• Title/Summary/Keyword: Privacy Settings

Search Result 30, Processing Time 0.02 seconds

Examining Factors that Determine the Use of Social Media Privacy Settings: Focused on the Mediating Effect of Implementation Intention to Use Privacy Settings

  • Jongki Kim;Jianbo Wang
    • Asia pacific journal of information systems
    • /
    • v.30 no.4
    • /
    • pp.919-945
    • /
    • 2020
  • Social media platforms such as Instagram and Facebook lead to potential security risks, which consequently raise public concerns about privacy. However, most people rarely make active efforts to protect their personal data, even though they have shown increasing concerns about privacy. Therefore, this study examines the factors that determine social media users' behavior of using privacy settings and testifies the existence of privacy paradox in such a context. In addition, it investigates the mediating effects of implementation intentions on the relationship between intentions and behaviors. In the study, we collected data through questionnaires, and the respondents were undergraduate and graduate students in South Korea. After a pilot test (n = 92) and a set of face-to-face interviews, 266 usable responses were retrieved for data analysis finally. The results confirmed the existence of the privacy paradox regarding the use of social media privacy settings. And the implication intention did positively mediate the relationship between intention and behavior in the context of social media privacy settings. To the best of our knowledge, our study is the first in the information privacy literature to introduce the notion of implementation intention which is a much more powerful explanation and prediction of actual behavior than the (behavioral) intention.

Analyzing Factors Influencing COVID-19 Contact-Tracing Application Users' Mobile Location Service Settings: A Perspective of Information-Motivation-Behavioral Skills Model and Implementation Intention

  • Jongki Kim;Jianbo Wang;Wei Zhang
    • Asia pacific journal of information systems
    • /
    • v.34 no.2
    • /
    • pp.541-564
    • /
    • 2024
  • Contact-tracing applications have significantly contributed to mitigating the spread of coronavirus disease 2019 (COVID-19), yet the extensive use of these location-based applications raises serious privacy concerns. Drawing on the Information-Motivation-Behavioral (IMB) skills model, our study investigated factors that influence users' protective behaviors toward location privacy, elucidating the privacy paradox and the mediating role of implementation intention. Through an online survey conducted in China with 311 participants, we found that privacy concerns and privacy awareness positively affected the use of mobile location service settings, with privacy concerns mediating the relationship between privacy awareness and the intention to protect privacy. Furthermore, our study demonstrated the privacy paradox, revealing the pivotal mediating role of implementation intentions in bridging the gap between users' intentions and their actual behaviors. This study offers new perspectives on the privacy paradox, particularly through the lens of implementation intention, and provides valuable insights for motivating greater use of contact-tracing applications. It offers both theoretical and practical guidance for stakeholders to address privacy concerns during global pandemics like COVID-19, thereby encouraging a more widespread and responsible engagement with technology in public health.

Differential Privacy in Practice

  • Nguyen, Hiep H.;Kim, Jong;Kim, Yoonho
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.177-186
    • /
    • 2013
  • We briefly review the problem of statistical disclosure control under differential privacy model, which entails a formal and ad omnia privacy guarantee separating the utility of the database and the risk due to individual participation. It has born fruitful results over the past ten years, both in theoretical connections to other fields and in practical applications to real-life datasets. Promises of differential privacy help to relieve concerns of privacy loss, which hinder the release of community-valuable data. This paper covers main ideas behind differential privacy, its interactive versus non-interactive settings, perturbation mechanisms, and typical applications found in recent research.

A Moderating Effect of Use of Interaction Privacy Controls on the Relationship between Privacy Concerns and Self-disclosure

  • Kim, Gimun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.235-241
    • /
    • 2020
  • Many studies have tried to explain the privacy paradox but reported conflicting results; Some of them found connection between privacy concerns and information disclosure, while others did not. This study examines the role of interaction privacy controls (mainly friend lists and privacy settings) as a moderating variable that has the potential to affect the relationship in the SNS context. The reason for this is that most users use interactive privacy controls to create their own social environment before conducting SNS activities, so the relationship between privacy concerns and information disclosure may vary depending on the degree of use of interactive privacy controls. The study collected data using survey method, analyzed the moderating effect of use of interaction privacy controls using hierarchical multiple regression analysis, and as a result, found that effect. Therefore, the degree of use of interactive privacy controls may be an important contingent variable that needs to be considered in a study examining the privacy paradox in SNS context.

