• Title/Summary/Keyword: Privacy concerns

Search Result 252, Processing Time 0.03 seconds

A Comparative Analysis between High and Low Groups on Concerns About Privacy Infringement in Consumer Innovation Patterns According to Internet Media Activities (인터넷 미디어 활동에 따른 소비자 혁신성 유형이 프라이버시 침해 우려성에 대한 고(High)집단과 저(Low)집단 간의 비교 분석)

  • Lee, Ji-Hun;Kang, Jun-Mo;Lee, Jeong-Suk
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.7
    • /
    • pp.193-202
    • /
    • 2020
  • This study was intended to present the magnitude of privacy infringement concerns and their relationship to consumer innovation (functional innovation, hedonistic innovation, social innovation, cognitive innovation), to identify differences among groups and to suggest implications for marketing strategies for the spread of new products. The implications of this study are as follows. First, functional innovation has shown that differences exist between groups. Analysts say that sensitive groups are buying products that can simplify their work immediately after release despite concerns over privacy violations. Second, hedonistic innovation has shown that differences exist between groups. These findings suggest that sensitive groups prefer novel products, products that give excitement and excitement about products, and products that give new enjoyment and fun that they have never known before. Third, social innovation has been shown that there is no difference between groups. These analyses show that the self-esteem of using products that others have never experienced before, and the curiosity that anyone envies, are purchased or used first. Finally, cognitive innovation showed that differences existed between groups. These analyses show that new products are purchased when they meet the functions, design, and innovation that consumers want.

University Faculty's Perspectives on Implementing ChatGPT in their Teaching

  • Pyong Ho Kim;Ji Won Yoon;Hye Yoon Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.56-61
    • /
    • 2023
  • The present study explored a comprehensive investigation of university professors' perspectives on the implementation of ChatGPT - an artificial intelligence-powered language model - in their teaching practices. A diverse group of 30 university professors responded to a questionnaire about the level of their interest in implementing the tool, willingness to apply it, and concerns they have regarding the intervention of ChatGPT in higher education setting. The results showed that the participants are highly interested in employing the tool into their teaching practice, and find that the students are likely to benefit from using ChatGPT in classroom settings. On the other hand, they displayed concerns regarding high depandency on data, privacy-related issues, lack of supports required, and technical contraints. In today's fast-paced society, educators are urged to mindfully apply this inevitable generative AI means with thoughtfulness and ethical considerations to and for their learners. Relevant topics are discussed to successfully intervene AI tools in teaching practices in higher education.

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

Analyses of Light-weight Cryptography Technology for Internet of Things (사물인터넷 통신을 위한 경량 암호기술 동향 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.234-235
    • /
    • 2016
  • With the development of the Internet, the popularization of internet has become the new trend and enormously changed the way of human communication. There is a strong need for security. The following research will provide the definition and purpose of IoT and examine its security concerns, In this paper, we surveyed at energy consumption of lightweight block ciphers implemented in reconfigurable devices, and we analyze d the effects that round unrolling might have on the energy consumed during the encryption.

  • PDF

The Moderating Role of Site Usage Experience in Internet Users' Decision on Personal Information Disclosure (개인정보제공 의사결정에 있어서 사이트 이용경험의 조절효과에 대한 연구)

  • Lee, Dong-Joo
    • Informatization Policy
    • /
    • v.19 no.2
    • /
    • pp.21-38
    • /
    • 2012
  • The proliferation of the Internet and the advent of e-commerce have amplified public concerns about privacy. Accordingly, much research effort has been made on the issue. While existing research on online information privacy has usually focused on the examination of antecedents of personal information disclosure, the literature has not paid attention to the potential changes of the antecedents' effects depending on the user's experience of the service. The current study aims to investigate the moderating role of site usage experience in Internet users' decision on personal information disclosure. Specifically, this study considers two types of antecedents of personal information disclosure on a site - the attributes of personal information requested (sensitivity and relevance of information) and the value of the service provided by the site; and examines how the effects of the antecedents on the disclosure intention are affected by the users'experience of the site. Our analysis of the data gathered through a web-based experiment reveals that site usage experience moderates the relationship between the attributes of personal information and disclosure intention. While usage experience attenuates the negative effect of information sensitivity on disclosure intention, it intensifies the positive impact that relevance of information has on disclosure intention. Based on the analysis results, we provide implications for the mitigation of the Internet users' privacy concerns as well as theoretical implications.

