• Title/Summary/Keyword: Privacy Benefit

Search Result 58, Processing Time 0.021 seconds

A Consumer Perception based on the Type of Recommender System : A Privacy Calculus Perspective (상품 추천 서비스 유형에 따른 소비자 반응 연구 : 프라이버시 계산 모델을 중심으로)

  • Choi, Hye-Jin;Cho, Chang-Hoan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.254-266
    • /
    • 2020
  • The purpose of this study is to analyze the influence of the type of recommender system on consumer's perceived benefit and privacy risk. The result showed that the perceived usefulness and intension to click was high in the order of Hybrid-filtering, Bestseller, and SNS-based system. Privacy concern was high in order of SNS-based system, Hybrid-filtering, and Bestseller. Moderating effects of perceived personalization on the type of recommender system and perceived usefulness were significant. Finally perceived usefulness had positive effect, and privacy concern had negative effect on consumer's intension to click. This study has significant implications for digital marketing bt comparing consumer responses according to the type of recommended service. The result of this study can be helpful for providing and developing future recommender service.

Privacy Calculus and the Role of Information Transparency in Personal Information Disclosure (온라인상의 개인 정보 제공에 있어서 정보 투명성의 역할 - 프라이버시 계산 모형을 중심으로 -)

  • Lee, Dong-Joo;Bang, Youngsok;Bae, Yoon Soo
    • Informatization Policy
    • /
    • v.17 no.2
    • /
    • pp.68-85
    • /
    • 2010
  • This study extends the privacy calculus model to investigate the role of information transparency in influencing individual decision making on information disclosure. The proposed model integrates perceived usefulness and ease of use as benefit-side factors and information privacy risk as a risk-side factor accompanying information disclosure, and theorizes the effects of information transparency on the factors. The research model was tested using data gathered from 163 respondents through an online survey method. Results suggest that users'perception of information transparency not only increases the perceived benefits from the online site but also mitigates the risk related with information disclosure, resulting in higher intention to provide personal information to the site. Further, we find that online firms may improve users' perception of information transparency by providing explanation on why particular personal information is required and how it will be used.

  • PDF

Privacy Preserving Techniques for Deep Learning in Multi-Party System (멀티 파티 시스템에서 딥러닝을 위한 프라이버시 보존 기술)

  • Hye-Kyeong Ko
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.647-654
    • /
    • 2023
  • Deep Learning is a useful method for classifying and recognizing complex data such as images and text, and the accuracy of the deep learning method is the basis for making artificial intelligence-based services on the Internet useful. However, the vast amount of user da vita used for training in deep learning has led to privacy violation problems, and it is worried that companies that have collected personal and sensitive data of users, such as photographs and voices, own the data indefinitely. Users cannot delete their data and cannot limit the purpose of use. For example, data owners such as medical institutions that want to apply deep learning technology to patients' medical records cannot share patient data because of privacy and confidentiality issues, making it difficult to benefit from deep learning technology. In this paper, we have designed a privacy preservation technique-applied deep learning technique that allows multiple workers to use a neural network model jointly, without sharing input datasets, in multi-party system. We proposed a method that can selectively share small subsets using an optimization algorithm based on modified stochastic gradient descent, confirming that it could facilitate training with increased learning accuracy while protecting private information.

The internet perceived risk segments: clothing benefits sought, internet shopping attitude, and internet purchase intention (인터넷 위험지각 집단의 의복추구혜택, 인터넷 쇼핑태도 및 구매의도)

  • 황진숙
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.7
    • /
    • pp.746-757
    • /
    • 2003
  • The purpose of this study was to investigate the internet perceived risk segments in regard to clothing benefits sought, internet shopping attitude, and internet purchase intention. The subjects used for the study were 210 male and 338 female college students. The internet perceived risk consisted of size/defect risk, social psychological risk, privacy risk, delivery risk, and price risk. The clothing benefits sought had impression improvement, fashion, individuality, figure flaws compensation, and comfort factors. The results showed that consumers were segmented by four groups based on internet perceived risk factors : 1) privacy risk group, 2) size risk group. 3) low risk group, and 4) price/social psychological risk group. The four segmented groups differed in regard to clothing benefits sought, internet shopping attitude, and internet purchase intention. For example, in regard to clothing benefits sought, the price/social Psychological risk group sought fashion more than other groups. The low risk group considered figure flaws compensation benefit less important than other groups. Concerning internet shopping attitude, the low risk group had more favorable altitude toward trust, safety, diversity, exchange/return attributes of internet shopping than other groups. The privacy risk group had more favorable attitude toward convenience and price attributes of internet shopping. Regarding internet purchase intention, the low risk group had higher intention to purchase formal, casual, and sportswear. The size risk group had higher intention to purchase fashion accessories. Further group differences and implications of the results were discussed.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

