DOI QR코드

DOI QR Code

Exploring User Attitude to Information Privacy

개인정보 노출에 대한 인터넷 사용자의 태도에 관한 연구

  • Received : 2014.10.27
  • Accepted : 2014.12.09
  • Published : 2015.02.28

Abstract

As many companies have been interested in big data, they have invested a lot of resources to get more customer data. Some companies try to trade the data illegally. In order to collect more customer data, companies provide various incentive programs to customers. However, their results are normally much less than their expectations. This study focuses on exploring the relative importance of the factors which influence customer attitudes to providing his/her personal information. This study conducts a conjoint analysis to assess trade-offs among the five influential factors-monetary reward, concern for data collection, concern for secondary use, concern for unauthorized use, and concern for errors. This study finds that the customer attitude to providing personal information is most influenced by the concern for secondary use. Furthermore, it shows that there are some differences between the light internet user group and the heavy internet user group in the relative importances of these factors. The monetary rewards appeal to the heavy internet users, rather than the light internet users.

최근 빅데이터에 대한 관심이 높아지면서 많은 기업들은 소비자의 개인정보를 수집하는데 많은 노력과 자원을 투자하고 있다. 극기야 소비자의 정보를 긴급히 필요로 하는 일부 기업들은 불법으로 정보를 거래하는 사건도 발생하고 있다. 기업들은 더 많은 소비자 정보를 수집하기 위하여 다양한 인센티브를 소비자에게 제공하고 있으나, 그 효과가 만족할 만한 수준에 이르지 못하고 있는 실정이다. 이에 본 연구는 실증적인 조사를 통하여 소비자의 개인정보 제공 의사에 영향을 미치는 요인이 어떤 것이 있는지를 탐색하여 보았다. 본 연구에서는 기존의 개인정보 노출에 대한 염려를 측정하기 위하여 개발되어진 Concern for Information Privacy (CFIP) 모델을 기반으로 소비자의 개인정보 제공 의사에 영향을 미치는 주요 요인을 정의하였다. 조사 결과, 제 3자의 허가되지 않은 2차적인 정보사용(Secodndary Use)에 대한 염려가 가장 크게 개인정보 제공 의사에 영향을 미치는 것으로 조사되었다. 그 뒤를 이어 경제적인 보상 (Monetary Rewards)과 부정확한 정보 (Error)에 대한 염려가 두 번째와 세 번째로 주요한 영향을 미치는 요인으로 조사되었다. 그리고 소비자의 인터넷 사용시간에 따라서 영향을 미치는 요인이 차이가 있음도 발견하였다. 또한 인터넷 사용 시간이 하루에 3시간 이상인 'Heavy User' 그룹에서는 3시간 미만인 'Light User' 그룹에 비하여 상대적으로 경제적 보상을 주요한 요인으로 꼽았다.

