• 제목/요약/키워드: Privacy concerns

검색결과 252건 처리시간 0.032초

사용자의 지각된 통제력이 디지털 금융서비스 이용의도에 미치는 영향: 프라이버시 염려 조절효과를 중심으로 (Effects of Perceived Control on Usage Intention toward Digital Finance Service: Moderating Role of Privacy Concern)

  • 강준모;박철
    • 경영정보학연구
    • /
    • 제25권4호
    • /
    • pp.161-181
    • /
    • 2023
  • 코로나19 이후 소비생활 환경의 비대면화가 급격히 앞당겨지면서, 변화하는 비대면 금융생활서비스는 소비자의 일상에 큰 영향을 미치고 있다. 이처럼 필수재화가 된 디지털 기기·서비스를 이용하지 못하는 국민은 일상생활뿐 만 아니라 사회·경제 전반에서 소외되는 '디지털 사각지대'에 내쳐질 위험이 높아지고 있다. 이에 본 연구에서는 지각된 통제력 요인인 인지 통제력, 행동 통제력, 결정통제력이 디지털 금융서비스 이용의도에 미치는 영향을 분석하였다. 본 연구를 위해 디지털금융을 알고 있으면서 이용의도가 있는 133명의 고객을 대상으로 설문조사를 실시하였다. 연구결과 인지 통제력, 행동 통제력, 결정 통제력은 디지털 금융서비스 이용의도에 유의적인 영향을 미치는 것으로 나타났다. 또한 프라이버시 염려에 대한 조절효과는 결정 통제력이 디지털 금융서비스 이용의도에 미치는 영향에서 유의하게 나타났다. 이러한 결과를 바탕으로 디지털 금융서비스 기업이 고객의 지각된 통제력을 관리할 수 있는지에 대한 시사점을 제시하였다.

Secure Face Authentication Framework in Open Networks

  • Lee, Yong-Jin;Lee, Yong-Ki;Chung, Yun-Su;Moon, Ki-Young
    • ETRI Journal
    • /
    • 제32권6호
    • /
    • pp.950-960
    • /
    • 2010
  • In response to increased security concerns, biometrics is becoming more focused on overcoming or complementing conventional knowledge and possession-based authentication. However, biometric authentication requires special care since the loss of biometric data is irrecoverable. In this paper, we present a biometric authentication framework, where several novel techniques are applied to provide security and privacy. First, a biometric template is saved in a transformed form. This makes it possible for a template to be canceled upon its loss while the original biometric information is not revealed. Second, when a user is registered with a server, a biometric template is stored in a special form, named a 'soft vault'. This technique prevents impersonation attacks even if data in a server is disclosed to an attacker. Finally, a one-time template technique is applied in order to prevent replay attacks against templates transmitted over networks. In addition, the whole scheme keeps decision equivalence with conventional face authentication, and thus it does not decrease biometric recognition performance. As a result, the proposed techniques construct a secure face authentication framework in open networks.

전자상거래의 소비자 구매행위에 영향을 미치는 요인에 관한 실증연구 (The Study on the Factors Affecting Consumer's Buying Behavior Under The E-commerce Environment.)

  • 한경일;손원일
    • 마케팅과학연구
    • /
    • 제7권
    • /
    • pp.321-337
    • /
    • 2001
  • 본 연구의 옥적은 한국적 상황에서 전자상거래의 소비자 구매행위에 영향을 미치는 요인을 실증적으로 밝히기 위한 것이다. 이를 위하여 선행연구에서 구매행위에 영향을 미치는 것으로 밝혀진 온라인 기업의 특성, 거래 안정성의 우려, 프라이버시의 보장, 쇼핑성향, 인 지된 유통구조를 독립변수로 사용하였고, 소비자의 구매행위를 종속변수로 설정하여 다중 회귀분석을 실시하였다. 가설 검증 결과, 인지된 유통구조와 소비자의 오락적 성향과 경험 적 성향이 구매행위에 유의적인 정의 영향을 미치는 것으로 밝혀졌고, 거래 안정성의 우려 및 개인 정보의 누출은 구매행위에 유의적인 부의 영향을 미치는 것으로 밝혀졌다.

  • PDF

스마트폰 위치기반 어플리케이션의 효용과 비용에 대한 소비자 인식 (Consumers' Perceived Costs and Benefits of Location-Based Smartphone Applications)

  • 김효정;나종연
    • Human Ecology Research
    • /
    • 제51권5호
    • /
    • pp.483-495
    • /
    • 2013
  • This study aimed to identify the dimensions of benefits and costs that consumers perceive in utilizing locationbased applications (LBAs) on smartphones, and to distinguish consumer groups according to their perceptions of those benefits and costs. A web-based consumer survey was conducted-among consumers who had experience using LBAs. Four hundred participants were 20's to 40's, with 200 women and 200 men. Descriptive statistics, frequency analysis, t -tests, one-way analysis of variance, and cluster analysis were used for data analysis. The findings of this study are as follows: first, LBAs accounted for about 20% of the smartphone apps used by consumers. Second, factor analysis identified the underlying dimensions of the benefits and costs of smartphone LBAs. The underlying dimensions of benefits perceived by consumers were information/economic/convenience, entertainment and personalization. Privacy concerns, lack of trust and lack of behavioral control were the underlying dimensions of the perceived costs of LBAs. Third, ANOVA showed that the perceived benefits and costs of smartphone LBA services differed according to the characteristics of the consumer. Cluster analysis identified three distinctive consumer groups according to the levels of perceive costs and benefits of smartphone LBAs. The three groups were labeled the 'benefit-cost balanced group,' 'cost centered group,' and 'benefit centered group.'

