$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

IoT 기반 스마트 홈카메라 이용환경에서의 프라이버시 패러독스 현상에 관한 연구: 사용경험 비교연구를 중심으로
A Study on the Privacy Paradox in the IoT-based Smart Home Camera Usage Environment: Focusing on a Comparative Study of User Experience 원문보기

Journal of information technology applications & management = 한국데이타베이스학회지, v.28 no.6, 2021년, pp.145 - 161  

루진단 (MIS Department in Chungbuk National University) ,  권순동 (MIS Department in Chungbuk National University)

Abstract AI-Helper 아이콘AI-Helper

Recently, as personal information utilization devices such as IoT, artificial intelligence, and wearable devices that focus on the individual have spread, privacy violations are also increasing. However, the privacy paradox of providing personal information to enjoy services while worrying is gettin...

주제어

표/그림 (10)

참고문헌 (62)

  1. Acquisti, A. and Grossklags, J., "Privacy and rationality in individual decision making", IEEE Security & Privacy, Vol. 3, No. 1, 2005, pp. 26-33. 

  2. Aleisa, N., Renaud, K., and Bongiovanni, I., "The privacy paradox applies to IoT devices too: A Saudi Arabian study", Computers & Security, Vol. 96, 101897, 2020. 

  3. Barnes, S. B., "A privacy paradox: Social networking in the United States", First Monday, Vol. 11, No. 9, 2006. 

  4. Barth, S. and De Jong, M. D., "The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior: A systematic literature review", Telematics and informatics, Vol. 34, No. 7, 2017, pp. 1038-1058. 

  5. Belanger, F. and Crossler, R. E., "Privacy in the digital age: A review of information privacy research in information systems", MIS Quarterly, Vol. 35, No. 4, 2011, pp. 1017-1041. 

  6. Bhattacherjee, A., "An empirical analysis of the antecedents of electronic commerce service continuance", Decision support systems, Vol. 32, No. 2, 2001, pp. 201-214. 

  7. Blank, G., Bolsover, G., and Dubois, E., "A new privacy paradox: Young people and privacy on social network sites", In Prepared for the Annual Meeting of the American Sociological Association, Vol. 17, 2014. 

  8. Brakus, J. J., Schmitt, B. H., and Zarantonello, L., "Brand experience: What is it? How is it measured? Does it affect loyalty?", Journal of marketing, Vol.73, No. 3, 2009, pp. 52-68. 

  9. Chae, J. M., "The Effect of Mobile Fashion Shopping Characteristics on Consumer's Purchase Intention: Applying the Technology Acceptance Model", Fashion & Textile Research Journal, Vol. 18, No. 1, 2016, pp. 38-47. 

  10. Chae, J. M., "The Effects of Shopping Value, Ease of Use, and Usefulness on Mobile Purchase Intention", Korean Journal of the Science of Emotion & sensibility, Vol. 20, No. 2, 2017, pp. 73-86. 

  11. Choi, G. B., "An Empirical Study on the Post Acceptance of Mobile Banking Service", Internet E-commerce Research, Vol. 12, No. 3, 2012, pp. 1-27. 

  12. Choi, H. S., Lee, M. S., and Lee, H. M., "Is There a Privacy Paradox in the Online Purchasing Context?: The Study on the Effects of Privacy Concern and Online Purchasing Behavior", Journal of Product Research, Vol. 37, No. 5, 2019, pp. 1-13. 

  13. Choi, S. J., "An Empirical Study of Social Network Service (SNS) Continuance: Incorporating the Customer Value-Satisfaction-Loyalty Model into the IS Continuance Model", Asia Pacific Journal of Information Systems, Vol. 23, No. 4, 2013, pp. 1-28. 

  14. Davis, F. D., "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 319-340. 

  15. Fishbach, A. and Dhar, R., "Goals as excuses or guides: The liberating effect of perceived goal progress on choice", Journal of Consumer Research, Vol. 32, No. 3, 2005, pp. 370-377. 

  16. Fornell, C. and Larcker, D. F., "Evaluating structural equation models with unobservable variables and measurement error", Journal of marketing research, Vol. 18, No. 1, 1981, pp. 39-50. 

  17. Gao, T., Sultan, T. F., and Rohm, A. J., "Factors influencing Chinese youth consumers' acceptance of mobile marketing", Journal of Consumer Marketing, Vol. 27, No. 7, 2010, pp. 574-583. 

  18. Ginosar, A. and Ariel, Y., "An analytical framework for online privacy research: What is missing?", Information & Management, Vol. 54, No. 7, 2017, pp. 948-957. 

