• 제목/요약/키워드: Personal Use

검색결과 2,682건 처리시간 0.028초

중국 모바일 결제서비스의 발전과 사용동기 - 중국 모바일 결제서비스 알리페이, 위챗페이를 중심으로 - (Growth and Motivations for Chinese Mobile Payment Service: An Empirical Study Using Ali-Pay and Wechat-Pay Users in Chinese Market)

  • 윤창룡;이새봄;노인성;서영호
    • 품질경영학회지
    • /
    • 제45권1호
    • /
    • pp.139-152
    • /
    • 2017
  • Purpose: The purpose of this study is how Chinese users' personal traits affect the intention to use mobile payment. This research selects personal innovativeness and habit of cash payment as personal traits, and considers perceived risks and relative advantage as personal beliefs. In addition, the research divided perceived risks into three multi-faceted risks, which are privacy risk, financial risk and performance risk. Methods: The method of this study used questionnaire survey to collect 241 data on users' perception on mobile payment, and also used a structural equation modeling method. Results: The result of this paper shows that all hypotheses are statistically significant except 4 hypotheses. Conclusion: The result of this study found that personal innovativeness is negatively related with all 3 kinds of perceived risks as anticipated. And Chinese users' traditional habit of cash payment negatively affects intention to use mobile payment but is not statistically significant affecting three perceived risks. Among perceived risks, privacy risk is the most negatively influencing factor to relative advantage.

호텔 이용 고객의 개인정보 비식별화 방안에 관한 연구 (A Study on the de-identification of Personal Information of Hotel Users)

  • 김태경
    • 디지털산업정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.51-58
    • /
    • 2016
  • In the area of hotel and tourism sector, various research are analyzed using big data. Big data is being generated by any digital devices around us all the times. All the digital process and social media exchange produces the big data. In this paper, we analyzed the de-identification method of big data to use the personal information of hotel guests. Through the analysis of these big data, hotel can provide differentiated and diverse services to hotel guests and can improve the service and support the marketing of hotels. If the hotel wants to use the information of the guest, the private data should be de-identified. There are several de-identification methods of personal information such as pseudonymisation, aggregation, data reduction, data suppression and data masking. Using the comparison of these methods, the pseudonymisation is discriminated to the suitable methods for the analysis of information for the hotel guest. Also, among the pseudonymisation methods, the t-closeness was analyzed to the secure and efficient method for the de-identification of personal information in hotel.

Analysis of Reputation Factors for the Personal Branding of Journalists in Thailand

  • Rodgunphai, Cholticha;Kheokao, Jantima
    • Asian Journal for Public Opinion Research
    • /
    • 제8권4호
    • /
    • pp.453-477
    • /
    • 2020
  • This research is a combination of qualitative and quantitative methods. It analyzed reputation factors for the personal branding of journalists in Thailand. Research tools were in-depth interviews and an online questionnaire with 33 variables. Eleven journalists and informed sources were interviewed. A total of 1,262 survey respondents were divided into three groups including 586 recipients, 416 news people, and 260 academics. Data were analyzed using content analysis and factor analysis. It was found that the reputation factors for the personal branding of journalists in Thailand consisted of 1) the professionalism in rich and reliable news reporting, 2) the ability to use communication technology that increases prominence and career opportunities 3) the social responsibility in reporting news events, 4) the key opinion leaders who speak up for people to monitor in the government for peace in society, and 5) the use of experience in developing news reporting capabilities.

A Study on Cognition about Personal Broadcasting

  • Lee, Yong-Whan
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권9호
    • /
    • pp.27-34
    • /
    • 2018
  • Personal media centered on blogs, Twitter, and Facebook has opened up a personal broadcasting area while meeting platforms such as YouTube and Africa TV. Due to the many advantages and disadvantages of personal broadcasting, a study on it was necessary and statistical survey was conducted. The study conducted opinion survey of 118 university students on personal broadcasting. As a result, we are getting news using smartphones and mainly watching videos through YouTube, and watching videos type in the order of games, music videos and sports. Satisfaction rate of video was 72.4%, 80.2% of survey did not use paid services, experiences about personal broadcasting was 96.6% and 90.5% of survey the prospect of person broadcasting of the opinion that "it will be expanded". The first thing we want to be improved in personal broadcasting is the prevention of abusive language and hate speech. Second, we were reluctant to sensational content. Third, the survey results are the improvement of excessive advertising.

i-PIN 서비스를 활용한 인증 서비스 구현 (Implementation of Personal Certification Using i-PIN Service)

