• Title/Summary/Keyword: service user risk

Search Result 156, Processing Time 0.022 seconds

A Study on the Privacy Paradox in the IoT-based Smart Home Camera Usage Environment: Focusing on a Comparative Study of User Experience (IoT 기반 스마트 홈카메라 이용환경에서의 프라이버시 패러독스 현상에 관한 연구: 사용경험 비교연구를 중심으로)

  • Lyu, JinDan;Kwon, Sundong
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.6
    • /
    • pp.145-161
    • /
    • 2021
  • Recently, as personal information utilization devices such as IoT, artificial intelligence, and wearable devices that focus on the individual have spread, privacy violations are also increasing. However, the privacy paradox of providing personal information to enjoy services while worrying is getting stronger. However, there are still preliminary studies on this. In this study, an intelligent home camera based on IoT technology was selected as a research object, and whether privacy paradox exists in the IoT environment, including smart home camera, was studied. To this end, the effect of perceived usefulness, a benefit factor of smart home camera use, and privacy concern, a risk factor, on intention to use was verified. In addition, it was investigated whether the relationship between privacy concerns and intention to use differs according to the presence or absence of use experience. In order to verify the research model, a survey was conducted with people with and without experience in using smart home cameras, and a total of 298 data samples were used for statistical analysis. As a result of the analysis, it was found that both perceived usefulness and privacy concerns had a positive effect on the intention to use, proving that privacy paradox exists in the IoT-based smart home camera environment. In addition, by analyzing the fact that privacy concerns have different effects on usage intentions depending on the user experience, it was verified that those with experience have a strong privacy paradox and those without experience have a weak privacy paradox. This study is meaningful because it seeks strategic implications to improve service and business performance by understanding the relationship between privacy attitudes and behaviors of IoT service providers, including smart home cameras.

Study on the Development for Traffic Safety Curriculum of Automated Vehicles on Public Roads (실 도로 기반 자율주행자동차 교통안전 교육과정 개발 연구)

  • Jin ho Choi;Jung rae Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.266-283
    • /
    • 2022
  • With the rapid development of autonomous vehicle technology, unexpected accidents are occurring. Therefore, it is necessary to minimize user accident damage through the development of autonomous traffic safety education. Since edge cases, accident type, and risk factor analysis are important for realistic education, overseas case studies and demonstrations were carried out, and based on this, two curriculum for service providers and general users were developed. The service provider curriculum consisted of OEDR, sudden stop, cut-in, take-over, defensive driving, system malfunction, policy and information security education, and the general user curriculum consisted of attention duty, take-over, operating design domain, accidents type, laws, functions, information security education.

Effect of TikTok's Level-specific Recommendation Service on Continuous Use Intention: Focusing on the Privacy Calculation Model (틱톡의 수준별 추천 서비스에 따른 지속적 사용의도에 미치는 영향: 프라이버시계산 모델을 중심으로)

  • Yue Zhang;JeongSuk Jin;Joo-Seok Park
    • Information Systems Review
    • /
    • v.24 no.3
    • /
    • pp.69-91
    • /
    • 2022
  • The video recommendation services help to save the user's information search time in the overflowing online information, and algorithms for more efficient and accurate recommendation are continuously developed. In particular, TikTok has the largest number of users in the short video industry due to its unique recommendation algorithms. In this study, by applying a privacy calculation model, the research tried to compare users' responses to each type of TikTok's recommendation service. Users are well aware of the privacy concerns and benefits of TikTok's recommendation service. Although there is a risk, it was found that users continue to use TikTok's recommendation service because the benefits are greater.

A Framework for measuring query privacy in Location-based Service

  • Zhang, Xuejun;Gui, Xiaolin;Tian, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1717-1732
    • /
    • 2015
  • The widespread use of location-based services (LBSs), which allows untrusted service provider to collect large number of user request records, leads to serious privacy concerns. In response to these issues, a number of LBS privacy protection mechanisms (LPPMs) have been recently proposed. However, the evaluation of these LPPMs usually disregards the background knowledge that the adversary may possess about users' contextual information, which runs the risk of wrongly evaluating users' query privacy. In this paper, we address these issues by proposing a generic formal quantification framework,which comprehensively contemplate the various elements that influence the query privacy of users and explicitly states the knowledge that an adversary might have in the context of query privacy. Moreover, a way to model the adversary's attack on query privacy is proposed, which allows us to show the insufficiency of the existing query privacy metrics, e.g., k-anonymity. Thus we propose two new metrics: entropy anonymity and mutual information anonymity. Lastly, we run a set of experiments on datasets generated by network based generator of moving objects proposed by Thomas Brinkhoff. The results show the effectiveness and efficient of our framework to measure the LPPM.