Keywords

References

  1. Ackermann, T., Widjaja, T., Benlian, A., and Buxmann, P., "Perceived IT Security Risks of Cloud Computing : Conceptualization and Scale Development," Proceedings of International Conference of Information Systems, 2012.
  2. Belanger, F. and Crossler, R. E., "Privacy in the digital age : a review of information privacy research in information systems," MIS quarterly, Vol. 35, No. 4, pp. 1017-1042, 2011. https://doi.org/10.2307/41409971
  3. Culnan, M. J., "How did they get my name? : An exploratory investigation of consumer attitudes toward secondary information use," MIS Quarterly, Vol. 17, No. 2, pp. 341-363, 1993. https://doi.org/10.2307/249775
  4. Culnan, M. J. and Bies, R. J., "Consumer privacy : Balancing economic and justice considerations," Journal of Social Issues, Vol. 59, No. 2, pp. 323-342, 2003. https://doi.org/10.1111/1540-4560.00067
  5. Esrock, S. L. and Ferre, J. P., "A Dichotomy of Privacy : Personal and Professional Attitudes of Marketers," Business and Society Review, Vol. 104, No. 1, pp. 107-120, 1999. https://doi.org/10.1111/0045-3609.00042
  6. Green, P. E., Carroll, D., and Goldberg, S. M., "A general approach to product design optimization via conjoint analysis," Journal of Marketing, Vol. 45, pp. 17-37, 1981. https://doi.org/10.2307/1251539
  7. Green, P. E. and Rao, V., "Conjoint measurement for quantifying judgemental data," Journal of Marketing Research, Vol. 8, pp. 355-363, 1971. https://doi.org/10.2307/3149575
  8. Green, P. E. and Srinivasan, V., "Conjoint analysis in consumer research : issues and outlook," Journal of Consumer Research, Vol. 5, pp. 103-123, 1978. https://doi.org/10.1086/208721
  9. Green, P. E. and Srinivasan, V., "Conjoint analysis in marketing : new developments with implications for research and practice," Journal of Marketing, Vol. 54, pp. 3-19, 1990. https://doi.org/10.2307/1251756
  10. Hann, I., Hui, K., Lee, T., and Png, I., "Online Information Privacy : Measuring the Cost-Benefit Trade-Off," Proceedings of International Conference on Information Systems, 2002.
  11. Hoadley, C. M., Xu, H., Lee, J. J., and Rosson, M., "Privacy as information access and illusory control : The case of the Facebook News Feed privacy outcry," Electronic Commerce Research and Applications, Vol. 9, No. 1, pp. 50-60, 2010. https://doi.org/10.1016/j.elerap.2009.05.001
  12. Ji, H. and Cho, W., "Attribute Analysis for Cellular Phone using Conjoint Analysis," Journal of the Korean Data and Information Science Society, Vol. 20, No. 4, pp. 695-703, 2009.
  13. Krasnova, H., Hildebrand, T., and Guenther, O., "Investigating the value of privacy in online social networks : conjoint analysis," Proceedings of International Conference on Information Systems, 2002.
  14. Lee, J., Lee, M., and Choi, H., "Conjoint Analysis of Online Content : A Case of Video on Demand Service," The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 89-102, 2007.
  15. Lee, Z., Choi, H., and Choi, S., "Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance," The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 37-51, 2007.
  16. Li, T. and Slee, T., "The Effects of Information Privacy Concerns on Digitizing Personal Health Records," Journal of the Association for Information Science and Technology, Vol. 65, No. 8, pp. 1541-1554, 2014. https://doi.org/10.1002/asi.23068
  17. Lim, J., Park, H., and Kang, M., Marketing Research Methodology, Bobmunsa, Seoul, Korea, 2001.
  18. Malhotra, N. K., Kim, S. S., and Agarwal, J., "Internet users' information privacy concerns(IUIPC) : the construct, the scale, and a causal model," Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004. https://doi.org/10.1287/isre.1040.0032
  19. Milberg, S. J., Burke, S. J., and Smith, H. J., and Kallman, E. A., "Values, personal information privacy concerns, and regulatory approaches," Communications of ACM, Vol. 38, No. 12, pp. 65-74, 1995.
  20. Phelps, J., Nowak, G., and Ferrell, E., "Privacy Concerns and Consumer Willingness to Provide Personal Information," Journal of Public Policy and Marketing, Vol. 19, No. 1, pp. 27-41, 2000. https://doi.org/10.1509/jppm.19.1.27.16941
  21. Ratcliffe, J., "The use of conjoint analysis to elicit willingness-to-pay values," International Journal of Technology Assessment in Health Care, Vol. 16, No. 1, pp. 270-290, 2000. https://doi.org/10.1017/S0266462300161227
  22. Smith, H. J., Milberg, J. S., and Burke, S. J., "Information Privacy : Measuring Individuals' Concerns About Organizational Practices," MIS Quarterly, Vol. 20, No. 2, pp. 167-196, 1996. https://doi.org/10.2307/249477
  23. Stewart, K. and Segars, A. H., "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research, Vol. 13, No. 1, pp. 36-49, 2002. https://doi.org/10.1287/isre.13.1.36.97
  24. Westin, A., "Opinion Surveys : What Consumers Have To Say About Information Privacy," Testimony before U. S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Commerce, Trade and Consumer Protection, May 8, 2001.

Cited by

  1. The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users vol.21, pp.2, 2016, https://doi.org/10.7838/jsebs.2016.21.2.135
  2. A Two-Phase On-Device Analysis for Gender Prediction of Mobile Users Using Discriminative and Popular Wordsets vol.21, pp.1, 2016, https://doi.org/10.7838/jsebs.2016.21.1.065
  3. A Study on Method for User Gender Prediction Using Multi-Modal Smart Device Log Data vol.21, pp.1, 2016, https://doi.org/10.7838/jsebs.2016.21.1.147
  4. An Empirical Research on Information Privacy Risks and Policy Model in the Big data Era vol.21, pp.1, 2016, https://doi.org/10.7838/jsebs.2016.21.1.131