DOI QR코드

DOI QR Code

A Study on Factors Influencing Privacy Decision Making on the Internet: Focus on Dual-Calculus Model

온라인 환경에서 프라이버시 의사결정에 영향을 미치는 요인에 관한 연구: 이중계산모델을 중심으로

  • Received : 2016.07.13
  • Accepted : 2016.09.23
  • Published : 2016.09.30

Abstract

Purpose This study aims to investigate the factors that influence decision making in relation to providing personal information on the internet with respect to the integration of the privacy calculus theory and protection motivation theory based on the dual-calculus model proposed by Li(2012). Design/methodology/approach The privacy calculus theory and protection motivation theory have been applied to explain privacy behavior to a certain degree but few studies have been conducted to explain privacy behavior based on the integration of these two theories. Although Li(2012) proposed the dual-calculus model, he only proposed its framework and did not carry out an empirical study. Therefore, this study proposes a research model that integrates these two theories and examines the relationship between the two theories through an empirical study. Findings According to the results of empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between coping appraisal and privacy risk in the risk calculus process. Thus, the results verify that external threat played a decisive role in increasing the risk level of a consumer's privacy. It can be discussed the ways to enhance the privacy behavior of consumer on the internet through these findings.

Keywords

References

  1. 김상현, 박현선, "프라이버시 보호인식 및 보호 행동의도에 미치는 영향 요인과 프라이버시 침해경험의 조절효과에 관한 연구," 인터넷전자상거래연구, 제13권, 제4호, 2013, pp. 79-105.
  2. 김영렬, "개인 정보 보호 의식 측정 정도의 개발과 개인정보 중요성에 관한 인지도 조사," 한국산업정보학회논문지, 제15권, 제5호, 2010, pp. 259-271.
  3. 김종기, 이동호, "전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구," 경영정보학연구, 제15권, 제2호, 2005, pp. 65-96.
  4. 김종기, 김상희. "스마트폰 위치기반서비스에서 정보제공의도: 프라이버시 계산 관점을 중심으로," 정보시스템연구, 제21권, 제4호, 2012, pp. 55-79.
  5. 김종기, 김상희, "온라인 환경에서 프라이버시 행동의도에 미치는 영향," 정보화정책, 제20권, 제3호, 2013, pp. 63-85.
  6. 김종기, 김진성, "전자상거래에서 정보 프라이버시 염려를 유발하는 원인과 보호반응에 관한 연구: 주인-대리인 이론을 중심으로," 정보시스템연구, 제23권, 제4호, 2014, pp. 119-145.
  7. Acquisti, A., "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proceedings of the 5th ACM Electronic Commerce Conference, 2004, pp. 21-29.
  8. Barclay, D., Thompson, R., and Higgins, C., "The Partial Least Squares (PLS) Approach to Causal Modeling, Personal Computer Adoption and Use as an Illustration," Technology Studies, Vol. 2, No. 2, 1995, pp. 285-324.
  9. Chenoweth, T., Minch, R., and Gattiker, T., "Application of Protection Motivation Theory to Adoption of Protective Technologies," Proceedings of the 42nd Hawaii International Conference on System Science, 2009.
  10. Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling," in Modern Methods for Business Research, Marcoulides, G. A. (ed.), Lawrence Erlbaum Associates: New Jersey, 1998.
  11. Cohen, J. O., Statistical Power Analysis for the Behavioral Sciences(2nd ed.), Lawrence Erlbaum: New Jersey, 1988.
  12. Culnan, M. J. and Bies, J. R., "Consumer Privacy: Balancing Economic and Justice Considerations," Journal of Social Issues, Vol. 59, No. 2, 2003, pp. 323-342. https://doi.org/10.1111/1540-4560.00067
  13. Dinev, T. and Hart, P., "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, Vol. 17, No. 1, 2006, pp. 61-80. https://doi.org/10.1287/isre.1060.0080
  14. Hair, J. F., Hult, G. T. M., Ringle, C. M., and Sarstedt, M., A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), SAGE Publication, 2013.
  15. Ifinedo, P., "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security, Vol. 31, 2012, pp. 83-95. https://doi.org/10.1016/j.cose.2011.10.007
