DOI QR코드

DOI QR Code

An Empirical Research on Information Privacy Concern in the IoT Era

사물인터넷 시대의 정보 프라이버시 염려에 대한 실증 연구

  • Park, Cheon-Woong (Dept. of Data Distribution & Business, Korea Database Agency) ;
  • Kim, Jun-Woo (Dept. of Business Administration, Incheon National University)
  • 박천웅 (한국데이터베이스진흥원 유통사업실) ;
  • 김준우 (인천대학교 경영학과)
  • Received : 2015.11.24
  • Accepted : 2016.02.20
  • Published : 2016.02.28

Abstract

This study built the theoretical frameworks for empirical analysis based on the analysis of the relationship among the concepts of risk of information privacy, the experience of information privacy, the policy of information privacy and information control via the provision intention studies. Also, in order to analyze the relationship among the factors such as the risk of information privacy, intention to offer the personal information, this study investigated the concepts of information privacy and studies related with the privacy, established a research model about the information privacy. Followings are the results of this study: First, the information privacy risk, information privacy experience, information privacy policy, and information control have positive effects upon the information privacy concern. Second, the information privacy concern has the negative effects upon the provision intention of personal information.

사물인터넷(IoT), 빅데이터 등 새로운 IT 환경시대가 도래한 지금 우리는 법 테두리 안에서 개인의 정보가 포함되지 않은 정보를 제공하더라도, 다양한 정보와 결합하여 개인 식별이 가능한 시대에 살고 있다. 이로 인하여, 개인정보 피해가 발생할 수 있으며, 또한 2차 피해로 발전 될 수 있다. 특히, IoT를 통해 수집되는 데이터에는 단기간에는 개인을 식별할 수 없지만, 시간이 지남에 따라 축적된 데이터를 기반으로 특정 개인을 인식 할 수 있는 위험성이 존재한다. 이에 따라 본 연구는 IoT 시대에 개인정보 제공에 대한 염려를 낮추는데 영향을 주는 요인들을 도출하여 실제로 개인정보 제공의도와 연결될 수 있도록 하기위해 실증적으로 분석하여 검증하고자 하였다. 이를 바탕으로 정보 프라이버시가 개인정보 제공의도에 어떠한 영향을 미치는지에 대한 영향도를 분석하였다. 연구 결과, 정보프라이버시 위험이 정보 프라이버시 염려에 가장 큰 설명력을 보였으며, 정보 프라이버시 정책, 정보 통제 그리고 침해 경험 순으로 설명력을 보였다. 따라서 소비자에게 정보 프라이버시 염려를 낮추는 정책이나 제도개선 및 기술 개발을 통해 안전한 환경을 제공하면 개인정보를 제공할 것이다.

Keywords

References

  1. Personal Information Protection Commision, "Research of personal information protection measures due to the widespread use of smart devices", 2014.
  2. Cheon-Woong Park, Jun-Woo Kim. An Empirical Research on Information Privacy and Trust Model in the Convergence Era, Journal of Digital Convergence, Vol. 13, No. 4, pp.219-225, 2015. https://doi.org/10.14400/JDC.2015.13.4.219
  3. Gartner, "Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020", (http://www.gartner.com/newsroom/id/2636073)
  4. Min Kyung Sik, Park Hee Woon, Global Trends discussion on privacy in the IoT environment, Institute for Information & communications Technology Promotion, pp. 12-23, 2015. 06.17.
  5. O. Garcia-Morchon, D. Kuptsov, A. Gurtov, K. Wehrle, Cooperative security in distributed networks, Comp. Commun. Vol. 36 No. 12, pp. 1284-1297, 2013. https://doi.org/10.1016/j.comcom.2013.04.007
  6. Na Sung Hyun, Privacy issues in IoT environment, Korea Information Society Development Institute, Premium Report, Vol. 15, No. 06, 2015.
  7. Rodrigo Roman, Jianying Zhou, Javier Lopez. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, Vol. 57, pp. 2266-2279, 2013. https://doi.org/10.1016/j.comnet.2012.12.018
  8. Eleonora Borgia, The Internet of Things vision: Key features, applications and open issues, Computer Communications, Vol. 54, pp. 1-31, 2014. https://doi.org/10.1016/j.comcom.2014.09.008
  9. Son, J. Y. and Kim S. S, Internet Users' Information Privacy - Protective Responses: A Taxonomy and a Nomological Model, MIS Quarterly, Vol. 32, No. 2, pp. 503-529, 2008. https://doi.org/10.2307/25148854
  10. Dinev, T. and Hart, P. Privacy Calculus Model in E-commerce-A Study of Italy and the United States, European Journal of Information Systems, 15, pp.389-402, 2006. https://doi.org/10.1057/palgrave.ejis.3000590
  11. Buchanan, T., Paine, C., Joinson, A. N., Reips, U. D. Development of Measures of Online Privacy Concern and Protection for Use on the Internet, Journal of the American Society for Information Sciences and Technology, Vol. 58, pp.157-165, 2007. https://doi.org/10.1002/asi.20459
  12. Sanghyun Kim, Hyunsun Park. An Analysis of Influence Factors on Privacy Protection Awareness and Protection Behavior and moderating Effect of Privacy Invasion Experience, The Journal of Internet Electronic Commerce Research, Vol. 13, No.4, pp. 79-105, 2013.
  13. Culnan, M. J. How Did They Get My Name? : An Exploratory Investigations of Consumer Attitudes toward Secondary Information Use, MIS Quarterly, Vol. 17, No. 3, pp.341-363, 1993. https://doi.org/10.2307/249775
  14. Smith, H. J., Milberg, S. J., and Burke, S. J. Information Privacy: Measuring Individuals Concerns about Organizational Practices, MIS Quarterly, Vol. 20, No. 6, pp.167-196, 1996. https://doi.org/10.2307/249477
  15. Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet Users Information Privacy Concerns : The Construct, the Scale, and Causal Model, Information System Research, Vol. 15, No. 4, pp.336-355, 2004. https://doi.org/10.1287/isre.1040.0032
  16. Yuan Li. The Impact of Disposition to Privacy, Website Reputation and Website Familiarity on Information Privacy Concerns, Decision Support Systems, Vol. 57, pp.343-354, 2014. https://doi.org/10.1016/j.dss.2013.09.018
  17. Jun-Young Go, Keun-Ho Lee, "SNS disclosure of personal information in M2M environment threats and countermeasures", Journal of the Korea Convergence Society, Vol. 5, No. 1, pp. 29-34, 2014. https://doi.org/10.15207/JKCS.2014.5.1.029
  18. Hyeon-Ho Park, Hee-Ock Nho, Yong-Ho Kim, "The Impact of Perceived IT Threat on Convergence Information System Performance", Journal of the Korea Convergence Society, Vol. 6, No. 3, pp. 65-71, 2015. https://doi.org/10.15207/JKCS.2015.6.3.065