• Title/Summary/Keyword: Online protection

Search Result 251, Processing Time 0.03 seconds

Determinants of the Intention to Protect Personal Information among Facebook Users

  • Chon, Bum Soo;Lee, Jeong-Ki;Jeong, HyeonJu;Park, Jowon;Park, Jonghwa
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.146-155
    • /
    • 2018
  • This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability) had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.

Factors Influencing Radiation Protection Behaviors of Endoscopy Nurses during Endoscopic Interventional Radiology (내시경하 중재적 방사선 시술 시 간호사의 방사선 방어행위 영향요인)

  • Yun, Bo Young;Park, Jeong Yun
    • Journal of Korean Clinical Nursing Research
    • /
    • v.26 no.3
    • /
    • pp.305-313
    • /
    • 2020
  • Purpose: The purpose of this study was to identify factors influencing the Radiation Protection(RP) behaviors of endoscopy nurses during endoscopic interventional radiology. Methods: A total of 188 endoscopy nurses working at 30 tertiary or general hospitals participated in this questionnaire-based study. The questionnaire included items on general and job related characteristics, RP knowledge, RP attitude, RP behavior, self-efficacy, and safety climate. Data were collected through online surveys from March 22 to April 10, 2019. Results: Multivariate analysis revealed that RP attitude (β=.65, p<.001), safety climate (β=.12, p=.035), self-efficacy (β=.14, p=.009), and existence of RP protocols (β=.11, p=.038) were significant predictors of better RP behavior. Conclusion: The findings showed that the RP behavior of endoscopy nurses was at high levels and the continuing education for endoscopy nurses and development of a radiation safety management education program were important to improve RP behavior.

Social Commerce and Consumer Protection Policies (소셜커머스와 소비자 보호 정책방안 연구)

  • Yu, Seung-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.31-40
    • /
    • 2012
  • This study intends to investigate some practical problems that arise from the development of the social commerce market and propose a set of consumer protection policies. To that purpose, we discuss the concept of social commerce and analyze a few common types of social commerce in Korea. Then, we look into the problems of the social commerce industry and propose a set of consumer protection policies that can deal with those problems. The goal of the current paper is to suggest optimal policies that can protect consumers from this new trend of online transactions. We hope that the proposals can help establish the base of consumer protection from the social commerce business.

A Study on the Development of Information Protection Education Contents in the Maritime Using Metaverse (메타버스를 활용한 조선 해양 분야 정보보호 교육 콘텐츠 개발 방안)

  • Kim, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1011-1020
    • /
    • 2021
  • Throughout the years, cybersecurity incidents related to the shipbuilding and maritime industries are occurring more frequently as the IT industry develops. Accordingly, expertise in the information protection industry is necessary, and effective education contents on information protection are needed for this purpose. Recently, there have been more and more cases of increasing user experience by applying Metaverse technology to the educational field. Therefore, this study analyzes the existing information protection education and training and the information protection education contents in the maritime industries and proposes four directions for content development (i.e., online education and seminars, cybersecurity threat learning of virtual ships, accident reproduction, and maritime cybersecurity exhibition operation).

An Empirical Study on the Effect of Information Quality and Service Quality on Satisfaction and Loyalty through Perceived Privacy Protection: Focusing on Users of O2O Mobile Shopping Applications in China (개인정보보호를 통한 정보품질과 서비스 품질이 만족도와 충성도에 미치는 영향에 관한 실증연구: 중국 O2O 모바일 쇼핑 어플리케이션 이용자를 중심으로)

  • Tae-Woo Roh;Jin-Ho Noh;Ye-Eun Oh
    • Korea Trade Review
    • /
    • v.45 no.6
    • /
    • pp.77-97
    • /
    • 2020
  • This study investigates the effects of O2O-based mobile shopping application (O2O MSA)'s information and service quality on the user's perceived privacy protection, satisfaction and loyalty. In this study, 969 questionnaire reponses were collected, out of which 555 were used to estimate the structural paths using PLS-SEM (partial least square structural equation model) for the hypothesis test. Our empirical findings are drawn from Chinese respondents that live in a 1-line city in China and use O2O MSAs serviced by China's leading companies. This study examines and confirms that qualified information and service of O2O MSA positively affect both perceived privacy protection and customer satisfaction, which finally leads to customer behavioral loyalty through the perceived privacy protection. Further, this study presents effective practical implications for application development strategy suitable for users in the O2O-based mobile shopping industry.

The Online Protective Coordination Schemes of the Distribution Systems with Distributed Generation (분산전원이 연계된 배전계통의 온라인 보호협조 방안)

  • Choi, Joon-Ho;Ro, Kyoung-Soo;Kim, Jae-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.3
    • /
    • pp.132-141
    • /
    • 2007
  • Recently, there has been growing interest in distributed resources with high-energy efficiency due to the increasing energy consumption and environmental pollution problems. But an insertion of new distributed generation to existing power distribution systems can cause several problems such as voltage variations, harmonics, protective coordination, increasing fault current etc. In this paper, a new method of the fault location identification at the distribution system with distributed resources, which can be determined by the magnitude and direction of the fault current, is proposed. In addition, a new online protective coordination scheme of recloser-sectionalizer is proposed based on the proposed fault location identification method for distribution system with distributed resources.

A Polynomial-based Study on the Protection of Consumer Privacy (소비자 프라이버시 보호에 관한 다항식 기반 연구)

  • Piao, Yanji;Kim, Minji
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.145-158
    • /
    • 2020
  • With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

A Study on Removal Request of Exposed Personal Information (노출된 개인정보의 삭제 요청에 관한 연구)

  • Jung, Bo-Reum;Jang, Byeong-Wook;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.37-42
    • /
    • 2015
  • Although online search engine service provide a convenient means to search for information on the World Wide Web, it also poses a risk of disclosing privacy. Regardless of such risk, most of users are neither aware of their personal information being exposed on search results nor how to redress the issue by requesting removal of information. According to the 2015 parliamentary inspection of government offices, many government agencies were criticized for mishandling of personal information and its leakage on online search engine such as Google. Considering the fact that the personal information leakage via online search engine has drawn the attention at the government level, the online search engine and privacy issue needs to be rectified. This paper, by examining current online search engines, studies the degree of personal information exposure on online search results and its underlying issues. Lastly, based on research result, the paper provides a sound policy and direction to the removal of exposed personal information with respect to search engine service provider and user respectively.

An exploratory analysis of factors influencing online music users' willingness to pay

  • Yu-Xuan, Yuan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.217-225
    • /
    • 2023
  • The willingness of online music users to pay is the key to the protection of music copyright and the sustainable development of the industry. This paper aims to study the influencing factors of online music users' willingness to pay based on exploratory analysis. Based on the theory of customer perceived value, the unified theory of technology acceptance and use, and the theory of fan enthusiasm, the research model is constructed. Validate the obtained 583 valid data. Through analysis, I got that perceived value, interpersonal influence, fan enthusiasm, and personal payment awareness directly affect online music users' willingness to pay; practical value and hedonic value have a positive impact on perceived value, and the impact of economic cost and compilation cost has not reached a significant level; Online word-of-mouth negatively moderates the impact of perceived value on users' willingness to pay for music. Music platforms can formulate operating policies based on this.