The Personal Information Overloads Effect Information Protective Responses in the Internet of Thing (IoT) Era

  • Won-Hyun So
  • Ha-Kyun KimEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)


With the emergence of information overload in the age of the Internet of Things (IoT), data are collected and information is processed regardless of personal will. This study aims to examine the impact of personal information overload on perceived risks and information protective responses in the IoT environment. In this study, a research model related to personal information overload was proposed and empirical analyses were conducted. The major findings are as follows. First, personal information overload had a significant effect on perceived risks (economic, social, time loss, and privacy risks). Second, among perceived risks, economic, social, and privacy risks had a significant effect on information protective responses while time loss risk did not.


Personal information overload Economic risk Social risk Time loss risk Privacy risk Information protective responses 


  1. 1.
    Chea, S., Lee, Y., Joung, Y., Choi, S.: A study on the intention of using smart wearable device from the viewpoint of privacy calculation model. Korean Inf. Soc. 17(2), 99–108 (2016)Google Scholar
  2. 2.
    Luo, X., Li, H., Zhang, J., Shim, J.P.: Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decis. Support Syst. 49, 222–234 (2010)CrossRefGoogle Scholar
  3. 3.
    Mowen, J.C., Spears, N.: Understanding compulsive buying among college students: a hierarchical approach. J. Consum. Psychol. 8(4), 407–430 (1999)CrossRefGoogle Scholar
  4. 4.
    Schults, U., Vodenbosch, B.: Information overload in groupware environment: now you see it, now you don’t. J. Organ. Comput. Electron. Commer. 8(2), 127–148 (1998)Google Scholar
  5. 5.
    Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. J. Publ. Policy Mark. 19(1), 62–73 (2000)CrossRefGoogle Scholar
  6. 6.
    Simth, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)CrossRefGoogle Scholar
  7. 7.
    Cohen, J.: Statistical Power Analysis for the Behavioral Science, 2nd edn. Lawrence Erlbaum, Hillside (1998)Google Scholar
  8. 8.
    Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum. Centric Comput. Inf. Sci. 6(1), 1–21 (2016). SpringerCrossRefGoogle Scholar
  9. 9.
    Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum. Centric Comput. Inf. Sci. 7(20), 1–19 (2017). SpringerGoogle Scholar
  10. 10.
    Park, C.-W., Kim, J.-S.: An empirical study on information privacy concern in the internet age. Digital Fusion Res. 14(2), 65–72 (2016)Google Scholar
  11. 11.
    Huh, M.K., Huh, H.W.: Genetic diversity and population structure of wild lentil tare, Crop Sci. 41(6), 1940–1946 (2001). Crop Science Society of AmericaGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Korean StudiesThe Academy of Korean StudiesSeongnamKorea
  2. 2.Department of Business AdministrationPukyong National UniversityBusanKorea

Personalised recommendations