• Title/Summary/Keyword: Privacy concerns

Search Result 252, Processing Time 0.029 seconds

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

A Study of the Experiences of Unwed Mothers in Interaction with Public Service Professionals: Focusing on the Experiences during Pregnancy, Birth and Child Caring (미혼모들의 경험을 통해 본 공공서비스 전문가들의 미혼모들에 대한 인식: 임신과 출산, 보육 과정에서의 경험을 중심으로)

  • Sung, JungHyun;Kim, HeeJoo;Lee, MeeJung;Park, YoungMee
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.404-418
    • /
    • 2016
  • This study aimed to explore negative experiences of unwed mothers in interaction with medical professionals, government officials and nursery teachers who have negative stereotypes about the unwed mothers and to seek ways of improving awareness and attitudes of the professionals. Researchers conducted individual and focus groups interviews with 15 unwed mothers. The results showed that unwed mothers experienced the violation of their maternal and privacy rights and inhospitable services in the interaction with medical professionals. They also had similar experiences with government officials who often had overbearing and discriminatory attitudes toward these mothers, and hardly received useful information. Last, unwed mothers had deep concerns about possibilities and experiences of discrimination against their children by nursery teachers and other parents in day care centers. In conclusion, this study discussed ways of improving awareness and attitudes toward unwed mothers through various medias and supplementary educations.

A Comparative Analysis of Cognitive Change about Big Data Using Social Media Data Analysis (소셜 미디어 데이터 분석을 활용한 빅데이터에 대한 인식 변화 비교 분석)

  • Yun, Youdong;Jo, Jaechoon;Hur, Yuna;Lim, Heuiseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.7
    • /
    • pp.371-378
    • /
    • 2017
  • Recently, with the spread of smart device and the introduction of web services, the data is rapidly increasing online, and it is utilized in various fields. In particular, the emergence of social media in the big data field has led to a rapid increase in the amount of unstructured data. In order to extract meaningful information from such unstructured data, interest in big data technology has increased in various fields. Big data is becoming a key resource in many areas. Big data's prospects for the future are positive, but concerns about data breaches and privacy are constantly being addressed. On this subject of big data, where positive and negative views coexist, the research of analyzing people's opinions currently lack. In this study, we compared the changes in peoples perception on big data based on unstructured data collected from the social media using a text mining. As a results, yearly keywords for domestic big data, declining positive opinions, and increasing negative opinions were observed. Based on these results, we could predict the flow of domestic big data.

Anti-Obesity Effect of Panax Ginseng in Animal Models: Study Protocol for a Systematic Review and Meta-Analysis (동물실험에서 인삼의 항비만 효과: 체계적 고찰과 메타분석을 위한 연구 프로토콜)

  • Cho, Jae-Heung;Kim, Koh-Woon;Park, Hye-Sung;Yoon, Ye-Ji;Song, Mi-Yeon
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.17 no.1
    • /
    • pp.37-45
    • /
    • 2017
  • Recently the global epidemic problem of obesity has stimulated intense interest in the study of physiological mechanisms using animal models as a way to gain crucial data required for translation to human studies. Panax ginseng has been reported to have anti-obesity or antidiabetic effects in many animal studies; however, there have been few studies investigating human obesity. Herein, we will assess and examine the evidence supporting the anti-obesity effect of Panax ginseng in animal models with respect to anthropometric and metabolic outcomes. We will include controlled, comparative studies assessing the effect of Panax ginseng in preclinical studies of obesity. Panax ginseng will be administered during or following the induction of experimental obesity. The primary outcome measure will be anthropometric assessment and the secondary outcome measures will include adipose tissue weight, total amount of food consumed and metabolic parameters. We will search MEDLINE, Embase, PubMed, Web of Science, and Scopus without language, publication date, or other restrictions. Ethical approval will not be necessary as the data collected in this study will not be individual patient data, consequently there will be no concerns about violations of privacy. After finishing the whole procedure, the results will be disseminated by publication in a peer-reviewed journal or presented at a relevant conference. This protocol has been registered on the Collaborative Approach to Meta-Analysis and Review of Animal Data from Experimental Studies (CAMARADES) website (http://www.camarades.info).

