DOI QR코드

DOI QR Code

Individual Differences in Online Privacy Concern

  • Yeolib Kim (School of Business Administration, Ulsan National Institute of Science and Technology) ;
  • Boreum Choi (School of Business Administration, University of Seoul) ;
  • Yoonhyuk Jung (School of Media and Communication, Korea University)
  • 투고 : 2018.06.22
  • 심사 : 2018.10.17
  • 발행 : 2018.12.31

초록

We examined the effects of socio-demographics and personality traits on online privacy concern. We investigated this relationship in general and across different Internet functions. Using a large, diverse, population-representative sample (N = 5,242), we found that females, educated, and wealthier individuals tend to be concerned with online privacy to a greater extent. Among personality traits, agreeableness and conscientiousness were generally associated with an increased probability of being concerned with online privacy. These results imply that socio-demographics and personality traits provide explanatory insights into online privacy concern.

키워드

과제정보

This research is supported by Ulsan National Institute of Science and Technology (1.180040.01).

참고문헌

  1. Ackerman, P. L., and Beier, M. E. (2003). Intelligence, personality, and interests in the career choice process. Journal of Career Assessment, 11(2), 205-218. https://doi.org/10.1177/1069072703011002006
  2. Acquisti, A., and Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1), 26-33. https://doi.org/10.1109/MSP.2005.22
  3. American Psychological Association (2010). Publication manual of the American Psychological Association 6th ed. American Psychological Association, Washington, DC.
  4. Ahn, S., Jang, J., Kim, J., and Kim, B. (2014). Factors Affecting the Intention to Invade Privacy on Social Network Service. Information Systems Review, 16(2), 1-23. https://doi.org/10.14329/isr.2014.16.2.001
  5. Bansal, G., and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 492, 138-150. https://doi.org/10.1016/j.dss.2010.01.010
  6. Berendt, B., Gunther, O., and Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 484, 101-106. https://doi.org/10.1145/1053291.1053295
  7. Bergstrom, A. (2015). Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior, 53, 419-426. https://doi.org/10.1016/j.chb.2015.07.025
  8. Briley, D. A., and Tucker-Drob, E. M. (2014). Genetic and environmental continuity in personality development: A meta-analysis. Psychological Bulletin, 140(5), 1303-1331. https://doi.org/10.1037/a0037091
  9. Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165. https://doi.org/10.1002/asi.20459
  10. Cha, H. (2012). Factors influencing the adoption of location-based smartphone applications: An application of the privacy calculus model. Asia Pacific Journal of Information Systems, 22(4), 7-29.
  11. Chauvin, B., Hermand, D., and Mullet, E. (2007). Risk perception and personality facets. Risk Analysis, 27(1), 171-185. https://doi.org/10.1111/j.1539-6924.2006.00867.x
  12. Cho, H., Lee, J. S., and Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987-995. https://doi.org/10.1016/j.chb.2010.02.012
  13. Crede, M., Harms, P., Niehorster, S., and Gaye-Valentine, A. (2012). An evaluation of the consequences of using short measures of the Big Five personality traits. Journal of Personality and Social Psychology, 102(4), 874-888. https://doi.org/10.1037/a0027403
  14. Cumming, G. (2014). The new statistics: Why and how. Psychological Science, 25(1), 7-29. https://doi.org/10.1177/0956797613504966
  15. Digman, J. M. (1990). Personality structure: Emergence of the five-factor model. Annual Review of Psychology, 41, 417-440. https://doi.org/10.1146/annurev.ps.41.020190.002221
  16. Diener, E., Oishi, S., and Lucas, R. E. (2003). Personality, culture, and subjective well-being: Emotional and cognitive evaluations of life. Annual Review of Psychology, 54, 403-425. https://doi.org/10.1146/annurev.psych.54.101601.145056
  17. Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
  18. Eich, E. (2014). Business not as usual. Psychological Science, 25(1), 3-6. https://doi.org/10.1177/0956797613512465
  19. Elovici, Y., Glezer, C., and Shapira, B. (2005). Enhancing customer privacy while searching for products and services on the World Wide Web. Internet Research, 15(4), 378-399. https://doi.org/10.1108/10662240510615164
