• Title/Summary/Keyword: Privacy Trust

Search Result 171, Processing Time 0.021 seconds

Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers (사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로)

  • Bae, Jinseok;Jung, Yoonhyuk;Cho, Wooje
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.23-40
    • /
    • 2015
  • Despite much interest and investment in the Internet of Things (IoT) which expand the Internet to a ubiquitous network including objects in the physical world, there is growing concerns of privacy protections. Because the risk of privacy invasion is higher in IoT environments than ever before, privacy need to be a key issue in the diffusion of IoT. Considering that the privacy concern is a critical barrier for user to adopt information technologies, it is important to investigate users' privacy concerns related to IoT applications. From the triad perspective (i.e., risk on technology, risk on service provider, and trust on legislation), this study aims to examine users' privacy concerns in the context of activity trackers.

An Empirical Analysis of the Impact of the Institution-based Trust Factors on the Survival of E-commerce Companies in Korea (제도기반 신뢰요소가 한국 전자상거래 기업의 생존에 미치는 영향에 관한 실증 분석 연구)

  • Park, Sho Yun;Kim, Seung Hyun
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.131-148
    • /
    • 2019
  • E-commerce in Korea has grown steadily in recent years. E-commerce has provided firms with an effective method to approach potential customers by overcoming geographical and physical barriers. However, despite the rapid growth, many e-commerce businesses closed their businesses and were not able to survive. This study aims to empirically examine the factors that determine the survival of e-commerce businesses in Korea. In particular, this study focuses on the factors related to the notion of institution-based trust that includes delivery, privacy, and security management. This research used the data set about 31,295 e-commerce businesses that have been registered in Seoul. We found that the e-commerce business that does not require extra personal information beyond the standard terms and conditions or provides a feedback mechanism by having an online board to submit a complaint has a higher chance of survival. In addition, the e-commerce business that has a secured web server, shows the specific information about the date of delivery, or provides escrow services is likely to survive longer than others. The research has extended the extant literature on the importance of trust in e-commerce by empirically examining the effects of the institution-based trust factors on the actual survival of e-commerce businesses.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.

Technical Trends of Media Trust for Healthy Media Consumption (건전한 미디어 소비를 위한 미디어 트러스트 기술 동향)

  • Lee, N.K.;Lee, E.J.;Lee, H.K.;Kim, J.H.;Jung, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.3
    • /
    • pp.22-33
    • /
    • 2018
  • Media trust technologies are capable of playing a significant role in the development of ICT, and may play a complementary role in existing security and privacy technologies to cope with the complex interactions among people, objects, media, and services that are being created. We hope that the results of this study will aid in strengthening the foundation of source technologies related to media trust, and to secure technological competitiveness through continuous research in this area.

Design and Development Study of a Trust-based Decentralized User Authentication System with Enhanced Data Preprocessing Functionality in a Metaverse Environment (메타버스 환경에서 Data Preprocessing 기능을 개선한 Trust-based Decentralized User Authentication 시스템 설계 및 개발 연구)

  • Suwan Park;Sangmin Lee;Kyoungjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.3-15
    • /
    • 2023
  • As remote services and remote work become commonplace, the use of the Metaverse has grown. This allows transactions like real estate and finance in virtual Second Life. However, conducting economic activities in the Metaverse presents unique security challenges compared to the physical world and conventional cyberspace. To address these, the paper proposes solutions centered on authentication and privacy. It suggests improving data preprocessing based on Metaverse data's uniqueness and introduces a new authentication service using NFTs while adhering to W3C's DID framework. The system is implemented using Hyperledger Indy blockchain, and its success is confirmed through implementation analysis.

