DOI QR코드

DOI QR Code

The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users

개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로

  • Received : 2016.04.11
  • Accepted : 2016.05.14
  • Published : 2016.05.31

Abstract

As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.

대부분의 웹 사이트에서는 법을 준수하기 위해 정보주체의 개인정보 수집에 동의를 구하는 이용약관이나 개인정보 취급방침(이하 '취급방침')을 마련하고 있다. 국내 온라인 및 모바일 서비스에서 이용자로부터 수집하는 개인정보의 항목을 명시하고자 마련한 취급방침을 대부분의 이용자는 읽지도 않고 그냥 넘기는 등 이용자 관점에서 인지하지 못하는 경우가 많다. 보다 구체적으로 취급방침을 확인했을 때 이용자가 제공하는 개인정보의 인지 및 서비스 이용에 어떤 영향이 있는지를 살펴보고자 카카오톡 이용자를 중심으로 실험하였다. 332명의 실험 참여 인원을 구성해 취급방침에 대해 기존 행동을 유지하는 그룹과 Display를 확인하여 내용을 인지하는 그룹을 구성해 개인 프라이버시 민감도의 차이를 고려하여 개인정보보호 행동의 차이를 분석하여 시사한다. 본 연구에서는 민감군과 무관심군으로 나누었을 때 취급방침 인지로 나타나는 보호행동을 제시하고 서비스 제공자의 정책 실현을 위한 가이드라인을 제시한 점에서 그 의의가 있다.