  20. Feng, Y., and Xie, W. (2014). Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, 153-162. https://doi.org/10.1016/j.chb.2014.01.009
  21. Goldberg, L. R. (1990). An alternative "description of personality": The big-five factor structure. Journal of Personality and Social Psychology, 59(6), 1216-1229. https://doi.org/10.1037/0022-3514.59.6.1216
  22. Goldberg, L. R., and Strycker, L. A. (2002). Personality traits and eating habits: The assessment of food preferences in a large community sample. Personality and Individual Differences, 32(1), 49-65. https://doi.org/10.1016/S0191-8869(01)00005-8
  23. Gosling, S. D., Rentfrow, P. J., and Swann, W. B. (2003). A very brief measure of the Big-Five personality domains. Journal of Research in Personality, 37(6), 504-528. https://doi.org/10.1016/S0092-6566(03)00046-1
  24. Guadagno, R. E., Okdie, B. M., and Eno, C. A. (2008). Who blogs? Personality predictors of blogging. Computers in Human Behavior, 24(5), 1993-2004. https://doi.org/10.1016/j.chb.2007.09.001
  25. Halsey, L. G., Curran-Everett, D., Vowler, S. L., and Drummond, G. B. (2015). The fickle p value generates irreproducible results. Nature Methods, 12, 179-185. https://doi.org/10.1038/nmeth.3288
  26. Hughes, D. J., Rowe, M., Batey, M., and Lee, A. (2012). A tale of two sites: Twitter vs. Facebook and the personality predictors of social media usage. Computers in Human Behavior, 28(2), 561-569. https://doi.org/10.1016/j.chb.2011.11.001
  27. Jensen, C., Potts, C., and Jensen, C. (2005). Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1-2), 203-227. https://doi.org/10.1016/j.ijhcs.2005.04.019
  28. Judge, T. A., Bono, J. E., Ilies, R., and Gerhardt, M. W. (2002). Personality and leadership: A qualitative and quantitative review. Journal of Applied Psychology, 87(4), 765-780. https://doi.org/10.1037/0021-9010.87.4.765
  29. Jung, W. J. and Lee, S. Y. T. (2015). What Affects the Value of Information Privacy on SNS? Asia Pacific Journal of Information Systems, 25(2), 289-305. https://doi.org/10.14329/apjis.2015.25.2.289
  30. Junglas, I. A., Johnson, N. A., and Spitzmuller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387-402. https://doi.org/10.1057/ejis.2008.29
  31. Kim, J., and Oh, D. (2016). The Effect of Privacy Policy Awareness on the Willingness to Provide Personal Informationin Electronic Commerce. Information Systems Review, 18(3), 185-207. https://doi.org/10.14329/isr.2016.18.3.185
  32. Kim, Y., Briley, D. A., and Ocepek, M. G. (2015). Differential innovation of smartphone and application use by sociodemographics and personality. Computers in Human Behavior, 44, 141-147. https://doi.org/10.1016/j.chb.2014.11.059
  33. Kim, Y., and Jeong, J. S. (2015). Personality predictors for the use of multiple internet functions. Internet Research, 25(3), 399-415. https://doi.org/10.1108/IntR-11-2013-0250
  34. Kim, G., Shin, B., and Lee, H. G. (2009). Understanding dynamics between initial trust and usage intentions of mobile banking. Information Systems Journal, 19(3), 283-311. https://doi.org/10.1111/j.1365-2575.2007.00269.x
  35. Korzaan, M. L., and Boswell, K. T. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48(4), 15-24.
  36. Lala, V., Arnold, V., Sutton, S. G., and Guan, L. (2002). The impact of relative information quality of e-commerce assurance seals on Internet purchasing behavior. International Journal of Accounting Information Systems, 3(4), 237-253. https://doi.org/10.1016/S1467-0895(02)00069-6
  37. Li, J., and Chignell, M. (2010). Birds of a feather: How personality influences blog writing and reading. International Journal of Human-Computer Studies, 68(9), 589-602. https://doi.org/10.1016/j.ijhcs.2010.04.001
  38. Lim, S. H., Sung, J., Kim, D., and Kim, D. J. (2017). A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services. Asia Pacific Journal of Information Systems, 27(3), 156-175. https://doi.org/10.14329/apjis.2017.27.3.156
  39. Lin, M., Lucas Jr, H. C., and Shmueli, G. (2013). Research commentary-too big to fail: Large samples and the p-value problem. Information Systems Research, 24(4), 906-917. https://doi.org/10.1287/isre.2013.0480
