DOI QR코드

DOI QR Code

A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory

인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로

  • Park, Chanouk (Graduate School of Information, Yonsei University) ;
  • Lee, Sang-Woo (Graduate School of Information, Yonsei University)
  • Received : 2014.01.09
  • Accepted : 2014.02.27
  • Published : 2014.04.30

Abstract

This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law's effect on privacy awareness and behavioral change. The study finds that there exists a significant difference in privacy protection behavior according to privacy rights awareness. Independent variables are as follows: Five variables (Perceived vulnerability, Perceived severity, Perceived response effectiveness, Perceived barriers, Privacy Rights awareness) were tested as critical variables influencing Behavioral Intention in PMT model. Privacy awareness had a moderating effect on the relationship between perceived severity and privacy protection behavior. This study would contribute on theoretical expansion of Protection Motivation Theory and also provide practical implications for effective ways to promote behavioral changes.

본 연구의 목적은 보호동기 이론을 기반으로 인터넷 사용자의 개인정보 보호행동의 변화를 설명하고, 사용자의 개인정보 권익을 보호하기 위한 방안에 대해 모색하는 것이다. 보호동기 이론은 위협메시지에 의한 보호행동의 변화과정을 설명하기 위한 대표적인 이론으로, 본 연구에서는 개인정보에 대한 위협과 개인정보 보호행동에 대한 개인의 인지적 평가가 보호동기를 형성하고 보호동기가 개인정보 보호행동에 어떠한 영향을 미치는지 확인하였다. 또한 개인정보 권리보장 및 권리구제와 관련된 법제도를 반영하여서 개인정보 권리인지 변인을 개발하였다. 즉 개인정보 관련 법률이 개인정보 보호에 대한 인식이나 행동변화에 어떠한 영향을 미치는지 알아보았다. 본 연구는 선행연구들과 달리 법제도를 반영한 개인정보 권리인지 변인을 개발하여 개인정보 보호행동의 변화에 대해 분석하였다. 연구의 결과 개인정보 권리인지 변인이 개인정보 보호행동에 유의미한 영향을 미치는 요인으로 밝혀졌으며, 법제도를 통한 정보주체의 권리보장이 개인정보 보호행동을 촉진시키는 것으로 나타났다. 본 연구의 결과가 추후 개인정보 관련 신규정책 확립에 있어서 도움을 줄 수 있을 것이라 생각한다.

