연령, 소득 및 디지털 리터러시가 온라인 개인정보 노출 및 보호 행동에 미치는 영향
초록
본 연구를 통해 온라인 개인정보 노출 및 보호 행동에 있어서 연령과 소득, 그리고 디지털 리터러시에 따른 디지털 격차를 살펴 보고자 하였다. 디지털 격차 연구의 주요 변수인 연령과 소득 수준이 개인정보 관리의 두 가지 측면, 즉 개인정보 노출과 보호 행동에 어떻게 영향을 미치는지 살펴보기 위해 전국 20-60대 성인남녀 336명을 대상으로 온라인 설문조사를 실시한 결과, 연령이 높아질수록 개인정보 보호 행동이 감소하는 것으로 나타나 정보 보호 측면에서도 디지털 격차가 발생하는 것이 확인되었다. 하지만 연령이 개인정보 노출 행동에는 영향을 미치지 않았고, 소득은 노출과 보호 어느 쪽에도 영향을 미치지 않았다. 아울러 개인의 종합적인 디지털 활용능력 수준을 나타내는 4가지 유형의 디지털리터러시(기능적 소비, 비판적 소비, 기능적 생산, 비판적 생산)가 개인정보 노출과 보호에 미치는 영향을 살펴본 결과, 디지털리터러시 중 비판적 생산능력이 증가할수록 보호 행동이 증가하는 것으로 나타났고, 흥미롭게도 기능적 소비능력이 증가할수록 오히려 정보 노출 행동이 증가하는 것으로 나타남으로써 위험이 늘어날 가능성이 제기됐다. 한편 기능적 소비능력의 증가로 인한 노출 행동의 증가를 연령이 조절하는 것으로 나타났는데, 고연령이면서 기능적 소비능력이 높은 사람들이 개인정보 노출에 취약한 집단임이 확인되었다. 이러한 연구결과와 함께 이론적·실무적 함의를 논의하였다.
Abstract
This research attempted to examine the digital divide in the behaviors of online exposure and protection of personal information as a function of age, income, and digital literacy. To examine how age and income affect the behaviors of online exposure and protection of personal information, a survey of 336 adults(between 20 to 60 years old) was conducted. Results showed that age was negatively related to online personal information protection behavior, indicating that older adults were less likely to engage in protection behaviors than younger adults. However, age did not influence online personal information exposure. Income was related to neither online behaviors of exposure nor protection of personal information. With regard to the four types of digital literacy (functional consumption, critical consumption, functional prosumption, critical prosumption), only critical prosumption was positively related to protection behavior. Interestingly, functional consumption was positively related to exposure behavior, which increased the risk of online personal information exposure. On the other hand, the effect of functional consumption on online personal information exposure behavior was moderated by age, confirming that older adults with high functional consumption were particularly susceptible to online personal information exposure. Theoretical and practical implications of this study are further discussed.
Keywords:
personal information exposure, personal information protection, age, digital literacy, digital divide키워드:
개인정보 노출, 개인정보 보호, 연령, 디지털 리터러시, 디지털 격차References
- An, S. J., Lee, Y. J. (2014). Track 2: Implication of changes in the foreign computing curriculum. The Journal of Korean Association of Computer Education, 18(1), 47-51.
- Athey, S., Catalini, C., & Tucker, C. (2017). The digital privacy paradox: small money, small costs, small talk (No. w23488). National Bureau of Economic Research. [https://doi.org/10.3386/w23488]
- Bank of Korea (2018). 2017 Mobile Financial Service Usage Behavior Survey Results and Implications. Seoul : Bank of Korea.
- Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). [https://doi.org/10.5210/fm.v11i9.1394]
- Bayne, S., & Ross, J. (2011). ‘Digital Native’ and ‘Digital Immigrant’ discourses. In Digital difference: Perspectives on online learning (pp. 159-169). Rotterdam, The Netherlands: SensePublishers. [https://doi.org/10.1007/978-94-6091-580-2_12]
- Bergström, A. (2015). Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior, 53, 419–426. [https://doi.org/10.1016/j.chb.2015.07.025]
- Blank, G., Bolsover, G., & Dubois, E. (2014). A new privacy paradox: Young people and privacy on social network sites. Oxford Internet Institute. Retrieved from http://www.oxfordmartin.ox.ac.uk/downloads/A%20New%20Privacy%20Paradox%20April%202014.pdf [https://doi.org/10.2139/ssrn.2479938]
- boyd, D. & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8). Retrieved from http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3086/2589 [https://doi.org/10.5210/fm.v15i8.3086]
- Büchi, M., Just, N., & Latzer, M. (2016). Caring is not enough: the importance of Internet skills for online privacy protection. Information, Communication & Society, 20(8), 1261-1278. [https://doi.org/10.1080/1369118X.2016.1229001]
- Buckingham, D. (2009). Beyond Technology: Rethinking learning in the age of digital culture, In J. Petersen (Ed.). Youth, media, democracy: Perceptions of new literacies (pp. 36-42), Dublin: Dublin Institute of Technology, 2009.
