$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

핀테크 사용에 대한 정보프라이버시 염려와 이용자 저항에 대한 연구: 조절초점성향과의 상호작용 효과 고찰
Fintech Users' Information Privacy Concerns and User Resistance: Investigating the Interaction Effect with Regulatory Focus 원문보기

情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.26 no.1, 2016년, pp.209 - 226  

이애리 (연세대학교 바른ICT연구소) ,  안효영

초록
AI-Helper 아이콘AI-Helper

최근 금융과 IT가 결합된 핀테크에 대한 관심이 증가하고 있다. 현재 핀테크 서비스는 확산 초기 단계에 있으며, 사용 확산을 위한 이슈로서 정보 보안 이슈가 대두되고 있다. 본 연구에서는 핀테크 서비스 실 사용자들이 인지하는 정보프라이버시 염려를 중심으로 사용 저항 정도를 분석하고, 이들에 영향을 주는 요인들로 사회적 영향 정도와 모바일 인터넷 활용 능력을 분석하였다. 특히, 본 연구에서는 사용자의 조절초점성향과 정보프라이버시 염려의 상호작용이 사용자 저항에 미치는 효과를 검증하였다. 이를 통해, 핀테크 서비스에 대한 저항 감소 및 사용 확산을 위한 전략적 시사점을 제공하고자 한다.

Abstract AI-Helper 아이콘AI-Helper

Recently, there is a growing interest in Fintech which is a business based on using IT to provide financial services. At the early stage of diffusion of Fintech, one of the issues raised is the concern for information security. This study examines actual users' information privacy concern and user r...

주제어

질의응답

핵심어 질문 논문에서 추출한 답변
핀테크란? 핀테크(FinTech)는 금융(finance)분야에서 IT기술을 활용하여 금융시스템을 보다 효율적으로 제공하는 서비스 산업을 말한다[1]. 여기서 효율성이란 금융서비스를 보다 낮은 비용과 향상된 보안성 및 편의성을 제공하여 금융소비자들이 더 높은 효용을 달성하게 해주는 것을 의미한다[1].
핀테크는 어떠한 분야로 구분하는가? 여기서 효율성이란 금융서비스를 보다 낮은 비용과 향상된 보안성 및 편의성을 제공하여 금융소비자들이 더 높은 효용을 달성하게 해주는 것을 의미한다[1]. 핀테크는 제공하는 금융서비스 유형에 따라 크게 송금, 결제, 자산관리, 투자, 보안 및 데이터분석 분야로 구분할 수 있다[2]. 세계적인 IT시장조사기관 가트너의 전망에 의하면, 최근 애플(애플페이), 구글(구글월렛), 이베이(페이팔), 아마존(아마존페이먼트), 페이스북 등 글로벌 IT기업의 진입으로 가장 경쟁이 심한 모바일 결제 시장의 경우, Fig.
CFIP는 어떻게 구성되는가? [10]의 정보프라이버시 염려(CFIP; Concern for Information Privacy)이다[21]. 이 지표는 과도한 양의 개인정보가 웹 사이트에 의해 수집되고 저장되는 것에 대한 염려인 수집(collection), 하나의 목적으로 수집된 개인정보가 본래 의도된 목적 이외의 다른 용도로 분석되거나 사용되는 것에 대한 염려인 2차적 사용(secondary use), 개인에 관한 정보가 외부인에 의해 불법적으로 접근되거나 이용당하는 것에 대한 염려인 비허가된 접근(unauthorized access), 개인정보 입력시 발생할 수 있는 오류를 제대로 확인 수정할 수 있는가에 관한 염려인 오류(error)로 구성된다.
질의응답 정보가 도움이 되었나요?

참고문헌 (65)

  1. Gil Jinse, Hyun Gyungmin, Park Jongil, Kim Sungjin and Park Jangbae, Why now Fintech. Connecting Lab, Miraebook, Aug. 2015. 

  2. Yoon Jong Moon, "The requirement of value creation of fintech and implication," The credit finance research institute, Research Report, Jan. 2015. 

