• Title/Summary/Keyword: 프라이버시위험

Search Result 146, Processing Time 0.023 seconds

The Impact of Privacy Policy Layout on Users' Information Recognition (사용자 인지 제고를 위한 개인정보 보호정책 알림방식의 비교 연구)

  • Ko, Yumi;Choi, Jaewon;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.183-193
    • /
    • 2014
  • Korean personal data(information) protection law requires privacy policies post on every website. According to recent survey results, users' interests on these policies are low due to these policies' low readability and accessibility. This study proposes a layout that effectively conveys online privacy policy contents, and assesses its impact on information understandability, vividness, and recognition of users. Studies on privacy policies and layouts, media richness theory, social presence theory, and usability are used to develop the new layered approach. Using experiments, three major layouts are evaluated by randomly selected online users. Research results shows that information understandability, vividness, and recognition of privacy policies in the revised-layered approach are higher than those of in the text-only or table-based layouts. This study implies that employing visual guides like icons on privacy policy layouts may increase users' interest in those policies.

Determinants.influencing Consumer Perceptions of Web Site Trust and Outcomes (웹사이트 신뢰에 대한 소비자 지각과 성과에 영향을 미치는 요인에 관한 연구)

  • Ha, Hong-Youl
    • Journal of Global Scholars of Marketing Science
    • /
    • v.15 no.2
    • /
    • pp.1-25
    • /
    • 2005
  • Unlike the traditional bricks-and-mortar marketplace, the online environment includes several distinct factors that influence Web site trust. As consumers become more savvy about the Internet, the author contends they will insist on doing business with web companies they trust. This study examines 1) how Web site trust is affected by the following web purchase-related factors: security, privacy, brand name, word-of-mouth, good online experience, and quality of information, and 2) how it influences outcomes. Unlike Urban and colleagues' study (2000), the author argues that not all e-trust bUilding programs guarantee success in building Web site trust. In addition to the mechanism depending on a program, building e-brand trust requires a systematic relationship between a consumer and a particular web site. The findings show that Web site trust does not build one or two components but are established by the interrelationships of complex components. By carefully investigating these variables in formulating marketing strategies, marketers can cultivate brand loyalty and gain a formidable competitive edge.

  • PDF

The Effect of Characteristics and Perceived Privacy Risk of Mobile Location-based SNS on Intention to Use SoLoMo Applications (모바일 위치기반 SNS의 특성과 지각된 프라이버시 위험이 SoLoMo 어플리케이션의 이용의도에 미치는 영향)

  • Shin, Taeksoo;Cho, Won Sang
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.205-230
    • /
    • 2014
  • In recent years, the social network service (SNS) and the location-based social network service (LBSNS) industry is expanding and the competition within the field is increasing much more. Since 2010, the full-scaled studies of SNS and LBSNS have begun. With the growth of SNS and LBSNS markets, SoLoMo (Social-Local-Mobile) is also becoming the trend for applications in different fields. However, despite the importance of SoLoMo, there have been little studies on the characteristics of SoLoMo applications. The purpose of this research is to investigate the effect of characteristics and perceived privacy risk of mobile location-based SNS on intention to use SoLoMo applications. For the purpose, we proposed a SoLoMo service acceptance model with TAM (Technology Acceptance Model) and the characteristics of SoLoMo applications. The characteristics consist of three factors, i.e. SNS, location, and mobile-related factors. This study also considered a gamification and a perceived privacy risk factor influencing on SoLoMo service usage in our proposed research model. The results of our empirical analysis using partial least squares (PLS) method show that the characteristics of SoLoMo applications including SNS, location, and mobile-related features, gamification, and perceived privacy risk have partially an effect on intention to use SoLoMo applications. Based on these results, SoLoMo-related companies will be able to increase the usage of SoLoMo services by differentiating their own strategies with these factors influencing on SoLoMo services.

A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance (지능형 영상 감시 환경에서의 개인정보보호를 위한 COP-변환 기반 메타데이터 보안 기법 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.417-428
    • /
    • 2018
  • The intelligent video surveillance environment is a system that extracts various information about a video object and enables automated processing through the analysis of video data collected in CCTV. However, since the privacy exposure problem may occur in the process of intelligent video surveillance, it is necessary to take a security measure. Especially, video metadata has high vulnerability because it can include various personal information analyzed based on big data. In this paper, we propose a COP-Transformation scheme to protect video metadata. The proposed scheme is advantageous in that it greatly enhances the security and efficiency in processing the video metadata.