- Chang, G. W., Yoon, H. S. (2011). A Study on personal information’s protection in cyber space : Focusing on social networking service (SNS). Korean Criminological Review, 22(3), 105-137.
- Chen, D.-T., Wu, J., & Wang, Y.-M. (2011). Unpacking new media literacy. Journal of Systemics, Cybernetics and Informatics, 9(2), 84-88.
- Choi, D., KIm, S. H., Cho, J.-M., Jin, S.-H., Cho, H.-S. (2013). Personal information exposure on social network service. Journal of The Korea Institute of Information Security and Cryptology, 23(5), 977-983. [https://doi.org/10.13089/JKIISC.2013.23.5.977]
- Choi, I. Yum, J..-Y., Kim, R., Jeong, S.-H. (2018). Effects of income, age, and need for cognition on digital media skills and new media literacy. Journal of Cybercommunication Academic Society 35(2), 181-221.
- eMarketer (2018). Worldwide Retail and Ecommerce Sales: eMarketer's Updated Forecast and New Mcommerce Estimates for 2016-2021.
- Fogel, J. & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concern. Computers in Human Behavior, 25(1), 153-160. [https://doi.org/10.1016/j.chb.2008.08.006]
- Friemel, T. N. (2016). The digital divide has grown old: Determinants of a digital divide among seniors. New Media & Society, 18(2), 313-331. [https://doi.org/10.1177/1461444814538648]
- George, A. (2006). Living online: The end of privacy. New Scientist, 2569, 1-50. [https://doi.org/10.1016/S0262-4079(06)60502-2]
- Hargittai, E., & Marwick, A. (2016). “What can I really do?” Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737–3757.
- Hwang, Y., Park, N., Lee, H., Lee, W.-T. (2012). Exploring digital literacy in convergent Media environment: Communication competence and generation gap. Korean Journal of Journalism & Communication Studies, 56(2), 198-225.
- Jin, S.-C., Kim, I.-K. (2011). A Study on the psychological anxiety on private information leakage to likelihood of internet users. The Korea Institute of Electronic Communication Sciences, 6(5), 731-737.
- Jones, S., & Fox, S. (2009). Generations online in 2009. Pew Internet & American Life Project. Retrieved from http://pewinternet.org/Reports/2009/Generations-Online-in-2009.aspx
- Jones, S., Johnson-Yale, C., Millermaier, S., & Perez, F. S. (2009). U.S. college students' Internet use: Race, gender and digital divides. Journal of Computer-Mediated Communication, 14, 244-264. [https://doi.org/10.1111/j.1083-6101.2009.01439.x]
- Jones, C., Ramanau, R., Cross, S., & Healing, G. (2010). Net generation or Digital Natives: Is there a distinct new generation entering university?. Computers & Education, 54(3), 722-732. [https://doi.org/10.1016/j.compedu.2009.09.022]
- Kezer, M., Sevi, B., Cemalcilar, Z., & Baruh, L. (2016). Age differences in privacy attitudes, literacy and privacy management on Facebook. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(1). [https://doi.org/10.5817/CP2016-1-2]
- Kim, H. J., Jeong, S.-H. (2015). Disclosure and protection of online privacy information among older adults. Journal of Cybercommunication Academic Society, 32(3), 49-78.
- Kim, J., Kim, S. (2013). Privacy protection behavior of online user : Based on privacy paradox perspective. Research of Internet e-commerce, 13(1), 41-64.
- Kim, S., Park, H. (2013). An analysis of influence factors on privacy protection awareness and protection behavior and moderating effect of privacy invasion experience. Research of Internet e-commerce, 13(4), 79-105.
- Kim, S., Rhee, K. C. (2007). Potential consequences of online privacy invasion and their affecting factors. Korean Consumption Culture Association, 10(1), 1-27. [https://doi.org/10.17053/jcc.2007.10.1.001]
- Koc, M., & Barut, E. (2016). Development and validation of New Media Literacy Scale (NMLS) for university students. Computers in Human Behavior, 63, 834-843. [https://doi.org/10.1016/j.chb.2016.06.035]
- Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134. [https://doi.org/10.1016/j.cose.2015.07.002]
- Korea Institute for international Economic Policy (2018). The Trend of Digital Economy in APEC and Korea's Response. Retrieved from http://www.kiep.go.kr/sub/view.do?bbsId=KiepBaseLine&nttId=201053
- Koutropoulos, A. (2011). Digital natives: Ten years after. Journal of Online Learning and Teaching, 7(4), 525-538.