'Viewpoints/ Concerns' on empirical methodologies for Socio/ cultural studies

  • Ashis, Jalote Parmar;Lee, Kun-Pyo
    • 한국디자인학회:학술대회논문집
    • /
    • 한국디자인학회 2004년도 추계 학술발표대회 논문집
    • /
    • pp.212-213
    • /
    • 2004
  • Since the advent of man there has been a constant struggle to define social pattern, and understand ways of cultural thinking. Every culture has it's own limitations and freedoms, problems and expectations. For centuries now anthropologist, ethnographers have worked on mapping and defining these differences. These findings instigate the designers to formulate new design theories and research methodologies for drafting cultural specific solutions. The question arises 'in a cross cultural application how effective and applicable are the basic research methodologies'? Quoting one such example the 'Privacy' issue seems to be a very strong component in the Japanese culture but is often a deterring factor in allowing the 'home ethnographic study to take place effectively'. However in countries like India similar studies could have a more welcoming reaction owing to the adaptive social culture. Similarly, the high rate of 'Illiteracy' in rural India closes many doors for 'form filling' user surveys. This leads to the scope of research for understanding specific cultural traits that may effect adaptation and re-improvisation of these existing methodologies. Quite often the cultural traits of a country may lead in forming new research methodologies.

  • PDF

지문인식 기반을 이용한 전자의무기록 시스템 접근제어에 관한 연구 (A study of access control using fingerprint recognition for Electronic Medical Record System)

  • 백종현;이용준;염흥렬;오해석
    • 디지털산업정보학회논문지
    • /
    • 제5권3호
    • /
    • pp.127-133
    • /
    • 2009
  • The pre-existing medical treatment was done in person between doctors and patients. EMR (Electronic Medical Record) System computerizing medical history of patients has been proceed and has raised concerns in terms of violation of human right for private information. Which integrates "Identification information" containing patients' personal details as well as "Medical records" such as the medical history of patients and computerizes all the records processed in hospital. Therefore, all medical information should be protected from misuse and abuse since it is very important for every patient. Particularly the right to privacy of medical record for each patient should be surely secured. Medical record means what doctors put down during the medical examination of patients. In this paper, we applies fingerprint identification to EMR system login to raise the quality of personal identification when user access to EMR System. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing carries out it in client. And the confidence of hospital service is improved because login is forbidden without fingerprint identification success.

국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구 (Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management)

  • 이성중;이영재
    • Journal of Information Technology Applications and Management
    • /
    • 제16권4호
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

  • Li, Jiping;Ding, Yaoming;Xiong, Zenggang;Liu, Shouyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5556-5573
    • /
    • 2017
  • As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker's own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

공동주택 대안적 화재 피난방식에 대한 건설전문가 평가조사 (Analysis on Field Professionals' Assessment of Alternative Fire Escape Methods in Apartment Building)

  • 이명식;이소영
    • KIEAE Journal
    • /
    • 제9권5호
    • /
    • pp.21-28
    • /
    • 2009
  • In apartment buildings, casualties, especially fatalities have occurred in balcony areas in fires if residents fail to escape to the main entrance. Potential consequences of a particular infrequent event should be considered. In attempting to design apartment buildings for fire safety, alternative escape methods such as vertical penetration could be considered. The purpose of this study is to investigate present building regulations regarding apartment buildings and examine pros and cons of the current escape method and alternative escape methods. Focus group interview was conducted to discuss problems of fire escape methods. In addition, questionnaires were distributed to field professionals working in architecture, construction and related industries. Among 500 questionnaires distributed, 192 questionnaires were collected. Usable 162 questionnaires were analyzed using SPSS 15. Regarding alternative fire escape methods, several concerns were mentioned. Safety, privacy, security, effectiveness of escape, water proof problems were raised. Based on the opinions, vertical penetration between apartment unit appeared more safe, secure, effective than horizontal penetration. However, both methods have its own pros and cons under specific contexts. Alternative escape methods need be considered for a selective options for residents in case of fire.

의료정보보호를 위한 RFID를 이용한 환자 인증 시스템 (Patient Authentication System for Medical Information Security using RFID)

  • 윤은준;유기영
    • 한국통신학회논문지
    • /
    • 제35권6B호
    • /
    • pp.962-969
    • /
    • 2010
  • 최근 의료 과실을 줄이기 위한 방법으로 RFID 기술을 많이 적용한다. 이 기술을 이용하면 환자들에 대한 의료처방 및 치료를 정확하게 수행 할 수 있다. 의료 환경에서 RFID 기술 활용의 핵심은 프라이버시 제공이다. 본 논문에서는 위와 같은 환경을 기반으로 안전하고 효율적으로 환자 인증 및 환자 개인 의료 정보를 보호할 수 있는 RFID 인증 시스템을 제안한다. 제안한 시스템은 RFID 기반의 환자 인증 프로토콜과 데이터베이스 보안 프로토콜로 구성된다. 결론적으로, 제안한 RFID 인증 시스템은 강인한 보안성과 효율성을 제공하여 주어, u-Hospital 및 u-Healthcare 같은 첨단 의료 환경 상에서 환자 인증뿐만 아니라 환자 개인의 의료 정보를 안전하게 보호할 수 있음으로 실용적으로 사용되어 질 수 있다.