최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국전자거래학회지 = The Journal of Society for e-Business Studies, v.18 no.1, 2013년, pp.107 - 127
이은곤 (연세대학교 정보대학원) , 김경규 (연세대학교 정보대학원) , 송호현 (연세대학교 정보대학원)
The evolution of IT facilitated the communication and knowledge sharing between the social network service (SNS) users. When the more information about SNS users had been posted in SNS site, SNS users had sometimes exposed in the risk of privacy invasion. To remedy this problem, we had introduced th...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
지각된 행동 통제는 무엇인가? | 지각된 행동 통제(Perceived Behavioral Control)는 “특정 행위를 수행하는데 대한 용이성과 행위에 대한 수행이 행위자의 의지와 통제 하에 있다고 믿는 행위자가 인식하는 수준”이다[3]. 지각된 보안 통제(Perceived Security Control)는 정보 교환 상황에서의 행동 통제의 하나로서 “인증, 무결성, 암호화, 지불수단과 같은 안전 요구 사항을 이행 가능성에 대한 사용자들의 믿음”이다[34, 46, 56, 70]. | |
정보 통제 요소가 SNS 이용자들의 보안 우려와 SNS 사업자에 대한 신뢰에 미치는 효과를 분석한 결과는 어떠한가? | 가장 널리 알려져 있는 SNS 서비스로서 페이스북 이용자를 대상으로 설문 조사를 진행하였다. 총 459개의 자료를 수집하였으며 PLS 알고리즘을 이용하여 분석한 결과, 열람 통제와 확산 통제는 유의하게 SNS 이용자들의 보안 우려를 감소시키고 SNS 서비스 제공자에 대한 신뢰를 증진시킴으로써 SNS 서비스에 대한 만족도와 지속적인 정보 공유 의도를 증가시키는 것으로 조사되었다. 본 연구는 소셜 네트워크 서비스에서 보안 문제를 제기한 선도적인 연구일 뿐 아니라, 실제 구현이 용이한 보안 통제 기법을 소개함으로써 실무적인 측면에서도 가치가 높을 것으로 기대한다. | |
SNS 이용자들은 자신의 사적 정보를 포함한 다양한 정보들을 SNS에 올리는 이유는 무엇인가? | 예를 들어, 페이스북에서는 자신의 프로필을 자발적으로 등록하고, 연락처 정보나 부가적인 정보를 공개하여 개인을 검색할 수 있다[36]. SNS 이용자들은 자신의 사적 정보를 포함한 다양한 정보들을 SNS에 올리고 있는데 이는 자신들의 사생활 등의 사적 정보가 그들의 친구, 가족, 지인 등의 사람들에게 공개되더라도 제한된 범위의 사람들 외의 일반 대중에게는 노출되지 않을 것이라고 믿기 때문이다[1, 69]. 이러한 믿음과는 달리 대부분의 SNS 사이트에서는 SNS 이용자 간의 친구 찾기 등 사이트 이용의 편이성을 높이기 위해, 정보에 대한 접근 권한, 게시된 정보에 대한 타 이용자의 공유, 확산 등을 제한하지 않고 있어 개인정보 보호 메커니즘이 취약하게 설계되어 있다. |
Acquisti, A. and Gross, R., "Imagined communities : Awareness, information sharing, and privacy on the Facebook," Presentation at the 2006 privacy enhancing technologies (PET) workshop, Cambridge, England, 2006.
Ahuja, M., Galletta, D., and Carley, K., "Individual Centrality and Performance in Virtual R&D Groups : An Empirical Study," Management Science, Vol. 49, No. 1, pp. 21-38, 2003.
Ajzen, I., "Behavioral Interventions Based on the Theory of Planned Behavior," Journal of applied social psychology, pp. 1-6, 2006.
Andrews, S., "Privacy and human rights 2002 : An intenrnational survey of privacy laws and developments," http://www.privacyinternational.org/survey/phr2002/, 2002.
Barclay, D., Higgins, C., and Thompson, R., "The Partial Least Squares (PLS) Approach to Causal Modeling : Personal Computer Adoption and Use as an Illustration," Technology Studies, Vol. 2, No. 2, pp. 285-309, 1995.
Beato, F., Kohlweiss, M., and Wouters, K., "Enforcing Access Control in Social Network Sites," Hot Topics in Privacy, pp. 1-11, 2009.
Bhattacherjee, A. and Premkumar, G., "Understanding Changes in Belief and Attitude Toward Information Technology Usage : A Theoretical Model and Longitudinal Test," MIS Quarterly, Vol. 28, pp. 229-254, 2004.