- LaRose, R., Lai, Y. J., Lange, R., Love, B., & Wu, Y. (2005). Sharing or piracy? An exploration of downloading behavior. Journal of Computer Mediated Communication, 11(1), 1-21. [https://doi.org/10.1111/j.1083-6101.2006.tb00301.x]
- Lee, H. (2009). A critique of digital divide discussions : From group level to individual level, Korean Journal of Journalism & Communication Studies, 53(6), 5-25.
- Lee, D.-J., Kim, M.-S. (2011). A study on the e-Commerce adopters' information privacy concerns and response behaviors. Research of e-Business, 12(2), 365-383. [https://doi.org/10.15719/geba.12.2.201106.365]
- Lee. M., Lee, S., Choi, I (2014). Analysis of the facebook profiles for Korean users: Description and determinants. Journal of the Internet Information Science Society, 15(2), 73-85. [https://doi.org/10.7472/jksii.2014.15.2.73]
- Lee, H., Park, H., & Kim, J. (2013). Why do people share their context information on Social Network Services? A qualitative study and an experimental study on users' behavior of balancing perceived benefit and risk. International Journal of Human-Computer Studies, 71(9), 862-877. [https://doi.org/10.1016/j.ijhcs.2013.01.005]
- Lee, M.-N., Shim, J.-W. (2009). The moderating effect by gender in the relationship between the perception of online privacy and use of privacy protection strategy. Media, Gender & Culture, 12, 165-190.
- Lee, H., Wong, S. F., Oh, J., & Chang, Y. (2019). Information privacy concerns and demographic characteristics: Data from a Korean media panel survey. Government Information Quarterly, 36(2), 294-303. [https://doi.org/10.1016/j.giq.2019.01.002]
- Lee, S., Youk, E. (2014). Digital capability divide and digital outcome divide : Gaps in the digital capability and its effects on informational support. Korean Journal of Journalism & Communication Studies, 58(5), 206-232.
- Li, K., Lin, Z., & Wang, X. (2015). An empirical analysis of users’ privacy disclosure behaviors on social network sites. Information & Management, 52(7), 882-891. [https://doi.org/10.1016/j.im.2015.07.006]
- Livingstone, S., & Helsper, E. (2007). Gradations in digital inclusion: children, young people and the digital divide. New Media & Society, 9, 671-696. [https://doi.org/10.1177/1461444807080335]
- Livingstone, S., & Helsper, E. (2010). Balancing opportunities and risks in teenagers’ use of the internet: The role of online skills and internet self-efficacy. New Media & Society, 12(2), 309-329. [https://doi.org/10.1177/1461444809342697]
- Loges, W. E., & Jung, J. (2001). Exploring the digital divide: Internet connectedness and age. Communication Research, 28(4), 536-562. [https://doi.org/10.1177/009365001028004007]
- Lwin, M. O., Li, B., & Ang, R. P. (2012). Stop bugging me: An examination of adolescents’ protection behavior against online harassment. Journal of Adolescence, 35(1), 31-41. [https://doi.org/10.1016/j.adolescence.2011.06.007]
- McNair, C. (2018). Worldwide retail and ecommerce sales: emarketer’s updated forecast and new mcommerce estimates for 2016–2021. Industry Report, eMarketing.
- Milivojevic, S., Crofts, T., Lee, M., & McGovern, A. (2018). ‘A Sneaky Bit of Stalking’: Young people, social network sites, and practices of online surveillance. Temida, 21(2). [https://doi.org/10.2298/TEM1802181M]
- Millham, M. H., & Atkin, D. (2018). Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors. New Media & Society, 20(1), 50-67. [https://doi.org/10.1177/1461444816654465]
- Min, Y. (2011). The digital divide among internet users : An analysis of digital access, literacy, and participation. Journal of Communication Research, 48(1), 150-187. [https://doi.org/10.22174/jcr.2011.48.1.150]
- Ministry of Science & ICT, National Information Society Agency (2019) 2018 Digital devide survey. Ministry of Science & ICT
- Na, J., Lee, J., Choi, A., Yoon, J., Choi, J. (2012). "Only know about me there". Korean Society of Consumer Studies Conference Paper, 241-245.
- Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. [https://doi.org/10.1111/j.1745-6606.2006.00070.x]
- Park, Y. J. (2011). Digital literacy and privacy behavior online. Communication Research, 40(2), 215-236. [https://doi.org/10.1177/0093650211418338]
- Park, Y. J., Campbell, S. W., & Kwak, N. (2012). Affect, cognition and reward: Predictors of privacy protection online. Computers in Human Behavior, 28(3), 1019-1027. [https://doi.org/10.1016/j.chb.2012.01.004]
- Park, C.-H., Jang, S.-J. (2013).The smart media of elderly and digital welfare: focused on the access and use gap of smart device. Locality & Communication, 17(4), 79-105.