Keywords

References

  1. Warren, Samuel D., and Louis D. Brandeis. "The right to privacy." Harvard law review 4, no. 5 (1890): 193-220. https://doi.org/10.2307/1321160
  2. Mayer-Schonberger, Viktor. "The Internet and Privacy Legislation: Cookies for a Treat?." Computer Law & Security Review 14, no. 3 (1998): 166-174. https://doi.org/10.1016/S0267-3649(98)80024-1
  3. DeCew, Judith W. In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, 1997.
  4. McCullagh, Karen. "Blogging: self presentation and privacy." Information & communications technology law 17, no. 1 (2008): 3-23. https://doi.org/10.1080/13600830801886984
  5. Lee, Mi-Na, and Shim, Jae-Woong. "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy." Media, gender&culture 12 (2009): 166-190
  6. Ki, Sojin, and Lee, Sooyoung. "Exploring Categories of SNS User on the Basis of Privacy Concern and Self-Efficacy." Korean Journal of Journalism & Communication Studies 57, no. 1 (2013): 81-110.
  7. Culnan, Mary J. "How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use." Mis Quarterly 17, no. 3 (1993): 341-363. https://doi.org/10.2307/249775
  8. Choi, Hyuk-ra, and Shin, Jeoung-shin. "Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users." Journal of information technology applications & m 16, no. 3 (2007): 21-44.
  9. Rogers, Ronald W. "A Protection Motivation Theory of Fear Appeals and Attitude Change1." The Journal of Psychology 91, no. 1 (1975): 93-114. https://doi.org/10.1080/00223980.1975.9915803
  10. Ifinedo, Princely. "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory." Computers & Security 31, no. 1 (2012): 83-95. https://doi.org/10.1016/j.cose.2011.10.007
  11. Kim, Jongki, and Kim, Sanghee. "Privacy Protection Behavior of Online User : Based on Privacy Paradox Perspective" The Journal of internet electronic commerce research 13, no. 1 (2013): 41-64. https://doi.org/10.1007/s10660-013-9105-4
  12. Maddux, James E., and Ronald W. Rogers. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change." Journal of Experimental Social Psychology 19, no. 5 (1983): 469-479. https://doi.org/10.1016/0022-1031(83)90023-9
  13. Rogers, Ronald W. "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation." Social psychophysiology (1983): 153-176.
  14. Woon, Irene, Gek-Woo Tan, and R. Low. "A protection motivation theory approach to home wireless security." (2005).
  15. Chenoweth, Tim, Robert Minch, and Tom Gattiker. "Application of protection motivation theory to adoption of protective technologies." In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, pp. 1-10. IEEE, 2009.
  16. Lee, Younghwa. "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective." Decision Support Systems 50, no. 2 (2011): 361-369. https://doi.org/10.1016/j.dss.2010.07.009
  17. Workman, Michael, William H. Bommer, and Detmar Straub. "The amplification effects of procedural justice on a threat control model of information systems security behaviours." Behaviour & Information Technology 28, no. 6 (2009): 563-575. https://doi.org/10.1080/01449290802556021
  18. Liang, Huigang, and Yajiong Xue. "Understanding security behaviors in personal computer usage: A threat avoidance perspective." Journal of the Association for Information Systems 11, no. 7 (2010): 394-413. https://doi.org/10.17705/1jais.00232
  19. Johnston, Allen C., and Merrill Warkentin. "Fear appeals and information security behaviors: an empirical study." MIS quarterly 34, no. 3 (2010): 549-566. https://doi.org/10.2307/25750691
  20. Bum-suk Jee, Liu Fan, Sang-Chul Lee, Yung-Ho Suh. "Personal information Protection behavior for Information quality: Health psychology Therory perspectives" Journal of the Korean Society for Quality Management 39, no. 3 (2011): 432-443.
  21. Heider, Fritz. "Attitudes and cognitive organization." The Journal of psychology 21, no. 1 (1946): 107-112. https://doi.org/10.1080/00223980.1946.9917275
  22. Chan, Ricky YK. "Determinants of Chinese consumers' green purchase behavior." Psychology & Marketing 18, no. 4 (2001): 389-413. https://doi.org/10.1002/mar.1013
  23. Youn, Seounmi. "Teenagers' perceptions of online privacy and coping behaviors: a risk-benefit appraisal approach." Journal of Broadcasting & Electronic Media 49, no. 1 (2005): 86-110. https://doi.org/10.1207/s15506878jobem4901_6
  24. Youn, Seounmi. "Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents." Journal of Consumer Affairs 43, no. 3 (2009): 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
  25. HyungJinWoo. "Exploring the Relationship between Television News Viewing and Audiences' Intention to the Health Promotion." Korean Journal of Journalism & Communication Studies 51, no. 2 (2007): 308-333.
  26. Gurung, Anil, Xin Luo, and Qinyu Liao. "Consumer motivations in taking action against spyware: an empirical investigation." Information Management & Computer Security 17, no. 3 (2009): 276-289. https://doi.org/10.1108/09685220910978112
  27. Milne, George R., Andrew J. Rohm, and Shalini Bahl. "Consumers' protection of online privacy and identity." Journal of Consumer Affairs 38, no. 2 (2004): 217-232. https://doi.org/10.1111/j.1745-6606.2004.tb00865.x
  28. Buchanan, Tom, Carina Paine, Adam N. Joinson, and Ulf-Dietrich Reips. "Development of measures of online privacy concern and protection for use on the Internet." Journal of the American Society for Information Science and Technology 58, no. 2 (2007): 157-165. https://doi.org/10.1002/asi.20459
  29. LaRose, Robert, Nora Rifon, Sunny Liu, and Doohwang Lee. "Understanding online safety behavior: A multivariate model." In The 55th Annual Conference of the International Communication Association, New York City. 2005.
  30. Bandura, Albert. "Self-efficacy: toward a unifying theory of behavioral change." Psychological review 84, no. 2 (1977): 191. https://doi.org/10.1037/0033-295X.84.2.191
  31. Milne, George R., Lauren I. Labrecque, and Cory Cromer. "Toward an understanding of the online consumer's risky behavior and protection practices." Journal of Consumer Affairs 43, no. 3 (2009): 449-473. https://doi.org/10.1111/j.1745-6606.2009.01148.x
  32. Yao, Mike Z., and Daniel G. Linz. "Predicting self-protections of online privacy." CyberPsychology & Behavior 11, no. 5 (2008): 615-617. https://doi.org/10.1089/cpb.2007.0208
  33. J. Hun Park and Suk Hyun Lee. "Privacy,User Behavior,User Attitude, Attitude-Behavior Inconsistency,Path Analysis." Korean Journal of Public Administration 45, no. 1 (2007): 281-307.
  34. Lee, Doohwang, Robert Larose, and Nora Rifon. "Keeping our network safe: a model of online protection behaviour." Behaviour & Information Technology 27, no. 5 (2008): 445-454. https://doi.org/10.1080/01449290600879344
  35. Zhang, Lixuan, and William C. McDowell. "Am I really at risk? Determinants of online users' intentions to use strong passwords." Journal of Internet Commerce 8, no. 3-4 (2009): 180-197. https://doi.org/10.1080/15332860903467508
  36. Mattson, Marifran. "Toward a reconceptualization of communication cues to action in the health belief model: HIV test counseling." Communications Monographs 66, no. 3 (1999): 240-265. https://doi.org/10.1080/03637759909376476
  37. Jun Hong Kim. "The Effects of Victimization Experiences as Internal Cues to Action on Preventive Behavioral Intentions in Cyber Communication: Modifying Health Belief Model." Journal of Cybercommunication 27, no. 3 (2010): 5-46.
  38. Wonchang Jang, and Ilsoon Shin. "The Online Privacy Policy: Recognition, Confirmation and its Effects on Online Transaction Behavior*." Journal of The Korea Institute of Information Security and Cryptology 22, no. 6 (2012): 1419-1427.
  39. Min Sik Lee. "The Reactions to Cybercrime Victimization: Testing a Generic Model.." Jounal of Victimology 10, no. 2 (2002): 209-247
  40. Jihye Kim. "Analysis of the consumer privacy protection behavior in online based on protection motivation theory." Doctoral Dissertation, Seoul National University (2010).
  41. Hoffman, Donna L., Thomas P. Novak, and Patrali Chatterjee. "Commercial scenarios for the Web: opportunities and challenges." Journal of Computer-Mediated Communication 1, no. 3 (1995): 0-0.
  42. McCole, Patrick, Elaine Ramsey, and John Williams. "Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns." Journal of Business Research 63, no. 9 (2010): 1018-1024. https://doi.org/10.1016/j.jbusres.2009.02.025
  43. Song, J. J. "SPSS/AMOS statistical analytic method for thesis." Paju: 21C Book Company (2008).

