• Title/Summary/Keyword: 개인정보 침해요인

Search Result 69, Processing Time 0.032 seconds

A Study on Continued Intention of Social Network Services by Applying Privacy Calculus Model: Facebook and KakaoTalk Cases (프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로)

  • Min, Jinyoung;Kim, Byoungsoo
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.105-122
    • /
    • 2013
  • Given the proliferation of social network services, it has become important to understand its user's continued use behavior. As users' privacy concerns in SNS have been identified as a critical barrier against forming this continued intention, many studies have focused on inducing continued intention by mitigating privacy concerns. However, this paper suggests to approach users' continued intention not only from the perspective of mitigating privacy concerns but also from the perspective of increasing potential benefits. Under the theoretical framework of privacy calculus model, we conducted cross sectional survey on 150 Facebook and 150 KakaoTalk users. The result suggests that trust mediates the relationships between privacy concerns and continued intention and between network externality and continued intention, and the influence of support for network formation on continued intention. The effect of network externality on continued intention, however, is not significant among Facebook users while it is significant among KakaoTalk users.

  • PDF

A Study on the Investigation of the Awareness for the Privacy of the Users at the School Libraries (학교도서관 이용자의 프라이버시에 대한 인식조사연구)

  • Sim, Jae-yun;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.4
    • /
    • pp.31-63
    • /
    • 2015
  • This research was based on the investigation of the awarenesses of librarians of issues regarding the privacy of the users of school libraries. It sought to determine if, by raising the issue of the importance of the need for the protection of the personal information of the users of the school libraries, and the implications of not paying attention to the rules in effect, the awareness regarding the privacy of the users of school libraries would be improved. For this, previous research related to the privacy of the students, the legal basis for the protection of the privacy of the domestic and foreign students, and the types of the infringements upon the protection of their personal information were investigated. A survey was conducted to measure the awareness of issues related to the privacy of the users of the library. The research showed the results as follows: First, the awarenesses regarding the privacy of the users of the school libraries appeared low, and low recognition was also found regarding the awareness of the cases of the infringements upon the privacy of the users of the school libraries; regarding the awareness in relation to the protection of privacy; regarding the seriousness of the privacy problems of the users; and regarding the factors that can encroach upon the privacy of the users. Second, regarding the seriousness felt when the library records of the users of the school libraries are leaked to the outside, 41.6% of the respondents responded by saying "It is serious", and 18.4% responded by saying "It is not serious". Third, as a result of investigating the awareness regarding whether the consent of the person concerned is needed in case a third party requests access to reading the records in the library, 68.5% of the respondent responded "It is needed", and only 10.4% responded "It is not needed". Last, in the investigation into whether the respondents had the experience of being educated as to the rules related to the privacy of the users at a school or an external organization, over 80% of the respondents answered that they did not receive it.

A Study on Factors Affecting the Investment Intention of Information Security (정보보호 투자의도에 영향을 미치는 요인에 대한 연구)

  • Lee, Hong-Je;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1515-1525
    • /
    • 2018
  • Security threats in the 4th Industrial Revolution have expanded to the issue of safety, but the environment for information security of domestic companies is still at a low level. This study aims to propose policy implications by empirically analyzing factors affecting investment intention. We investigated the state of information security and protection behavior and expanded UTAUT to investigate correlations. The results showed that information assets affect facilitating conditions, and perceived and new concerns have impacts on social influence. Social influence affect experience and habits, but the impact on security investment intentions was rejected. Facilitation conditions, previous experiences and habits have great influences on investment intention, new service security investment intention. The influence of perceived and new concern are low or rejected. There are moderating effects between types of business, size, security organization, experience of infringement, security personnel ratio, and personal information collection. This study will help to establish policies for enhancing the level of information security.

