DOI QR코드

DOI QR Code

The Effect of Individual Risk Appraisal and Ability to Control on Information Privacy Concerns in Online Social Network

온라인 소셜네트워크에서 개인의 위험성평가와 자기통제력이 정보보안우려감에 미치는 영향

  • Moon, Yun Ji (Department of Management Information Systems, Catholic University of Pusan)
  • 문윤지 (부산가톨릭대학교 경영정보학과)
  • Received : 2017.02.08
  • Accepted : 2017.05.12
  • Published : 2017.05.31

Abstract

Recently, online social networks have become one of the most representative Internet services and are being used increasingly, which allows people to share information and interact with other people. On the other hand, as the use of OSN is increased, there has been an increased incidence where illegally accessed personal information is used wrongfully. Accordingly, privacy has become a key concern by the users. Regarding the construct of information privacy concerns (IPC), this study explored the antecedents of IPC at the individual personal level - risk appraisal and perceived behavioral control - based on Protection Motivation Theory. Hence, the current paper investigated the moderating effect of gender in the relationship between individual characteristics and IPC. The hypothesized research model was examined with 233 questionnaires of OSN users. The results showed that the positive effects of risk appraisal and the negative effects of perceived behavioral control on IPC are supported. In addition, the moderate effects of gender between risk appraisal and IPC is only supported.

오늘날 온라인 소셜네트워크(OSN: Online Social Network)는 전 세계 수십억명의 사람들이 활용하는 대표적인 인터넷 서비스로, OSN은 사용자들로 하여금 다양한 정보를 공유하고 다른 사람들과 상호작용하는 것을 가능하게 함으로써 그 사용이 점점 증가하고 있다. 하지만 OSN 활용이 늘어나면서 OSN에서 사용자가 노출하는 개인정보가 악용되는 사례 역시 함께 증가하고 있다. 이 때문에 사용자들은 OSN 상에서의 정보보안에 대해 우려감을 가지게 된다. 이에 본 연구에서는 OSN에서 사용자가 가지는 정보보안우려감 개념을 중심으로 정보보안우려감에 영향을 미치는 선행요인을 보호동기이론(Protection Motivation Theory)에 기반하여 개인적 차원(개인 사용자의 위험평가와 자기통제력)을 연구모형에 포함한다. 나아가 본 연구는 개인적 특성과 정보보안우려감 간 관계가 사용자의 성별에 따라 달라질 수 있음을 조절효과로 검증하고자 한다. 이러한 본 연구의 연구모형은 OSN을 활용하는 233명을 대상으로 한 설문지를 통한 실증분석으로 검증되었다. 연구결과 사용자가 OSN 사용에 따른 위험성이 높으며 더불어 이에 대해 행사할 수 있는 자신의 자기통제력이 약하다고 인지할 경우 정보보안우려감은 높아지지만, 성별에 따른 차이는 위험평가와 정보보안우려감 간 관계에서만 유의한 것으로 입증되었다.