  19. Guo, X., Zhang, X., and Sun, Y., "The privacy-personalization paradox in mHealth services acceptance of different age groups", Electronic Commerce Research and Applications, Vol. 16, 2016, pp. 55-65. 

  20. Hassenzahl, M., "User experience (UX) towards an experiential perspective on product quality", In Proceedings of the 20th Conference on l'Interaction HommeMachine, 2008, pp. 11-15. 

  21. Hoch, S. J., "Product experience is seductive", Journal of consumer research, Vol. 29, No. 3, 2002, pp. 448-454. 

  22. Jun, S. Y., Ho, H. J., and Kang, S. J., "The Effects of Risk Perception on the Relative Role of Brand and Price in Internet Shopping Mall", Journal of Consumer Studies, Vol. 14, No. 2, 2003, pp. 19-43. 

  23. Karahanna, E., Straub, D. W., and Chervany, N. L., "Information technology adoption across time: A cross-sectional comparison of pre-adoption and postadoption beliefs", MIS Quarterly, Vol. 23, No. 2. 1999, pp. 183-213. 

  24. Kim, H. J. and Jung, C. H., "The Impacts of Commodity and User Characteristics on Customers' Intention to Reuse in Mobile Banking Services", The Journal of Business Education, Vol. 21, 2008, pp. 215-246. 

  25. Kim, J. I. and Kim, I. S., "A Study on how Smartphone Users Experiences Affect Consumer Loyalty Affect", Global Business Administration Review, Vol. 11, No. 1, 2014, pp. 179-203. 

  26. Kim, J. K. and Kim, S. H., "A Study on Privacy Paradox between Privacy Concern and Information Disclosure Behavior: Focus on Privacy Calculus Theory", Entrue Journal of Information Technology, Vol. 13, No. 3, 2014, pp. 139-152. 

  27. Kim, M., "Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras", The Korea Contents Society, Vol. 16, No. 9, 2016, pp. 329-338. 

  28. Kim, Y. G. and Woo, E. J., "Privacy Concerns Within Personalization Based on the Internet of Things(IoT): A Perspective from the Privacy Paradox", The Tourism Sciences Society Of Korea, Vol. 42, No. 7, 2018, pp. 71-84. 

  29. Kim, Y. K., "Six components of Smart Home (Home IoT) Ecosystem - Communication, Home appliance, and IT companies need mutual cooperation for Global Competitiveness", Digico Report, KT Economic Management Research Institute, 2014. 

  30. Kokolakis, S., "Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon", Computers & security, Vol. 64, 2017, pp. 122-134. 

  31. Kuratko, D. F., "Entrepreneurial leadership in the 21st century: Guest editor's perspective", Journal of Leadership & Organizational Studies, Vol. 13, No. 4, 2007, pp. 1-11. 

  32. Kwon, S. H., Lim, Y. W., and Kim, H. J., "A study on the usage intention of AI(artificial intelligence) speaker", Journal of the Korea Society of Computer and Information, Vol. 25, No. 1, 2020, pp. 199-206. 

  33. Lee, A. R., "The Privacy Paradox and User Values in Internet of Things: Investigating the Moderating Effect of Self-Efficacy and Differences between Groups of Demographic Characteristics", The E-business Studies, Vol. 21, No. 1, 2020, pp. 205-223. 

  34. Lee, H. S., Lim, D. W., and Zo, H. J., "Personal Information Overload and User Resistance in the Big Data Age", Journal of Intelligence and Information Systems, Vol. 19, No. 1, 2013, pp. 125-139. 

  35. Lee, J. M. and Rha, J. Y., "Personalization-privacy paradox and consumer conflict with the use of location-based mobile commerce", Computers in Human Behavior, Vol. 63, 2016, pp. 453-462. 

  36. Lee, K. T. and Noh, M. J., "Factors Influencing the Usage Intention of Social Commerce: The Relationship between the Technology Acceptance Model and the Consumers' Perceived Risk", Consumption Culture Review, Vol. 14, No. 4, 2011, pp. 165-182. 

  37. Lee, M. N. and Shim, J. W., "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy", Media, Gender & Culture, Vol. 12, 2009, pp. 165-190. 

  38. Letchumanan, M. and Muniandy, B., "Migrating to e-book: A study on perceived usefulness and ease of use", Library Hi Tech News, Vol. 30, No. 7. 2013, pp. 10-16. 

  39. Malhotra, N. K., Kim, S. S., and Agarwal, J., "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model", Information systems research, Vol. 15, No. 4, 2004, pp. 336-355. 