A Test of Situational Action Theory for Explaining the Moderating Effect of Self-Control and Deterrence in Digital Piracy: Comparing Download with Upload Behavior (디지털 저작권침해 행위에서 상황행위이론의 적용을 통한 자기통제와 처벌억제의 조절효과: 다운로드와 업로드 행위의 비교)

  • Lee, Seong-Sik;Jang, Ha-Young;Lim, Su-Kyung
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.9-17
    • /
    • 2021
  • This study test a situational action theory for explaining online download and upload digital piracy and examines the moderating effect of self-control and punishment. Then it tests the moderating effect of self-control in high morality and low moral rule environments and tests the moderating effect of perceived punishment in low morality and high moral rule environments. Using data from 317 college students in Seoul, In case of download, results show that self-control does not control the effects of high morality and low moral rule on it. In addition, it is found that perceived punishment does not control the effects of low morality and high moral rule on it. In case of upload, results show that self-control does not control but increase the effects of high morality and low moral rule on it, while perceived punishment controls the effects of high morality and low moral rule on it.

A Study on the RFID Security Technologies in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.267-272
    • /
    • 2005
  • The ubiquitous computing environment is a new paradigm that represents the future life and is expected to bring about great changes in IT and in the lives of individuals. However, since a good deal of information can be easily obtained and shared in the ubiquitous computing environment, problems such as a security threat and infringement of privacy are getting serious. The present study is intended to explore some ways to minimize such problems by introducing RFID technology in the ubiquitous computing environment. This study also examines the causes of violation of security and privacy that might occur in the RFID system and requirement for security. In addition it seeks possible technical solutions to those causes.

  • PDF

An Impact Assessment Index for the RFID Privacy (RFID 개인정보 영향평가지수 개발)

  • Han, Pil-Koo;Kang, Byung-Goo
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.69-86
    • /
    • 2009
  • The biggest paradigm of the latest telecommunications is ubiquitous computing. It is a technology basis to realize ubiquitous society that would affect social, economical and cultural industries with positive influence. However, there is a simultaneous concern that the approach to ubiquitous society may violate one's privacy. Therefore, the existence of legal and technological regulation would be the biggest obstacle in further RFID technology and industry dissemination. Also, in business side, they must invest with enormous expense and technology if technological method is only approached for the solution. As in the research, 8 RFID applications, application process and inspection items and 85 appraisal list of "An impact assessment for the privacy protection in RFID applications" developed by P. K. Han(2006), will be used as an indicator to measure RFID privacy impact assessment. In addition, it is to develop RFID privacy impact assessment index by applying objective data with survey of applied specialists. This would provide a data with feasibility and reliability to RFID related companies and able to utilize policy making on RFID private data. In addition, it is expected to contribute as an efficiency tool for individual data to build basis of ubiquitous society.

A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems (지능형교통시스템의 보안취약점 개선방안에 관한 연구)

  • Jo, Pyoung Hyun;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.531-543
    • /
    • 2013
  • The destruction and prejudice of major infrastructure such as energy, broadcast, communication and transportation could result in a threat to individual rights and liberties, as well as social and economic losses. If a traffic signal control facilities have been violated, the lives of the citizens discomfort as well as causing social disruption such as traffic accident. Because the control system is operating as a closed network and you think it is safe, the information protection system has not been built or security patches and anti-virus updates do not work properly. So, cyber attacks by security vulnerabilities are exposed. Therefore, there is a need to identify the characteristics of the system, and develop appropriate countermeasures in order to prevent cyber attacks and prejudices incidents. This paper examines the vulnerabilities of Intelligent Transport Systems and proposes the improvement of security vulnerabilities.