Bhattacherjee, A., "Understanding Information Systems Continuance : An Expectation- Confirmation Model," MIS Quarterly, Vol. 25, No. 3, pp. 351-370, 2001.
Bloter.net, Jung, B. R., "SNS Users per 5 persons in Global," 2012. 3. 2., http://www.bloter.net/archives/99004.
Bock, G. W., Zmud, R. W., and Kim, Y. G., "Behavioral Intention Formation in Knowledge Sharing : Examining the Roles of Extrinsic Motivators, Social- Psychological Forces, and Organizational Climate," MIS Quarterly, Vol. 29, No. 1, pp. 87-111, 2005.
Boyd, D. M. and Ellison, N. B., "Social network sites:Definition, history and scholarship," Journal of Computer-Mediated Communication, Vol. 13, No. 1, pp. 210- 230, 2007.
Cheung, C. and Lee, M., "Trust in Internet Shopping : Instrument Development and Validation Through Classical and Modern Approaches," Journal of Global information Management, Vol. 9, No. 3, pp. 23-35, 2001.
Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling," In Marcoulides, G. A. (ed.), Modern methods for business research, pp. 295- 336, 1998.
Chin, W. W. and Dibbern, J., "Permutation Based Procedure for Multi-Group PLS Analysis : Results of Tests of Differences on Simulated Data and a Cross of Information System Services between Germany and the USA" in Handbook of Partial Least Squares : Concepts, Methods and Applications in Marketing and Related Fields, V. E. Vinzi, W. W. Chin, J. Henseler, and H. Wang (eds), pp. 171-193, 2010.
Chow, K. and Chan, J., "A Dual-Scheme Approach of Cumulus Parameterization for Simulating the Asian Summer Monsoon," Meteorological Applications, Vol. 17, No. 3, pp. 287-297, 2010.
Christy, C., Matthew, and Lee, K. O., "Trust in Internet Shopping : A Proposed Model and Measurement Instrument," Americas Conference on Information Systems, pp. 681-689, 2000.
CNN, Dominique Van Heerden, "Facebook Birthday Invite Leads to Mayhem in Dutch town, Authorities Say," September 24, 2012, http://edition.cnn.com/2012/09/ 22/world/europe/netherlands-facebook-riot/index.html.
Culnan, M. J., "How did They Get My Name?:An Exploratory Investigations of Consumer Attitudes toward Secondary Information Use," MIS Quarterly, Vol. 17, No. 3, pp. 341-363, 1993.
Culnan, M. J. and Bies, R. J., "Consumer privacy : Balancing economic and justice considerations," Journal of SocialIssues, Vol. 59, No. 2, pp. 323-342, 2003.
DeLone, W. H. and McLean, E. R., "Information Systems Success : The Quest for the Dependent Variable," information Systems Research, Vol. 3, No. 1, pp. 60-95, 1992.
Donaldson, T. and Dunfee, T. W., "Towards a unified conception of business ethics : Integrative social contracts theory," Academy of Management Review, Vol. 19, No. 2, pp. 252-284, 1994.
Dwyer, C., Hiltz, S. R., and Passerini, K., "Trust and privacy concern within social networking sites : A comparison of Facebook and MySpace," Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado August, 2007.
eDaily, An, H. S., "The Number of Facebook Users Has Exceeded 1 Billion in 8 Years," 2012, http://edaily.co.kr/ news/ewsRead.edy?SCDJH41&newsid 01620326599689968&DCDA00804& OutLnkChkY.
eDaily, Yang, H. S., "The Privacy Problems occurred in Twitter Case : Including Account Number, Address, Schedule etc., 2011, http://www.edaily.co.kr/news/ NewsRead.edy?SCDJE31&newsid 02059846596118704&DCDA00503& OutLnkChkY.
Fang, Y. H. and Chiu, C. M., "In Justice We Trust : Exploring Knowledge-Sharing Continuance Intentions in Virtual Communities of Practice," Computers in Human Behavior, Vol. 26, No. 2, pp. 235-246, 2010.
Filipe B., Markulf K., and Karel W., "Scramble! Your Social Network Data," Privacy Enhancing Technologies, pp. 211-225, 2011.
Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, pp. 39-50, 1981.
Gatian, A. W., "IS user Satisfaction a Valid Measure of Systems Effectiveness?," Information and Management, Vol. 26, pp. 119-131, 1994.
Gefen, D. and Straub, D. W., "Consumer Trust in B2C e-Commerce and the Importance of Social Presence : Experiments in e-Products and e-Services," Omega, Vol. 32, No. 6, pp. 407-424, 2004.
