• Title/Summary/Keyword: 개인정보 보호 행동

Search Result 90, Processing Time 0.024 seconds

An Investigation of the Psychology of Password Replacement by Email Users (전자메일 서비스 이용자의 패스워드 교체 심리에 대한 연구)

  • Lim, Se Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1251-1258
    • /
    • 2016
  • Recently, leaks of the personal information of Internet users have been occurring too frequently. Generally, Internet users have email accounts. The use of email as a communications tool in the private and public sectors has increased. Therefore, in email usage, password management to ensure a more secure email service is most important. In this study, we conducted an online survey of email users and analyzed their responses by using structural equation modeling software to find the psychological and behavioral characteristics of their password management. The results of this study provide useful suggestions on information security strategies related to email password management at both the enterprise and individual levels.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

Influence of Personal Information Security Vulnerabilities and Perceived Usefulness on Bank Customers' Willingness to Stay (개인정보 보안취약성과 지각된 유용성이 지속적인 은행이용의도에 미치는 영향)

  • Seo, Dong-Jin;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1577-1587
    • /
    • 2015
  • Privacy of financial customers is becoming important due to frequent leakage of personal information. Financial customers, who experience the leakage of personal information, feel threatened by their privacy and this changes customer's awareness about financial institutions or behavioral intentions. By examining the influence relation of personal information security vulnerability of the bank information system with usefulness, trust and attractiveness perceived by bank customers, this study aims to analyze the effect of each variable on bank customers' willingness to stay.

The behavior patterns of Cyworld's users -Focusing on Communication- (싸이월드 사용자의 행동패턴에 관한 연구 -의사소통 중심으로-)

  • Whang, Leo Sang-Min;Cho, Hee-Jin
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.744-752
    • /
    • 2006
  • 사이버 공간이 현실 생활의 일부분으로 통합되어가고 사이버 공간에서의 대인간 의사소통이 보편적인 현상으로 나타남에 따라 사이버 공간에서의 의사소통과 경험 그리고 그것의 영향력에 대한 논의는 그 동안 많이 있어왔다. 그러나 기존의 연구들은 사용자의 행동 특성에 따라 사이버 공간에서의 활동과 영향력, 그리고 그 의미가 달라진다는 점을 간과하였다. 따라서 본 연구에서는 동일한 커뮤니케이션 공간인 싸이월드도 그것에 부여하는 가치와 의미는 사람마다 다르고 따라서 행동도 다를 것이라는 가정하에, 싸이월드에서 나타나는 다양한 이용행동과 활동들을 유형으로 분류하고 그 유형에 따라 싸이월드에서의 의사소통 패턴과 경험, 활동에서의 차이를 살펴보고자 했다. 사전 연구로 진행되었던 사용자 인터뷰를 통해 정리된 행동문항을 전체 설문을 통해 분석한 결과 싸이월드에서 보이는 개인의 행동적 특성을 의미하는 5 개 요인(적극성.몰입, 낯선 사람과의 연결과 정보 추구, 사생활 보호, 단순한 연락 수단, 폐쇄성)이 확인되었고, 이렇게 추출된 행동 요인을 토대로 싸이월드에서 나타나는 3 개의 행동 유형(적극적 활용형, 폐쇄적. 다이어리 추구형, 새로운 관계.정보 추구형)이 구분되었다. 행동 요인의 차이로 표현되는 3 개의 행동 유형에 따른 싸이월드에서의 의사소통 패턴과 싸이월드에서의 활동 그리고 싸이월드 경험에 대한 평가를 분석한 결과 행동 유형간에 유의미한 차이가 있는 것으로 나타났다. 본 연구는 동일한 싸이월드라는 공간이 사용자가 추구하는 가치와 목적에 따라 각기 다른 공간으로 기능하고 있음을 보여주었다는 데에 의의가 있으며, 가치의 차이로 나타나는 행동 유형에 따라 싸이월드에서 소통하는 대상과 방식이 달라지고 경험의 의미 또한 달라질 수 있음을 시사하고 있다.

  • PDF

Anonymity User Authentication Scheme with Smart Cards preserving Traceability (추적이 가능한 스마트카드 사용자 인증 기법)

  • Kim, Se-Il;Chun, Ji-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.31-39
    • /
    • 2008
  • Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme. which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

Impacts of Information Security Culture and Management Leadership Styles on Information Security Behaviors (정보보안문화와 경영진 리더십이 조직 구성원의 정보보안 행동에 미치는 영향)

  • Park, Sunghwan;Kim, Beomsoo;Park, Jaeyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.355-370
    • /
    • 2022
  • This research investigates the impacts of information security (IS) culture and management leadership styles on employee's security behaviors (IS policies compliance, IS participation) in financial institutions. This study use the survey data collected from 236 employees of financial institutions. This research shows that IS culture has a positive effect on both behavioral intentions to comply with IS policies and the intentions to actively participate in information security activities. Transactional leadership has a positive impact on the IS policies compliance intentions and to participate in information security activities. In contrast, transformational leadership has a positive impact on the intentions to participate in information security activities, but not on the IS policies compliance intentions.

Antecedents Affecting the Information Privacy Concerns in Personalized Recommendation Service of OTT

  • Yujin Kim;Hyung-Seok Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.161-175
    • /
    • 2024
  • In this paper, we examined the causes of privacy concern and related factors in personalized recommendation service of OTT. On the basis of the 'Big Five Personality model,' we established factors such as agreeableness, neuroticism, conscientiousness, extraversion, and openness to experience. Additionally, we established factors such as accuracy, diversity, and novelty of OTT recommendation's services, and perceived transparency. we analyzed the relationship between privacy concern, service benefit, and intention to give personal information. Finally, we analyzed the mediating effect of service benefits on the relationship between privacy concern and intention to give personal information. The results of this study showed that (1) neuroticism, extraversion and openness to experience had the significant effects on privacy concerns, (2) perceived transparency had the significant effects on privacy concern, 3) privacy concern and service benefit had the significant effect on intention to give personal information, and (4) as a result of multi-group analysis towards low and high groups to verify the moderating effect by service benefits, a significant difference was observed between privacy concern and intention to give personal information. The findings of the study are expected to help the OTT firms' understanding towards users' privacy protection behaviors.

A Study on the Effects of IS Organization Justice and Positive Psychological Capital on Mitigation of Role Stress (정보보안 조직 공정성과 긍정심리자본이 업무 스트레스 완화에 미치는 영향 연구)

  • Hwang, Inho;Lee, Yunsock
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.575-590
    • /
    • 2022
  • Recently, organizations are increasing their investment to protect information resources from information security(IS) threats through the adoption of IS policies and technologies. However, IS incidents occur in a variety of ways, such as intrusions from outside the organization and exposure to the inside. Our study presented the negative effects of IS role stress on organizational insiders and suggested factors from the organizational and individual perspectives for mitigating IS role stress. We conducted a survey on employees of companies that introduced and applied IS policies to their work and tested the hypothesis using 329 samples. As a result, IS organization justice reduced IS role stress and strengthened IS positive psychological capital, thereby affecting the IS compliance intention of employees. Also, IS positive psychological capital moderated the relationship between IS stress and IS compliance intention. This study contributes to the achievement of internal IS goals by suggesting the conditions that affect the IS compliance behavior of employees in terms of the organizational environment and individual characteristics