• Title/Summary/Keyword: 이용자 프라이버시

Search Result 79, Processing Time 0.032 seconds

The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users (개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로)

  • Lee, Eun Suk;Lee, Zoon Ky;Cha, Kyung Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.135-150
    • /
    • 2016
  • As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments (이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜)

  • Kim, Soon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2193-2201
    • /
    • 2006
  • In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.

A Case Study of Privacy Invasion Caused by Excessive Information Seeking on Mass Media (과도한 정보추구로 인한 미디어의 프라이버시 침해 사례 및 유형 분석 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.231-247
    • /
    • 2008
  • The purpose of this study was to try to describe types of invasion of privacy caused by excessive information seeking on mass media. Recent 5 years of cases were gathered and analyzed to see the types of invasion of privacy, and extracted only those cases showing the results by excessive information seeking. Three standards such as the intension, the subject, and the characteristics were selected to differentiate the types and cases. Five types of those three standards were introduced by case by case. The issues regarding ways of privacy protection and correct attitude of information seeking were explored and a few suggestions were included at the end.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Effect of Purchase Intention of Location-Based Services: Focused on Privacy-Trust-Behavioral Intention Model (위치기반서비스에서 구매의도에 영향을 미치는 요인: 프라이버시-신뢰-행동의도 모형을 중심으로)

  • Jang, Sung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.175-184
    • /
    • 2014
  • The purpose of this study is to examine the factors influencing purchase intention of Location-Based Services (LBS) using privacy-trust-behavioral intention model. This model tests various theoretical research hypotheses relating to LBS, privacy-trust-behavioral intention model, and Concern for Information Privacy(CFIP). The target population of this study was LBS users. Data for this study were collected from January 21 to March 20, 2014. The data were gathered from 231 questionnaire respondents with experience using LBS. Among these reponses, 21 were excluded because of missing or inappropriate data. After removing the unsuitable questionnaires, a total of 210 surveys were considered for analysis. The results of hypothesis testing are as follows. First, location awareness positively influence privacy concerns. Second, privacy concerns negatively influence trust. Finally, trust positively influence purchase intention. The results of this study will provide various implication to improve purchase intention of LBS.

Self-disclosure and Privacy in the Age of Web 2.0 A Case Study (웹 2.0 시대의 프라이버시 청년 UCC 이용자들의 인식과 실천을 중심으로)

  • Lee, Dong-Hoo
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.556-589
    • /
    • 2009
  • With the advent of the so-called Web 2.0 age, the interconnections of various contents on the web, as well as the user-participatory services from blogs, web-based communities, picture sharing sites, and social networking sites, to the sites for collective knowledge productions, have been further vitalized. As the User Generated Contents(UGCs) are flourishing on the web, they have channeled users' desires for self-expression and social acknowledgement, and yet have created the new kinds of invasion of privacy. This study attempts to look at how the networked individuals' everyday perceptions of privacy have been reconstructed in the age of Web 2.0. By investigating how users have used the UGCs for their sociality on the web and how they have set the boundaries of the private and the public in these public or semi-public disclosures of self-expressions, it has traced the changing perceptions of privacy in everyday communication practices. For this study, it has interviewed Korean youngsters in their 10s and 20s who have grown up with the Internet and have received self-expressions and social communication on the web as everyday activities. Based on their interviews, it inquires into the concurrent notion of privacy and discuss its cultural implications.

  • PDF

Relationship among Privacy Concerns, Self Discrepancy and Sense of Virtual Communities (커뮤니티 서비스에서 프라이버시 염려, 자아불일치 및 공동체 의식의 관계)

  • Kwak, Soo-Hwan;Ryoo, Sung-Yul;Lee, Yun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.360-369
    • /
    • 2010
  • The objective of this research examines the relationships among privacy concerns, self discrepancy, and sense of virtual communities. According to the relevant literature review, we considered information privacy concerns factor as information collection, control, and awareness of privacy practice, and sense of community factor as membership and immersion on virtual communities. This research surveyed for the online community user and employed hierarchical regression model for the moderating effect test. The results of empirical analysis turns out that awareness of privacy concerns practice has negative impact on the self discrepancy, on the other hand, information collection and control factors do not affect. The next finding is internet use duration has moderating effect on the self discrepancy with information control and awareness of privacy concerns practice. The last findings are self discrepancy affect on the community membership and does not affect on the community immersion. It could be a good guide line for the operational direction on virtual community.

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.