  40. Norberg, P. A., Horne, D. R., and Horne, D. A., "The Privacy Paradox: Personal Information Disclosure Intentions Versus Behaviors", Journal of Consumer Affairs, Vol. 41, No. 1, 2007, pp. 100-126. 

  41. Pal, D., Arpnikanondt, C., and Razzaque, M. A., "Personal Information Disclosure via Voice Assistants: The PersonalizationPrivacy Paradox", SN Computer Science, Vol. 1, No. 5, 2020, pp. 1-17. 

  42. Park, J. Y. and Kwak, K. Y., "Motivational Factors Affecting Self-Disclosure Behavior of SNS Users", Korean Management Review, Vol. 48, No. 2, 2019, pp. 561-587. 

  43. Park, S. A. and Choi, S. M., "A Understanding the Factors Influencing Satisfaction and Continued Use Intention of AI speakers: Focusing on the Utilitarian and Hedonic Values", The Journal of Information Society, Vol. 19, No. 3, 2018, pp. 159-182. 

  44. Pavlou, P. A., "Consumer Acceptance of Electronic Commerce : Integrating Trust and Risk with the Technology Acceptance Model", International Journal of Electronic Commerce, Vol. 7, No. 3, 2003, pp. 101-134. 

  45. Pavlou. P. A., "State of the information privacy literature: Where are we now and where should we go?", MIS quarterly, Vol.35, No.4. 2011, pp. 977-988. 

  46. Reynolds, B., Venkatanathan, J., Goncalves, J., and Kostakos, V., "Sharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours", In IFIP Conference on Human-Computer Interaction, 2011, pp. 204-215. 

  47. Shih, H. P., "An empirical study on predicting user acceptance of e-shopping on the Web," Information & Management, Vol. 41, No. 3, 2004, pp. 351-368. 

  48. Shin, I. S. and Kim, H. S., "Privacy Concerns and SNS Activities: Focusing on the Validity and Explanations of the Existence of a Privacy Paradox", Korean Telecommunications Oolicy Review, Vol. 25, No. 2, 2018, pp. 33-67. 

  49. Smith, H. J., Dinev, T., and Xu, H., "Information privacy research: an interdisciplinary review", MIS Quarterly, Vol. 35, No. 4, 2011, pp. 989-1015. 

  50. Smith, H. J., Milberg, S. J., and Burke, S. J., "Information privacy: Measuring individuals' concerns about organizational practices", MIS Quarterly, Vol. 20, No. 2, 1996, pp. 167-196. 

  51. Son, J. and Kim, S., "Internet users' information privacy-protective responses", MIS Quarterly, Vol. 32, No. 3, 2008, pp. 503-529. 

  52. Stanislav, M. and Beardsley, T., "Hacking IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities", Rapid7's report, 2015. 

  53. Sun, Y., Wang, N., Shen, X. L., and Zhang, J. X., "Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences", Computers in Human Behavior, Vol. 52, 2015, pp. 278-292. 

  54. Taddicken, M., "The 'privacy paradox'in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure", Journal of Computer-Mediated Communication, Vol. 19,No. 2, 2014, pp. 248-273. 

  55. Tam, K. Y. and Ho, S. Y., "Web personalization as a persuasion strategy: An elaboration likelihood model perspective", Information systems research, Vol. 16, No. 3, 2005, pp. 271-291. 

  56. Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M., and Lauro, C., "PLS path modeling: Computational statistics & data analysis", Cross Ref Web of Science, Vol. 48, No. 1, 2005, pp. 159-205. 

  57. Thong, J. Y., Hong, S. J., and Tam, K. Y., "The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance", International Journal of human-computer studies, Vol. 64, No. 9, 2006, pp. 799-810. 

  58. Westin, A. F., "Privacy and Freedom", New York: Atheneum, 1967. 

  59. Xu, H., Dinev, T., Smith, H. J., and Hart, P., "Examining the formation of individual's privacy concerns: Toward an integrative view", 2008. 

  60. Xu, H., Luo, X. R., Carroll, J. M., and Rosson, M. B., "The personalization privacy paradox: An exploratory study of decision making process for locationaware marketing", Decision support systems, Vol. 51, No. 1, 2011, pp. 42-52. 

  61. Yim, M. S., "Understanding the Factors that influence Website Retention and Privacy Unconcern After the Disclosure of Privacy Information", Journal of Digital Convergence, Vol. 11, No. 1, 2013, pp. 107-119. 

  62. Zhao, L., Lu, Y., and Gupta, S., "Disclosure intention of location-related information in location-based social network service", International Journal of Electronic Commerce, Vol. 16, No. 4, 2012, pp. 53-89. 

저자의 다른 논문 :

관련 콘텐츠

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로