DOI QR코드

DOI QR Code

The Effect of Perceived Information Control on the Knowledge Sharing Intention of the Social Network Service Users

인지된 정보 통제가 소셜 네트워크 이용자의 정보 제공 의도에 미치는 영향

  • Lee, Un-Kon (Graduate School of Information, Yonsei University) ;
  • Kim, Kyong Kyu (Graduate School of Information, Yonsei University) ;
  • Song, Ho Hyeon (Graduate School of Information, Yonsei University)
  • Received : 2013.01.22
  • Accepted : 2013.02.16
  • Published : 2013.02.28

Abstract

The evolution of IT facilitated the communication and knowledge sharing between the social network service (SNS) users. When the more information about SNS users had been posted in SNS site, SNS users had sometimes exposed in the risk of privacy invasion. To remedy this problem, we had introduced the information control mechanisms from the prior studies in data management to the SNS area and empirically validated the effect of these mechanisms in this research. Three information control mechanisms had been elected as access control, reference control and diffusion control. We had conducted a survey to the Facebook users which is the most famous SNS site. 459 data had been gathered and analyzed by PLS algorism. As the results, reference control and diffusion control has significantly increased the trust on SNS providers and decrease the privacy concern. This change could significantly affect on the satisfaction with the SNS site and knowledge sharing intention of SNS users. This study could introduce the new perspective about privacy protection issues in SNS area. Also, the information control mechanisms suggested in this study could contribute to make more robust privacy protection mechanisms in SNS site in practice.

정보통신 기술의 발전에 따라 사람들은 소셜 네트워크 서비스(SNS)를 통해 다른 사람과 소통하고 자신의 정보를 공유하고 있다. 그러나 이 과정에서 SNS 이용자들의 개인정보가 의도하지 않게 노출되거나 악용되는 사례가 나타났다. 이러한 문제를 해결하기 위해 본 연구에서는 데이터 관리에 관한 선행 연구를 바탕으로 정보 통제 요소가 SNS 이용자들의 보안 우려와 SNS 사업자에 대한 신뢰에 미치는 효과를 살펴보고자 하였다. 본 연구에서는 이를 통해 접근 통제, 열람 통제 및 확산 통제의 세 가지 정보 통제 요소를 추출하였다. 가장 널리 알려져 있는 SNS 서비스로서 페이스북 이용자를 대상으로 설문 조사를 진행하였다. 총 459개의 자료를 수집하였으며 PLS 알고리즘을 이용하여 분석한 결과, 열람 통제와 확산 통제는 유의하게 SNS 이용자들의 보안 우려를 감소시키고 SNS 서비스 제공자에 대한 신뢰를 증진시킴으로써 SNS 서비스에 대한 만족도와 지속적인 정보 공유 의도를 증가시키는 것으로 조사되었다. 본 연구는 소셜 네트워크 서비스에서 보안 문제를 제기한 선도적인 연구일 뿐 아니라, 실제 구현이 용이한 보안 통제 기법을 소개함으로써 실무적인 측면에서도 가치가 높을 것으로 기대한다.