Medical Information Privacy Concerns in the Use of the EHR System: A Grounded Theory Approach (의료정보 프라이버시 염려에 대한 근거이론적 연구: 전자건강기록(EHR) 시스템을 중심으로)

  • Eom, Doyoung;Lee, Heejin;Zoo, Hanah
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.217-229
    • /
    • 2018
  • Electronic Health Record (EHR) systems are widely adopted worldwide in hospitals for generating and exchanging records of patient information. Recent developments are moving towards implementing interoperable EHR systems that enable information to be shared seamlessly across healthcare organizations. In this context, this paper explores the factors that cause medical information privacy concerns, identifies how people react to privacy invasion and what their perceptions are towards the acceptance of the EHR system. Interviews were conducted to draw a grounded theory on medical information privacy concerns in the use of EHRs. Medical information privacy concerns are caused by perceived sensitivity of medical information and the weaknesses in security technologies. Trust in medical professionals, medical institutions and technologies plays an important role in determining people's reaction to privacy invasion and their perceptions on the use of EHRs.

A Rapid Response Proposal for Disaster Situations Through the Efficient Risk Map Transport and imaging information (효율적 Risk Map 전송 및 재난 정보 영상화 기법을 통한 신속 재난 상황 대응 방안 제시)

  • Jo, Myung Hee;Choe, Su-Yeong;Kim, Jin-Man
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.258-258
    • /
    • 2016
  • 이상기후로 인한 자연 재해의 발생규모는 점차 증가하고 있다. 이는 시민의 안전과 재산을 위협하는 요인 중 하나이며, 시민 개인의 안전 침해 뿐 아니라 국가적 재산에 해당하는 SOC 시설물의 위협 역시 심각한 피해라고 할 수 있다. 이를 위해 최근 SOC 시설물에 대한 재난 대응 측면의 모니터링 시스템을 구축 및 개발 하고 있으며, 그를 지원하는 현장 지원 모바일 시스템을 연계하는 방안을 모색하는 연구가 급증 하고 있다. 하지만 현장에 있는 시설물 담당자의 측면에서는 실시간으로 모니터링 시스템을 신속하게 활용할 수 없으며, 모듈 단위가 융합하여 구동되는 무거운 사양의 시스템이 일반 PC에서 원활이 구동될 것이라는 보장이 없다. 따라서 본 연구에서는, 재난시에 발생할 수 있는 SOC 시설물에 대한 피해정보를 시뮬레이션 해주는 3차원 표출 시스템과, 그에 대한 일반 정보를 간단하게 확인 할 수 있는 모바일 어플리케이션 간의 원활한 연계 방안을 모색하고자 한다. 재난 정보는 지리정보 뿐 아니라 지리정보와 연계되는 다양한 정보들이 융합되어 있어 그에 대한 원 데이터를 실시간으로 모바일 상에 전송할 수 없으며, 이를 단순화 시킨 정보를 전송해야할 필요성이 있다. 따라서 본 연구에서는 해당하는 정보를 영상화 및 압축 하여 보다 신속하고 효율적으로 정보를 받아볼 수 있도록 하는 체계를 수립하고, 그에 맞는 시스템을 설계하고자 한다. 이를 기반으로 효율적인 재난 정보 압축방안을 마련하며, 향후 신속한 정보 송 수신 체계를 확보할 수 있다.

  • PDF

A Study on Awareness Levels of Personal Information Protection in Health Care Workers (개인정보 보호에 대한 의료기관 종사자들의 인식수준에 관한 연구)

  • Hong, Ju-Youn;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.647-659
    • /
    • 2019
  • The purpose of this study was to examine the relationship between the awareness of health care workers on the protection of patient health information and their practice of it in an attempt to provide some information on the policy setting of health care institutions about medical information protection. As a result, the awareness of the health care workers on the protection of patient health information and their practice of it were both the best in the communication area, followed by the patient health information management area and the area of direct contact with health information. As for the variables linked to their awareness and practice of patient health information protection, the type of the health care institutions, job satisfaction, religion and the departments in which they worked were significantly related. To determine what factors affected the patient health information management area, a multiple regression analysis was carried out by selecting the area of direct contact with patient health information and the communication area as independent variables and by selecting the patient health information management area as a dependent variable. And it's found that the patient health information management area became better when the area of direct contact with the information and the communication area were better.