Acknowledgement
This research is supported by Ulsan National Institute of Science and Technology (1.180040.01).
References
- Ackerman, P. L., and Beier, M. E. (2003). Intelligence, personality, and interests in the career choice process. Journal of Career Assessment, 11(2), 205-218. https://doi.org/10.1177/1069072703011002006
- Acquisti, A., and Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1), 26-33. https://doi.org/10.1109/MSP.2005.22
- American Psychological Association (2010). Publication manual of the American Psychological Association 6th ed. American Psychological Association, Washington, DC.
- Ahn, S., Jang, J., Kim, J., and Kim, B. (2014). Factors Affecting the Intention to Invade Privacy on Social Network Service. Information Systems Review, 16(2), 1-23. https://doi.org/10.14329/isr.2014.16.2.001
- Bansal, G., and Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 492, 138-150. https://doi.org/10.1016/j.dss.2010.01.010
- Berendt, B., Gunther, O., and Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 484, 101-106. https://doi.org/10.1145/1053291.1053295
- Bergstrom, A. (2015). Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior, 53, 419-426. https://doi.org/10.1016/j.chb.2015.07.025
- Briley, D. A., and Tucker-Drob, E. M. (2014). Genetic and environmental continuity in personality development: A meta-analysis. Psychological Bulletin, 140(5), 1303-1331. https://doi.org/10.1037/a0037091
- Buchanan, T., Paine, C., Joinson, A. N., and Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58(2), 157-165. https://doi.org/10.1002/asi.20459
- Cha, H. (2012). Factors influencing the adoption of location-based smartphone applications: An application of the privacy calculus model. Asia Pacific Journal of Information Systems, 22(4), 7-29.
- Chauvin, B., Hermand, D., and Mullet, E. (2007). Risk perception and personality facets. Risk Analysis, 27(1), 171-185. https://doi.org/10.1111/j.1539-6924.2006.00867.x
- Cho, H., Lee, J. S., and Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26(5), 987-995. https://doi.org/10.1016/j.chb.2010.02.012
- Crede, M., Harms, P., Niehorster, S., and Gaye-Valentine, A. (2012). An evaluation of the consequences of using short measures of the Big Five personality traits. Journal of Personality and Social Psychology, 102(4), 874-888. https://doi.org/10.1037/a0027403
- Cumming, G. (2014). The new statistics: Why and how. Psychological Science, 25(1), 7-29. https://doi.org/10.1177/0956797613504966
- Digman, J. M. (1990). Personality structure: Emergence of the five-factor model. Annual Review of Psychology, 41, 417-440. https://doi.org/10.1146/annurev.ps.41.020190.002221
- Diener, E., Oishi, S., and Lucas, R. E. (2003). Personality, culture, and subjective well-being: Emotional and cognitive evaluations of life. Annual Review of Psychology, 54, 403-425. https://doi.org/10.1146/annurev.psych.54.101601.145056
- Dinev, T., and Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80. https://doi.org/10.1287/isre.1060.0080
- Eich, E. (2014). Business not as usual. Psychological Science, 25(1), 3-6. https://doi.org/10.1177/0956797613512465
- Elovici, Y., Glezer, C., and Shapira, B. (2005). Enhancing customer privacy while searching for products and services on the World Wide Web. Internet Research, 15(4), 378-399. https://doi.org/10.1108/10662240510615164
- Feng, Y., and Xie, W. (2014). Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, 153-162. https://doi.org/10.1016/j.chb.2014.01.009
- Goldberg, L. R. (1990). An alternative "description of personality": The big-five factor structure. Journal of Personality and Social Psychology, 59(6), 1216-1229. https://doi.org/10.1037/0022-3514.59.6.1216
- Goldberg, L. R., and Strycker, L. A. (2002). Personality traits and eating habits: The assessment of food preferences in a large community sample. Personality and Individual Differences, 32(1), 49-65. https://doi.org/10.1016/S0191-8869(01)00005-8