Cited by

  1. Adaptive Multi-Layer Security Approach for Cyber Defense vol.16, pp.5, 2015, https://doi.org/10.7472/jksii.2015.16.5.01
  2. Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework vol.19, pp.3, 2014, https://doi.org/10.7838/jsebs.2014.19.3.065
  3. Knowledge and Practice of Dental Practitioners Regarding Patient’s Personal Information vol.17, pp.2, 2017, https://doi.org/10.17135/jdhs.2017.17.2.99
  4. A Study on Factors Affecting the Investment Intention of Information Security vol.19, pp.8, 2018, https://doi.org/10.9728/dcs.2018.19.8.1515
  5. 정보보호 교육이 청소년의 정보보호 실천에 미치는 영향 vol.26, pp.2, 2014, https://doi.org/10.21219/jitam.2019.26.2.027
  6. Effect of Age, Income, and Digital Literacy on Online Personal Information Exposure and Protection Behaviors vol.63, pp.5, 2014, https://doi.org/10.20879/kjjcs.2019.63.5.007
  7. 대화형 에이전트의 설명 기능과 프라이버시 염려 수준에 따른 사용자 경험 차이에 관한 연구 vol.20, pp.2, 2020, https://doi.org/10.5392/jkca.2020.20.02.203
  8. 중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로 vol.29, pp.1, 2020, https://doi.org/10.5859/kais.2020.29.1.51