Keywords

References

  1. Acquisti, A. and Gross, R., "Imagined communities : Awareness, information sharing, and privacy on the Facebook," Presentation at the 2006 privacy enhancing technologies (PET) workshop, Cambridge, England, 2006.
  2. Ahuja, M., Galletta, D., and Carley, K., "Individual Centrality and Performance in Virtual R&D Groups : An Empirical Study," Management Science, Vol. 49, No. 1, pp. 21-38, 2003. https://doi.org/10.1287/mnsc.49.1.21.12756
  3. Ajzen, I., "Behavioral Interventions Based on the Theory of Planned Behavior," Journal of applied social psychology, pp. 1-6, 2006.
  4. Andrews, S., "Privacy and human rights 2002 : An intenrnational survey of privacy laws and developments," http://www.privacyinternational.org/survey/phr2002/, 2002.
  5. Barclay, D., Higgins, C., and Thompson, R., "The Partial Least Squares (PLS) Approach to Causal Modeling : Personal Computer Adoption and Use as an Illustration," Technology Studies, Vol. 2, No. 2, pp. 285-309, 1995.
  6. Beato, F., Kohlweiss, M., and Wouters, K., "Enforcing Access Control in Social Network Sites," Hot Topics in Privacy, pp. 1-11, 2009.
  7. Bhattacherjee, A. and Premkumar, G., "Understanding Changes in Belief and Attitude Toward Information Technology Usage : A Theoretical Model and Longitudinal Test," MIS Quarterly, Vol. 28, pp. 229-254, 2004.
  8. Bhattacherjee, A., "Understanding Information Systems Continuance : An Expectation- Confirmation Model," MIS Quarterly, Vol. 25, No. 3, pp. 351-370, 2001. https://doi.org/10.2307/3250921
  9. Bloter.net, Jung, B. R., "SNS Users per 5 persons in Global," 2012. 3. 2., http://www.bloter.net/archives/99004.
  10. Bock, G. W., Zmud, R. W., and Kim, Y. G., "Behavioral Intention Formation in Knowledge Sharing : Examining the Roles of Extrinsic Motivators, Social- Psychological Forces, and Organizational Climate," MIS Quarterly, Vol. 29, No. 1, pp. 87-111, 2005.
  11. Boyd, D. M. and Ellison, N. B., "Social network sites:Definition, history and scholarship," Journal of Computer-Mediated Communication, Vol. 13, No. 1, pp. 210- 230, 2007.
  12. Cheung, C. and Lee, M., "Trust in Internet Shopping : Instrument Development and Validation Through Classical and Modern Approaches," Journal of Global information Management, Vol. 9, No. 3, pp. 23-35, 2001.
  13. Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling," In Marcoulides, G. A. (ed.), Modern methods for business research, pp. 295- 336, 1998.
  14. Chin, W. W. and Dibbern, J., "Permutation Based Procedure for Multi-Group PLS Analysis : Results of Tests of Differences on Simulated Data and a Cross of Information System Services between Germany and the USA" in Handbook of Partial Least Squares : Concepts, Methods and Applications in Marketing and Related Fields, V. E. Vinzi, W. W. Chin, J. Henseler, and H. Wang (eds), pp. 171-193, 2010.
  15. Chow, K. and Chan, J., "A Dual-Scheme Approach of Cumulus Parameterization for Simulating the Asian Summer Monsoon," Meteorological Applications, Vol. 17, No. 3, pp. 287-297, 2010.
  16. Christy, C., Matthew, and Lee, K. O., "Trust in Internet Shopping : A Proposed Model and Measurement Instrument," Americas Conference on Information Systems, pp. 681-689, 2000.
  17. CNN, Dominique Van Heerden, "Facebook Birthday Invite Leads to Mayhem in Dutch town, Authorities Say," September 24, 2012, http://edition.cnn.com/2012/09/ 22/world/europe/netherlands-facebook-riot/index.html.
  18. Culnan, M. J., "How did They Get My Name?:An Exploratory Investigations of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, Vol. 17, No. 3, pp. 341-363, 1993. https://doi.org/10.2307/249775
  19. Culnan, M. J. and Bies, R. J., "Consumer privacy : Balancing economic and justice considerations," Journal of SocialIssues, Vol. 59, No. 2, pp. 323-342, 2003.