  3. Kim Gyusoo and Lee Slgi, "2014 Survey of using behavior in means of payment," The Bank of korea, Jan. 2015. 

  4. Stewart, K. and Segars, A.H., "An empirical examination of the concern for information privacy instrument," Information Systems Research, vol. 13, no. 1, pp. 36-49, Mar. 2002. 

  5. Miyazaki, A.D., and Fernandez, A., "Internet privacy and security: An examination of online retailer disclosures," Journal of Public Policy & Marketing, vol. 19, no. 1, pp. 54-61, Spring, 2000. 

  6. UCLA Center for Communication Policy, The UCLA Internet report: Surveying the digital future, 2000. 

  7. Park Jeonggook, "Fintech and information privacy," Korea Information Science Society Review, pp.23-32, Jun. 2015. 

  8. Culnan, M.J., "How did they get my name?: An exploratory investigation of consumer attitudes toward secondary informationuse," MIS Quarterly, vol. 17, no. 2, pp.341-363, Sep. 1993. 

  9. Jung Joonho and Kim Jeongsook, "Service development and security issues in fintech," Journal of Multimedia Information System, 10(1), pp.9-15, Mar. 2015. 

  10. Smith, H.J., Milberg, J.S., and Burke, S.J., "Information privacy : Measuring individuals' concerns about organizational practices," MIS Quarterly, vol. 20, no. 2, pp. 167-196, Jun. 1996. 

  11. Ram, S., "A model of innovation resistance," Advances in Consumer Research, vol. 14, pp. 208-212, 1987. 

  12. Higgins, E.T., "Beyond pleasure and pain," American Psychologist, vol. 52, pp. 1280-1300, Dec. 1997. 

  13. Warren, S.D. and Brandeis, L.D., "The right to privacy," Harvard law review, pp. 193-220, Dec. 1890. 

  14. Ki Sojin and Lee Sooyoung, "Exploring categories of SNS user on the basis of privacy concern and self-efficacy," Korean Journal of Journalism & Communication Studies, 57(1), pp. 81-110, Feb. 2013. 

  15. Westin, A.F., "The Privacy Concerns & Consumer Choice Survey," Privacy & American Business, 1998. 

  16. Lee Mina and Sim Jaewoong, "The moderating effect by gender in the relationship between the perception of online privacy and use of privacy protection strategy," Media, Gender & Culture, 12, pp. 165-190, Dec. 2009. 

  17. Lee Hwansoo, Lim Dongwon and Zo Hangjung, "Personal information overload and user resistance in the big data age," Biblographic Info: J Intell Inform Syst 2013 March, 19(1), pp. 125-139, Mar. 2013. 

  18. Jang Sungho and Lee Kidong, "Privacy risk of social network service and user resistance," The e-Business Studies, 15(3), pp. 323-338, Jun. 2014. 

  19. Harris. National survey on consumer privacy attitudes. 2014. Available: http://www.epic.org/privacy/survey 

  20. Westin, A.H. and Associates Inc., "Ecommerce and privacy: What net users want." Privacy and American Business and Pricewaterhousecoopers. LLP., 1998. 

  21. Baek Seungik and Choi Duksun, "Exploring user attitude to information privacy," The Journal of Society for e-Business Studies, 20(1), pp. 45-59, Dec. 2014. 

  22. Choi Miyoung and Lee Sangyong, "A conjoint analysis of online information privacy concerns: A case in korea," Information Systems Review, 18(3), pp. 45-65, Sep. 2008. 

  23. Yoo Pilhwa and Lee Seunghee, "Study on the innovation resistance of consumers in adoption process of new product," Business Research, 23(3), pp. 218-249, May. 1994. 

  24. Malhotra, N.K., Kim, S.S., and Agarwal, J., "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model," Information Systems Research, vol. 15, no. 4, pp. 336-355, Dec. 2004. 

  25. George, F., "The theory of planned behavior and internet purchasing," Internet Research, vol. 14, no. 3, pp. 198-212, 2004. 

  26. Tufecki, Z., "Can you see me now? Audience and disclosure regulation in online social network sites, bulletin of Science," Technology & Society, vol. 28, no. 1, pp. 20-36, Feb. 2008. 

  27. Youn, S., "Teenagers' perception of online privacy and coping behaviors: A risk-benefit appraisal approach," Journal of Broadcasting & Electronic Media, vol. 49, no. 1, pp. 86-110, Mar. 2005. 