Gefen, D., Karahanna, E., and Straub, D. W., "Trust and TAM in Online Shopping : An Integrated Model," MIS Quarterly, Vol. 27, No. 1, pp. 51-90, 2003.
Ginzberg, M. J., "Early Diagnosis of MIS Implementation Failure : Promising Results and Unanswered Questions," Management Science, Vol. 27, No. 4, pp. 459-478, 1981.
Greenfield Online, "Online Marketing Research Conducted on Behalf of Better Business Bureau," Cybershoppers Research Report #13197, http://greenfieldcentral.com, 1998.
Hewett, K. and William, O. B., "Dependence, Trust, and Relational Behavior on the Part of Foreign Subsidiary Marketing Operations Implication for Managing Global Marketing Operations," Journal of Marketing, Vol. 65, pp. 51-66, 2001.
Hoffman, D. L., Novak, T. P., and Peralta, M. A., "Information Privacy in the Marketspace : Implications for the Commercial Uses of Anonymity on the Web," Information Society, Vol. 15, No. 2, pp. 129-140, 1999.
Jarvenpaa, S. L. and Tractinsky, N., "Consumer Trust in an Internet Store : A Cross Cultural Validation," Journal of Computer Mediated Communication, Vol. 5, No. 2, pp. 1-35, 1999.
Joinson, A. N., "Looking at, Looking up or Keeping up with People? Motives and Use of Facebook," In : Proc. CHI. ACM Press, pp. 1027-1036, 2008.
Jun, D. Y., Chun, J. M., and Jung, I. L., "An Efficient Privacy-Preserving Data Sharing Scheme in Social Network," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 447-461, 2012.
Jung, S. I., Kim, D. M., and Jung, I. L., "Efficient Hop-based Access Control for Private Social Networks," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 505- 514, 2012.
Kankanhalli, A., Tan, B. C. Y., and Wei, K. K., "Contributing Knowledge to Electronic Knowledge Repositories : an Empirical Investigation," MIS Quarterly, Vol. 29, No. 1, pp. 113-143, 2005.
Kim, S. S. and Son, J. Y., "Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and Its Empirical Test in the Context of Online Services," MIS Quarterly, Vol. 33, No. 1, pp. 49-70, 2009.
Kim, H. S., "A Study on the Possibility of Development ofSocial Media Literacies Using Facebook," Korean Journal of the Learning Sciences, Vol. 6, No. 2, pp. 20-38, 2012.
Kim, J. H. and Lee, H. H., "Implementation of Privacy Protection Policy Language and Module For Social Network Services," Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 53-63, 2011,
Kim, J. S., Kim, K. Y., and Na, K. S., "The Effect of Perceived Privacy Concern on B2C Mall Usage Intention," 2004 Conference of Korean Society of Manage Information Systems, Paper, Seoul, pp. 380- 390, 2004.
Kim, M. J. and Choi, Y. G., "The Role of Twitter on Online and Offline Relationship Formation," Korean Journal of Broadcasting and Telecommunication Studies, Vol. 26, No. 1, pp. 43-82, 2012.
Kim, Y. J., "The Motivation Factors of Relationship Management in SNS : Twitter and Metoday Case," Disertation of Master Degree, Hongik University, 2010.
Kinney, W., "Information Quality Assurance and Internal Control for Management Decision," McGraw-Hill Education, 2000.
Korean Communication Agency, "The Diffusion of SNS(Social Network Service)," 2012.
Koufaris, M., "Applying the Technology Acceptance Model and Flow Theory to Online Consumer Behavior," Information Systems Research, Vol. 13, No. 2, pp. 205-223, 2002.
Koufaris, M. and Hampton-Sosa, W., "The Development of Initial Trust in an Online Company by New Customers," Information and Management, Vol. 41, pp. 377-397, 2004.
Laudon, K. and Laudon, J., "The Essentials of Business Information Systems," 12/E, Prentice Hall, 2012.
Ma, M. and Agawal, R., "Through a Glass Darkly : Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities," Information Systems Research, Vol. 18, No. 1, pp. 42-67, 2007.
Malhotra, N. K., Kim, S. S., and Agarwal, J., "Internet Users' Information Privacy Concerns(IUIPC):The Construct, the Scale, and a Causal Model," Information Systems Research, Vol. 15, No. 4, pp. 336-355, 2004.
Mayer, R. C., Davis, J. H., and Schoorman, F. D., "An Integrative Model of Organizational Trust," Academy of Management Journal, Vol. 20, No. 3, pp. 709-734, 1995.
McKnight, D. H., Choundhury, V. and Karmer, C., "Developing and Validating Trust Measures for e-Commerce : An Integrative Typology," Information Systems Research, Vol. 13, No. 3, 2002.