  16. Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566. https://doi.org/10.2307/25750691
  17. Keith, M. J., Thompson, S. C., Hale, J., Lowry, P. B., and Greer, C., "Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior," International Journal of Human-Computer Studies, Vol. 71, 2013, pp. 1163-1173. https://doi.org/10.1016/j.ijhcs.2013.08.016
  18. Krasnova, H. and Veltri, N. F., "Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA," Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010, pp. 1-10.
  19. Lee, Y., "Understanding Anti-plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective," Decision Support Systems, Vol. 50, 2011, pp. 361-369. https://doi.org/10.1016/j.dss.2010.07.009
  20. Li, H., Sarathy, R., and Xu, H., "Understanding Situational Online Information Disclosure as a Privacy Calculus," Journal of Computer Information Systems, 2010, pp. 1-29.
  21. Li, H., Sarathy, R., and Xu, H., "The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors," Decision Support Systems, Vol. 51, No. 3, 2011, pp. 434-445. https://doi.org/10.1016/j.dss.2011.01.017
  22. Li, Y., "Theories in Online Information Privacy Research: A Critical Review and an Integrated Framework," Decision Supports Systems, Vol. 54, 2012, pp. 471-481. https://doi.org/10.1016/j.dss.2012.06.010
  23. Liang, H. and Xue, Y., "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems, Vol. 11, No. 7, 2010, pp. 394-413. https://doi.org/10.17705/1jais.00232
  24. Nunnally, J. C. and Bernstein, I. H., Psychometric Theory(3rd ed.), McGraw-Hill: New York, 1994.
  25. Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology, Vol. 91, 1975, pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
  26. Rogers, R. W., "Cognitive and Physiological Processes in Fear-based Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A sourcebook, Cacioppo, J. and Petty, R. (eds.), Guilford Press: New York, 1983, pp. 153-176.
  27. Segars, A. and Grover, V. "Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis," MIS Quarterly, Vol. 17, No. 4, 1993, pp. 517-525. https://doi.org/10.2307/249590
  28. Smith, H. J., Dinev, T., and Xu, H., "Information Privacy Research: An Interdisciplinary Review," MIS Quarterly, Vol. 35, No. 4, 2011, pp. 989-1015. https://doi.org/10.2307/41409970
  29. Stevens, J., Applied Multivariate Statistics for the Social Sciences, Lawrence Erlbaum Associates: New Jersey, 1992.
  30. Stone, E. F. and Stone, D. L., "Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms," Research in Personnel and Human Resources Management, Vol. 8, No. 3, 1990, pp. 349-411.
  31. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C., "PLS Path Modeling," Computational Statistics & Data Analysis, Vol. 48, No. 1, 2005, pp. 159-205. https://doi.org/10.1016/j.csda.2004.03.005
  32. Workman, M., Bommer, W. H., and Straub, D., "The Amplification Effects of Procedural Justice on a Threat Control Model of Information Systems Security Behaviours," Behaviour & Information Technology, Vol. 28, No. 6, 2009, pp. 563-575. https://doi.org/10.1080/01449290802556021
  33. Xu, H., Teo, H., Tan, B. C. Y., and Agarwal, R., "The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Service," Journal of Management Information Systems, Vol. 26, No. 3, 2010, pp. 135-173. https://doi.org/10.2753/MIS0742-1222260305
  34. Xu, H., Luo, X., Carroll, J. M., and Rosson, M. B., "The Personalization Privacy Paradox: An Exploratory Study of Decision Making Process for Location-Aware Marketing," Decision Support Systems, Vol. 51, No. 1, 2011, pp. 42-52. https://doi.org/10.1016/j.dss.2010.11.017