빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구

A Study of Relationship between Dataveillance and Online Privacy Protection Behavior under the Advent of Big Data Environment

  • 박민정 (이화여자대학교 경영학과) ;
  • 채상미 (이화여자대학교 경영학과)
  • 투고 : 2017.05.24
  • 발행 : 2017.09.30


Big Data environment is established by accumulating vast amounts of data as users continuously share and provide personal information in online environment. Accordingly, the more data is accumulated in online environment, the more data is accessible easily by third parties without users' permissions compared to the past. By utilizing strategies based on data-driven, firms recently make it possible to predict customers' preferences and consuming propensity relatively exactly. This Big Data environment, on the other hand, establishes 'Dataveillance' which means anybody can watch or control users' behaviors by using data itself which is stored online. Main objective of this study is to identify the relationship between Dataveillance and users' online privacy protection behaviors. To achieve it, we first investigate perceived online service efficiency; loss of control on privacy; offline surveillance; necessity of regulation influences on users' perceived threats which is generated by Dataveillance.


  1. 오길영 2015. "빅데이터 환경에서의 정보보호 담론에 대한 비판," 헌법학연구, 21, pp. 37-69.
  2. 윤상오 2009. "전자정부 구현을 위한개인정보보호 정책에 관한 연구: 정부신뢰 구축의 관점에서," 한국지역정보화학회지, (12:2).
  3. 최대선, 김석현, 조진만, 진승헌, 조현숙 2013. "소셜네트워크서비스 개인정보 노출 실태 분석," 정보보호학회논문지, (23:5), pp. 977-983.
  4. 최보미, 박민정, 채상미 2015. "개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구," Information Systems Review, (17:3), pp. 77-94.
  5. Ashworth, L., and Free, C. 2006. "Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns," Journal of Business Ethics, (67:2), pp. 107-123.
  6. Baek, Y. M., Kim, E. M., and Bae, Y. 2014. "My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns," Computers in Human Behavior, 31, pp. 48-56.
  7. Bettini, C., Wang, X. S., and Jajodia, S. 2005. August. "Protecting privacy against locationbased personal identification," In Workshop on Secure Data Management (pp. 185-199). Springer Berlin Heidelberg.
  8. Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. 2007. "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American Society for Information Science and Technology, (58:2), pp.157-165.
  9. Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., and Upadhyaya, S. J. 2009. "Internet and online information privacy: An exploratory study of preteens and early teens," IEEE Transactions on Professional Communication, (52:2), pp.167-182.
  10. Chellappa, R. K., and Pavlou, P. A. 2002. "Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, (15:5/6), pp.358-368.
  11. Chen, H., Beaudoin, C. E., and Hong, T. 2017. "Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors," Computers in Human Behavior .
  12. Chen, K., and Rea Jr, A. I. 2004. "Protecting personal information online: A survey of user privacy concerns and control techniques," Journal of Computer Information Systems, (44:4), pp. 85-92.
  13. Clarke, R. 2009. "Privacy impact assessment: Its origins and development," Computer law & security review, (25:2), pp. 123-135.
  14. Clarke, R. 1997. "Introduction to dataveillance and information privacy, and definitions of terms"
  15. Clarke, R. 1994. "The digital persona and its application to data surveillance," The information society, (10:2), pp. 77-92.
  16. Clarke, R. 1993. "Profiling: A hidden challenge to the regulation of data surveillance," JL & Inf. Sci., 4, 403.
  17. Clarke, R. 1988. "Information technology and dataveillance," Communications of the ACM, (31:5), pp. 498-512
  18. Cohen, J. 1992 "Statistical power analysis", Current directions in psychological science, pp.98-101
  19. Degli Esposti, S. 2014. "When big data meets dataveillance: The hidden side of analytics," Surveillance & Society, (12:2), 209.
  20. Culnan, M.J. 1993. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, (17:3), pp. 341-363.
  21. Dinev, T., and Hart, P. 2004. "Internet privacy concerns and their antecedents-measurement validity and a regression model," Behaviour & Information Technology, (23:6), pp. 413-422.
  22. Eberle, E. J. 2001. "The right to information Self-Determination," Utah L. Rev., 965.
  23. Ferraris, V., Bosco, F., Cafiero, G., D'Angelo, E., and Suloyeva, Y. 2013. "Defining Profiling"
  24. Frey, D. 1986. "Recent research on selective exposure to information," Advances in experimental social psychology, 19, pp. 41-80.
  25. Gilliland, S.W. 1993. "The perceived fairness of selection systems: An Organizational Justice Perspective," Academy of Management Review, (18:4), pp. 694-734.
  26. Gross, R., and Acquisti, A. 2005, November. "Information revelation and privacy in online social networks," In Proceedings of the 2005 ACM workshop on Privacy in the electronic society pp. 71-80.
  27. Hasan, H., and Hyland, P. 2001. "Using OLAP and multidimensional data for decision making," IT Professional, (3:5), pp. 44-50.
  28. Heider, F. 1946. "Attitudes and cognitive organization," The Journal of psychology, (21:1), pp. 107-112.
  29. Herath, T., and Rao, H. R. 2009. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems, (18:2), pp.106-125.
  30. Hui, K.L. Teo, H.H. and Lee, S.Y.T. 2007. "The Value of Privacy Assurance: An Exploratory Field Experiment," MIS Quarterly, (31:1), pp. 19-33.