- Park, Y. M., Lee, H. S. (2012). How internet shopping malls collect and manage personal informations, and how consumers show their attitudes toward It. Journal of Consumer Policy Studies, 41, 203-225. [https://doi.org/10.15723/jcps..41.201204.203]
- Park, C., Lee, S.-W. (2014). A study of the user privacy protection behavior in online environment: Based on protection motivation theory. Journal of the Internet Information Science Society, 15(2), 59-71. [https://doi.org/10.7472/jksii.2014.15.2.59]
- Park, E. S., Woo, H., J. (2013). A study on factors affecting the intention to use personal cloud service : Focused on the convergence model of TAM and PMT. Journal of Cybercommunication Academic Society, 30(2), 111-150.
- Prensky, M. (2001a). Digital Natives, Digital Immigrants: Part 1. On the Horizon, 9(5), 1-6. [https://doi.org/10.1108/10748120110424816]
- Prensky, M (2001b). Digital Natives, Digital Immigrants Part 2: Do they really think differently? On the Horizon, 9(6), 1-6. [https://doi.org/10.1108/10748120110424843]
- Redmiles, E. M., Kross, S., & Mazurek, M. L. (2017). Where is the digital divide?: A survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 931-936). ACM. [https://doi.org/10.1145/3025453.3025673]
- Seoul Economic Daily (2018, 1, 4). Online shopping, clicks toward the 100 trillion KRwon era, Life 19 page
- Shim, J. W., Hwang, H. S., Lee, H. (2009). An exploratory research on the perception of online privacy by UCC use and age differences. Journal of Broadcasting Research, 69, 192-221.
- Song, K. (2011). From digital divide to multi-layered smart divide society. Internet & Security Issue, 03, 5-24.
- Steijn, W., Schouten, A., & Vedder, A. (2016). Why concern regarding privacy differs: The influence of age and (non-) participation on Facebook. Cyberpsycholog; Journal of Psychosocial Research on Cyberspace, 10(1). [https://doi.org/10.5817/CP2016-1-3]
- Taddicken, M. (2014). The ‘privacy paradox’in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248-273. [https://doi.org/10.1111/jcc4.12052]
- Taddei, S., & Contena, B. (2013). Privacy, trust and control: Which relationships with online self-disclosure?. Computers in Human Behavior, 29(3), 821-826. [https://doi.org/10.1016/j.chb.2012.11.022]
- The Chosun Ilbo (2016, 9, 10). No internet banking for the elderly. Retrieved from http://news.chosun.com/site/data/html_dir/2016/09/10/2016091000100.html
- The Chosun Ilbo (2018, 5, 1). 6070 is 'mobile finance' illiterate. Retrieved from http://biz.chosun.com/site/data/html_dir/2018/05/01/2018050100037.html
- Tichenor, P. J., Donohue, G. A., & Olien, C. N. (1970). Mass media flow and different growth in knowledge. Public Opinion Quarterly, 34, 159-170. [https://doi.org/10.1086/267786]
- Turow, J., Feldman, L., & Meltzer, K. (2005). Open to exploitation: American shoppers online and offline. Report of the Annenberg Public Policy Center, University of Pennsylvania, Philadelphia.
- van Deursen, A., & Van Dijk, J. (2014). The digital divide shifts to differences in usage. New Media & Society, 16(3), 507-526. [https://doi.org/10.1177/1461444813487959]
- Youn, S. (2005). Teenagers’perceptions of online privacy and coping behaviours: A risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86-110. [https://doi.org/10.1207/s15506878jobem4901_6]
- Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389-418. [https://doi.org/10.1111/j.1745-6606.2009.01146.x]
- Yu, R. P., Ellison, N. B., McCammon, R. J., & Langa, K. M. (2016). Mapping the two levels of digital divide: Internet access and social network site adoption among older adults in the USA. Information, Communication & Society, 19(10), 1445-1464. [https://doi.org/10.1080/1369118X.2015.1109695]
- van Deursen, A. J., van Dijk, J. A., & ten Klooster, P. M. (2015). Increasing inequalities in what we do online: A longitudinal cross sectional analysis of Internet activities among the Dutch population (2010 to 2013) over gender, age, education, and income. Telematics and informatics, 32(2), 259-272. [https://doi.org/10.1016/j.tele.2014.09.003]
- van Schaik, P., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297. [https://doi.org/10.1016/j.chb.2017.10.007]
- Walrave, M., Vanwesenbeeck, I., & Heirman, W. (2012). Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 6(1). [https://doi.org/10.5817/CP2012-1-3]
- Workman, M., Bommer, W. H., & Straub, D. (2009). The amplification effects of procedural justice on a threat control model of information systems security behaviours. Behaviour & Information Technology, 28(6), 563-575. [https://doi.org/10.1080/01449290802556021]