Milberg, S. J., Burke, S. J., Smith, H. J., and Kallman, E. A., "Values, Personal Information Privacy Concerns, and Regulatory Approaches," Communications of ACM, Vol. 38, No. 12, pp. 65-74, 1995.
Min, C. H. and Ko, W. S., "The Effect of Mobile Privacy Protection Service on Usability of Mobiling Billing Systems," 2005 Conference of Korean Society of Manage Information Systems, Paper, Seoul, pp. 191-198, 2005.
Miyazaki, A. D. and Fernandez, A., "Consumer perceptions of privacy and security risks for online shopping," The Journal of Consumer Affairs, Vol. 35, No. 1, pp. 27-44, 2001.
Nicolaou, A. I. and McKnight, D. H., "Perceived Information Quality in Data Exchanges : Effects of Risk, Trust, and Intention to Use," Information Systems Research, Vol. 17, No. 4, pp. 332-351, 2006.
Nunnally, J. C. and Bernstein, I. H., "Psychometric Theory" (3rd ed.), 1994.
Oliver, R., "A Conceptual Model of Service Quality and Service Satisfaction : Compatible Goals, Different Concept," Advances in Service Marketing and Management, 1993.
Olmo, J. M. C. and Jamilena, D. M. F., "Regression lineal," In Martinez, T. L. (coord.), T cnicas de an lisis de datos eninvestigaci n de mercados, pp. 247-280, 2008.
Park, C. H. and Kim, Y. G., "Identifying Key Factors Affecting Consumer Purchase Behavior in an Online Shopping Context," International Journal of Retail and Distribution Management, Vol. 31, pp. 16-29, 2003.
Park, Y. S., "Who Controls the User's Privacy on Social Networking Sites," Journal of Industrial Property, Vol. 37, pp. 337-375, 2012.
Pavlou, P. A. and Gefen, D., "Building Effective Online Marketplaces with Institution- Based Trust," Information Systems Research, Vol. 15, No. 1, pp. 37-59, 2004.
Warren, S. D. and Brandeis, L. D., "The Right to Privacy," Harvard Law Review, Vol. IV, No. 5, pp. 193-220, 1890.
Sandhu, R. S. and Samarati, P., "Access Control : Principles and Practice," IEEE Communications Magazine, pp. 40-48, 1994.
Son, J. Y. and Kim, S. S., "Internet Users' Information Privacy-Protective Responses : A Taxonomy and A Nomological Model, MIS Quarterly, Vol. 32, No. 3, pp. 503-529, 2008.
Stewart, K. L., "Trust Transfer on the World Wide Web," Organization Science, Vol. 14, No. 1, pp. 5-17, 2003.
Stutzman, F., "An Evaluation of Identity- Sharing Behavior in Social Network Communities," International Digital and Media Arts Journal, Vol. 3, No. 1, pp. 10-18, 2006.
Suh, B. M. and Han, I. G., "The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce, International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 135-161, 2003.
Teeni, D., "Review : ACognitive-Affective Model of Organizational Communication For Designing IT," MIS Quarterly, Vol. 25, No. 2, pp. 251-312, 2001.
Wang, Y. D. and Emurian, H. H., "An Overview of Online Trust : Concepts, Elements, and Implications," Computers in Human Behavior, Vol. 21, No. 1, pp. 105-125, 2005.
Wasko, M. M. and Faraj, S., "Why Should I share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice," MIS Quarterly, Vol. 29, No. 1, pp. 35-57, 2005.
Werts, C. E., Linn, R. L., and Joreskog. K. G., "Intraclass Reliability Estimates : Testing Structural Assumptions," Educational and Psychological Measurement, Vol. 34, pp. 25-33, 1973.
Westbrook, R. A. and Reilly, M. D., "Value-Percept Disparity : An Alternative to the Disconfirmation of Expectations Theory of Cons user Satisfaction," Advances in Consumer Research, Vol. 10, pp. 256-261, 1983.
Westin, A. F., "Privacy and Freedom," Athenaum, New York, 1967.
Wiemann, J. M., "Explication and Test of a Model of Communicative Competence," Human Communication Research, Vol. 3, pp. 195-213, 1977.
Wold, H., "Systems Under Indirect Observation Using PLS, in A Second Generation of Multivariate Analysis," C. Fornell (Ed.), Praeger, New York, pp. 325-347, 1982.
Yoo, I., Shin, J. S., Lee, K. K., and Choi, H. L., "Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users," Journal of Information Technology Applications and Management, Vol. 25, No. 4, pp. 37-59, 2008.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.