  • 김현주;신인철;이수종
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권7호
    • /
    • pp.117-128
    • /
    • 2012
  • 기존 인터넷 웹 사이트에서는 개인을 식별하는 방법으로 주민등록번호를 사용해 왔다. 그러나 인터넷에서의 주민등록번호 사용은 개인정보 유출 위험을 증가시키는 주요인이 되고 있다. 현재 정부에서는 인터넷에서 주민등록번호 수집과 개인정보 유출을 방지하고자 다양한 정보 보호 서비스를 권장하고 있다. 이 중 인터넷상에서 주민등록번호 사용을 최소화를 위해 권장하는 서비스가 i-PIN 서비스이다. 그러나 i-PIN은 인터넷에서주민등록번호 수집을 대체 할 수는 있으나, 개인을 식별하는 유일한 키로 사용하기에는 한계점이 있다. 본 논문에서는 i-PIN을 개인인증서로 사용하여 인터넷 웹 시스템 접속 시 본인을 인증하는 웹 시스템 구성을 제안한다. 또한, i-PIN 서비스가 웹 시스템과 연계되어 개인인증서로 사용 시의 실용성과 안정성을 성능평가로 확인하였다. 그러나 i-PIN 서비스는 i-PIN 제공 본인확인기관에 장애가 발생되면 서비스 지원이 불가능해 진다. 이 불편을 해결하고자 i-PIN 본인확인기관의 장애 대처 방안도 제안한다.

개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석 (A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure)

  • 정태철;권헌영
    • 한국IT서비스학회지
    • /
    • 제22권6호
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

스마트폰 기반 모바일 뱅킹 서비스 수용의도의 선행요인으로서 개인적 영향요인과 사회적 영향요인의 역할에 관한 실증적 연구 (The Role of Personal and Social Dimensions in the Determination of the Intention to use Smartphone-based Mobile Banking Services: An Empirical Investigation)

  • 최재용;홍일유
    • 정보화정책
    • /
    • 제21권3호
    • /
    • pp.102-127
    • /
    • 2014
  • 오늘날 모바일뱅킹은 은행들에게 고객편의성 증대는 물론 비용절감의 기회를 제공할 수 있어 도입하는 은행들이 늘고있는 반면, 스마트폰 이용능력 부족 등과 같은 개인적 이유로 모바일 뱅킹을 이용하기를 꺼려하는 고객들이 아직 많기 때문에 이러한 고객들의 모바일뱅킹 이용 거부감이 은행 온라인 전략에 걸림돌이 되고 있다. 이러한 배경에서 본 연구에서는 개인적 및 사회영향요인들에 기초한 스마트폰 기반의 모바일 뱅킹서비스 수용의도의 예측 모델을 제시하고 이를 실증분석 방법을 통해 검증하는 데 주된 목적이 있다. 실증분석을 위해 751명의 모바일뱅킹 이용자들을 대상으로 설문조사를 실시하였다. 가설검정 결과에 의하면, 개인적 영향요인들은 모두 수용의도에 긍정적인 유의한 영향을 미치는 것으로 나타났다. 또한 사회적 영향요인들 중에서 인지된 무리행동은 수용의도에 유의한 영향이 있는 반면, 주관적 규범은 유의한 영향을 미치지 못하는 것으로 나타남에 따라, 모바일 뱅킹의 수용은 주변 지인들의 시선보다는 대세라는 인식에 의해 더 중요한 영향을 받는다는 점이 확인됐다. 연구결과를 바탕으로 학문적 및 실무적 시사점을 제시하였다.

데이터 3법 개정의 의미와 추후 과제 (Meanings and Tasks of the Three Revised Bills which Ease Regulations on the Use of Personal Information)

  • 김서안
    • 융합보안논문지
    • /
    • 제20권2호
    • /
    • pp.59-68
    • /
    • 2020
  • 2020년 1월, 「개인정보 보호법」, 「정보통신망 이용촉진 및 정보보호 등에 관한 법률」, 「신용정보의 이용 및 보호에 관한 법률」 의 개정안이 국회 본회의를 통과하였다. 현행 법률이 개인정보의 보호에 치우쳐 정보의 활용이 어렵고 감독 기구의 분산과 규정의 중복 등으로 수범자들이 혼란을 가중시켜 데이터 활용 경제 산업의 발전을 저해한다는 비판을 수용하여, 이번 개정법에서는 가명 정보를 활용하고 마이데이터 산업을 도입, 개인정보 보호위원회를 독립기구로 일원화 하는 등의 내용으로 많은 부분이 개정되어 4차 산업혁명의 시대를 본격화할 것이라는 기대를 모으고 있다. 하지만 가명 정보의 활용에 대한 프라이버시(Privacy)침해에 대한 우려와 함께 여전히 중복된 규정이 혼재하며, 모호한 개념이 존재, 가명정보의 활용이 실효성을 거둘 수 있을지 등의 비판과 우려의 목소리도 높다. 이에 본 논문에서는 데이터 3법의 개정 내용과 의미에 관하여 서술하고, 추후 과제를 세 가지 측면, 즉 프라이버시 침해 우려에 대한 개인정보자기결정권의 실질 보장을 위한 시스템 구축, 안전조치 확보를 위한 인증제도의 구축 및 합리적인 가이드라인의 지속적인 제시, 독립 기구로서의 개인정보보호위원회의 전문적 업무 수행의 기대에 대하여 개략적으로 제시한다.

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • 제7권3호
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

모바일 환경에서 개인정보 유출 방지를 위한 개선 연구 (The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제11권3호
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.