• Title/Summary/Keyword: National Informatization Agency

Search Result 318, Processing Time 0.022 seconds

Economic Valuation of the Right to be Forgotten (잊힐 권리의 경제적 가치 추정 연구)

  • Lee, Mi-Suk;Cho, Young-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.84-96
    • /
    • 2018
  • The right to be forgotten means the right of people to request information and communication providers to delete their information online. As the number of people asking for deletion of their past embarrassing or negative online activities is increasing, discussions are being raised on the introduction of the right to be forgotten in South Korea. However, previous research on the right to be forgotten mainly deals with the legal concept, with insufficient consideration of economic value. The main purpose of this research is to examine social perception towards the right to be forgotten and to estimate its economic value quantitatively. According to the results, there are concerns about disclosure of personal information, but with lack of awareness on the right to be forgotten. The monthly average amount that a person is willing to pay to be forgotten is 1,218 Korean won (11 US dollars) and the total economic value is estimated to be about 540 billion won (490 million dollars) per year in 2017. Especially, those who have experienced leakage of personal information put higher value to the right to be forgotten. These results can be useful for making decisions about the right to be forgotten in the future.

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

Using TPC Model to Understand Broadband Diffusion in Korea (TPC(Technology, Policy and Culture) 모델을 이용한 한국의 초고속인터넷 확산 요인 분석)

  • Kum, Heisung
    • Informatization Policy
    • /
    • v.17 no.3
    • /
    • pp.74-97
    • /
    • 2010
  • This paper investigates factors that have facilitated the rapid diffusion of broadband in South Korea. It finds that the quick spread of broadband access in South Korea is the result of combining the government's strategic ICT policy considering cultural traits, businesses'competitive efforts, and the timely explosion of domestic demand for IT service. This paper also discusses the impact of broadband diffusion on the digital divide. It finds that although there are still regional and age gaps in broadband access, the Korean government and businesses are working to alleviate these problems through various ways from systemic to physical ones. While the deployment of broadband cannot eliminate every issue of the digital divide, broadband access minimizes the digital divide by lowering the barrier to inequitable access to information. This paper concludes with a number of recommendations that address selected policy issues related to the spread of broadband Internet for its successful implementation.

  • PDF

A Conceptual Framework for Knowledge Enhanced E-government Portal (지식강화 전자정부포털의 개념적 프레임워크)

  • Kim, Sun-Kyung
    • Informatization Policy
    • /
    • v.20 no.2
    • /
    • pp.39-59
    • /
    • 2013
  • Majority of knowledge management(KM) studies in e-government have been confined to facilitate KM within an organization. But due to citizen-centric(citizen-driven) paradigm shift and advance of web 2.0 communication in recent years, KM between governments and citizen in e-government portals is becoming an important consideration. So a series of studies on knowledge enhanced e-government portal get under way by considering that it is necessary to enhance knowledge of e-government portal and assuming it improves the usability of portal. While the topics of knowledge enhancement and e-government(portal) are widely discussed in their own domains there is a paucity of studies that address these constructs in a joint context. This paper aims to propose conceptual framework of knowledge enhanced e-government portal through structuralization of theoretical discussion with holistic approach. This framework presents an evolutional path of knowledge enhanced e-government portal that consists of three phases and it will be used for realizing the knowledge enhanced portal project as a basic reference model.

  • PDF

The Effects of Social and Personal Dimensions on the Intention to Use a Social Networking Service: The Case of Facebook (사회적 및 개인적 선행요인들이 SNS 이용의도에 미치는 영향에 관한 연구 - 국내 대학생들의 페이스북 이용을 중심으로 -)

  • Hong, Ilyoo B.;Kang, Dong Won;Cho, Hwihyung
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.57-76
    • /
    • 2014
  • The purpose of this research is to investigate the role of social dimensions in predicting the intention to use SNS. We proposed an integrative SNS acceptance model based on the theory of planned behavior (TPB), the technology acceptance model (TAM), and the social influence theory. Included in the model are attitude toward SNS use, subjective norm, information cascades, and perceived behavioral control as antecedents to intention to use SNS. An empirical analysis was conducted using data collected from a questionnaire survey with 228 college students in Korea, and it yielded the following findings. First, the two social dimensions, namely subjective norm and information cascades, were found to have a significant positive relationship with the intention to use SNS. In particular, information cascade turned out to have the strongest impact of the three antecedents to intention to use SNS. Second, perceived usefulness and perceived ease of use were found to have a significant positive influence on the attitude toward SNS use.