Keywords

References

  1. C, Wuest, The Risks of Social Networking, Symantec Corporation, 2010.
  2. N. F. Awad, M. S. Krishnan, "The Personalization privacy paradox: An empirical Evaluation of information transparency and the willingness to be profiled online for personalization," MIS Quarterly, vol. 30, no. 1, pp. 13-28, 2006. https://doi.org/10.2307/25148715
  3. K-L. Huit, H. Hai, S. Y. T. Lee, "The value of privacy assurance: An exploratory field experiment," MIS Quarterly, vol. 31, no. 1, pp. 19-33, 2007. https://doi.org/10.2307/25148779
  4. J. Wirtz, M. O. Lwin, J. D. Williams, "Causes and consequences of consumer online privacy concern," International Journal of Service Industry Management, vol. 18, no. 4, pp. 326-348, 2007. DOI: https://doi.org/10.1108/09564230710778128
  5. J-Y. Son, S. S. Kim, "Internet users' information privacy-protective responses: A taxonomy and a nomological model," MIS Quarterly, vol. 32, no. 3, pp. 503-529, 2008. https://doi.org/10.2307/25148854
  6. M. Korzaan, N. Brooks, T. Greer, "Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy," Journal of Behavioral Studies in Business, vol. 1, pp. 1-17, 2009.
  7. M. Lwin, J. Wirtz, J. D. Williams, "Consumer online privacy concerns and responses: A power-responsibility equilibrium perspective," Journal of the Academy of Marketing Science, vol. 35, no. 4, pp. 572-585, 2007. DOI: https://doi.org/10.1007/s11747-006-0003-3
  8. Okazaki S, Li H, Hirose M (2009). Consumer privacy concerns and preference for degree of regulatory control, Journal of Advertising, 38(4):63-77. DOI: https://doi.org/10.2753/JOA0091-3367380405
  9. J. A. Bae, Y. H. Cho, S. S. Kim, E. H. Choi, T. H. Ha, A Study on Measuring the Levels of Perception on Privacy (Protection of Personal Information) by Internet Users and Service Providers, Korea Information Society Development Institute, 2011.
  10. C. M. Angst, R. Agarwal, "Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion," MIS Quarterly, vol. 33, no. 2, pp. 339-370, 2009. https://doi.org/10.2307/20650295
  11. J. B. Earp, A. I. Anton, L. Aiman-Smith, W. H. Stuebeam, "Examining internet privacy policies within the context of user privacy values," IEEE Transactions on Engineering Management, vol. 52, no. 2, pp. 227-237, 2005. DOI: https://doi.org/10.1109/TEM.2005.844927
  12. J. J. Smith, S. J. Milberg, S. J. Burke, "Information privacy: Measuring individuals' concerns about organizational practices," MIS Quarterly, vol. 20, no. 2, pp. 167-196, 1996. DOI: https://doi.org/10.2307/249477
  13. W. Hong, J. Y. Thong, "Internet Privacy concerns: An integrated conceptualization and four empirical studies," MIS Quarterly, vol. 37, no. 1, pp. 275-298, 2013. https://doi.org/10.25300/MISQ/2013/37.1.12
  14. J. A. Castaneda, F. J. T. Montoso, "The Dimensionality of customer privacy concern on the Internet," Online Information Review, vol. 31, no. 4, pp. 420-439, 2007. DOI: https://doi.org/10.1108/14684520710780395
  15. R.S. Laufer, M. Wolfe, "Privacy as a concept and a social issue: A multidimensional development theory," Journal of Social Issues, vol. 33, no. 3, pp. 22-42, 1977. DOI: https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
  16. T. Buchanan, C. Paine, A.N. Joinson, U-D. Reips, "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American Society for Information Science and Technology, vol. 58, no. 2, pp. 157-165, 2007. DOI: https://doi.org/10.1002/asi.20459
  17. Culnan MJ, Williams CC, How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches, MIS Quarterly, vol. 33, no. 4, pp. 673-687, 2009. https://doi.org/10.2307/20650322
  18. K. S. Schwaig, A. H. Segars, V. Grover, K.D. Fiedler, "A model of consumers' perceptions of the invasion of information privacy," Information & Management, vol. 50, pp. 1-12, 2013. DOI: https://doi.org/10.1016/j.im.2012.11.002
  19. D. L. Floyd, S. Prentice-Dunn, R.W. Rogers, "A meta-analysis of research on protection motivation theory," Journal of Applied Social Psychology, vol. 30, no. 2, pp. 407-429, 2000. DOI: https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
  20. R. W. Rogers, A protection motivation theory of fear appeals and attitude change, Journal of Psychology, 91(1): 93-114, 1975. DOI: https://doi.org/10.1080/00223980.1975.9915803
  21. Y. Li, "Theories in online information privacy research: A critical review and an integrated framework," Decision Support Systems, vol. 54, pp. 471-481, 2012. DOI: https://doi.org/10.1016/j.dss.2012.06.010
  22. B. Bulgurcu, "Antecedents and outcomes of information privacy concerns in online social networking: A theoretical perspective," Information Systems, vol. 2, no. 2, pp. 153-163, 2010.
  23. B. Debatin, J. P. Lovejoy, A-K. Horn, B. N. Hughes, "Facebook and online privacy: Attitudes, behaviors, and unintended consequences," Journal of Computer-Mediated Communication, vol. 15, no. 1, pp. 83-108, 2009. DOI: https://doi.org/10.1111/j.1083-6101.2009.01494.x
  24. H. Liang, Y. Xue, "Avoidance of information technology threats: A theoretical perspective," MIS Quarterly, vol. 33, no. 1, pp. 71-90, 2009. https://doi.org/10.2307/20650279
  25. S. Youn, "Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents," Journal of Consumer Affairs, vol. 43, no. 3, pp. 389-418, 2009. DOI: https://doi.org/10.1111/j.1745-6606.2009.01146.x
  26. J. Fogel, E. Nehmad,. "Internet social network communities: Risk taking, trust, and privacy concerns," Computers in Human Behavior, vol. 25, no. 1, pp. 153-160, 2009. DOI: https://doi.org/10.1016/j.chb.2008.08.006
  27. J. Phelps, G. Nowak, E. Ferrell, "Privacy concerns and consumer willingness to provide personal information," Journal of Public Policy and Marketing, vol. 19, no. 1, pp. 27-41, 2000. DOI: https://doi.org/10.1509/jppm.19.1.27.16941
  28. T. Dinev, P. Hart, "Internet privacy concerns and their antecedents -Measurement validity and a regression model," Behavior and Information Technology, vol. 23, no. 6, pp. 413-422, 2004. DOI: https://doi.org/10.1080/01449290410001715723
  29. P. Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory," Computers & Security, vol. 31, pp. 83-95, 2012. DOI: https://doi.org/10.1016/j.cose.2011.10.007
  30. G. Torkzadeh, T.P. van Dyke, "Development and validation of an internet self-efficacy scale," Behaviour & Information Technology, vol. 20, no. 4, pp. 275-280, 2001. DOI: https://doi.org/10.1080/01449290110050293
  31. J. L. Tsai, B. Knutson, H.H. Fung, "Cultural variation in affect valuation," Journal of Personality and Social Psychology, vol. 90, pp. 288-307, 2006. DOI: https://doi.org/10.1037/0022-3514.90.2.288
  32. J. C. C. Lin, H. Lu, "Towards an understanding of the behavioural intention to use a web site," International Journal of Information Management, vol. 20, no. 3, pp. 197-208, 2000. DOI: https://doi.org/10.1016/S0268-4012(00)00005-0
  33. J.C. Nunnally, Psychometric theory(2nd ed.), New York: McGraw-Hil, 1978.
  34. S. L. Jarvenpaa, N. Tractinsky, M. Vitale, "Consumer trust in an internet store," Information Technology and Management, vol. 1, no. 1-2, pp. 45-71, 2000. DOI: https://doi.org/10.1023/A:1019104520776