  28. Dinev, T., and Hart, P., "Internet privacy concerns and social awareness as determinants of intention to transact," International Journal of Electronic Commerce, vol. 10, no. 2, pp. 7-29, Jun. 2005. 

  29. Cialdini, R.B. and Trost, M.R., "Social influence: Social norms, conformity, and compliance", In: Gilbert, D.T. and Fiske, S.T. (Eds.), The handbook of social psychology: Vol. 2 (4th ed), New York: McGraw-Hill, pp. 151-192, 1998. 

  30. Fulk, J., Steinfield, C. W., Schmitz J. and Power, J.G., "A social information processing model of media use in organizations," Communication Research, vol. 14, no. 5, pp. 529-552, Oct. 1987. 

  31. Ahearne, M., Mathieu, J., and Rapp, A., "To empower or not to empower your sales force? An empirical examination of the influence of leadership empowerment behavior on customer satisfaction and performance," Journal of Applied psychology, vol. 90, no. 5, pp. 945, Sep. 2005. 

  32. Deutsch, M. and Gerard, H.B., "A study of normative and information social influences upon individual judgment", Journal of Abnormal and Social Psychology, vol. 51, pp. 629-636, Nov. 1955. 

  33. Rogers, E. M., Diffusion of Innovations(4th ed.), New York: The Free Press, 1995. 

  34. Huh Jongho, "The moderating role of the type of option and regulatory focus on the option framing effects," Korean Marketing Review, 22(1), pp. 141-159, Oct. 2007. 

  35. Choi Jayoung, Lee Soowon, Jang Eunyoung and Han Chungseok, "The role of chronic regulatory focus in online information seeking behavior : focused on product review, the number of alternatives and searching depth," Journal of Marketing Management Research, 17(3), pp. 1-24, Jul. 2012. 

  36. Sheth, J.N., "Psychology of innovation resistance: the less developed concept." Research in Marketing, vol. 4, no. 3, pp. 273-283, 1981. 

  37. Ram, S., and Sheth, J. N., "Consumer resistance to innovations: the marketing problem and its solutions," Journal of Consumer Marketing, vol. 6, no. 2, pp. 5-14, 1989. 

  38. Lapointe, L. and S. Rivard, "A multi level model of resistance to information technology implementation," MIS Quarterly, vol. 29, no. 3, pp. 461-491, Sep. 2005. 

  39. Moldovan, S. and Goldenberg, J., "Cellular automata modeling of resistance to innovations: effects and solutions," Technological Forecasting and Social Change, vol. 71, no. 5, pp. 425-442, Jun. 2004. 

  40. Yoon Sukyung, Kim Myeongji and Choi Junho, "Effects of innovation characteristics and user characteristics on the adopting e-Books : focused on innovation resistance model," International Journal of Contents, 14(8), pp. 61-73, Feb. 2014. 

  41. Son, J.Y. and Kim, S.S., "Internet users' information privacy-protective responses: A taxonomy and a nomological model," Mis Quarterly, vol. 32, no. 3, pp. 503-529, Sep. 2008. 

  42. Lee Dongjoo and Kim Myoungsoo, "A study on the e-Commerce adopters' information privacy concerns and response behaviors," The e-Business Studies, 12(2), pp. 365-383, Jun. 2011. 

  43. Szmigin, I., and Foxall, G., "Three forms of innovation resistance: the case of retail payment methods," Technovation, vol. 18, no. 6, pp. 459-468, Jan. 1998. 

  44. Lee Bonggyou, Lee Sungjoon, Seoh Hyunsik and Kim Junho, "Investigating the adoption of IPTV services influenced by socio-cultural factor, flow experience and perceived behavioral control," Journal of Internet Computing and Service, 11(3), pp. 105-119, Jun. 2010. 

  45. Choi Hyukra and Shin Jeongshin, "Antecedents to internet privacy concern and their effect on perceived trust for the internet transaction," The Journal of Information Systems, 16(3), pp. 21-44, Sep. 2007. 

  46. Juang, W.S., Lei, C.L., and Liaw, H.T., "Privacy and anonymity protection with blind threshold signatures," International Journal of Electronic Commerce, vol. 7, no. 2, pp. 143-157, Mar. 2002. 