User Acceptance of Virtual Personal Assistant Devices : An Extended Perspective of Perceived Value (가상개인비서 기기의 소비자 수용에 관한 연구 : 사용자의 지각된 가치를 중심으로)

  • Yang, HeeTae
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.179-189
    • /
    • 2017
  • The purpose of this paper is to develop a comprehensive research model that can explain potential customers' intentions to adopt and use VPA(Virtual Personal Assistants) devices. This study proposes and validates a new theoretical model that extends the perceived value theory. Partial least squares analysis is employed to test the research model and corresponding hypotheses on data collected from 313 survey samples. Perceived value, perceived usefulness, perceived enjoyment are important factors affecting the adoption of VPA devices. To increase potential users' intention to use, VPA device manufacturers should not only focus on developing utilitarian functions but also fun features based on open development echo-system. This study is the important empirical attempt to examine user acceptance of VPA devices, as most of the prior literature has concerned analysis of usage patterns or technical features.

Research on the Use of Pseudonym Data - Focusing on Technical Processing Methods and Corporate Utilization Directions - (가명 데이터 활용연구 - 기술적 처리방법 및 기업의 활용방향을 중심으로 -)

  • Kim, Jung-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.253-261
    • /
    • 2020
  • This study examines the technologies and application processes related to the use of pseudonym data of companies after the passage of the Data 3 Act to activate the data economy in earnest, and what companies should prepare to use pseudonym data and what will happen in the process It was intended to contribute to the elimination of uncertainty. In the future, companies will need to extend the information security management system from the perspective of the existing IT system to manage and control data privacy protection and management from a third party provisioning perspective. In addition, proper pseudonym data use control should be implemented even in the data use environment utilized by internal users. The economic effect of market change and heterogeneous data combination due to the use of pseudonymized data will be very large, and standards for appropriate non-identification measures and risk assessment criteria for data utilization and transaction activation should be prepared in a short time.

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

Privacy Amplification of Correlated Key Decryption over Public Channels (공개 채널을 통한 상관 키 분산 암호화의 프라이버시 증폭)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.73-78
    • /
    • 2018
  • In this paper, we consider a system where multiple sources are encrypted in separated nodes and sent through their respective public communication channels into a joint sink node. We are interested at the problem on protecting the security of an already existing system such above, which is found out to have correlated encryption keys. In particular, we focus on finding a solution without introducing additional secret keys and with minimal modification to minimize the cost and the risk of bringing down an already running system. We propose a solution under a security model where an eavesdropper obtains all ciphertexts, i.e., encrypted sources, by accessing available public communication channels. Our main technique is to use encoders of universal function to encode the ciphertexts before sending them to public communication channels.

A Study on Personal Information Protection System for Big Data Utilization in Industrial Sectors (산업 영역에서 빅데이터 개인정보 보호체계에 관한 연구)

  • Kim, Jin Soo;Choi, Bang Ho;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2019
  • In the era of the 4th industrial revolution, the big data industry is gathering attention for new business models in the public and private sectors by utilizing various information collected through the internet and mobile. However, although the big data integration and analysis are performed with de-identification techniques, there is still a risk that personal privacy can be exposed. Recently, there are many studies to invent effective methods to maintain the value of data without disclosing personal information. In this paper, a personal information protection system is investigated to boost big data utilization in industrial sectors, such as healthcare and agriculture. The criteria for evaluating the de-identification adequacy of personal information and the protection scope of personal information should be differently applied for each industry. In the field of personal sensitive information-oriented healthcare sector, the minimum value of k-anonymity should be set to 5 or more, which is the average value of other industrial sectors. In agricultural sector, it suggests the inclusion of companion dogs or farmland information as sensitive information. Also, it is desirable to apply the demonstration steps to each region-specific industry.

Factors Influencing Information Privacy Behavior: A Replication Study

  • Kim, Gimun;Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.231-237
    • /
    • 2021
  • Over a decade ago, Krasnova et al. identified the factors that influence Facebook users' self-disclosure. These factors include perceived risks, relationship building, relationship maintenance, self-presentation, and enjoyment. Meanwhile, during the past 10 years, there have been significant changes in terms of function, media, and competition. SNSs have been functionally enhanced, used in mobile environment, and had many competitors. Based on these facts, it is believed that the influence of the factors on self-disclosure is different from those of Krasnova et al. The purpose of this study is to verify through a replication study whether the factors adopted in the study of Krasnova et al. are still important in explaining self-exposure. The study empirically find the result significantly different from those of Krasnova et al. Based on the result, the study provides meaningful implications and suggestions for future research.