• Title/Summary/Keyword: Invasion of Privacy

Search Result 159, Processing Time 0.028 seconds

Ethical Issues in Business Marketing Researches

  • HWANG, Hee-Joong
    • Journal of Research and Publication Ethics
    • /
    • v.3 no.2
    • /
    • pp.1-5
    • /
    • 2022
  • Purpose: Various ethical issues arise in different stages of management and business marketing research. The current study aims to take look at practices that ensure informed consent, privacy and confidentiality, deception, and legal aspect in data management in procedures involved in marketing research. Research design, data and methodology: Literature content analysis was conducted for this research and the current author has investigated journal articles mostly to guarantee a high degree of content validity and to keep the advantages of qualitative content approach. The current study explores manifest topics regarding the ethical issues of business marketing research. Results: The current study found that ethical consideration needs to be similarly significant and learning from the previous researchers' approach to handling this issue is helpful for future research and is essential to have additional guidelines. Also, four findings (Lack of Informed Consent, Deception, Invasion of Privacy and Confidentiality, and Legal Data Management) indicate that marketing researchers need to consider before undertaking any project. Conclusions: Overall, the study presents practical suggestions though unexhausted. By raising these ethical marketing issues, consumer behavior disciplines will continue to expand and contribute positively towards attaining thoughts, feelings, and decisions that positively contribute to marketing research as the foundation for effective marking practices.

A Study on The Utilization and Secure Plan of Security in Social Media (소셜 미디어 이용 현황과 보안대책에 관한 연구)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.1-7
    • /
    • 2010
  • One of celebrities using Social media caught public's eye and interest in Korea. Thereby the number of the user has grown rapidly and by last year it had reached to about 770 million. But at the same time, it has brought us social issues such as invasion of privacy, spreading of malicious code, and stealing of ID. To solve these problems, first the government need to establish adequate law and policy. Second, Service provider should remove vulnerability in the security system and filter illegal information. Third, individual user should put more effort to protect their own privacy. This paper will suggest a solution of using the Social media more sound and secure.

A Study on People Count of Hospital Facilities Using Wi-Fi MAC (WiFi MAC을 이용한 병원시설 인원계수의 활용에 관한 연구)

  • Yun-Kyoo Ryoo
    • Journal of the Health Care and Life Science
    • /
    • v.10 no.2
    • /
    • pp.253-258
    • /
    • 2022
  • It is a widely known fact that MAC addresses can be collected using Wi-Fi from mobile phones that people carry. However, since collecting and using MAC addresses without individual consent entails many legal problems, it was difficult to actively utilize them. In order to prevent invasion of privacy information due to unintentional exposure of these MAC addresses in recent years, the method of protecting privacy information by exposing a randomly generated virtual MAC address rather than the MAC address of the actual device is applied to all mobile devices. is becoming By exposing a randomly generated virtual MAC address on a device, it becomes impossible to identify and track an individual using the MAC address. However, the fact that various facts can be estimated through MAC Address collection is still valid. By expanding the application of Random MAC Address, the possibility of invasion of privacy information has been completely removed from the MAC address that has been raised in the past, so that it can be used more actively than in the past. In this paper, we propose a method for automatically collecting and analyzing statistical information of hospital visitors using MAC addresses. The collection of hospital visitors using MAC Address is a low cost and relatively accurate method, and the analysis of hospital visitors through steady collection can provide very objective and scientific evidence for hospital operation.

Self-disclosure and Privacy in the Age of Web 2.0 A Case Study (웹 2.0 시대의 프라이버시 청년 UCC 이용자들의 인식과 실천을 중심으로)

  • Lee, Dong-Hoo
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.556-589
    • /
    • 2009
  • With the advent of the so-called Web 2.0 age, the interconnections of various contents on the web, as well as the user-participatory services from blogs, web-based communities, picture sharing sites, and social networking sites, to the sites for collective knowledge productions, have been further vitalized. As the User Generated Contents(UGCs) are flourishing on the web, they have channeled users' desires for self-expression and social acknowledgement, and yet have created the new kinds of invasion of privacy. This study attempts to look at how the networked individuals' everyday perceptions of privacy have been reconstructed in the age of Web 2.0. By investigating how users have used the UGCs for their sociality on the web and how they have set the boundaries of the private and the public in these public or semi-public disclosures of self-expressions, it has traced the changing perceptions of privacy in everyday communication practices. For this study, it has interviewed Korean youngsters in their 10s and 20s who have grown up with the Internet and have received self-expressions and social communication on the web as everyday activities. Based on their interviews, it inquires into the concurrent notion of privacy and discuss its cultural implications.

