DOI QR코드

DOI QR Code

The Effects of Consumers' Perceived Privacy Control on Perceived Privacy Risk in Location-Based Services

  • Lee, Joohee (Graduate School of Culture Technology Korea Advanced Institute of Science and Technology (KAIST)) ;
  • Kim, Songmi (Graduate School of Culture Technology Korea Advanced Institute of Science and Technology (KAIST)) ;
  • Kim, Wonjoon (Graduate School of Culture Technology Korea Advanced Institute of Science and Technology (KAIST))
  • Received : 2017.01.17
  • Accepted : 2017.02.13
  • Published : 2017.03.28

Abstract

The diffusion of advanced mobile technology has introduced new types of personal information or 'location data'. These new data mean new opportunities for businesses, such as location-based services (LBS), but have resulted in new consumer anxieties regarding disclosure of personal information. This study examines the effects of the consumers' perceived control over "time-andplace" information in location-aware services on their perceived privacy risk. A total of 270 respondents participated in this study. Conditions of perceived privacy control were operationalized over time-and-place information, in a $2{\times}2$ factorial design. Results indicate that the perceived control over time-and-place personal information is a significant predictor of perceived risk, and control assurances over time-and-place information enhances the perception of control, thus alleviating the perceived risk. In addition, the effect is much more significant when time and place were combined.

