• Title/Summary/Keyword: Privacy Benefit

Search Result 58, Processing Time 0.023 seconds

Consumers' Perceived Costs and Benefits of Location-Based Smartphone Applications (스마트폰 위치기반 어플리케이션의 효용과 비용에 대한 소비자 인식)

  • Kim, Hyo Jung;Rha, Jong Youn
    • Human Ecology Research
    • /
    • v.51 no.5
    • /
    • pp.483-495
    • /
    • 2013
  • This study aimed to identify the dimensions of benefits and costs that consumers perceive in utilizing locationbased applications (LBAs) on smartphones, and to distinguish consumer groups according to their perceptions of those benefits and costs. A web-based consumer survey was conducted-among consumers who had experience using LBAs. Four hundred participants were 20's to 40's, with 200 women and 200 men. Descriptive statistics, frequency analysis, t -tests, one-way analysis of variance, and cluster analysis were used for data analysis. The findings of this study are as follows: first, LBAs accounted for about 20% of the smartphone apps used by consumers. Second, factor analysis identified the underlying dimensions of the benefits and costs of smartphone LBAs. The underlying dimensions of benefits perceived by consumers were information/economic/convenience, entertainment and personalization. Privacy concerns, lack of trust and lack of behavioral control were the underlying dimensions of the perceived costs of LBAs. Third, ANOVA showed that the perceived benefits and costs of smartphone LBA services differed according to the characteristics of the consumer. Cluster analysis identified three distinctive consumer groups according to the levels of perceive costs and benefits of smartphone LBAs. The three groups were labeled the 'benefit-cost balanced group,' 'cost centered group,' and 'benefit centered group.'

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

A Study on Comparative Analysis of Maritime Security Programs - Focussed on TWIC

  • Yoon, Dae-Gwun
    • Journal of Navigation and Port Research
    • /
    • v.33 no.4
    • /
    • pp.283-288
    • /
    • 2009
  • To improve maritime security and enhance international shipping commerce within US ports in addition to ISPS (International Ship and Port Facility Security Code), the TWIC (Transportation Worker Identification Credential) program is working on the maritime field from the October 15, 2008 in the United States. In this paper, the program is reviewed and investigated in terms of goal, benefit, solution, and related legislation so forth In addition, other maritime security programs including MMD (Merchant Mariner Document), FAST (Free and Secure Trade), SIDA (Security Identification Display Areas). and Air Cargo security program was analyzed and compared in order to obtain relationship and difference with the program in terms of enrollment frequency, list and method of security check, and profile of each program As a result of this paper, the program is mostly to improve maritime security, protect individual privacy, and enhance commerce rather than other programs.

University Faculty's Perspectives on Implementing ChatGPT in their Teaching

  • Pyong Ho Kim;Ji Won Yoon;Hye Yoon Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.56-61
    • /
    • 2023
  • The present study explored a comprehensive investigation of university professors' perspectives on the implementation of ChatGPT - an artificial intelligence-powered language model - in their teaching practices. A diverse group of 30 university professors responded to a questionnaire about the level of their interest in implementing the tool, willingness to apply it, and concerns they have regarding the intervention of ChatGPT in higher education setting. The results showed that the participants are highly interested in employing the tool into their teaching practice, and find that the students are likely to benefit from using ChatGPT in classroom settings. On the other hand, they displayed concerns regarding high depandency on data, privacy-related issues, lack of supports required, and technical contraints. In today's fast-paced society, educators are urged to mindfully apply this inevitable generative AI means with thoughtfulness and ethical considerations to and for their learners. Relevant topics are discussed to successfully intervene AI tools in teaching practices in higher education.

Comparison of Websites Offering Nutrition Services Controlled by Registered Dietitians and Those Controlled by Non-dietitian Nutrition Consultants

  • Hires Brigette;Ham Sunny;Forsythe Hazel W.
    • Journal of Community Nutrition
    • /
    • v.8 no.1
    • /
    • pp.9-15
    • /
    • 2006
  • Health care is one of the most popular reasons for accessing the Internet. Of concern is the amount of information from disreputable sources available on the Internet. A review of websites offering nutrition consulting services suggests sites are controlled by both registered dietitians and non-dietitian professionals marketing themselves as nutrition consultants. The purpose of this study was to investigate structure and content of websites controlled by registered dietitians and nondietitians professionals marketing themselves as nutritionists or nutrition consultants. Internet search queries of 'dietitian', 'dietitian consultant', and 'nutrition consultant' were completed for website selection. Thirty websites controlled by registered dietitians and 10 websites controlled by nutrition consultants were reviewed using an 18-item website evaluation instrument developed for this study. Five evaluators were recruited from the dietetics program at the University of Kentucky. Overall, websites controlled by registered dietitians ranked higher than websites controlled by nutrition consultants in a majority of categories. Sites controlled by registered dietitians ranked statistically higher for the following categories: 'accuracy of information'(p<.0001), 'inclusion of professional resume of owner or primary manager' (p<.05), and 'explanation of the affiliation to externallinks'(p<.05). A majority of sites controlled by both dietitians and nutrition consultants achieved a poor ranking in regards to provision of a legal disclaimer and inclusion of a privacy policy. Prior studies suggest personal privacy is the most important concern for consumers accessing health information on the Internet. Findings from this project will benefit dietitians to assist in development of reputable nutrition related websites.