  20. DeLone, W. H. and McLean, E. R., "Information Systems Success : The Quest for the Dependent Variable," information Systems Research, Vol. 3, No. 1, pp. 60-95, 1992. https://doi.org/10.1287/isre.3.1.60
  21. Donaldson, T. and Dunfee, T. W., "Towards a unified conception of business ethics : Integrative social contracts theory," Academy of Management Review, Vol. 19, No. 2, pp. 252-284, 1994.
  22. Dwyer, C., Hiltz, S. R., and Passerini, K., "Trust and privacy concern within social networking sites : A comparison of Facebook and MySpace," Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado August, 2007.
  23. eDaily, An, H. S., "The Number of Facebook Users Has Exceeded 1 Billion in 8 Years," 2012, http://edaily.co.kr/ news/ewsRead.edy?SCD=JH41&newsid= 01620326599689968&DCD=A00804& OutLnkChk=Y.
  24. eDaily, Yang, H. S., "The Privacy Problems occurred in Twitter Case : Including Account Number, Address, Schedule etc., 2011, http://www.edaily.co.kr/news/ NewsRead.edy?SCD=JE31&newsid= 02059846596118704&DCD=A00503& OutLnkChk=Y.
  25. Fang, Y. H. and Chiu, C. M., "In Justice We Trust : Exploring Knowledge-Sharing Continuance Intentions in Virtual Communities of Practice," Computers in Human Behavior, Vol. 26, No. 2, pp. 235-246, 2010. https://doi.org/10.1016/j.chb.2009.09.005
  26. Filipe B., Markulf K., and Karel W., "Scramble! Your Social Network Data," Privacy Enhancing Technologies, pp. 211-225, 2011.
  27. Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981. https://doi.org/10.2307/3151312
  28. Gatian, A. W., "IS user Satisfaction a Valid Measure of Systems Effectiveness?," Information and Management, Vol. 26, pp. 119-131, 1994. https://doi.org/10.1016/0378-7206(94)90036-1
  29. Gefen, D. and Straub, D. W., "Consumer Trust in B2C e-Commerce and the Importance of Social Presence : Experiments in e-Products and e-Services," Omega, Vol. 32, No. 6, pp. 407-424, 2004. https://doi.org/10.1016/j.omega.2004.01.006
  30. Gefen, D., Karahanna, E., and Straub, D. W., "Trust and TAM in Online Shopping : An Integrated Model," MIS Quarterly, Vol. 27, No. 1, pp. 51-90, 2003.
  31. Ginzberg, M. J., "Early Diagnosis of MIS Implementation Failure : Promising Results and Unanswered Questions," Management Science, Vol. 27, No. 4, pp. 459-478, 1981. https://doi.org/10.1287/mnsc.27.4.459
  32. Greenfield Online, "Online Marketing Research Conducted on Behalf of Better Business Bureau," Cybershoppers Research Report #13197, http://greenfieldcentral.com, 1998.
  33. Hewett, K. and William, O. B., "Dependence, Trust, and Relational Behavior on the Part of Foreign Subsidiary Marketing Operations Implication for Managing Global Marketing Operations," Journal of Marketing, Vol. 65, pp. 51-66, 2001. https://doi.org/10.1509/jmkg.65.4.51.18380
  34. Hoffman, D. L., Novak, T. P., and Peralta, M. A., "Information Privacy in the Marketspace : Implications for the Commercial Uses of Anonymity on the Web," Information Society, Vol. 15, No. 2, pp. 129-140, 1999. https://doi.org/10.1080/019722499128583
  35. Jarvenpaa, S. L. and Tractinsky, N., "Consumer Trust in an Internet Store : A Cross Cultural Validation," Journal of Computer Mediated Communication, Vol. 5, No. 2, pp. 1-35, 1999.
  36. Joinson, A. N., "Looking at, Looking up or Keeping up with People? Motives and Use of Facebook," In : Proc. CHI. ACM Press, pp. 1027-1036, 2008.
  37. Jun, D. Y., Chun, J. M., and Jung, I. L., "An Efficient Privacy-Preserving Data Sharing Scheme in Social Network," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 447-461, 2012.
  38. Jung, S. I., Kim, D. M., and Jung, I. L., "Efficient Hop-based Access Control for Private Social Networks," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 505- 514, 2012.