  • PDF

The structural relationships among user citizenship behavior, aberrant user behavior, social connectedness, privacy concern, and user satisfaction (SNS 이용자 시민행동, 불량행동, 사회적 유대감, 프라이버시 침해 우려 및 이용자 만족도간의 구조적 관계)

  • Kim, Yoo-Jung;Kim, Jae-Young;Han, Jae-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.4994-5004
    • /
    • 2012
  • This paper aims at investigating voluntary user participation such as user citizenship behavior and aberrant user behavior in the SNS context. Also it examines on how user participation behavior affects social connectedness, privacy concern, and user satisfaction. The empirical assessment of the research model was conducted using a total of 143 responses. The findings show that user citizenship behavior impacts on social connectedness positively and significantly whereas aberrant user behavior does not influence on social connectedness. Aberrant user behavior is proven not to be related to social connectedness, and to has positive relationship with concern for privacy invasion. Also, the results show that privacy concern is not associated with social connectedness. Finally, social connectedness is shown to be a key determinant of SNS user satisfaction whereas privacy concern is not related to user satisfaction.

Reducing Process Time for RFID Tag Identification on the Grid Environment (그리드 환경에서 RFID 태그 판별 시간 절감을 위한 태그 판별 처리)

  • Shin, Myeong-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1049-1056
    • /
    • 2010
  • Recently RFID system has been adopted in various fields rapidly. However, we should solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system. To solve these problems, There is the Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of creasing numbers of Tag. Therefore We, suggest SP-Division algorithm satisfied with all necessary security of Privacy Protection Scheme and decreased in Tag Identification Time in this paper. And this paper implemented it in time standard finding the first key among the data devided into each nodes. The length of Hash-Chain holds 1000, and the total number of SPs increases 1000, 2000, 3000, and 4000. Comparing tag identification time by the total number of SPs and the number of Nodes with single node, extending the number of nodes to 1, 2, 3 and 4, when the number of nodes is 2, 40% of Performance, when the number of nodes is 3, 56%, and when the number of nodes is 4, 71% is improved.

Design of a Privacy-based Confirmed Case Contact Notification System in the With-Corona Era (With-Corona 시대에 프라이버시 보호 기반의 확진자 접촉 여부 알림 시스템 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.138-143
    • /
    • 2021
  • As of this moment, we are tracing people who are closed contact with Covid-19 patients and trying to block the spread of Covid-19 through diagnostic tests. However, the incubation period of the confirmed case is two weeks, and it takes a lot of human resources, time, and money to trace the routes of the confirmed case. In particular, as the number of confirmed cases have been increasing, the cost for finding closed contacts and blocking them in advance exponentially have almost reached the limitation of the budget. In finding closed contacts, all citizens must record an electronic access list every time they visit an amenities such as a store or a restaurant. This is likely the invasion of the privacy of personal location information. In this study, we designed a system that keeps one's location in real time, it will download the movement information of the confirmed case which is collected by KDCA, and it will notify the user when there is an overlap. Moreover, then guide for diagnostic test in advance will be used. The proposed method can solve the difficulty of recording in an electronic access list when visiting a store, and it can block infringement of privacy without providing personal information from KDCA.

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

Analysis of k Value from k-anonymity Model Based on Re-identification Time (재식별 시간에 기반한 k-익명성 프라이버시 모델에서의 k값에 대한 연구)

  • Kim, Chaewoon;Oh, Junhyoung;Lee, Kyungho
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.43-52
    • /
    • 2020
  • With the development of data technology, storing and sharing of data has increased, resulting in privacy invasion. Although de-identification technology has been introduced to solve this problem, it has been proved many times that identifying individuals using de-identified data is possible. Even if it cannot be completely safe, sufficient de-identification is necessary. But current laws and regulations do not quantitatively specify the degree of how much de-identification should be performed. In this paper, we propose an appropriate de-identification criterion considering the time required for re-identification. We focused on the case of using the k-anonymity model among various privacy models. We analyzed the time taken to re-identify data according to the change in the k value. We used a re-identification method based on linkability. As a result of the analysis, we determined which k value is appropriate. If the generalized model can be developed by results of this paper, the model can be used to define the appropriate level of de-identification in various laws and regulations.

A Study on the Improvements of the Big Data Guideline in Korea (빅데이터 개인정보보호 가이드라인(안)의 개선 방향에 관한 연구)

  • Kim, Sunnam;Lee, Hwansoo
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.20-39
    • /
    • 2014
  • The age of big data has not only opened new opportunities for economic growth in various industries, but it has also created new problems related to personal information protection and privacy invasion. Given this situation, Korea's communications commission has proposed a big data guideline that specifies how companies should collect and utilize personal information in the big data environment. However, this guideline is more focused on industrial development than personal information protection, and it contains many features that conflict with personal information protection law as it currently exists. As a result, civic groups strongly oppose the guideline, as it may create serious privacy issues for subjects of information gathering. Thus, this paper analyses the limitations of the guideline by comparing it with domestic and foreign laws about personal information protection and privacy. We also discuss the direction of legalization and institutionalization with respect to the secure use of big data.