  31. Ifinedo, P. 2012. "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory," Computers & Security, (31:1), pp. 83-95.
  32. Kang, J., Shilton, K., Estrin, D., and Burke, J. 2011. "Self-surveillance privacy," Iowa L. Rev., 97, pp.809.
  33. Kang, J. 1998. "Information privacy in cyberspace transactions," Stanford Law Review, pp. 1193-1294.
  34. Ko, H. S., Kim, C. S., Jeong, M. Y., Oh, Y. J., and Lee, S. H. 2011. "The effect of social network service's quality factors on user satisfaction and the intention to continued use," Journal of the Korean society for quality management, (39:4), pp. 543-555.
  35. Lee, D., Larose, R., and Rifon, N. 2008. "Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology," (27:5), pp. 445-454.
  36. Leistert, O. 2012. "Resistance against cybersurveillance within social movements and how surveillance adapts," Surveillance & Society, (9:4), pp. 441.
  37. Litman, J. 2000. "Information privacy/information property," Stanford Law Review, pp. 1283-1313.
  38. Liu, X., He, M., Gao, F., and Xie, P. 2008. "An empirical study of online shopping customer satisfaction in China: a holistic perspective," International Journal of Retail & Distribution Management, (36:11), pp. 919-940.
  39. Maddux, J. E., & Rogers, R. W. 1983. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change," Journal of experimental social psychology, (19:5), pp. 469-479.
  40. Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model," Information systems research, (15:4), pp. 336-355.
  41. McQuail, D. 2010. McQuail's mass communication theory. Sage publications.
  42. Milne, G. R., and Rohm, A. J. 2000. "Consumer privacy and name removal across direct marketing channels: Exploring opt-in and optout alternatives," Journal of Public Policy & Marketing, (19:2), pp. 238-249.
  43. Mohamed, N., and Ahmad, I. H. 2012. "Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia," Computers in Human Behavior, (28:6), pp. 2366-2375.
  44. Morimoto, M., and Chang, S. 2006. "Consumers' attitudes toward unsolicited commercial e-mail and postal direct mail eting methods: intrusiveness, perceived loss of control, and irritation," Journal of Interactive Advertising, (7:1), pp. 1-11.
  45. Nowak, G. J., and Phelps, J. 1995. "Direct marketing and the use of individual-level consumer information: Determining how and when "privacy" matters," Journal of Direct Marketing, (9:3), pp. 46-60.
  46. Park, M., Chai, S., and Lee, M. 2017. "A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases," Conference Proceedings, 19th Information Security and Risk Management, Singapore Jan 08-09
  47. Park, M., Choi. B., and Chai, S. 2016. "Do You Really Maintain Your Social Tie through SNS?; An Exploratory Study of Online Environment, Journal of Next Generation Information Technology," (7:1), pp. 72-82.
  48. Parasuraman, A., Zeithaml, V. A., and Berry, L. L. 1988. "Servqual: A multiple-item scale for measuring consumer perc," Journal of retailing, (64:1), pp. 12.
  49. Rogers, R. W. 1975. "A protection motivation theory of fear appeals and attitude change1," The journal of psychology, (91:1), pp. 93-114.
  50. Schmid, G., and Gausling, T. 2016. "Data protection and the right of personality with regard to rating platforms: decisions of the German Federal Supreme Court," Journal of Intellectual Property Law & Practice, (11:1), pp. 46-48.
  51. Sproull, L. 2011. "Prosocial behavior on the net," Daedalus, (140:4), pp. 140-153.
  52. Stelzner, Micael A. 2010. "Social media marketing industry report: How marketers are using social media to grow their businesses," SocialMedia Examiner
  53. Stone, E. F., and Stone, D. L. 1990. "Privacy in organizations: Theoretical issues, research f indings, and protection mechanisms," Research in personnel and human resources management, (8:3), pp. 349-411.
  54. Youn, S. 2009. "Determinants of online pr ivac y concer n a nd its inf luence on privacy protection behaviors among young adolescents," Journal of Consumer affairs, (43:3), pp. 389-418.
  55. Van Dijck, J. 2014. "Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology," Sur veillance & Society, (12:2), pp. 197.
  56. Vance, A., Siponen, M., and Pahnila, S. 2012. "Motivating IS security compliance: insights from habit and protection motivation theory," Information & Management, (49:3), pp. 190-198.
  57. Wu, K. W., Huang, S. Y., Yen, D. C., and Popova, I. 2012. "The effect of online privacy policy on consumer privacy concern and trust," Computers in human behavior, (28:3), pp.889-897.
  58. Wu, Y. L., Tao, Y. H., and Chang, C. J. 2017. "A comparative review on privacy concerns and safety demands of closed-circuit television among Taiwan, Japan, and the United Kingdom," Journal of Information and Optimization Sciences, (38:1), pp. 173-196.
  59. Zeithaml, V. A ., Parasuraman, A ., and Malhotra, A. 2000. "Conceptual Framework for understanding e-service quality : Implications for future research and managerial practice"
  60. Zeithaml, V. A. 2000. "Service quality, profitability, and the economic worth of customers: what we know and what we need to learn," Journal of the academy of marketing science, (28:1), pp. 67-85.
  61. Zhang, D. Y. 2014. "Study on the Behavioral Logic of Personal Information Protection in the View of Constitution," In Advanced Materials Research, 971, pp. 1768-1771.
  62. 전자신문, [보안컬럼] "감시자에서 조력자로, CCTV의 진화," 2017.04.18,