DOI QR코드

DOI QR Code

A Study of Relationship between Dataveillance and Online Privacy Protection Behavior under the Advent of Big Data Environment

빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구

  • 박민정 (이화여자대학교 경영학과) ;
  • 채상미 (이화여자대학교 경영학과)
  • Received : 2017.05.24
  • Published : 2017.09.30

Abstract

Big Data environment is established by accumulating vast amounts of data as users continuously share and provide personal information in online environment. Accordingly, the more data is accumulated in online environment, the more data is accessible easily by third parties without users' permissions compared to the past. By utilizing strategies based on data-driven, firms recently make it possible to predict customers' preferences and consuming propensity relatively exactly. This Big Data environment, on the other hand, establishes 'Dataveillance' which means anybody can watch or control users' behaviors by using data itself which is stored online. Main objective of this study is to identify the relationship between Dataveillance and users' online privacy protection behaviors. To achieve it, we first investigate perceived online service efficiency; loss of control on privacy; offline surveillance; necessity of regulation influences on users' perceived threats which is generated by Dataveillance.

Keywords

References

  1. 오길영 2015. "빅데이터 환경에서의 정보보호 담론에 대한 비판," 헌법학연구, 21, pp. 37-69.
  2. 윤상오 2009. "전자정부 구현을 위한개인정보보호 정책에 관한 연구: 정부신뢰 구축의 관점에서," 한국지역정보화학회지, (12:2).
  3. 최대선, 김석현, 조진만, 진승헌, 조현숙 2013. "소셜네트워크서비스 개인정보 노출 실태 분석," 정보보호학회논문지, (23:5), pp. 977-983. https://doi.org/10.13089/JKIISC.2013.23.5.977
  4. 최보미, 박민정, 채상미 2015. "개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구," Information Systems Review, (17:3), pp. 77-94. https://doi.org/10.14329/isr.2015.17.3.077
  5. Ashworth, L., and Free, C. 2006. "Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns," Journal of Business Ethics, (67:2), pp. 107-123. https://doi.org/10.1007/s10551-006-9007-7
  6. Baek, Y. M., Kim, E. M., and Bae, Y. 2014. "My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns," Computers in Human Behavior, 31, pp. 48-56. https://doi.org/10.1016/j.chb.2013.10.010
  7. Bettini, C., Wang, X. S., and Jajodia, S. 2005. August. "Protecting privacy against locationbased personal identification," In Workshop on Secure Data Management (pp. 185-199). Springer Berlin Heidelberg.
  8. Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. 2007. "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American Society for Information Science and Technology, (58:2), pp.157-165. https://doi.org/10.1002/asi.20459
  9. Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., and Upadhyaya, S. J. 2009. "Internet and online information privacy: An exploratory study of preteens and early teens," IEEE Transactions on Professional Communication, (52:2), pp.167-182. https://doi.org/10.1109/TPC.2009.2017985
  10. Chellappa, R. K., and Pavlou, P. A. 2002. "Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, (15:5/6), pp.358-368. https://doi.org/10.1108/09576050210447046
  11. Chen, H., Beaudoin, C. E., and Hong, T. 2017. "Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors," Computers in Human Behavior .
  12. Chen, K., and Rea Jr, A. I. 2004. "Protecting personal information online: A survey of user privacy concerns and control techniques," Journal of Computer Information Systems, (44:4), pp. 85-92.
  13. Clarke, R. 2009. "Privacy impact assessment: Its origins and development," Computer law & security review, (25:2), pp. 123-135. https://doi.org/10.1016/j.clsr.2009.02.002
  14. Clarke, R. 1997. "Introduction to dataveillance and information privacy, and definitions of terms"
  15. Clarke, R. 1994. "The digital persona and its application to data surveillance," The information society, (10:2), pp. 77-92. https://doi.org/10.1080/01972243.1994.9960160
  16. Clarke, R. 1993. "Profiling: A hidden challenge to the regulation of data surveillance," JL & Inf. Sci., 4, 403.
  17. Clarke, R. 1988. "Information technology and dataveillance," Communications of the ACM, (31:5), pp. 498-512 https://doi.org/10.1145/42411.42413
  18. Cohen, J. 1992 "Statistical power analysis", Current directions in psychological science, pp.98-101