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Protection of Location Privacy for Spatio-Temporal Query Processing Using R-Trees (R-트리를 활용한 시공간 질의 처리의 위치 개인정보 보호 기법)

  • Kwon, Dong-Seop
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.85-98
    • /
    • 2010
  • The prevailing infrastructure of ubiquitous computing paradigm on the one hand making significant development for integrating technology in the daily life but on the other hand raising concerns for privacy and confidentiality. This research presents a new privacy-preserving spatio-temporal query processing technique, in which location based services (LBS) can be serviced without revealing specific locations of private users. Existing location cloaking techniques are based on a grid-based structures such as a Quad-tree and a multi-layered grid. Grid-based approaches can suffer a deterioration of the quality in query results since they are based on pre-defined size of grids which cannot be adapted for variations of data distributions. Instead of using a grid, we propose a location-cloaking algorithm which uses the R-tree, a widely adopted spatio-temporal index structure. The proposed algorithm uses the MBRs of leaf nodes as the cloaked locations of users, since each leaf node guarantees having not less than a certain number of objects. Experimental results show the superiority of the proposed method.

Responsible usage of digital technologies to manage SARS-CoV-2 pandemic (코로나19 대응을 위한 책임 있는 디지털 기술의 활용 방안)

  • Kim, Hongjun;Eom, Jung Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.99-108
    • /
    • 2020
  • The COVID-19 pandemic have been spreading continuously across the world, hence it is difficult to expect coming to an end in a short period of time. The use of digital technology has shown tangible results in suppressing COVID-19, but raised privacy and data-protection concerns. In the context of the global efforts to deal with the coronavirus pandemic, various digital technologies are taking on a role in surveillance, monitoring, and forecasting. Also the Korea government manages Corona crisis based on legal basis. In this paper, Korea and each country's response to the Corona 19 pandemic are shown, and suggests ways to protect personal information while using digital tools. Large-scale data collection and processing is essential for the suppression of pandemic, but it should be limited to the level and scope required privacy. Also international cooperation, temporary and transparent use of personal information, the corresponding legal basis are necessary. As the use of data and algorithms is expected to continue to increase, technical and institutional efforts to reinforce privacy protection must continue.

Intention to Use and Group Difference in Adopting Big Data: Towards a Comprehensive View (활용 주체별 빅데이터 수용 인식 차이에 관한 연구: 활용 목적, 조직 규모, 업종 특성을 중심으로)

  • Lee, Young-Joo;Yang, Hyun-Cheol
    • Informatization Policy
    • /
    • v.24 no.1
    • /
    • pp.79-99
    • /
    • 2017
  • Despite the early success story, the pan-industry diffusion of big data has been slow mostly due to lack of confidence of the value creation and privacy-related concerns. The problem leads us to the need to a stakeholder analysis on the adoption process of big data. The present study combines technology acceptance model, task-technology fit theory, and privacy calculus theory to integrate the positive and negative factors on the big data adoption. The empirical analysis was performed based on the survey from the current and potential big data users. Results revealed perceived usefulness, task-technology fit, and privacy concern are significant antecedents to the intention to use big data. Furthermore, there are significant differences in the perceptions of each constructs among groups divided by the types of big data use, with several exceptions. And the control effect was found in the magnitude of the relation between independent variables and dependent variable. The theoretical and politic implications of the analysis are discussed as to the promotion of big data industry.

A study on UI/UX Navigating Method for Effective Privacy Guidance for Online Behavioral Advertising(OBA) (온라인 맞춤형 광고 안내에 대한 프라이버시 안내를 위한 UI/UX 제공 방안 연구)

  • Kim, Ga-Yun;Kim, Ho-Joon;Kim, Da-Yeong;Yang, Jin-Hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.175-183
    • /
    • 2021
  • As concerns about users' privacy infringement on Online Behavioral Advertising(OBA) increase, regulators are taking measures such as drawing up guidelines for OBAs, and websites provide OBA guidance in compliance with such guidelines. As a result of reviewing the status of providing OBA guidance on websites, access to OBA guidance pages was rather complicated. In order to analyze the issue from the UI/UX perspective, following the "Guidelines for Privacy in Online Behavioral Advertising" applied to all types of OBA transmitted on websites, this study aims to structuralize a navigation of page movement from two starting points, 1) Main Page, 2) The page where OBA is delivered, to OBA guidance pages. Also, with understanding the problems found in the access and navigation of OBA guidance pages by analyzing features found during the page navigation, such as hyperlinks containing keywords, and movement pages.