The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern mo...
The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.
The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.
민완기, 최정수, 장송자, "전자상거래 시장분 석을 위한 방법론 연구: Conjoint Analysis Method를 중심으로 통계분석연구," 제5권 제1호, 2000
이학식, 임지훈 SPSS 12.0 매뉴얼, 법문사, 2005
최성재 남기민, 사회복지행정론, 나남, 2001
Addelman, Sidney, "Orthogonal Main-Effect Plans for Asymmetrical Factorial Experiments," Technometrics, Vol. 4, No. 1, February 1962
Culnan, Mary J. "How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use," MIS Quarterly, Vol. 17, No. 3, Sept 1993. pp. 341-363
Culnan, Mary J. and Pamela K. Armstrong, "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science, Vol. 10, No. 1, January-February 1999, pp. 104-115
Donnenwerth, G.V., and Foa, U.G. "Effect of resource class on retaliation to injustice in interpersonal exchange.," Journal of Personality and Social Psychology, Vol. 29, No. 6, 1974, pp. 785-793
Emerson, R.M. "Exchange theory, Part II: Exchange relations and network structures." In J. Berger, M. Zelditch Jr., and B. Anderson (eds.), Social Theories in Progress. Boston: Houghton Miffl in, 1972, pp. 58-87
Foa, Uriel G. "Interpersonal and Economic Resources," Science, Vol. 171, 1971, pp. 345-351
Fusilier, M.R. and Hoyer, W.D. "Variables affecting perceptions of invasion of privacy in a personnel selection situation." Journal of Applied Psychology, Vol. 65, No. 5, 1980, pp. 623-626
Green, P.E. and Srinivasan, V. "Conjoint analysis in consumer research: Issues and outlook." Journal of Consumer Research, Vol. 5, No. 2, 1978, pp. 103-123
Green, Paul E. and V. Srinivasan, "Conjoint Analysis in Marketing: New Developments with Implications for Research and Practice," Journal of Marketing, Vol. 54, No. 4, 1990, pp. 3-19
Green, P.E., and Wind, Y. "New ways to measure consumer judgments." Harvard Business Review, Vol. 53, No. 4, July-August 1975, pp. 107-117
Hair, J.F, Anderson, R.E., Tatham, R.L., and Black, W.C., Multivarite Data Analy-sis with Readings, Fourth Edition, Prentice-Hall, Inc. 1995
Hann, I.H., Hui, K.L., Sang-Yong Tom Lee, and Ivan P.L. Png, "Overcoming Online Information Piracy Concerns: An Information Processing Theory Approach," Journal of Management Information Systems, Vol. 24, No. 2, Fall 2007, pp. 13-42
Hirschman, E.C. "People as products: Analysis of a complex marketing exchange." Journal of Marketing, Vol. 51, No. 1, January 1987, pp. 98-108
Jourard, S.M. "Some psychological aspects of privacy. Law and Contemporary Problems," Vol. 31, Winter 1966, pp. 307-318
Jupiter Media Metrix, "Seventy Percent of US Consumers Worry About Online Privacy, But Few Take Protective Action," Press Release, Vol. 3, June 2002
Laufer, Robert S. and Maxine Wolfe "Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory," Journal of Social Issues, Vol. 33, No. 3, 1977, pp. 22-42
Milligan, Glenn W., and Martha C. Cooper, "An Examination of Procedures for Determining the Number of Clusters in a Data Set." Psychometrika, Vol. 50, No. 2, 1985, pp. 159-79
Smith, H. Jeff, Sandra J. Milberg and Sandra J. Burke "Information Privacy: Measuring Individuals' Concerns About Organizational Practices," MIS Quarterly, Vol. 20, No. 2, June 1996, pp. 167-196
Stewart, Kathy A. and Albert H. Segars "An Empirical Examination of the Concern for Information Privacy Instrument," Information Systems Research, Vol. 13, No. 1, Mar 2002, pp. 36-49
Stone, Eugene F. and Dianna L. Stone, "Privacy in organizations: theoretical issues, research findings, and protection mechanisms," Research in Personnel and Human Resources Management, Vol. 8, 1990, pp. 349-411
Stone, Eugene F., Hal G. Gueutal, Donald G. Gardner and Stepherd McClure "A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations," Journal of Applied Psychology, Vol. 68, No. 3, 1983, pp. 459-468
Westin, Alan. Testimony before U.S. House of Representatives, Committee on Energy and Commerce, Subcommittee on Commerce, Trade, and Consumer Protection, Hearing on "Opinion Surveys: What Consumers Have To Say About Information Privacy" May No. 8, 2001
Woodman, Richard W., Daniel C. Ganster, Jerome Adams, Michael K. McCuddy, Paul D. Tolchinsky and Howard From kin "A Survey of Employee Perceptions of Information Privacy in Organizations," Academy of Management Journal, Vol. 25, No. 3, 1982, pp. 647-663
※ AI-Helper는 부적절한 답변을 할 수 있습니다.