  19. Degli Esposti, S. 2014. "When big data meets dataveillance: The hidden side of analytics," Surveillance & Society, (12:2), 209. https://doi.org/10.24908/ss.v12i2.5113
  20. Culnan, M.J. 1993. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, (17:3), pp. 341-363. https://doi.org/10.2307/249775
  21. Dinev, T., and Hart, P. 2004. "Internet privacy concerns and their antecedents-measurement validity and a regression model," Behaviour & Information Technology, (23:6), pp. 413-422. https://doi.org/10.1080/01449290410001715723
  22. Eberle, E. J. 2001. "The right to information Self-Determination," Utah L. Rev., 965.
  23. Ferraris, V., Bosco, F., Cafiero, G., D'Angelo, E., and Suloyeva, Y. 2013. "Defining Profiling"
  24. Frey, D. 1986. "Recent research on selective exposure to information," Advances in experimental social psychology, 19, pp. 41-80.
  25. Gilliland, S.W. 1993. "The perceived fairness of selection systems: An Organizational Justice Perspective," Academy of Management Review, (18:4), pp. 694-734. https://doi.org/10.5465/amr.1993.9402210155
  26. Gross, R., and Acquisti, A. 2005, November. "Information revelation and privacy in online social networks," In Proceedings of the 2005 ACM workshop on Privacy in the electronic society pp. 71-80.
  27. Hasan, H., and Hyland, P. 2001. "Using OLAP and multidimensional data for decision making," IT Professional, (3:5), pp. 44-50. https://doi.org/10.1109/6294.952980
  28. Heider, F. 1946. "Attitudes and cognitive organization," The Journal of psychology, (21:1), pp. 107-112. https://doi.org/10.1080/00223980.1946.9917275
  29. Herath, T., and Rao, H. R. 2009. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems, (18:2), pp.106-125. https://doi.org/10.1057/ejis.2009.6
  30. Hui, K.L. Teo, H.H. and Lee, S.Y.T. 2007. "The Value of Privacy Assurance: An Exploratory Field Experiment," MIS Quarterly, (31:1), pp. 19-33. https://doi.org/10.2307/25148779
  31. Ifinedo, P. 2012. "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory," Computers & Security, (31:1), pp. 83-95. https://doi.org/10.1016/j.cose.2011.10.007
  32. Kang, J., Shilton, K., Estrin, D., and Burke, J. 2011. "Self-surveillance privacy," Iowa L. Rev., 97, pp.809.
  33. Kang, J. 1998. "Information privacy in cyberspace transactions," Stanford Law Review, pp. 1193-1294.
  34. Ko, H. S., Kim, C. S., Jeong, M. Y., Oh, Y. J., and Lee, S. H. 2011. "The effect of social network service's quality factors on user satisfaction and the intention to continued use," Journal of the Korean society for quality management, (39:4), pp. 543-555. https://doi.org/10.7469/JKSQM.2011.39.4.543
  35. Lee, D., Larose, R., and Rifon, N. 2008. "Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology," (27:5), pp. 445-454. https://doi.org/10.1080/01449290600879344
  36. Leistert, O. 2012. "Resistance against cybersurveillance within social movements and how surveillance adapts," Surveillance & Society, (9:4), pp. 441. https://doi.org/10.24908/ss.v9i4.4345
  37. Litman, J. 2000. "Information privacy/information property," Stanford Law Review, pp. 1283-1313.
  38. Liu, X., He, M., Gao, F., and Xie, P. 2008. "An empirical study of online shopping customer satisfaction in China: a holistic perspective," International Journal of Retail & Distribution Management, (36:11), pp. 919-940. https://doi.org/10.1108/09590550810911683
  39. Maddux, J. E., & Rogers, R. W. 1983. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change," Journal of experimental social psychology, (19:5), pp. 469-479. https://doi.org/10.1016/0022-1031(83)90023-9
  40. Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model," Information systems research, (15:4), pp. 336-355. https://doi.org/10.1287/isre.1040.0032
  41. McQuail, D. 2010. McQuail's mass communication theory. Sage publications.
  42. Milne, G. R., and Rohm, A. J. 2000. "Consumer privacy and name removal across direct marketing channels: Exploring opt-in and optout alternatives," Journal of Public Policy & Marketing, (19:2), pp. 238-249. https://doi.org/10.1509/jppm.19.2.238.17136
  43. Mohamed, N., and Ahmad, I. H. 2012. "Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia," Computers in Human Behavior, (28:6), pp. 2366-2375. https://doi.org/10.1016/j.chb.2012.07.008