Improving Legislation on the use of Healthcare Data for Research Purposes (보건의료 빅데이터의 연구목적 사용에 대한 법제 개선방안)

  • Park, Dae Woong;Jeong, Hyun Hak;Jeong, Myung Jin;Ryoo, Hwa Shin
    • The Korean Society of Law and Medicine
    • /
    • v.17 no.2
    • /
    • pp.315-346
    • /
    • 2016
  • With the development of big data processing technology, the potential value of healthcare big data has attracted much attention. In order to realize these potential values, various research using the healthcare big data are essential. However, the big data regulatory system centered on the Personal Information Protection Act does not take into account the aspect of big data as an economic material and causes many obstacles to utilize it as a research purpose. The regulatory system of healthcare information, centered on the primary purpose of patient treatment, should be improved in a way that is compatible with the development of technology and easy to use for public interest. To this end, it is necessary to examine the trends of overseas legal system reflecting the concerns about the balance of protection and utilization of personal information. Based on the implications of the overseas legal system, we can derive improvement points in the following directions from our legal system. First, a legal system that specializes in healthcare information and encompasses protection and utilization is needed. De-identification, which is an exception to the Privacy Act, should also clearly define its level. It is necessary to establish a legal basis for linking healthcare big data to create synergy effects in research. It is also necessary to examine the introduction of the opt-out system on the basis of the discussion on the foreign debate and social consensus. But most importantly, it is the people's trust in these systems.

  • PDF

Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network (인지무선네트워크를 위한 회전자 기반 적응형 보안프레임워크 설계)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.165-172
    • /
    • 2013
  • Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. Especially, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio (CR) is a convergence technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. The main purpose of this research is focused on devising an adaptive security framework based on carousel for CR networks as a distinct telecommunication convergence application, which are still at the stage of being developed and standardized with the lack of security concerns. The framework uses a secure credential, named as carousel, initialized with the location related information from objects position, which is used to design security mechanisms for supporting privacy and various securities based on it. The proposed adaptive security framework could be used as a security building block for the CR network standards and various convergence applications.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Impacts of Perceived Value and Trust on Intention to Continue Use of Individuals' Cloud Computing: The Perception of Value-based Adoption Model (클라우드 컴퓨팅의 지각된 가치와 신뢰가 지속적 사용의도에 미치는 영향: 가치기반수용모델을 기반으로)

  • Kim, Sanghyun;Park, Hyunsun;Kim, Bora
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.77-88
    • /
    • 2021
  • Cloud computing is getting a lot of attention by many people and businesses due to IT environmental changes such as the proliferation of smart devices, the increase of digital data, and the cost of IT resources. More individuals use personal cloud computing services for storing and managing information and data. Therefore, this study proposed determinants that are expected to have an influence on evaluating the value of cloud computing based on the value-based adoption model, examining the relationship between the continuous use intention of cloud computing. Results of the study show that usefulness, convenience of information access, extensibility had a positive impact on perceived value while privacy concerns and costs had a negative impact on perceived value. In addition, perceived value was found to have a significant effect on the intention to continue use of cloud computing. Finally, trust was found to have a significant effect on the perceived value and the intention to continue use of cloud computing. The findings are expected to provide useful information for understanding the factors that individual users consider important in the steadily growing cloud computing market.

Effects of Motivation-Hygiene Factors on Acceptance and Resistance of Mobile Facial Recognition Payment Services: Focusing on Chinese Users (모바일 안면인식결제서비스의 동기-위생 요인이 수용 및 저항에 미치는 영향: 중국 사용자를 중심으로)

  • Jin, Xuanli;Park, JooSeok;Jin, JeongSuk
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.143-168
    • /
    • 2022
  • Using Herzberg's motive hygiene theory, this study also investigated the influence of motivation factors and hygiene factors on acceptance and resistance of mobile facial recognition payment services, and the influence of consumer innovation as a parameter on acceptance and resistance from motivation factors and hygiene factors. A survey was conducted on Chinese users who had experience using mobile payment services. IBM SPSS Statistics 26 and SmartPLS 3.0 were used for statistical analysis. As a result of the analysis, the motivating factors of mobile facial recognition payment services have a positive (+) impact on acceptance, and there were no significant results on resistance. In addition, hygiene factors have been shown to have negative (-) effects on acceptance and positive (+) effects on resistance. Consumer innovation, which is a parameter in relation to motivation factors and acceptance and resistance, had a partial mediation effect, and a partial mediation effect was also seen in the relationship between hygiene factors and resistance, but no mediation effect was found in the relationship between hygiene factors and acceptance. The motivating factors found through research results such as rapidity, ubiquity, perceived usability, perceived ease of use, privacy concerns, security, status quo inertia, use barriers, and loss avoidance, which are factors of non-contact and hygiene, can be used as basic data for activating mobile facial recognition payment services.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.