Privacy Preserving Keyword Search with Access Control based on DTLS (프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법)

  • Noh, Geon-Tae;Chun, Ji-Young;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.35-44
    • /
    • 2009
  • To protect sensitive personal information, data will be stored in encrypted form. However in order to retrieve these encrypted data without decryption, there need efficient search methods to enable the retrieval of the encrypted data. Until now, a number of searchable encryption schemes have been proposed but these schemes are not suitable when dynamic users who have the permission to access the data share the encrypted data. Since, in previous searchable encryption schemes, only specific user who is the data owner in symmetric key settings or has the secret key corresponding to the public key for the encrypted data in asymmetric key settings can access to the encrypted data. To solve this problem, Stephen S. Yau et al. firstly proposed the controlled privacy preserving keyword search scheme which can control the search capabilities of users according to access policies of the data provider. However, this scheme has the problem that the privacy of the data retrievers can be breached. In this paper, we firstly analyze the weakness of Stephen S. Yau et al.'s scheme and propose privacy preserving keyword search with access control. Our proposed scheme preserves the privacy of data retrievers.

Exploring the Impact of Interaction Privacy Controls on Self-disclosure

  • Gimun, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.171-178
    • /
    • 2023
  • As the risk of privacy invasion due to self-disclosure increases in SNS environment, many studies have tried to discover the influencing factors of self-disclosure. This study is an extension of this research stream and pays attention to the role of interaction privacy controls(friend list and privacy settings) as a new influencing factor. Specifically, the study theorizes and test the logic that the ability to effectively control interactions between individuals using IPC(called IPC usefulness) satisfies the three psychological needs(autonomy, relationship, and competency needs) suggested by the Self-Determination Theory, and in turn increase the amount of self-disclosure. As a result of data analysis, it was found that IPC usefulness has a very strong influence on the satisfaction of psychological needs and is a major factor in increasing the degree of self-disclosure by users. Based on these findings, the study discusses the theoretical and practical implications as well as future research directions.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

Design and Analyses of Security Mechanism with Low Cost RFID Tag (저비용 RFID 태그를 위한 보안 메카니즘의 분석 및 설계)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.681-682
    • /
    • 2011
  • RFID technique has been applied in high-security and high-integrity settings such as national defense, healthcare, and citizen identification. We proposed especially the privacy of sensitive data, various cryptographic techniques applicable to low-cost RFIDs in order to enhance the security of RFID.

  • PDF

Internet-Mediated Research in the Age of Social Distancing: Methodological Reflections and Recommendations from Two Online Research Projects (사회적 거리두기 시대의 인터넷 기반 연구: 두 온라인 연구 프로젝트로부터의 방법론적 고찰과 제안점)

  • Lee, Jisue;Hollister, Jonathan M.
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.319-353
    • /
    • 2020
  • Due to the COVID-19 pandemic, scholars at institutions of higher education around the world are transitioning their teaching, service, and research into online settings; for many this may be a new and challenging experience. While many of the best practices associated with research in traditional or face-to-face settings also apply to research in or via online settings, there are some additional challenges and nuances that researchers must adequately address and plan for due to the affordances and limitations of online settings. This paper discusses the key issues of privacy, informed consent, trust and trustworthiness, and retention through the literature and provides practical recommendations based on evidence and experience from two different online research projects. The reflections on and examples from these two research projects contextualize the above issues and act as evidence to inform research as a practice. The authors hope this evidence and practical guidance may help researchers better prepare for research in a socially distanced world.

Healing Design for Adolescent Patients and the Meaning of Home - American Adolescents' Preferences on Hospital Settings - (청소년을 위한 치유병원 디자인과 집의 의미와의 관계 - 미국 청소년을 대상으로 한 선호도 조사를 중심으로 -)

  • Kim, Eun Young
    • Journal of the Korean housing association
    • /
    • v.25 no.3
    • /
    • pp.93-103
    • /
    • 2014
  • The objective of the present study is to investigate healing design attributes for adolescent patients and to identify the relationship among healing design attributes and the meaning of home. This study examined the environmental preferences of American adolescents for hospital rooms to investigate age-appropriate healing design attributes. The health-related quality of life (HRQOL) concept was adapted to this study as a theoretical framework. One hundred six American adolescents participated in the survey. Participant adolescents consisted of two groups by their health status: forty-seven adolescent patients who were waiting for their surgical operations in waiting rooms and fifty-nine healthy high school students while they were at school. Participants aged in range from 14-year to 18-year olds with a mean of 16-year olds. Data collection consisted of two different instruments: Emotional state survey with demographics and environmental preference survey. Environmental values that are important to adolescents were control of privacy, having outside view, and quiet places to go. However, staying in a single-bed room for hospitalization is ranked the lowest score for the participating adolescents. Adolescents who perceived higher stress level preferred to have quiet places to go, to control over privacy and to have outside view significantly. The study resulted that the most important design attribute for American Adolescents was "privacy control", which is the essence of the meaning of home. There are some significant discrepancies in environmental preferences of hospital rooms by different genders and different health status.