vol.58. No.2, pp. 157-165, 2007. crossref(new window)