- Gosling, S. D., Rentfrow, P. J., and Swann, W. B. (2003). A very brief measure of the Big-Five personality domains. Journal of Research in Personality, 37(6), 504-528. https://doi.org/10.1016/S0092-6566(03)00046-1
- Guadagno, R. E., Okdie, B. M., and Eno, C. A. (2008). Who blogs? Personality predictors of blogging. Computers in Human Behavior, 24(5), 1993-2004. https://doi.org/10.1016/j.chb.2007.09.001
- Halsey, L. G., Curran-Everett, D., Vowler, S. L., and Drummond, G. B. (2015). The fickle p value generates irreproducible results. Nature Methods, 12, 179-185. https://doi.org/10.1038/nmeth.3288
- Hughes, D. J., Rowe, M., Batey, M., and Lee, A. (2012). A tale of two sites: Twitter vs. Facebook and the personality predictors of social media usage. Computers in Human Behavior, 28(2), 561-569. https://doi.org/10.1016/j.chb.2011.11.001
- Jensen, C., Potts, C., and Jensen, C. (2005). Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1-2), 203-227. https://doi.org/10.1016/j.ijhcs.2005.04.019
- Judge, T. A., Bono, J. E., Ilies, R., and Gerhardt, M. W. (2002). Personality and leadership: A qualitative and quantitative review. Journal of Applied Psychology, 87(4), 765-780. https://doi.org/10.1037/0021-9010.87.4.765
- Jung, W. J. and Lee, S. Y. T. (2015). What Affects the Value of Information Privacy on SNS? Asia Pacific Journal of Information Systems, 25(2), 289-305. https://doi.org/10.14329/apjis.2015.25.2.289
- Junglas, I. A., Johnson, N. A., and Spitzmuller, C. (2008). Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems, 17(4), 387-402. https://doi.org/10.1057/ejis.2008.29
- Kim, J., and Oh, D. (2016). The Effect of Privacy Policy Awareness on the Willingness to Provide Personal Informationin Electronic Commerce. Information Systems Review, 18(3), 185-207. https://doi.org/10.14329/isr.2016.18.3.185
- Kim, Y., Briley, D. A., and Ocepek, M. G. (2015). Differential innovation of smartphone and application use by sociodemographics and personality. Computers in Human Behavior, 44, 141-147. https://doi.org/10.1016/j.chb.2014.11.059
- Kim, Y., and Jeong, J. S. (2015). Personality predictors for the use of multiple internet functions. Internet Research, 25(3), 399-415. https://doi.org/10.1108/IntR-11-2013-0250
- Kim, G., Shin, B., and Lee, H. G. (2009). Understanding dynamics between initial trust and usage intentions of mobile banking. Information Systems Journal, 19(3), 283-311. https://doi.org/10.1111/j.1365-2575.2007.00269.x
- Korzaan, M. L., and Boswell, K. T. (2008). The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48(4), 15-24.
- Lala, V., Arnold, V., Sutton, S. G., and Guan, L. (2002). The impact of relative information quality of e-commerce assurance seals on Internet purchasing behavior. International Journal of Accounting Information Systems, 3(4), 237-253. https://doi.org/10.1016/S1467-0895(02)00069-6
- Li, J., and Chignell, M. (2010). Birds of a feather: How personality influences blog writing and reading. International Journal of Human-Computer Studies, 68(9), 589-602. https://doi.org/10.1016/j.ijhcs.2010.04.001
- Lim, S. H., Sung, J., Kim, D., and Kim, D. J. (2017). A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services. Asia Pacific Journal of Information Systems, 27(3), 156-175. https://doi.org/10.14329/apjis.2017.27.3.156
- Lin, M., Lucas Jr, H. C., and Shmueli, G. (2013). Research commentary-too big to fail: Large samples and the p-value problem. Information Systems Research, 24(4), 906-917. https://doi.org/10.1287/isre.2013.0480
- Liu, C., Marchewka, J. T., Lu, J., and Yu, C. S. (2005). Beyond concern-A privacy-trust-behavioral intention model of electronic commerce. Information and Management, 42(2), 289-304. https://doi.org/10.1016/j.im.2004.01.003
- Lwin, M. O., Wirtz, J., and Stanaland, A. J. (2016). The privacy dyad: Antecedents of promotion-and prevention-focused online privacy behaviors and the mediating role of trust and privacy concern. Internet Research, 26(4), 919-941. https://doi.org/10.1108/IntR-05-2014-0134
- Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users' information privacy concerns IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355. https://doi.org/10.1287/isre.1040.0032
- Mccrae, R. R., and Costa, P. T. (1991). Adding Liebe und Arbeit: The full five-factor model and well-being. Personality and Social Psychology Bulletin, 17(2), 227-232. https://doi.org/10.1177/014616729101700217
- McAdams, D. P., and Olson, B. D. (2010). Personality development: Continuity and change over the life course. Annual Review of Psychology, 61, 517-542. https://doi.org/10.1146/annurev.psych.093008.100507
- Mount, M. K., Barrick, M. R., Scullen, S. M., and Rounds, J. (2005). Higher-order dimensions of the big five personality traits and the big six vocational interest types. Personal Psychology, 58, 447-478. https://doi.org/10.1111/j.1744-6570.2005.00468.x
- Park, Y. J. (2015). Do men and women differ in privacy? Gendered privacy and in) equality in the Internet. Computers in Human Behavior, 50, 252-258. https://doi.org/10.1016/j.chb.2015.04.011
- Peppet, S. R. (2014). Regulating the Internet of things: First steps toward managing discrimination, privacy, security, and consent. Texas Law Review, 93(1), 85-178.
- Peterson, R. A. (2001). On the use of college students in social science research: Insights from a second-order meta-analysis. Journal of Consumer Research, 28(3), 450-461. https://doi.org/10.1086/323732
- Poropat, A. E. (2009). A meta-analysis of the five-factor model of personality and academic performance. Psychological Bulletin, 135(2), 322-338. https://doi.org/10.1037/a0014996
- Raine, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., and Dabbish, L. (2013). Anonymity, privacy, and security online. Pew Research Center.
- Shaver, P. R., and Brennan, K. A. (1992). Attachment styles and the "Big Five" personality traits: Their connections with each other and with romantic relationship outcomes. Personality and Social Psychology Bulletin, 18(5), 536-545. https://doi.org/10.1177/0146167292185003
- Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. The Information Society, 18(1), 21-32. https://doi.org/10.1080/01972240252818207
- Swickert, R. J., Hittner, J. B., Harris, J. L., and Herring, J. A. (2002). Relationships among Internet use, personality, and social support. Computers in Human Behavior, 18(4), 437-451. https://doi.org/10.1016/S0747-5632(01)00054-1
- Takabi, H., Joshi, J. B. D., and Ahn, G-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy, 8(6), 24-31. https://doi.org/10.1109/MSP.2010.186
- Tan, X., Qin, L., Kim, Y., and Hsu, J. (2012). Impact of privacy concern in social networking web sites. Internet Research, 22(2), 211-233. https://doi.org/10.1108/10662241211214575
- Valenzuela, S., Park, N., and Kee, K. F. (2009). Is there social capital in a social network site?: Facebook use and college students' life satisfaction, trust, and participation. Journal of Computer-Mediated Communication, 14(4), 875-901. https://doi.org/10.1111/j.1083-6101.2009.01474.x
- Viegas, F. B. (2005). Bloggers' expectations of privacy and accountability: An initial survey. Journal of Computer-Mediated Communication, 10(3).
- Weber, R. H. (2010). Internet of Things-New security and privacy challenges. Computer Law and Security Review, 26(1), 23-30. https://doi.org/10.1016/j.clsr.2009.11.008
- Xu, H., Teo, H. H., Tan, B. C., and Agarwal, R. (2009). The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3), 135-174. https://doi.org/10.2753/MIS0742-1222260305
- Yao, M. Z., Rice, R. E., and Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710-722. https://doi.org/10.1002/asi.20530
- Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
- Youn, S., and Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. Cyberpsychology & Behavior, 11(6), 763-765. https://doi.org/10.1089/cpb.2007.0240