Keywords

References

  1. N. Aldhafferi, C. Watson, and A.S.M. Sajeev, "Personal information privacy settings of online social networks and their suitability for mobile internet devices," International Journal of Security Privacy and Trust Management, vol. 2, no. 2, 2013, pp. 1-17. https://doi.org/10.5121/ijsptm.2013.2201
  2. D. J. Solove, The Digital Person: Technology and Privacy in the Information Age, New York: New York University Press, 2004.
  3. P. K. Kannan, A. M. Chang, and A. B. Whinston, "Wireless commerce; Marketing issues and possibilities," Proceedings from 34th International Conference on System Sciences, p. 6.
  4. J. Wu and T. Hisa, "Developing E-Business Dynamic Capabilities: An Analysis of E-Commerce Innovation From I-, M-, To U-Commerce," Journal of Organizational Computing and Electronic Commerce, vol. 18, no. 2, 2008, pp. 95-111. https://doi.org/10.1080/10919390701807525
  5. H. Galanxhi-Janaqi and F. Nah, "U-commerce: Emerging Trends and Research Issues," Industrial Management & Data Systems, vol. 104, no. 9, 2004, pp. 744-755. https://doi.org/10.1108/02635570410567739
  6. C. E. Tucker, "The Economics of Advertising and Privacy," International Journal of Industrial Organization, vol. 30, no. 3, 2012, pp. 326-329. https://doi.org/10.1016/j.ijindorg.2011.11.004
  7. R. T. Watson, L. F. Pitt, P. Berthon, and G. M. Zinkhan, "U-Commerce: Expanding the Universe of Marketing," Journal of the Academy of Marketing Science, vol. 30, no. 4, 2002, pp. 333-347. https://doi.org/10.1177/009207002236909
  8. J. Krumm, "Ubiquitous Advertising: The Killer Application for the 21st century," IEEE Pervasive Computing, vol. 10, no. 1, 2011, pp. 66-73. https://doi.org/10.1109/MPRV.2010.21
  9. M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," IEEE Computer, vol. 36, no. 7, 1993, p. 75.
  10. O. Gunther and S. Spiekermann, "RFID and the Perception of Control: The Consumer's View," Communications of the ACM, vol. 48, no. 9, 2005, pp. 73-76. https://doi.org/10.1145/1081992.1082023
  11. M. Johnson, S. Egelman, and S. M. Bellovin, "Facebook and privacy: It's complicated. Proceedings from SOUPS," '12 Proceedings of the eighth Symposium on Usable Privacy and Security, 2012, p. 9.
  12. D. A. Yorke and P. J. Kitchen, "Channel Flickers and Video Speeders," Journal of Advertising Research, vol. 25, no. 2, 1985, pp. 21-25.
  13. H. Li, R. Sarathy, and H. Xu, "The Role of Affect and Cognition on Online Consumers' Decision to Disclose Personal Information to Unfamiliar Online Vendors," Decision Support Systems, vol. 51, no. 3, 2011, pp. 434-445. https://doi.org/10.1016/j.dss.2011.01.017
  14. D. H. Shin, "Ubiquitous Computing Acceptance Model: End User Concern about Security, Privacy and Risk," International Journal of Mobile Communications, vol. 8, no. 2, 2010, pp. 169-186. https://doi.org/10.1504/IJMC.2010.031446
  15. T. Zhou, "The Impact of Privacy Concern on User Adoption of Location-Based Services," Industrial Management & Data Systems, vol. 111, no. 2, 2011, pp. 212-226. https://doi.org/10.1108/02635571111115146
  16. S. Spiekermann, "Perceived control: Scales for privacy in ubiquitous computing," International Conference on User Modeling, 2005.
  17. J. Phelps, G. Nowak, and E. Ferrell, "Privacy Concerns and Consumer Willingness to Provide Personal Information," Journal of Public Policy & Marketing, vol. 19, no. 1, 2000, pp. 27-41. https://doi.org/10.1509/jppm.19.1.27.16941
  18. C. E. Tucker, "Social Networks, Personalized Advertising, and Privacy Controls," Journal of Marketing Research, vol. 51, no. 5, 2014, pp. 546-562. https://doi.org/10.1509/jmr.10.0355
  19. B. Suh and I. Han, "The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce," International Journal of Electronic Commerce, vol. 7, no. 3, 2003, pp. 135-161. https://doi.org/10.1080/10864415.2003.11044270
  20. A. T. Campbell, S. B. Eisenman, N. D. Land, E. Miluzzo, and R. A. Peterson, "People-centric urban sensing (invited paper)," Proceedings from the Second ACM/IEEE International Conference on Wireless Internet, Boston, MA., 2006.
  21. D. Cvrcek, M. Kumpost, V. Matyas, and G. Danezis, "A study on the value of location privacy," Proceedings from Workshop on the Economics of Information Security Series (WEIS 2006) ACM, 2006, pp. 109-118.
  22. I. Junglas and R. Watson, "U-commerce: A conceptual extensions of e-commerce and m-commerce," Proceedings from International Conference on Information Systems, 2003, pp. 667-676.
  23. M. Ohkubo, K. Suzuki, and S. Kinoshita, "RFID privacy issues and technical challenges," Communications of the ACM, vol. 48, 2005.
  24. C. Ververidis and G. C. Polyzos, "Mobile Marketing using a location based service," Proceedings from 7th International Conference on Mobile Business, 2003.
  25. B. Kolmel and S. Alexakis. "Location Based Advertising," Proceedings from The First International Conference on Mobile Business, 2002.
  26. B. Rao and L. Minakakis, "Evolution of Mobile Location-Based Services," Communications of the ACM, vol. 46, no. 12, 2003, 2003, pp. 61-65. https://doi.org/10.1145/953460.953490
  27. T. Dinev and P. Hart, "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, vol. 17, no. 1, 2006, pp. 61-80. https://doi.org/10.1287/isre.1060.0080
  28. N. K. Malhotra, S. S. Kim, and J. Agarwal, "Internet Users' Information Privacy Concerns(IUIPC): The Construct, The Scale, and a Causal Model," Information Systems Research, vol. 15, no. 1, 2004, pp. 336-355. https://doi.org/10.1287/isre.1040.0032
  29. Y. Chen, S. Wu, and X. Jiao, "Risk perception of individual suppliers in e-commerce transactions," Proceedings from SWS '09 1st IEEE Symposium on Web Society, pp. 194-199.
  30. T. Xu and Y. Cai, "Location anonymity in continuous location-based services," Proceedings from 15th International Symposium on Advances in Geographic Information Systems ACM GIS, Article 39.
  31. J. Cas, "Privacy in Pervasive Computing Environments-A Contradiction in Terms?," IEEE Technology and Society Magazine, vol. 24, no. 1, 2005, pp. 24-33. https://doi.org/10.1109/MTAS.2005.1407744
  32. H. Xu, "The effects of self-construal and perceived control on privacy concerns," Proceedings from Twenty Eighth International Conference on Information System, 2007, pp. 1-14.
  33. B. Rossler, Privacies Philosophical Evaluations, Stanford, CA: Stanford University Press, 2004.
  34. E. F. Stone, H. G. Gueutal, D. G. Gardner, and S. McClure, "A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations," Journal of Applied Psychology, vol. 68, no. 3, 1983, pp. 459-468. https://doi.org/10.1037/0021-9010.68.3.459
  35. S. Bellman, E. J. Johnson, S. J., Kobrin, and G. L. Lohse, "International Differences in Information Privacy Concerns: A Global Survey of Consumers," Information Society, vol. 20, no. 5, 2004, pp. 313-324. https://doi.org/10.1080/01972240490507956
  36. L. Brandimarte, A. Acquisti, and G. Loewenstein, "Misplaced confidences: Privacy and the control paradox," Proceedings from Workshop on the Economics of Information Security (WEIS), vol. 4, no. 3, 2013, p. 340.
  37. M. Benisch, P. G. Kelley, N. Sadeh, and L. F. Cranor, "Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs," Personal and Ubiquitous Computing, vol. 15, no. 7, 2011, pp. 679-694. https://doi.org/10.1007/s00779-010-0346-0
  38. S. Lederer, J. Mankoff, and A. K. Dey, "Who wants to know what when? Privacy preference determinants in ubiquitous computing," Chicago: ACM, pp. 724-725.
  39. P. Slovic, The perception of risk. Risk, society, and policy series, London, England: Earthscan Publications.
  40. J. A. Swaney, "Social economics and Risk Analysis," Review of Social Economy, vol. 53, no. 4, 1995, pp. 575-594. https://doi.org/10.1080/00346769500000019
  41. V. Grag and J. Camp, "End user perception of online risk under uncertainty," Proceedings from 45th Hawaii International Conference on System Science, 2012.
  42. H. Xu and H. H. Teo, "Alleviating consumers' privacy concerns in location based services: A psychological control perspective," Proceedings from International Conference on Information Systems, 2004.
  43. G. Danezis, S. Lewis, and R. Anderson, "How much is location privacy worth?," Proceedings from Fourth Workshop on the Economics of Information Security Series (WEIS 2005) ACM, 2005.
  44. K. B. Sheehan and M. G. Hoy, "Dimensions of Privacy Concern among Online Consumers," Journal of Public Policy & Marketing, vol. 19, no. 1, 2000, pp. 62-73. https://doi.org/10.1509/jppm.19.1.62.16949
  45. M. J. Culnan and P. K. Armstrong, "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, vol. 10, no. 1, 1999, pp. 104-115. https://doi.org/10.1287/orsc.10.1.104
  46. M. J. Culnan, "How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, vol. 17, no. 3, 1993, pp. 341-364. https://doi.org/10.2307/249775