The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users

Eun Suk Lee, Zoon Ky Lee, Kyung Jin Cha

Abstract


As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.


Full Text:

PDF

References


Ajzen, I., “Constructing a TPB questionnaire: Conceptual and methodological considerations,” 2002.

Baek, S. I. and Choi, D. S., “Exploring User Attitude to Information Privacy,” The Journal of Society for e-Business Studies, Vol. 20, No. 1, pp. 45-59, 2015.

Boss, S. R. et al., “What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors,” MIS Quarterly, Vol. 39, No. 4, pp. 837-864, 2015.

Buchanan, T. et al., “Development of measures of online privacy concern and protection for use on the Internet,” Journal of the American Society for Information Science and Technology, Vol. 58, No. 2, pp. 157-165, 2007.

Culnan, M. J. and Robert, J. B., “Consumer privacy: Balancing economic and justice considerations,” Journal of social issues, Vol. 59, No. 2, pp. 323-342, 2003.

Hoffman, D. L., T. P. Novak, and M. A. Peralta, “Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web,” The Information Society, Vol. 15, No. 2, pp. 129-139, 1999.

Interactive, H., “Privacy on and off the Internet: What consumers want,” Privacy and American Business, pp. 1-127, 2002.

Jacoby, J., Speller, D. E., and Kohn, C. A., “Brand choice behavior as a function of information load,” Journal of Marketing Research, Vol. 11, No. 1, pp. 63-69, 1974.

Jeon, G.-G., “Development of a multidimensional coping scale,” Korean Journal of Clinical Psychology, Vol. 13, No. 1, pp. 114-135, 1994.

Joinson, A. N. et al. “Watching me, watching you: privacy attitudes and reactions to identity card implementation scenarios in the United Kingdom,” Journal of Information Science, Vol. 32, No. 4, pp. 334-343, 2006.

Kakao Corp., 2015 3rd Investor Relations, 2015.

Kelley, P. G. et al., “A nutrition label for privacy,” Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, No. 4, 2009.

Kenneth, B., Data Surveillance Bill, 1969.

Kim, J.-J. and Kweon, E.-H., “A Study on the Therapists’ Protective Actions of Medical Information Privacy-With a focus on physical and occupational therapists,” The Journal of the Korea institute of electronic communication sciences, Vol. 7, No. 2, pp. 447-455, 2012.

Kim, M., “A Study on Protecting Patients’ Privacy of Obstetric and Gynecologic Nurses,” Korean Journal of Women Health Nursing, Vol. 18, No. 4, pp. 268-278, 2012.

KISA, “A Study of Reform of Personal Information Law System by ICT Environment Change,” 2012.

Korea Communications Commission, “Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.,” 2001.

Korea Internet Law Association, “A Legislative Research of Privacy and Effective Use of Personal Information,” pp. 65-153, 2009.

Lee, Z.-K., Choi, H.-J., and Choi, S.-A., How Service Usefulness and Privacy Concern Influence on Service Acceptance, The Journal of Society for e-Business Studies, Vol. 12, No. 4, pp. 37-51, 2007.

Li, T. and Slee, T., “The Effects of Information Privacy Concerns on Digitizing Personal Health Records,” Journal of the Association for Information Science and Technology, Vol. 65, No. 8, pp. 1541-1554, 2014.

Malhotra, N. K., Kim, S. S., and Agarwal, J., “Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model,” Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004.

McDonald, A. M. and Cranor, L. F., “Cost of reading privacy policies, the,” ISJLP, No. 4, p. 543, 2008.

Milne, G. R. and Culnan, M. J., “Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices,” Journal of Interactive Marketing, Vol. 18, No. 3, pp. 15-29, 2004.

Milne, G. R., “How well do consumers protect themselves from identity theft?,” Journal of Consumer Affairs, Vol. 37, No. 2, pp. 388-402, 2003.

MOPAS, “Personal Information Protection Act Guidelines,” 2011.

National Human Rights Commission of Korea, “Report of Information and Communication Technologies(ICTs) and Human Rights,” 2013.

Pavlou, P. A. and Fygenson, M., “Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior,” MIS quarterly, Vol. 30, No. 1, pp. 115-143, 2006.

Personal Information Protection Commission, “2015 Annual Report on Personal Information Protection,” 2015.

Personal Information Protection Commission, “A study on improvement and analysis of change since enforcement personal information protection act,” 2012.

Phelps, J., Nowak, G., and Ferrell, E., “Privacy concerns and consumer willingness to provide personal information,” Journal of Public Policy and Marketing, Vol. 19, No. 1, pp. 27-41, 2000.

Schroder, H. M., Driver, M. J., and Siegfried S., Human information processing: Individuals and groups functioning in complex social situations, New York: Holt, Rinehart and Winston, 1967.

Smith, H. J., Milberg, S. J., and Burke, S. J., “Information privacy: measuring individuals’ concerns about organizational practices,” MIS quarterly, Vol. 20, No. 2, pp. 167-196, 1996.

Smith, H. J., Dinev, T., and Xu, H., “Information privacy research: an interdisciplinary review,” MIS quarterly, Vol. 35, No. 4, pp. 989-1016, 2011.

Taylor, D. G., Davis, D. F., and Jillapalli, R., “Privacy concern and online personalization: The moderating effects of information control and compensation,” Electronic Commerce Research, Vol. 9, No. 3, pp. 203-223, 2009.

Taylor, H., “Most people are ‘privacy pragmatists’ who, while concerned about privacy, will sometimes trade it off for other benefits,” The Harris Poll, Vol. 17, No. 19, p. 44, 2003.

Vail, M. W., Earp, J. B., and Antón, A. I., “An empirical study of consumer perceptions and comprehension of web site privacy policies,” Engineering Management, IEEE Transactions on, Vol. 55, No. 3, pp. 442-454, 2008.

Worthy, M., Gary, A. L., and Kahn, G. M., “Self-disclosure as an exchange process,” Journal of Personality and Social Psychology, Vol. 13, No. 1, p. 59, 1969.


Refbacks

  • There are currently no refbacks.