Researches on Trust in IoT and Implications: Focusing on EU Framework Programme 7 (FP7) (사물인터넷 신뢰 연구와 시사점: EU FP7을 중심으로)

  • Yoon, Young Seog;Jo, Seng-Kyoun;Lee, Hyun-Woo
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.56-73
    • /
    • 2016
  • The Internet of Things (IoT) is expected to provide new business opportunities by connecting devices, persons, and their data. However, the value proposed by IoT cannot be realized without trust. As IoT premises on the seamless connections, it should guarantee trust among the connected persons and things. However, there is lack of relevant discussion on how to achieve trustworthy connections and interactions because most of academic studies have mainly focused on the development of IoT platforms and applications. To fill the gaps, recent EU-funded projects such as uTRUSTit, ABC4Trust, Inter-Trust, COMPOSE, and SMARTIE have been conducted under the FP7-ICT Framework Programme. This paper presents and discusses each project's purpose and approach. Although their approaches are somewhat different from each other, all of them dedicate to achieving both privacy and security by providing the trustworthy connections. It seems to be clear that Korea also needs more academic and practical contribution in terms of researches, to implement "trust"among connected things, which will eventually satisfy what really IoT is expected for.

A Study on China's Intention to Switching to Shared Bike Platforms: Mechanisms of Trust and Distrust

  • Wenlong Lu;Yung Ho Suh;Sae Bom Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.179-187
    • /
    • 2023
  • Consumer trust plays a crucial role in the development of the sharing economy. This study primarily focuses on the factors influencing consumer trust and examines the case of ofo, a former leader in China's bike-sharing industry. This paper analyzes the decline in consumer trust in ofo, which can be attributed to internal management issues and the near-bankruptcy situation. The "difficulty in refunds" issue faced by ofo since December 2018 has been growing continuously, and this study explores the factors influencing trust and distrust in this context. By considering product factors (quality), platform factors (payment security, privacy protection, reputation), and social factors (social norms, government regulation) as independent variables, the study analyzes the factors affecting consumer trust. The analysis results revealed that as consumers' distrust towards shared bikes increases, their switching intention also increases. The company's reputation and social norms were found to influence both trust and distrust, while government regulation was found to influence trust. The research findings provide insights relevant to sharing economy platforms and offer guidance for future studies.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Factors Affecting an Individual's Intention to Disclose Personal Health Information: From Privacy Calculus Perspective (개인의 건강정보 제공의도에 영향을 미치는 요인: 프라이버시 계산 관점에서)

  • Jeong, Euiseon;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.4
    • /
    • pp.877-898
    • /
    • 2018
  • Purpose: This study empirically examines the effect of Communication Privacy Management(CPM) factors and Privacy Calculus factors to the intention to disclose Personal Health Information(PHI) in the context of healthcare ecosystem. Also, it investigates the moderating effects of CPM factors in the relationship between privacy calculus variables and the intention to disclose PHI. Methods: We conducted scenario-based repeated-measures quasiexperiment and used total 364 samples for analysis. Confirmatory factor analysis and repeated-measure ANOVA were employed using SPSS 24.0. Results: All CPM factors, such as type of information, requesting purpose, and requesting stakeholder, directly influence to the intention to disclose PHI, whereas only the medium trust out of the Privacy Calculus factors has direct influence on the intention to disclose PHI. With regard to the moderating effects, the requesting stakeholder is the most influential and the information type is the least influential construct. Conclusion: The findings suggest that healthcare system should be designed to provide more definite and personalized benefits to customers to enhance social and individual benefits by getting more participation from customers. Also, it is desirable that the requesting stakeholder of PHI would be non-profit organizations such as hospital, government or public agencies to secure more willingness of PHI from people. Furthermore, it is implied that extensive information gathering and utilization, instead of excluding sensitive information or critical patients' records, is recommended which is substantial to invigorate the healthcare industry.

Security and Trust of Mobile Payment Apps : Focus on Personal Predisposition and Security Signal (모바일 결제 앱에서의 보안과 신뢰 : 개인의 성향과 보안 신호를 중심으로)

  • Kim, Min-Gyung;Choi, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.194-204
    • /
    • 2019
  • The mobile payment app market has been expanding recently. However, the usage rate of mobile payment apps is not meeting service providers' expectations due to concerns about security and privacy. This study investigated how personal predisposition and how the security signals of the payment app affect users' perceived privacy and security risks, and how these factors ultimately affect the trust of mobile payment apps. The results showed that privacy concerns increase the risk of perceived personal information leaks and reduce perceived mobile system security, while familiarity, perceived reputation, and assurance seal reduce the risk of perceived personal information leaks and increase perceived mobile system security. Finally, it revealed that the reduced risk of perceived personal information leaks and the increased security of mobile systems had a positive impact on the reliability of mobile payment apps.