Keywords

References

  1. Ajzen, I., "Constructing a TPB questionnaire: Conceptual and methodological considerations," 2002.
  2. Baek, S. I. and Choi, D. S., "Exploring User Attitude to Information Privacy," The Journal of Society for e-Business Studies, Vol. 20, No. 1, pp. 45-59, 2015. https://doi.org/10.7838/jsebs.2015.20.1.045
  3. Boss, S. R. et al., "What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors," MIS Quarterly, Vol. 39, No. 4, pp. 837-864, 2015. https://doi.org/10.25300/MISQ/2015/39.4.5
  4. Buchanan, T. et al., "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American Society for Information Science and Technology, Vol. 58, No. 2, pp. 157-165, 2007. https://doi.org/10.1002/asi.20459
  5. Culnan, M. J. and Robert, J. B., "Consumer privacy: Balancing economic and justice considerations," Journal of social issues, Vol. 59, No. 2, pp. 323-342, 2003. https://doi.org/10.1111/1540-4560.00067
  6. Hoffman, D. L., T. P. Novak, and M. A. Peralta, "Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web," The Information Society, Vol. 15, No. 2, pp. 129-139, 1999. https://doi.org/10.1080/019722499128583
  7. Interactive, H., "Privacy on and off the Internet: What consumers want," Privacy and American Business, pp. 1-127, 2002.
  8. Jacoby, J., Speller, D. E., and Kohn, C. A., "Brand choice behavior as a function of information load," Journal of Marketing Research, Vol. 11, No. 1, pp. 63-69, 1974. https://doi.org/10.2307/3150994
  9. Jeon, G.-G., "Development of a multidimensional coping scale," Korean Journal of Clinical Psychology, Vol. 13, No. 1, pp. 114-135, 1994.
  10. Joinson, A. N. et al. "Watching me, watching you: privacy attitudes and reactions to identity card implementation scenarios in the United Kingdom," Journal of Information Science, Vol. 32, No. 4, pp. 334-343, 2006. https://doi.org/10.1177/0165551506064902
  11. Kakao Corp., 2015 3rd Investor Relations, 2015.
  12. Kelley, P. G. et al., "A nutrition label for privacy," Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, No. 4, 2009.
  13. Kenneth, B., Data Surveillance Bill, 1969.
  14. Kim, J.-J. and Kweon, E.-H., "A Study on the Therapists' Protective Actions of Medical Information Privacy-With a focus on physical and occupational therapists," The Journal of the Korea institute of electronic communication sciences, Vol. 7, No. 2, pp. 447-455, 2012. https://doi.org/10.13067/JKIECS.2012.7.2.447
  15. Kim, M., "A Study on Protecting Patients' Privacy of Obstetric and Gynecologic Nurses," Korean Journal of Women Health Nursing, Vol. 18, No. 4, pp. 268-278, 2012. https://doi.org/10.4069/kjwhn.2012.18.4.268
  16. KISA, "A Study of Reform of Personal Information Law System by ICT Environment Change," 2012.
  17. Korea Communications Commission, "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.," 2001.
  18. Korea Internet Law Association, "A Legislative Research of Privacy and Effective Use of Personal Information," pp. 65-153, 2009.
  19. Lee, Z.-K., Choi, H.-J., and Choi, S.-A., How Service Usefulness and Privacy Concern Influence on Service Acceptance, The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 37-51, 2007.
  20. Li, T. and Slee, T., "The Effects of Information Privacy Concerns on Digitizing Personal Health Records," Journal of the Association for Information Science and Technology, Vol. 65, No. 8, pp. 1541-1554, 2014. https://doi.org/10.1002/asi.23068
  21. Malhotra, N. K., Kim, S. S., and Agarwal, J., "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model," Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004. https://doi.org/10.1287/isre.1040.0032
  22. McDonald, A. M. and Cranor, L. F., "Cost of reading privacy policies, the," ISJLP, No. 4, p. 543, 2008.
  23. Milne, G. R. and Culnan, M. J., "Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices," Journal of Interactive Marketing, Vol. 18, No. 3, pp. 15-29, 2004. https://doi.org/10.1002/dir.20009
  24. Milne, G. R., "How well do consumers protect themselves from identity theft?," Journal of Consumer Affairs, Vol. 37, No. 2, pp. 388-402, 2003. https://doi.org/10.1111/j.1745-6606.2003.tb00459.x
  25. MOPAS, "Personal Information Protection Act Guidelines," 2011.
  26. National Human Rights Commission of Korea, "Report of Information and Communication Technologies(ICTs) and Human Rights," 2013.
  27. Pavlou, P. A. and Fygenson, M., "Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior," MIS quarterly, Vol. 30, No. 1, pp. 115-143, 2006. https://doi.org/10.2307/25148720
  28. Personal Information Protection Commission, "2015 Annual Report on Personal Information Protection," 2015.
  29. Personal Information Protection Commission, "A study on improvement and analysis of change since enforcement personal information protection act," 2012.
  30. Phelps, J., Nowak, G., and Ferrell, E., "Privacy concerns and consumer willingness to provide personal information," Journal of Public Policy and Marketing, Vol. 19, No. 1, pp. 27-41, 2000. https://doi.org/10.1509/jppm.19.1.27.16941
  31. Schroder, H. M., Driver, M. J., and Siegfried S., Human information processing: Individuals and groups functioning in complex social situations, New York: Holt, Rinehart and Winston, 1967.
  32. Smith, H. J., Milberg, S. J., and Burke, S. J., "Information privacy: measuring individuals' concerns about organizational practices," MIS quarterly, Vol. 20, No. 2, pp. 167-196, 1996. https://doi.org/10.2307/249477
  33. Smith, H. J., Dinev, T., and Xu, H., "Information privacy research: an interdisciplinary review," MIS quarterly, Vol. 35, No. 4, pp. 989-1016, 2011. https://doi.org/10.2307/41409970
  34. Taylor, D. G., Davis, D. F., and Jillapalli, R., "Privacy concern and online personalization: The moderating effects of information control and compensation," Electronic Commerce Research, Vol. 9, No. 3, pp. 203-223, 2009. https://doi.org/10.1007/s10660-009-9036-2
  35. Taylor, H., "Most people are 'privacy pragmatists' who, while concerned about privacy, will sometimes trade it off for other benefits," The Harris Poll, Vol. 17, No. 19, p. 44, 2003.
  36. Vail, M. W., Earp, J. B., and Anton, A. I., "An empirical study of consumer perceptions and comprehension of web site privacy policies," Engineering Management, IEEE Transactions on, Vol. 55, No. 3, pp. 442-454, 2008. https://doi.org/10.1109/TEM.2008.922634
  37. Worthy, M., Gary, A. L., and Kahn, G. M., "Self-disclosure as an exchange process," Journal of Personality and Social Psychology, Vol. 13, No. 1, p. 59, 1969. https://doi.org/10.1037/h0027990