개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로

DOI QR코드

DOI QR Code

이은숙;이준기;차경진
Lee, Eun Suk;Lee, Zoon Ky;Cha, Kyung Jin

  • Received : 2016.04.11
  • Accepted : 2016.05.14
  • Published : 2016.05.31

Abstract

대부분의 웹 사이트에서는 법을 준수하기 위해 정보주체의 개인정보 수집에 동의를 구하는 이용약관이나 개인정보 취급방침(이하 '취급방침')을 마련하고 있다. 국내 온라인 및 모바일 서비스에서 이용자로부터 수집하는 개인정보의 항목을 명시하고자 마련한 취급방침을 대부분의 이용자는 읽지도 않고 그냥 넘기는 등 이용자 관점에서 인지하지 못하는 경우가 많다. 보다 구체적으로 취급방침을 확인했을 때 이용자가 제공하는 개인정보의 인지 및 서비스 이용에 어떤 영향이 있는지를 살펴보고자 카카오톡 이용자를 중심으로 실험하였다. 332명의 실험 참여 인원을 구성해 취급방침에 대해 기존 행동을 유지하는 그룹과 Display를 확인하여 내용을 인지하는 그룹을 구성해 개인 프라이버시 민감도의 차이를 고려하여 개인정보보호 행동의 차이를 분석하여 시사한다. 본 연구에서는 민감군과 무관심군으로 나누었을 때 취급방침 인지로 나타나는 보호행동을 제시하고 서비스 제공자의 정책 실현을 위한 가이드라인을 제시한 점에서 그 의의가 있다.