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

An Empirical Study on Mobile Usage Behavior - Focusing on Smartphone Usage Addiction - (모바일 사용행동에 대한 실증연구 - 스마트폰 사용 중독을 중심으로 -)

  • Shin, Ho-Kyoung;Lee, Min Seok;KIM, Heung Gook
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.50-68
    • /
    • 2011
  • In this paper, our goal is to examine the factors related to smartphone users' usage addiction. Based on existing literature on mobile usage behavior and addiction, we developed and tested a theoretical model and hypotheses, analyzing how variables based on the characteristics of smartphones affect smartphone usage addiction and how smartphone usage addiction affects social withdrawal. Given the literature review, a questionnaire survey was conducted; and the PLS(Partial Least Square), a kind of SEM(Structural Equation Model), was used to analyze and test the research model and hypotheses. The research results indicated that smartphone users' self-monitoring, loneliness, and smartphone characteristics affect users' usage addiction. Further, smartphone users' usage addiction affects their social withdrawal. Finally, theoretical and practical implications of these findings and directions for future research were discussed.

  • PDF

Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory (온라인 환경에서 프라이버시 행동의도에 미치는 영향 - 보호동기이론을 중심으로 -)

  • Kim, Jongki;Kim, Sanghee
    • Informatization Policy
    • /
    • v.20 no.3
    • /
    • pp.63-85
    • /
    • 2013
  • Drawing on Protection Motivation Theory(PMT), this study attempts to clarify antecedents that influence the intention to protect individuals' privacy on the Internet. Protection motivation forms through individuals' cognitive appeal involving threat and efficacy. Then protection motivation causes privacy behavioral change. Protection motivation factors are established privacy trust and privacy risk, which are related to privacy attitude and belief. This proposed model is empirically analyzed by utilizing structural equation analysis(SEM). According to the result of the empirical analysis, it is founded that almost paths have statistically significant explanatory power except path from efficacy to privacy risk and path from privacy trust to privacy behavioral intention. This study shows powerful evidence of antecedent factors based on protection motivation of individuals' privacy behavioral intention in online environment.

  • PDF

The Determinants for the Preschool's Comprehensive Information Systems: User Resistance Perspective (유아교육 정보시스템 활성화를 위한 결정요소 - 사용자 저항성의 관점으로 -)

  • Choi, Jaewon;Jang, Jiwha;Kim, Beomsoo
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.77-98
    • /
    • 2014
  • The Korean government has been promoting the establishment of comprehensive information systems as one of supports for preschools' administration. This support is expected to enhance the efficiency of preschool education support systems and to improve the quality of educational services. The gap between government's expectation on an introduction of the information system and preschool educators' expectations has also been an issue in deploying this new system. This study identifies user resistance factors for comprehensive preschool administration assistance systems' deployment. We find that the performance expectancy, social influence, effort expectancy, and the psychological cost of user resistance have impacts on the user resistance. When these factors related resistance are resolved in the process of systems' deployment, active participation in these systems by preschool educators would be increased.

A Study on Flaming Phenomena in Social Network: Content Analysis of Major Issues in Seoul Mayor Reelection in 2011 (소셜 네트워크 상에서의 플레밍(Flaming) 현상과 공론장의 가능성 - 2011년 서울시장 선거 이슈 분석 -)

  • Jho, Whasun;Kim, Jeongyeon
    • Informatization Policy
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2013
  • Rational debate and public conversation in the public sphere of social network are crucial conditions for realizing deliberative democracy. However, negative communication can occur online more frequently than in the real space, and mutually hostile messages are appearing. In the electoral process, citizens combining for particular candidates have made personal attacks against, abused and slandered the opposing candidates. Then, how and to what degree has the flaming behavior been appearing in the elections? Are there influencers to propagate the flaming behavior? And how flaming are these influencers, compared to internet users? This research focuses on the flaming behavior which occurred during the reelection for Seoul Mayor, in order to diagnose the role of social network as an online public sphere. This study analyzes the spreading degree of flaming messages depending on each issue, and the differences of messages between influencers and normal users. There was frequent flaming behaviors to distribute biased information which criticized, laughed at and maliciously attacked individual candidates. Moreover, influencers who advanced leading opinions, displayed a higher flaming degree than normal users.

  • PDF