  39. Kankanhalli, A., Tan, B. C. Y., and Wei, K. K., "Contributing Knowledge to Electronic Knowledge Repositories : an Empirical Investigation," MIS Quarterly, Vol. 29, No. 1, pp. 113-143, 2005.
  40. Kim, S. S. and Son, J. Y., "Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and Its Empirical Test in the Context of Online Services," MIS Quarterly, Vol. 33, No. 1, pp. 49-70, 2009.
  41. Kim, H. S., "A Study on the Possibility of Development ofSocial Media Literacies Using Facebook," Korean Journal of the Learning Sciences, Vol. 6, No. 2, pp. 20-38, 2012.
  42. Kim, J. H. and Lee, H. H., "Implementation of Privacy Protection Policy Language and Module For Social Network Services," Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 53-63, 2011,
  43. Kim, J. S., Kim, K. Y., and Na, K. S., "The Effect of Perceived Privacy Concern on B2C Mall Usage Intention," 2004 Conference of Korean Society of Manage Information Systems, Paper, Seoul, pp. 380- 390, 2004.
  44. Kim, M. J. and Choi, Y. G., "The Role of Twitter on Online and Offline Relationship Formation," Korean Journal of Broadcasting and Telecommunication Studies, Vol. 26, No. 1, pp. 43-82, 2012.
  45. Kim, Y. J., "The Motivation Factors of Relationship Management in SNS : Twitter and Metoday Case," Disertation of Master Degree, Hongik University, 2010.
  46. Kinney, W., "Information Quality Assurance and Internal Control for Management Decision," McGraw-Hill Education, 2000.
  47. Korean Communication Agency, "The Diffusion of SNS(Social Network Service)," 2012.
  48. Koufaris, M., "Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior," Information Systems Research, Vol. 13, No. 2, pp. 205-223, 2002. https://doi.org/10.1287/isre.13.2.205.83
  49. Koufaris, M. and Hampton-Sosa, W., "The Development of Initial Trust in an Online Company by New Customers," Information and Management, Vol. 41, pp. 377-397, 2004. https://doi.org/10.1016/j.im.2003.08.004
  50. Laudon, K. and Laudon, J., "The Essentials of Business Information Systems," 12/E, Prentice Hall, 2012.
  51. Ma, M. and Agawal, R., "Through a Glass Darkly : Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities," Information Systems Research, Vol. 18, No. 1, pp. 42-67, 2007. https://doi.org/10.1287/isre.1070.0113
  52. Malhotra, N. K., Kim, S. S., and Agarwal, J., "Internet Users' Information Privacy Concerns(IUIPC):The Construct, the Scale, and a Causal Model," Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004. https://doi.org/10.1287/isre.1040.0032
  53. Mayer, R. C., Davis, J. H., and Schoorman, F. D., "An Integrative Model of Organizational Trust," Academy of Management Journal, Vol. 20, No. 3, pp. 709-734, 1995.
  54. McKnight, D. H., Choundhury, V. and Karmer, C., "Developing and Validating Trust Measures for e-Commerce : An Integrative Typology," Information Systems Research, Vol. 13, No. 3, 2002.
  55. Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A., "Values, Personal Information Privacy Concerns, and Regulatory Approaches," Communications of ACM, Vol. 38, No. 12, pp. 65-74, 1995.
  56. Min, C. H. and Ko, W. S., "The Effect of Mobile Privacy Protection Service on Usability of Mobiling Billing Systems," 2005 Conference of Korean Society of Manage Information Systems, Paper, Seoul, pp. 191-198, 2005.
  57. Miyazaki, A. D. and Fernandez, A., "Consumer perceptions of privacy and security risks for online shopping," The Journal of Consumer Affairs, Vol. 35, No. 1, pp. 27-44, 2001. https://doi.org/10.1111/j.1745-6606.2001.tb00101.x
  58. Nicolaou, A. I. and McKnight, D. H., "Perceived Information Quality in Data Exchanges : Effects of Risk, Trust, and Intention to Use," Information Systems Research, Vol. 17, No. 4, pp. 332-351, 2006. https://doi.org/10.1287/isre.1060.0103
