DOI QR코드

DOI QR Code

Determinants of the Intention to Protect Personal Information among Facebook Users

  • Chon, Bum Soo (Department of Journalism & Communication, Hanyang University) ;
  • Lee, Jeong-Ki (Center for Teaching & Learning, Hanyang University) ;
  • Jeong, HyeonJu (Department of Advertising and Public Relations, Catholic Kwandong University) ;
  • Park, Jowon (Department of Journalism & Communication, Hanyang University) ;
  • Park, Jonghwa (School of Management Engineering, Ulsan National Institute of Science and Technology)
  • Received : 2017.04.02
  • Accepted : 2017.10.30
  • Published : 2018.02.01

Abstract

This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability) had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.

Keywords

References

  1. D. Boyd and N. Ellison, "Social Network Sites: Definition, History and Scholarship," J. Comput. Mediated. Commun., vol. 13, no. 1, Oct. 2007, pp. 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
  2. M. Thelwall, "Social Network Sites: Users and Uses," Adv. Comput., vol. 76, 2009, pp. 19-73.
  3. S. Livingstone, K. Olafsson, and E. Staksrud, Social Networking, Age and Privacy, LSE, London, EU Kids Online, 2011.
  4. Y. Al-Saggaf and S. Nielsen, "Self-Disclosure on Facebook Among Female Users and its Relationship to Feelings of Loneliness," Comput. Human Behavior, vol. 36, July 2014, pp. 460-468. https://doi.org/10.1016/j.chb.2014.04.014
  5. F.D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, vol. 13, no. 3, Sept. 1989, pp. 318-339.
  6. M. Fishbein and I. Ajzen, Beliefs, Attitude, Intention and Behaviour: An Introduction to Theory and Research, Reading, MA, USA: Addison-Wesley, 1975.
  7. F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, "User Acceptance of Computer Technology," Manage. Sci., vol. 35, no. 8, Aug. 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
  8. J. Shah and E.T. Higgins, "Expectancy $\times$ Value Effects: Regulatory Focus as Determinant of Magnitude and Direction," J. Personality Soc. Psychol., vol. 73, no. 3, Sept. 1997, pp. 447-458. https://doi.org/10.1037/0022-3514.73.3.447
  9. N. Park, K.M. Lee, and P.H. Cheong. "University Instructors' Acceptance of Electronic Course Ware: An Application of the Technology Acceptance Model," J. Comput. Medicated Commun., vol. 13, no. 1, Oct. 2007, pp. 163-186. https://doi.org/10.1111/j.1083-6101.2007.00391.x
  10. D. Gefen and D.W. Straub, "Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model," MIS Quarterly, vol. 21, no. 4, Dec. 1997, pp. 389-400. https://doi.org/10.2307/249720
  11. G. Choi and H. Chung, "Applying the Technology Acceptance Model to Social Networking Sites (SNS): Impact of Subjective Norm and Social Capital on the Acceptance of SNS," Int. J. Human Comput. Interaction, vol. 29, no. 10, Jan. 2013, pp. 619-628. https://doi.org/10.1080/10447318.2012.756333
  12. I. Ajzen, "The Theory of Planned Behavior," Organizational Behavior Human Decision Process., vol. 50, no. 2, Dec. 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  13. P. Ifinedo, "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Comput. Security, vol. 31, no. 1, 2012, pp. 83-95. https://doi.org/10.1016/j.cose.2011.10.007
  14. B. Bulgurcu, H. Cavusoglu, and I. Banbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, vol. 34, no. 3, 2010, pp. 523-548. https://doi.org/10.2307/25750690
  15. Y. Lu, T. Zhou, and B. Wang, "Exploring Chinese Users' Acceptance of Instant Messaging Using the Theory of Planned Behavior, the Technology Acceptance Model, and the Flow Theory," Comput. Human Behavior, vol. 25, no. 1, Jan. 2009, pp. 29-39. https://doi.org/10.1016/j.chb.2008.06.002
  16. M.C. Lee, "Factors Influencing the Adoption of Internet Banking: An Integration of TAM and TPB with Perceived Risk and Perceived Benefit," Electron. Commerce Res. Appl., vol. 8, no. 3, 2009, pp. 130-141. https://doi.org/10.1016/j.elerap.2008.11.006
  17. R. Rogers, "Cognitive and Psychological Processes in Fear-Based Attitude Change: A Revised Theory of Protection Motivation. In Social Psychophysiology: A Sourcebook, New York, USA: Guilford Press, 1983, pp. 153-176.
  18. C.L. Anderson and R. Agarwal, "Practicing Safe Computing: A Multi-Method Empirical Examination of Home Computer User Security Behavioral Intention," MIS Quarterly, vol. 34, no. 3, 2010, pp. 613-643. https://doi.org/10.2307/25750694
  19. K.H. Beck and A. Frankel, "The Effects of Health Threat Seriousness and Personal Efficacy Upon Intentions and Behavior," J. Appl. Social Psychol., vol. 11, 1981, pp. 401-415. https://doi.org/10.1111/j.1559-1816.1981.tb00832.x
  20. Y.H. Lee, "Understanding Anti-Plagiarism Software Adaption: An Extended Protection Motivation Theory," Decision Support Syst., vol. 50, no. 2, 2011, pp. 361-369. https://doi.org/10.1016/j.dss.2010.07.009
  21. Y.H. Lee and K.R. Larsen, "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," Eur. J. Inform. Syst., vol. 18, 2009, pp. 177-187. https://doi.org/10.1057/ejis.2009.11
  22. N. Mohamed and J.H. Ahmad, "Information Privacy Concerns, Antecedents and Privacy Measure Use in Social Networking Sites: Evidence from Malaysia," Comput. Human Behavior, vol. 28, no. 6, 2012, pp. 2366-2375. https://doi.org/10.1016/j.chb.2012.07.008
  23. V. Venkatesh and F.D. Davis, "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Manage. Sci., vol. 46, no. 2, 2000, pp. 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
  24. I. Ajzen, "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior," J. Appl. Soc. Psychol., vol. 32, 2002, pp. 665-683. https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
  25. X. Wang and S.R. McClung, "Toward a Detailed Understanding of Illegal Digital Downloading Intentions: An Extended Theory of Planned Behavior Approach," New Media Soc., vol. 13, no. 4, 2011, pp. 663-677. https://doi.org/10.1177/1461444810378225
  26. M. Hajli, "An Integrated Model for E-Commerce Adoption at the Customer Level with the Impact of Social Commerce," Int. J. Inform. Sci. Manage., Special Issue, 2012, pp. 77-97.
  27. D. Gefen and D.W. Straub, "Consumer Trust in B2C E-Commerce and the Importance of Social Presence: Experiments in E-Products and E-Services," Omega, vol. 32, no. 6, 2004, pp. 407-424. https://doi.org/10.1016/j.omega.2004.01.006
  28. I.A. Junglas, N.A. Johnson, and C. Spitzmuller, "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services," Eur. J. Inform. Syst., vol. 17, no. 4, 2008, pp. 387-402. https://doi.org/10.1057/ejis.2008.29

Cited by

  1. Nowhere to hide: Anonymous User Recognition Based on Multidimensional Trajectory Set vol.1550, pp.None, 2018, https://doi.org/10.1088/1742-6596/1550/3/032100
  2. Examining the roles of students' beliefs and security concerns for using smartwatches in higher education vol.34, pp.4, 2018, https://doi.org/10.1108/jeim-02-2020-0052
  3. Understanding the disclosure of personal data online vol.29, pp.3, 2018, https://doi.org/10.1108/ics-10-2020-0168