The Effectiveness of Service Characteristics of Car Sharing on User Evaluation and Net Benefit (카 쉐어링 서비스 특성이 사용자 평가와 순 편익에 미치는 영향)

  • Sohn, Bongjin;Choi, Jaewon;Kwon, Hyuk-Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.2
    • /
    • pp.1-20
    • /
    • 2018
  • Car Sharing Service is provided with sharing the vehicleas you can use it anywhere and anytime. The paper verified the factors impact between providing infrastructure characteristics such as scarcity, system quality and service quality and user evaluation factors based on DeLone & McLean IS Success Model. User evaluation factors have an influence on net benefit. D&M IS model mainly proved inner organization impact. The research collected experienced car sharing service, we analyzed the 224 respondents. The result of the hypothesis follows. The scarcity of time is negatively related to perceived social support and app trust. Provisional coupon is positively related to perceived social support and app trust. But, scarcity of quantity is not related to user evaluation factors. Most of the system qualities are related to app trust, however, privacy concern isn't related to app trust. the paper's demographic characteristic is lack of experience frequency. User evaluation factors that are perceived social support and app trust are positively related to user satisfaction and WoM intention. User satisfaction is individual impact and WoM intention is organization impact. Two factors are the net benefit in car sharing service. The area of sharing economy should more study about correlation among experimental various factors. Thus, the paper has different significant from antecedent research. because of trying to experimental analysis.

Factors Influencing Individual's Intention to Provide MyData: Focusing on the Moderating Effects of Individual Capabilities and Institutional Type (개인의 마이데이터 제공의도에 영향을 미치는 요인: 개인역량과 기관유형의 조절효과를 중심으로)

  • Dong Keun Park;Sung-Byung Yang;Sang-Hyeak Yoon
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.73-97
    • /
    • 2023
  • Recently, the MyData market has been growing as the importance of data and issues related to personal information protection have drawn much attention together. MyData refers to the concept of guaranteeing an individual's right to personal information and providing and utilizing one's data according to individual consent. MyData service providers can combine and analyze customer information to provide personalized services. In the early days, the MyData business was activated mainly by private companies and the financial industry, but recently, public institutions are also actively taking advantage of MyData. Meanwhile, the importance of an individual's intention to provide MyData for the success of MyData businesses continues to increase, but research related to this is lacking. Moreover, existing studies have been mainly conducted on individual benefits of MyData; there are not enough studies in which both public benefit and perceived risk factors are considered at the same time. In this regard, this study intends to derive factors affecting the intention to provide MyData based on the privacy calculus model, examine their influencing mechanism, and further verify the moderating effects of individual capabilities and institutional type. This study can find academic significance in that it expanded and demonstrated the privacy calculus model in the context of MyData providing intention. In addition, the results of this study are expected to offer practical guidelines for developing and managing new services in MyData businesses.

A Longitudinal Study on the Effect of e-Commerce Technology Characteristics and Personal Value on Purchasing Behavior by Importance of Information Protection (전자상거래 기술특성과 개인가치가 정보보호 중요성에 의한 구매행동에 미치는 영향에 대한 종단적 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.159-171
    • /
    • 2017
  • The purpose of this study is to investigate the effects of e - commerce technology characteristics and personal values on purchasing behavior by information security importance. The results of the empirical study that examined the university students in 2006 and 2016 are as follows. First, personal value is centered on personal values, such as self - esteem and self - esteem in 2006. In 2016, however, personal values such as self - fulfillment and personal relationship with others are important. Transactional ease and product service serve as the main value of the fun and pleasure of life, but the sense of accomplishment as the core value of information protection. Second, the technical characteristics of e-commerce are as follows. In terms of ease of transaction and product service, technology characteristics are simplified and directly effected over time. On the other hand, information protection works very closely with individual value, There was a strong tendency to enjoy benefits. Especially in 2006, if you want to enjoy transactional convenience through transaction information security or benefit from product service, it has been changed to recognize the importance of information security through payment in 2016.