  59. Nunnally, J. C. and Bernstein, I. H., "Psychometric Theory" (3rd ed.), 1994.
  60. Oliver, R., "A Conceptual Model of Service Quality and Service Satisfaction : Compatible Goals, Different Concept," Advances in Service Marketing and Management, 1993.
  61. Olmo, J. M. C. and Jamilena, D. M. F., "Regression lineal," In Martinez, T. L. (coord.), T cnicas de an lisis de datos eninvestigaci n de mercados, pp. 247-280, 2008.
  62. Park, C. H. and Kim, Y. G., "Identifying Key Factors Affecting Consumer Purchase Behavior in an Online Shopping Context," International Journal of Retail and Distribution Management, Vol. 31, pp. 16-29, 2003. https://doi.org/10.1108/09590550310457818
  63. Park, Y. S., "Who Controls the User's Privacy on Social Networking Sites," Journal of Industrial Property, Vol. 37, pp. 337-375, 2012.
  64. Pavlou, P. A. and Gefen, D., "Building Effective Online Marketplaces with Institution- Based Trust," Information Systems Research, Vol. 15, No. 1, pp. 37-59, 2004. https://doi.org/10.1287/isre.1040.0015
  65. Warren, S. D. and Brandeis, L. D., "The Right to Privacy," Harvard Law Review, Vol. IV, No. 5, pp. 193-220, 1890.
  66. Sandhu, R. S. and Samarati, P., "Access Control : Principles and Practice," IEEE Communications Magazine, pp. 40-48, 1994.
  67. Son, J. Y. and Kim, S. S., "Internet Users' Information Privacy-Protective Responses : A Taxonomy and A Nomological Model, MIS Quarterly, Vol. 32, No. 3, pp. 503-529, 2008.
  68. Stewart, K. L., "Trust Transfer on the World Wide Web," Organization Science, Vol. 14, No. 1, pp. 5-17, 2003. https://doi.org/10.1287/orsc.14.1.5.12810
  69. Stutzman, F., "An Evaluation of Identity- Sharing Behavior in Social Network Communities," International Digital and Media Arts Journal, Vol. 3, No. 1, pp. 10-18, 2006.
  70. Suh, B. M. and Han, I. G., "The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce, International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 135-161, 2003.
  71. Teeni, D., "Review : ACognitive-Affective Model of Organizational Communication For Designing IT," MIS Quarterly, Vol. 25, No. 2, pp. 251-312, 2001. https://doi.org/10.2307/3250931
  72. Wang, Y. D. and Emurian, H. H., "An Overview of Online Trust : Concepts, Elements, and Implications," Computers in Human Behavior, Vol. 21, No. 1, pp. 105-125, 2005. https://doi.org/10.1016/j.chb.2003.11.008
  73. Wasko, M. M. and Faraj, S., "Why Should I share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice," MIS Quarterly, Vol. 29, No. 1, pp. 35-57, 2005.
  74. Werts, C. E., Linn, R. L., and Joreskog. K. G., "Intraclass Reliability Estimates : Testing Structural Assumptions," Educational and Psychological Measurement, Vol. 34, pp. 25-33, 1973.
  75. Westbrook, R. A. and Reilly, M. D., "Value-Percept Disparity : An Alternative to the Disconfirmation of Expectations Theory of Cons user Satisfaction," Advances in Consumer Research, Vol. 10, pp. 256-261, 1983.
  76. Westin, A. F., "Privacy and Freedom," Athenaum, New York, 1967.
  77. Wiemann, J. M., "Explication and Test of a Model of Communicative Competence," Human Communication Research, Vol. 3, pp. 195-213, 1977. https://doi.org/10.1111/j.1468-2958.1977.tb00518.x
  78. Wold, H., "Systems Under Indirect Observation Using PLS, in A Second Generation of Multivariate Analysis," C. Fornell (Ed.), Praeger, New York, pp. 325-347, 1982.
  79. Yoo, I., Shin, J. S., Lee, K. K., and Choi, H. L., "Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users," Journal of Information Technology Applications and Management, Vol. 25, No. 4, pp. 37-59, 2008.

Cited by

  1. 고객정보 식별자 표시제한으로 인한 업무영향에 관한 연구 - 국내 증권 업무를 중심으로 - vol.22, pp.4, 2013, https://doi.org/10.5859/kais.2013.22.4.49