A Research and Development of Dynamic Recognition Technique for Enhancing Reliability of Mobile Sensing Service (모바일 감지 서비스의 신뢰성 향상을 위한 동적 인지 기법 연구 및 개발)

  • Eun, Yun-Kyu;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3412-3420
    • /
    • 2015
  • Smartphone has become an essential element in our daily life and built-in sensors of the smartphone can be utilized in order to recognize of user's situation. However, it is lack of research for safety and accident prevention by dynamic situation recognition. In this paper, we propose a technique that can be recognized risk situation dynamically using accelerometer, microphone and GPS sensor of mobile device. We propose an architecture and process for sensing techniques of Dynamic Recognition Technique, and develop the mobile application for verifying the suitability of the architecture.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

A Study on Removal Request of Exposed Personal Information (노출된 개인정보의 삭제 요청에 관한 연구)

  • Jung, Bo-Reum;Jang, Byeong-Wook;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.37-42
    • /
    • 2015
  • Although online search engine service provide a convenient means to search for information on the World Wide Web, it also poses a risk of disclosing privacy. Regardless of such risk, most of users are neither aware of their personal information being exposed on search results nor how to redress the issue by requesting removal of information. According to the 2015 parliamentary inspection of government offices, many government agencies were criticized for mishandling of personal information and its leakage on online search engine such as Google. Considering the fact that the personal information leakage via online search engine has drawn the attention at the government level, the online search engine and privacy issue needs to be rectified. This paper, by examining current online search engines, studies the degree of personal information exposure on online search results and its underlying issues. Lastly, based on research result, the paper provides a sound policy and direction to the removal of exposed personal information with respect to search engine service provider and user respectively.

Secure Smart Safety System Using Streetlight Infrastructure (가로등 인프라를 활용한 안전한 스마트 방범 시스템)

  • Cha, Jeong-Hwa;Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.851-856
    • /
    • 2015
  • As crime has actually increased in recent years, various mobile applications related to safety and emergency measure have received much attention. Therefore, IoT (Internet of Things) technologies, which connect various physical objects with Internet communication, have been also paid attention and then diverse safety services based on IoT technologies have been on the increase. However, existing mobile safety applications are simply based on location based service (LBS). Also, as they are independently operated without the help of another safety systems, they cannot efficiently cope with various safety situations. So, this paper proposes the efficient smart safety service architecture with both the risky situation detection using user location as well as various sensing information and the risk congruence measure using the streetlight infrastructure. Additionally, UDID (unique device identifier) is utilized for the secure communication with the control center.

Determinants of Intention to Use Electronic Channel of Automobile Insurance: Applying the UTAUT Model (자동차 보험 거래에 있어서 전자적 채널 이용 의도의 영향 요인: UTAUT 모델의 응용)

  • Lee, Min-Hwa
    • The Journal of Information Systems
    • /
    • v.22 no.1
    • /
    • pp.181-200
    • /
    • 2013
  • Electronic channel of automobile insurance has emerged as an attractive way of lowering costs and saving time to do the transaction for customers. Electronic channel refers to using web sites to find useful information on insurance products, buy automobile insurance, and ask for services related to the insurance. This study suggests a modified model of the UTAUT and examines the factors influencing intention to use electronic channel in the transaction of automobile insurance. Based on 203 responses from potential automobile insurance buyers, the results showed that performance expectancy, effort expectancy, social influence, service expectancy, and security risk are significantly related to intention to use electronic channel. The results also showed that age as a moderator influences the effects of performance expectancy and effort expectancy on intention to use electronic channel. The study results would improve the understanding of the factors to which managers of insurance companies should pay attention in order to increase their sales through electronic channel.

Development of Compliance Collaboration Index for Trade Supply Chain (무역공급망 법규준수 협력지수 개발)

  • Kim, Hee-Soo;Ma, Sun-Duck
    • Journal of Korean Society for Quality Management
    • /
    • v.38 no.1
    • /
    • pp.34-41
    • /
    • 2010
  • This paper proposes the compliance collaboration index(CCI) which can be useful to measure the level of supply chain's compliance collaboration quantitatively. It can be shown that the proposed index is quite flexible when applied in real situations at the request of the index user. For instance, even if only one company of many companies in trade supply chain to be tested through the AEO certification test is not satisfied the required specification. the index is designed in such a way that the score can't be higher than a certain predetermined value. The proposed CCI can be used as the guidance for a trade company's collaboration process control strategy to increase the efficiency of compliance improvement activity. In this paper, we use the Analysis Hierarchy Process(AHP) which is one of the methods recommended by ISO/ICE as a measurement of weight to be assigned to the relevant parameters considered in the CCI.