Keywords

개인정보취급방침;개인정보보호;프라이버시 염려도;프라이버시 보호행동;프라이버시 근본주의

Referances

  1. Ajzen, I., "Constructing a TPB questionnaire: Conceptual and methodological considerations," 2002.
  2. Baek, S. I. and Choi, D. S., "Exploring User Attitude to Information Privacy," The Journal of Society for e-Business Studies, Vol. 20, No. 1, pp. 45-59, 2015. https://doi.org/10.7838/jsebs.2015.20.1.045
  3. Boss, S. R. et al., "What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors," MIS Quarterly, Vol. 39, No. 4, pp. 837-864, 2015. https://doi.org/10.25300/MISQ/2015/39.4.5
  4. Buchanan, T. et al., "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American Society for Information Science and Technology, Vol. 58, No. 2, pp. 157-165, 2007. https://doi.org/10.1002/asi.20459
  5. Culnan, M. J. and Robert, J. B., "Consumer privacy: Balancing economic and justice considerations," Journal of social issues, Vol. 59, No. 2, pp. 323-342, 2003. https://doi.org/10.1111/1540-4560.00067
  6. Hoffman, D. L., T. P. Novak, and M. A. Peralta, "Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web," The Information Society, Vol. 15, No. 2, pp. 129-139, 1999. https://doi.org/10.1080/019722499128583
  7. Interactive, H., "Privacy on and off the Internet: What consumers want," Privacy and American Business, pp. 1-127, 2002.
  8. Jacoby, J., Speller, D. E., and Kohn, C. A., "Brand choice behavior as a function of information load," Journal of Marketing Research, Vol. 11, No. 1, pp. 63-69, 1974. https://doi.org/10.2307/3150994
  9. Jeon, G.-G., "Development of a multidimensional coping scale," Korean Journal of Clinical Psychology, Vol. 13, No. 1, pp. 114-135, 1994.
  10. Joinson, A. N. et al. "Watching me, watching you: privacy attitudes and reactions to identity card implementation scenarios in the United Kingdom," Journal of Information Science, Vol. 32, No. 4, pp. 334-343, 2006. https://doi.org/10.1177/0165551506064902
  11. Kakao Corp., 2015 3rd Investor Relations, 2015.
  12. Kelley, P. G. et al., "A nutrition label for privacy," Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, No. 4, 2009.
  13. Kenneth, B., Data Surveillance Bill, 1969.
  14. Kim, J.-J. and Kweon, E.-H., "A Study on the Therapists' Protective Actions of Medical Information Privacy-With a focus on physical and occupational therapists," The Journal of the Korea institute of electronic communication sciences, Vol. 7, No. 2, pp. 447-455, 2012.
  15. Kim, M., "A Study on Protecting Patients' Privacy of Obstetric and Gynecologic Nurses," Korean Journal of Women Health Nursing, Vol. 18, No. 4, pp. 268-278, 2012. https://doi.org/10.4069/kjwhn.2012.18.4.268
  16. KISA, "A Study of Reform of Personal Information Law System by ICT Environment Change," 2012.
  17. Korea Communications Commission, "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.," 2001.
  18. Korea Internet Law Association, "A Legislative Research of Privacy and Effective Use of Personal Information," pp. 65-153, 2009.
  19. Lee, Z.-K., Choi, H.-J., and Choi, S.-A., How Service Usefulness and Privacy Concern Influence on Service Acceptance, The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 37-51, 2007.
  20. Li, T. and Slee, T., "The Effects of Information Privacy Concerns on Digitizing Personal Health Records," Journal of the Association for Information Science and Technology, Vol. 65, No. 8, pp. 1541-1554, 2014. https://doi.org/10.1002/asi.23068
  21. Malhotra, N. K., Kim, S. S., and Agarwal, J., "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model," Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004. https://doi.org/10.1287/isre.1040.0032
  22. McDonald, A. M. and Cranor, L. F., "Cost of reading privacy policies, the," ISJLP, No. 4, p. 543, 2008.
  23. Milne, G. R. and Culnan, M. J., "Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices," Journal of Interactive Marketing, Vol. 18, No. 3, pp. 15-29, 2004. https://doi.org/10.1002/dir.20009
  24. Milne, G. R., "How well do consumers protect themselves from identity theft?," Journal of Consumer Affairs, Vol. 37, No. 2, pp. 388-402, 2003. https://doi.org/10.1111/j.1745-6606.2003.tb00459.x
  25. MOPAS, "Personal Information Protection Act Guidelines," 2011.
  26. National Human Rights Commission of Korea, "Report of Information and Communication Technologies(ICTs) and Human Rights," 2013.
  27. Pavlou, P. A. and Fygenson, M., "Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior," MIS quarterly, Vol. 30, No. 1, pp. 115-143, 2006. https://doi.org/10.2307/25148720
  28. Personal Information Protection Commission, "2015 Annual Report on Personal Information Protection," 2015.
  29. Personal Information Protection Commission, "A study on improvement and analysis of change since enforcement personal information protection act," 2012.
  30. Phelps, J., Nowak, G., and Ferrell, E., "Privacy concerns and consumer willingness to provide personal information," Journal of Public Policy and Marketing, Vol. 19, No. 1, pp. 27-41, 2000. https://doi.org/10.1509/jppm.19.1.27.16941
  31. Schroder, H. M., Driver, M. J., and Siegfried S., Human information processing: Individuals and groups functioning in complex social situations, New York: Holt, Rinehart and Winston, 1967.
  32. Smith, H. J., Milberg, S. J., and Burke, S. J., "Information privacy: measuring individuals' concerns about organizational practices," MIS quarterly, Vol. 20, No. 2, pp. 167-196, 1996. https://doi.org/10.2307/249477
  33. Smith, H. J., Dinev, T., and Xu, H., "Information privacy research: an interdisciplinary review," MIS quarterly, Vol. 35, No. 4, pp. 989-1016, 2011. https://doi.org/10.2307/41409970
  34. Taylor, D. G., Davis, D. F., and Jillapalli, R., "Privacy concern and online personalization: The moderating effects of information control and compensation," Electronic Commerce Research, Vol. 9, No. 3, pp. 203-223, 2009. https://doi.org/10.1007/s10660-009-9036-2
  35. Taylor, H., "Most people are 'privacy pragmatists' who, while concerned about privacy, will sometimes trade it off for other benefits," The Harris Poll, Vol. 17, No. 19, p. 44, 2003.
  36. Vail, M. W., Earp, J. B., and Anton, A. I., "An empirical study of consumer perceptions and comprehension of web site privacy policies," Engineering Management, IEEE Transactions on, Vol. 55, No. 3, pp. 442-454, 2008. https://doi.org/10.1109/TEM.2008.922634
  37. Worthy, M., Gary, A. L., and Kahn, G. M., "Self-disclosure as an exchange process," Journal of Personality and Social Psychology, Vol. 13, No. 1, p. 59, 1969. https://doi.org/10.1037/h0027990