How Consumers Perceive Online Behavioral Advertising: Consumer Typology and Determining Factors (온라인 맞춤형 광고 인식에 따른 소비자유형 연구: 효용과 비용을 중심으로)

  • Lee, Jin-Myong;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.105-114
    • /
    • 2015
  • This study aims 1) to identify distinctive consumer groups according to their perception of benefits and costs of Online Behavioral Advertising(OBA), 2) to explore differences among them, and 3) to investigate antecedent variables that affect the consumers' perception of OBA. Online survey data collected from 1,000 online users. The findings of this study are as follows. First, the result of cluster analysis identified four distinctive consumer groups according to the levels of perceived benefits and costs of OBA: 'Indifferent group', 'cost-centered group', 'benefit-centered group', and 'Benefit-cost balanced group'. Second, four consumer groups showed differences in their demographics, advertising related variables, privacy related variables, and technology related variables. Third, according to multinomial logistic analysis, it was found that there were different factors affecting consumers' perception of benefits and costs of OBA.

Investigating the Impact of Affective Factors on Self-disclosure

  • Kim, Gimun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.235-242
    • /
    • 2022
  • One of the important research streams in the privacy literature for the past decade has been to discover factors affecting the decision-making process related to self-disclosure, called the cost-benefit analysis. However, although human behavior is greatly influenced by affective as well as cognitive factors, most of the factors found in previous studies are those with cognitive properties. Based on the awareness of this imbalanced situation, the study examines the role of affective factors on self-dislosure decision-making, especially SNS enjoyment and SNS fatigue. As a result of data analysis, the study finds that the influence of these affective factors is significant, and the influence of SNS enjoyment is greater than that of SNS fatigue. As for the relationship between the affective factors and the decision-making factors, the study finds that the positive affect(enjoyment) relates to only the positive evaluation factor(benefit) and the negative affect(fatigue) relates only the negative evaluation factor(cost), which demonstrate the congruent effect mechanism. Based on the result, the study discusses meaningful implications and suggestions for future studies.

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

Factors Influencing Acceptance Resistance of Personal Health Record Apps: Focusing on the Privacy Calculus Model (개인건강기록 앱 수용저항에 영향을 미치는 요인: 프라이버시 계산모형을 중심으로)

  • Sang Ho Kim;Eunkyung Kang;Sung-Byung Yang
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.165-187
    • /
    • 2023
  • The continuous increase in life expectancy and high interest in health has brought about significant changes in the use of health information by the public according to the development of information technology represented by the Internet and smartphones. As the medical market expands to the mobile health environment, many health-related apps have been created and distributed, but the acceptance rate is slow as it has become challenging to provide services due to various regulations. In this study, perceived value, perceived risk factors (psychological risk, risk of time-loss, legal risk), and perceived benefits (usefulness, interaction, autonomy) were derived and verified as factors that affect the acceptance resistance of personal health record apps based on the privacy calculation model. In addition, by analyzing the moderating effect of trust in the manufacturer, how the perceived risk and perceived benefit affect the perceived value was verified. A survey was conducted on Korean college students who recognized the personal health record apps but did not use them, and 127 samples were analyzed using structural equations. As a result of hypothesis verification, perceived value has a negative effect on acceptance resistance, perceived risk (risk of time-loss) has a negative effect on perceived value, and perceived benefits (usefulness, interaction, autonomy) were found to have a positive effect on perceived value. Trust in manufacturers has weakened the impact of perceived risks (legal risk) on perceived values. This study is expected to play an important role in maintaining a competitive advantage in the personal health record app market environment by identifying and proposing detailed criteria for reducing the acceptance resistance of personal health record apps.

A Polynomial-based Study on the Protection of Consumer Privacy (소비자 프라이버시 보호에 관한 다항식 기반 연구)

  • Piao, Yanji;Kim, Minji
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.145-158
    • /
    • 2020
  • With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.