  44. Morimoto, M., and Chang, S. 2006. "Consumers' attitudes toward unsolicited commercial e-mail and postal direct mail eting methods: intrusiveness, perceived loss of control, and irritation," Journal of Interactive Advertising, (7:1), pp. 1-11. https://doi.org/10.1080/15252019.2006.10722121
  45. Nowak, G. J., and Phelps, J. 1995. "Direct marketing and the use of individual-level consumer information: Determining how and when "privacy" matters," Journal of Direct Marketing, (9:3), pp. 46-60. https://doi.org/10.1002/dir.4000090307
  46. Park, M., Chai, S., and Lee, M. 2017. "A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases," Conference Proceedings, 19th Information Security and Risk Management, Singapore Jan 08-09
  47. Park, M., Choi. B., and Chai, S. 2016. "Do You Really Maintain Your Social Tie through SNS?; An Exploratory Study of Online Environment, Journal of Next Generation Information Technology," (7:1), pp. 72-82.
  48. Parasuraman, A., Zeithaml, V. A., and Berry, L. L. 1988. "Servqual: A multiple-item scale for measuring consumer perc," Journal of retailing, (64:1), pp. 12.
  49. Rogers, R. W. 1975. "A protection motivation theory of fear appeals and attitude change1," The journal of psychology, (91:1), pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
  50. Schmid, G., and Gausling, T. 2016. "Data protection and the right of personality with regard to rating platforms: decisions of the German Federal Supreme Court," Journal of Intellectual Property Law & Practice, (11:1), pp. 46-48. https://doi.org/10.1093/jiplp/jpv208
  51. Sproull, L. 2011. "Prosocial behavior on the net," Daedalus, (140:4), pp. 140-153. https://doi.org/10.1162/DAED_a_00120
  52. Stelzner, Micael A. 2010. "Social media marketing industry report: How marketers are using social media to grow their businesses," SocialMedia Examiner
  53. Stone, E. F., and Stone, D. L. 1990. "Privacy in organizations: Theoretical issues, research f indings, and protection mechanisms," Research in personnel and human resources management, (8:3), pp. 349-411.
  54. Youn, S. 2009. "Determinants of online pr ivac y concer n a nd its inf luence on privacy protection behaviors among young adolescents," Journal of Consumer affairs, (43:3), pp. 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
  55. Van Dijck, J. 2014. "Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology," Sur veillance & Society, (12:2), pp. 197.
  56. Vance, A., Siponen, M., and Pahnila, S. 2012. "Motivating IS security compliance: insights from habit and protection motivation theory," Information & Management, (49:3), pp. 190-198. https://doi.org/10.1016/j.im.2012.04.002
  57. Wu, K. W., Huang, S. Y., Yen, D. C., and Popova, I. 2012. "The effect of online privacy policy on consumer privacy concern and trust," Computers in human behavior, (28:3), pp.889-897. https://doi.org/10.1016/j.chb.2011.12.008
  58. Wu, Y. L., Tao, Y. H., and Chang, C. J. 2017. "A comparative review on privacy concerns and safety demands of closed-circuit television among Taiwan, Japan, and the United Kingdom," Journal of Information and Optimization Sciences, (38:1), pp. 173-196. https://doi.org/10.1080/02522667.2016.1220076
  59. Zeithaml, V. A ., Parasuraman, A ., and Malhotra, A. 2000. "Conceptual Framework for understanding e-service quality : Implications for future research and managerial practice"
  60. Zeithaml, V. A. 2000. "Service quality, profitability, and the economic worth of customers: what we know and what we need to learn," Journal of the academy of marketing science, (28:1), pp. 67-85. https://doi.org/10.1177/0092070300281007
  61. Zhang, D. Y. 2014. "Study on the Behavioral Logic of Personal Information Protection in the View of Constitution," In Advanced Materials Research, 971, pp. 1768-1771.
  62. 전자신문, [보안컬럼] "감시자에서 조력자로, CCTV의 진화," 2017.04.18, http://www.etnews.com/20170418000097

Cited by

  1. 개인 의료정보 보호를 위한 블록체인 적용 방안: 프라이빗 블록 스킴을 중심으로 vol.19, pp.4, 2018, https://doi.org/10.15813/kmr.2018.19.4.007
  2. 중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로 vol.29, pp.1, 2020, https://doi.org/10.5859/kais.2020.29.1.51