DOI QR코드

DOI QR Code

An Empirical Study on Behavior and Psychology Concerning Invoice Disposal in the Context of Courier Services: A Comparative Study on Korea and the U.S.

  • Se Hun Lim (Department of Management Information Systems, Sangji University)
  • 투고 : 2018.02.22
  • 심사 : 2018.05.26
  • 발행 : 2018.06.29

초록

This study investigates responses to privacy concerns by analyzing the psychological and behavioral characteristics related to the disposition toward invoices of courier service users. To this end, we develop a theoretical framework by combining stimulus response theory, communication privacy management theory, the theory of reasoned action, and the theory of planned behavior. Based on the theoretical framework, we analyze the relationships between social influence, privacy propensity, privacy control, privacy risk, privacy concern, invoice disposition intention, and invoice disposition behavior in the context of courier services. To test our hypotheses, we survey courier service users in the U.S. and Korea. Using a structural equation model, we test the relationships among these various factors for the courier service users of the two countries. Results have distinct implications for the psychological and behavioral characteristics concerning the disposal of courier invoices and enable understanding of the characteristics of courier service customers of the two countries.

키워드

과제정보

I am grateful to Professor Dan J. Kim (University of North Texas) and Assistant Professor Kunsu Park (KIMEP University) for their help. I also acknowledge the valuable suggestions and insightful comments of the Editor in Chief, the Associate Editor and the Anonymous Reviewers. This research was supported by the research grant of the Korea Sanhak Foundation in 2017.