  40. Liu, C., Marchewka, J. T., Lu, J., and Yu, C. S. (2005). Beyond concern-A privacy-trust-behavioral intention model of electronic commerce. Information and Management, 42(2), 289-304. https://doi.org/10.1016/j.im.2004.01.003
  41. Lwin, M. O., Wirtz, J., and Stanaland, A. J. (2016). The privacy dyad: Antecedents of promotion-and prevention-focused online privacy behaviors and the mediating role of trust and privacy concern. Internet Research, 26(4), 919-941. https://doi.org/10.1108/IntR-05-2014-0134
  42. Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
  43. Mccrae, R. R., and Costa, P. T. (1991). Adding Liebe und Arbeit: The full five-factor model and well-being. Personality and Social Psychology Bulletin, 17(2), 227-232. https://doi.org/10.1177/014616729101700217
  44. McAdams, D. P., and Olson, B. D. (2010). Personality development: Continuity and change over the life course. Annual Review of Psychology, 61, 517-542. https://doi.org/10.1146/annurev.psych.093008.100507
  45. Mount, M. K., Barrick, M. R., Scullen, S. M., and Rounds, J. (2005). Higher-order dimensions of the big five personality traits and the big six vocational interest types. Personal Psychology, 58, 447-478. https://doi.org/10.1111/j.1744-6570.2005.00468.x
  46. Park, Y. J. (2015). Do men and women differ in privacy? Gendered privacy and in) equality in the Internet. Computers in Human Behavior, 50, 252-258. https://doi.org/10.1016/j.chb.2015.04.011
  47. Peppet, S. R. (2014). Regulating the Internet of things: First steps toward managing discrimination, privacy, security, and consent. Texas Law Review, 93(1), 85-178.
  48. Peterson, R. A. (2001). On the use of college students in social science research: Insights from a second-order meta-analysis. Journal of Consumer Research, 28(3), 450-461. https://doi.org/10.1086/323732
  49. Poropat, A. E. (2009). A meta-analysis of the five-factor model of personality and academic performance. Psychological Bulletin, 135(2), 322-338. https://doi.org/10.1037/a0014996
  50. Raine, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., and Dabbish, L. (2013). Anonymity, privacy, and security online. Pew Research Center.
  51. Shaver, P. R., and Brennan, K. A. (1992). Attachment styles and the "Big Five" personality traits: Their connections with each other and with romantic relationship outcomes. Personality and Social Psychology Bulletin, 18(5), 536-545. https://doi.org/10.1177/0146167292185003
  52. Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. The Information Society, 18(1), 21-32. https://doi.org/10.1080/01972240252818207
  53. Swickert, R. J., Hittner, J. B., Harris, J. L., and Herring, J. A. (2002). Relationships among Internet use, personality, and social support. Computers in Human Behavior, 18(4), 437-451. https://doi.org/10.1016/S0747-5632(01)00054-1
  54. Takabi, H., Joshi, J. B. D., and Ahn, G-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy, 8(6), 24-31. https://doi.org/10.1109/MSP.2010.186
  55. Tan, X., Qin, L., Kim, Y., and Hsu, J. (2012). Impact of privacy concern in social networking web sites. Internet Research, 22(2), 211-233. https://doi.org/10.1108/10662241211214575
  56. Valenzuela, S., Park, N., and Kee, K. F. (2009). Is there social capital in a social network site?: Facebook use and college students' life satisfaction, trust, and participation. Journal of Computer-Mediated Communication, 14(4), 875-901. https://doi.org/10.1111/j.1083-6101.2009.01474.x
  57. Viegas, F. B. (2005). Bloggers' expectations of privacy and accountability: An initial survey. Journal of Computer-Mediated Communication, 10(3).
  58. Weber, R. H. (2010). Internet of Things-New security and privacy challenges. Computer Law and Security Review, 26(1), 23-30. https://doi.org/10.1016/j.clsr.2009.11.008
  59. Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174. https://doi.org/10.2753/MIS0742-1222260305
  60. Yao, M. Z., Rice, R. E., and Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710-722. https://doi.org/10.1002/asi.20530
  61. Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
  62. Youn, S., and Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. Cyberpsychology & Behavior, 11(6), 763-765.  https://doi.org/10.1089/cpb.2007.0240