  47. Donaldson, T. and Dunfee, T.W.."Towards a unified conception of business ethics: integrative social contracts theory." Academy Management Review, vol. 19, no. 2, pp. 252-284, Apr. 1994. 

  48. KISA and Yonsei university Industry-Academic Cooperation Foundation, Developing Privacy Survey Instrument, 2009. 

  49. Mayer, R.C., Davis, J.H., and Schoorman, F.D., "An integrative model of organizational trust." Academy of management review, vol. 20, no. 3, pp. 709-734, Jul. 1995. 

  50. Ajzen, I., "The theory of planned behavior," Organizational behavior and human decision processes, vol. 50, no. 2, pp. 179-211, Dec. 1991. 

  51. Fisher, R.J. and Price, L.L., "An Investigation into the social context of early adoption behavior," Journal of Consumer Research, vol. 19, pp. 477-486, Dec. 1992. 

  52. Higgins, E.T., "How self-regulation creates distinct values: The case of promotion and prevention decision making," Journal of Consumer Psychology, vol. 12, no. 3, pp. 177-191. 2002. 

  53. Ahn Kwangho, Lee Jieun, and Jeon Jooeon, "The effects of luxury brand-self identification on brand attachment and brand commitment - the moderating role of regulatory focus," Asia Marketing Journal, 10(4), pp. 1-33, Jan. 2008. 

  54. Ae Ri Lee, Kyung Hee Kang, and Choong C Lee, "A comparative study on smartphone app store use based on smartphone adoption stages: focusing individual characteristics and perceptions toward technology," Entrue Journal of Information Technology, 10(2), pp. 181-198, Jul. 2011. 

  55. Angst, C.M., and Agarwal, R., "Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion," MIS Quarterly, vol. 33, no. 2, pp. 339-370, Jun. 2009. 

  56. Markus M.L., "Power, politics, and MIS implementation," Communications of the ACM, vol. 26, no. 6, pp. 430-444, Jun. 1983. 

  57. Cranor, L.F., Reagle, J., and Ackerman, M.S., Beyond concern: understanding net users' attitudes about online privacy, The Internet upheaval: raising questions, seeking answers in communications policy, 2000. 

  58. Hair, J.F., Anderson, R.E., Tatham, R.L., and Black, W.C., "Multivariate data analysis with readings," (5th ed.). NY: Macmillan. 1998. 

  59. Gefen, D., Straub, D., and Boudreau, M., "Structural equation modeling and regression: Guidelines for research practice," Communications of the AIS, vol. 4, no. 7, pp. 1-79, Oct. 2000. 

  60. Hess, T., Fuller, M., and Campbell, D., "Designing interfaces with social presence: using vividness and extraversion to create social," Journal of the Association for Information Systems, vol. 10, no. 12, pp. 889-919, Jan. 2009. 

  61. Chin, W.W., "Issues and opinion on structural equation modeling," MIS Quarterly, vol. 22, no. 1, pp. 7-16, Mar. 1998. 

  62. Yoo, Y.J., and Alavi, M., "Media and group cohesion: relative influences on social presence, task participation, and group consensus," MIS Quarterly, vol. 25, no. 3, pp. 371-390, Sep. 2001. 

  63. Nowak, G.J. and Phelps, J., "Direct marketing and the use of individual-level consumer information: determining how and when privacy matters," Journal of Direct Marketing, vol. 9, no. 3, pp. 46-60, Summer, 1995. 

  64. Lee Cheol Gi and Lee Dong Jin, "An empirical study on relationships between organizational justice and employee's attitude - investigating a moderation effect of job burnout," Korean Journal of Business Administration, 25(8), pp. 3375-3395, Nov. 2012. 

  65. Chung Sang Hee and Lee Jung Yoon, "The relation between perfectionism and somatization among children: The moderating effects of stress-coping behaviors," Korean Journal of Counseling, 13(2), pp. 1029-1042, Feb. 2012. 

저자의 다른 논문 :

관련 콘텐츠

오픈액세스(OA) 유형

FREE

Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문

이 논문과 함께 이용한 콘텐츠

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로