참고문헌

  1. Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.  https://doi.org/10.1016/0749-5978(91)90020-T
  2. Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66-84.  https://doi.org/10.1111/j.1540-4560.1977.tb01883.x
  3. Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165.  https://doi.org/10.1002/asi.20459
  4. Craney, T. A., and Surles, J. G. (2002). Model-dependent variance inflation factor cutoff values. Quality Engineering, 14(3), 391-403.  https://doi.org/10.1081/QEN-120001878
  5. Chellappa, R. K., and Sin, R. (2005). Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6(2), 181-202.  https://doi.org/10.1007/s10799-005-5879-y
  6. Chin, W. W., Gopal, A., and Salisbury, W. D. (1997). Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation. Information Systems Research, 8(4), 342-367.  https://doi.org/10.1287/isre.8.4.342
  7. Choi, B. M., Park, M. J., and Chai, S. M. (2015). An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption. Information System Review, 17(3), 77-94 (In Korean).  https://doi.org/10.14329/isr.2015.17.3.077
  8. Croog, S. H., and Richards, N. P. (1977). Health Beliefs and Smoking Patterns in Heart Patients and Their Wives: A Longitudinal Study. American Journal of Public Health, 67(10), 921-930.  https://doi.org/10.2105/AJPH.67.10.921
  9. Derlega, V. J., and Chaikin, A. L. (1977). Privacy and self-disclosure in social relationships. Journal of Social Issues, 33(3), 102-115.  https://doi.org/10.1111/j.1540-4560.1977.tb01885.x
  10. Dinev, T., and Hart, P. (2004). Internet privacy concerns and their antecedents - Measurement validity and a regression model. Behavior and Information Technology, 23(6), 413-423.  https://doi.org/10.1080/01449290410001715723
  11. Dinev, T., and Hart, P. (2006a). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17(1), 61-80.  https://doi.org/10.1287/isre.1060.0080
  12. Dinev, T., and Hart, P. (2006b). Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2), 7-29.  https://doi.org/10.2753/JEC1086-4415100201
  13. Dinev, T., Hart, P., and Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance - An empirical investigation. Journal of Strategic Information Systems, 17(3), 214-233.  https://doi.org/10.1016/j.jsis.2007.09.002
  14. Fishbein, M., and Ajzen, I. (1977). Belief, attitude, intention and behavior: An introduction to theory and research. Philosophy and Rhetoric, 10(2), 130-132. 
  15. Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.  https://doi.org/10.1177/002224378101800104
  16. Jarvenpaa, S. L., and Leidner, D. E. (1999). Communication and trust in global virtual teams. Organization Science, 10(6), 791-815.  https://doi.org/10.1287/orsc.10.6.791
  17. Hair, Jr. J. F., Hult, G. T. M., Ringle, C. M., Sartedt, M. (2013). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). SEGE Publications, Inc. 
  18. Hall, E. T. (1976). Beyond Culture. New York: Anchor Press. 
  19. Hall, E. T., and Hall, M. R. (1990). Understanding Cultural Differences. Yarmouth, ME: Intercultural Press. 
  20. Havlena, W. J., and DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision Sciences, 22(4), 927-939.  https://doi.org/10.1111/j.1540-5915.1991.tb00372.x
  21. Hofstede, G. (1994). Cultures and Organizations: Software of the Mind: Intercultural. London: HarperCollins. 
  22. Kim, D. (2008). Self-Perception-Based Versus Transference-Based Trust Determinants in Computer-Mediated Transactions: A Cross-Cultural Comparison Study. Journal of Management Information Systems, 24(4), 13-45.  https://doi.org/10.2753/MIS0742-1222240401
  23. Laufer, R. S., and Wolfe, M. (1977). Privacy as a concept and a social issue - multidimensional developmental theory. Journal of Social Issues, 33(3), 22-42.  https://doi.org/10.1111/j.1540-4560.1977.tb01880.x
  24. Lim, S, H., Sung, J., Kim, D., and Kim, D. J. (2017). A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services. Asia Pacific Journal of Information Systems, 27(3), 156-175.  https://doi.org/10.14329/apjis.2017.27.3.156
  25. McCoy, S., Galletta, D. F., and King, W. R. (2005). Integrating national culture into IS research: The need for current individual-level measures. Communications of the ACM, 15(12), 211-224. 
  26. Margulis, S. T. (1977). Conceptions of privacy: current status and next steps. Journal of Social Issues, 33(3), 5-21.  https://doi.org/10.1111/j.1540-4560.1977.tb01879.x
  27. Margulis, S. T. (2003a). On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues, 59(2), 411-429.  https://doi.org/10.1111/1540-4560.00071
  28. Margulis, S. T. (2003b). Privacy as a social issue and behavioral concept. Journal of Social Issues, 59(2), 243-261.  https://doi.org/10.1111/1540-4560.00063
  29. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.  https://doi.org/10.1287/isre.1040.0032
  30. Milne, G. R., and Boza, M. E. (1999). Trust and concern in consumers' perceptions of marketing information management practices. Journal of Interactive Marketing, 13(1), 5-24.  https://doi.org/10.1002/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9
  31. Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335-361.  https://doi.org/10.1111/j.1083-6101.2007.00328.x
  32. Nelson, R. J. (1975). Behaviorism, finite automata, and stimulus response theory. Theory and Decision, 6(3), 249-267.  https://doi.org/10.1007/BF00136197
  33. Nunnally, J. C. (1978). Psychometric theory, 2nd edn. McGraw-Hill, New York 
  34. Nunnally, J. C., and Bernstein, I. H. (1994). Psychometric theory, 3rd edn. McGraw-Hill, New York 
  35. Pavlou, P. A., and Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 37-59.  https://doi.org/10.1287/isre.1040.0015
  36. Podsakoff, P., and Organ, D. (1986). Self-Reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531-533.  https://doi.org/10.1177/014920638601200408
  37. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.  https://doi.org/10.1037/0021-9010.88.5.879
  38. Song, S. H. (2011). Empirical Study on the Analysis for the Growth of Courier Service Industry Focusing on Electronic Commerce. Journal of Distribution and Management Research, 14(2), 107-125 (In Korean).  https://doi.org/10.17961/JDMR.14.2.201106.107
  39. Smith, H. J., Milberg, J. S., and Burke, J. S. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196.  https://doi.org/10.2307/249477
  40. Smith, H. J., Dinev, T., and Xu, H. (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4), 989-1016.  https://doi.org/10.2307/41409970
  41. Squicciarini, C. A., Xu, H., and Zhang, X. (2011). CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology, 62(3), 521-534.  https://doi.org/10.1002/asi.21473
  42. Phelps, J., D'Souza, G., and Nowak, G. J. (2001). Antecedents and consequences of consumer privacy concerns: An empirical investigation. Journal of Interactive Marketing, 15(4), 2-17.  https://doi.org/10.1002/dir.1019
  43. Phelps, J., Nowak, G., and Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 19(1), 27-41.  https://doi.org/10.1509/jppm.19.1.27.16941
  44. Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.  https://doi.org/10.2307/30036540
  45. Wixom, B. H., and Watson, H. J. (2001). An empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), 17-41.  https://doi.org/10.2307/3250957
  46. Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. Proceedings of the 28th Annual International Conference on Information Systems, Montreal, Canada, Paper 125. 
  47. Xu, H., Dinev, T., Smith, J., and Hart P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824.  https://doi.org/10.17705/1jais.00281
  48. Xu, H., Teo, H.-H., Tan, B. C. Y., and Agarwal, R. (2010). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174.