• Title/Summary/Keyword: 인터넷 프라이버시

Search Result 275, Processing Time 0.027 seconds

Effectiveness of the Internet Real-Name Verification Law: Evidence from Self-censorship and Intention to Detour the Regulation (인터넷실명제와 우회로의 선택: 인터넷 공론장 참여자들의 자기검열과 우회로 선택의향을 중심으로)

  • Han, Hye-Kyung;Kim, Eu-Jong
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.50-73
    • /
    • 2011
  • This paper investigates the effectiveness of Real-Name System on Internet, which has been applied to some Internet service provider bulletin boards in Korea. The goal of the Real-Name system on the Internet is controlling expression of slanderous or abusive language. The effectiveness of the regulation is dependent on the people's perceptions and attitude toward to the legislation. This empirical study examines the antecedents that affect the perceptions and attitude toward the regulation. Further, we investigate the relationships among variables such as internet public sphere participation, attitude to the regulations, and intention to choose detours. Results of regression analysis show that the younger and the more progressive individuals are, the more they oppose the implementation of the law. Also, it was found that people who have more political interest and participate more actively in public sphere via internet, tend to oppose the law. Structural equation models reveal that participation in online public sphere drives negative attitudes about the regulation. In addition, people with negative perceptions about the law tend to choose the detours such as 'cyber asylum' and 'service asylum'.

  • PDF

Analysis of Internet Identity Management 2.0 and Perspective of 3.0 (인터넷 신원 관리 2.0에 대한 분석과 3.0에 대한 전망)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1501-1509
    • /
    • 2011
  • Current identity management 1.0 model, which is service provider-centric and isolated, has several problems such as low usability, high cost structure, difficulty in privacy protection, and lack of trust infrastructure. Though various SSO-based identity management 2.0 models including Passport/Live ID, Liberty Alliance/SAML, CardSpace, and OpenID have been recently developed in order to overcome those problems, they are not widely accepted in real Internet environment so as to replace the existing identity management 1.0 model. This paper firstly analyzes the widely-known identity 2.0 models in a comparative way, and then presents a perspective on the development direction of identity management 3.0 model for future Internet.

A Study on the Consumer Factors Influencing the Choice of Channel in the Brokerage Transaction (증권거래 채널 선택에 영향을 미치는 소비자 요인에 대한 연구)

  • Park, Chan-Wook
    • Journal of Distribution Research
    • /
    • v.10 no.2
    • /
    • pp.1-26
    • /
    • 2005
  • The purpose of this study is to identify the consumer factors influencing the channel choice in the brokerage transaction. The 14 consumer factors were extracted from the two perspectives: first, the off-line channel is based on the relational benefits offered by the salespeople, second, the on-line stock exchange is a transaction mediated by the internet technology. The results shows that the channel choice is significantly influenced by the 8 out of 14 consumer factors hypothesized: interpersonal orientation, risk-taking tendency, amount of money invested, price consciousness, time length of internet usage, innovativeness, information privacy sensitivity, intrinsic desire for information. And the results of discriminant analysis shows that three consumer factors-risk-taking tendency, time length of internet usage, and information privacy sensitivity-are most valuable in discriminating off-line vs. on-line customers.

  • PDF

How the Strength of Parent Brand Associations Influences the User Acceptance of Extended brand: Internet of Things Perspective (사용자의 확장브랜드 수용과 모브랜드의 영향력: 사물인터넷을 중심으로)

  • Lim, Hyun A;Kwon, Hyuk-Jun;Choi, Jaewon
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.2
    • /
    • pp.49-65
    • /
    • 2018
  • The purpose of the research is to identify the effects of brand evidence, brand personality and negative factors on extended brand trust and customer purchase intention in IoT (Internet of Things) service. Negative factors include scarcity marketing and privacy concern. To achieve this objective, we analyzed the 269 respondents who had used Xiaomi products at least more than once. The results of this study are as follows: First, it was found that core service, self-image congruence of brand evidence and brand personality has a positive influence on extended brand trust. But, perceived price of brand evidence is not related to extended brand trust. Secondly, Scarcity marketing influenced extended brand trust. But, Privacy concern is not related to extended brand trust. Consumers did not realize privacy because of technological innovation of IoT. Thus, the research has a different significance from antecedent research.

An Understanding the Factors That Influence on Unconcern about Privacy Information (프라이버시 무관심에 영향을 미치는 요인에 관한 연구)

  • Jeong, Tae-Seok;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.49-59
    • /
    • 2012
  • This study is to explain why internet users are unconcerned with their privacy information. For this purpose, this study focuses on the Nate.com case. Nate.com recently suffered from external intrusion. They announced this fact to their users. However, users did not leave the Nate.com. To explain the reason, this study used a combination of qualitative and quantitative techniques. The grounded theory approach was used to analyze responses to open-ended questions answered by 240 Nate.com users. Using these responses, a survey instrument was developed. Survey results were analyzed using structural equation modeling. The conclusions and implications are discussed.

Fintech Users' Information Privacy Concerns and User Resistance: Investigating the Interaction Effect with Regulatory Focus (핀테크 사용에 대한 정보프라이버시 염려와 이용자 저항에 대한 연구: 조절초점성향과의 상호작용 효과 고찰)

  • Lee, Ae Ri;Ahn, Hyo Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.209-226
    • /
    • 2016
  • Recently, there is a growing interest in Fintech which is a business based on using IT to provide financial services. At the early stage of diffusion of Fintech, one of the issues raised is the concern for information security. This study examines actual users' information privacy concern and user resistance to Fintech services. We also investigates the effects of social influence and mobile Internet literacy on information privacy concern and user resistance. In particular, this research verifies the interaction effect between regulatory focus and information privacy concern to influence user resistance. Based on the findings, the results of this study provide strategic implications for firms which attempt to reduce user resistance to Fintech services and proliferate Fintech usage.

Content Centric Networking Naming Scheme for Efficient Data Sharing (효율적인 데이타 교환을 위한 Content-Centric Networking 식별자 방안)

  • Kim, Dae-Youb
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.9
    • /
    • pp.1126-1132
    • /
    • 2012
  • To enhance network efficiency, CCN allow intermediate network nodes between a content consumer and a content publisher to temporarily cache transmitted contents. Then the network nodes immediately return back the cached contents to another consumers when the nodes receives relevant contents request messages from the consumers. For that, CCN utilizes hierarchical content names to forward a request message as well as a response message. However, such content names semantically contain much information about domain/user as well as content itself. So it is possible to invade users' privacy. In this paper, we first review both the problem of CCN name in the view point of privacy and proposed schemes. Then we propose an improved name management scheme for users' privacy preservation.

A Secure Routing Protocol to Provide Location Privacy in VANET (VANET 환경에서 위치 프라이버시를 제공하는 보안 라우팅 프로토콜)

  • Kim, Hyo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.1100-1103
    • /
    • 2008
  • VANET(Vehicle Ad-hoc Network) 환경은 도로위의 차량을 노드로 하여 구성하는 애드혹 네트워크로써 최근 들어 그 연구가 활발히 진행되고 있는 분야이다. 일반적인 애드혹 환경과 마찬가지로 VANET 환경에서도 보안적인 문제가 중요한 이슈로 대두되고 있다. VANET 환경에서 가장 중요하게 요구되는 보안요소는 차량의 익명성을 통한 위치 프라이버시와 협력 운전(cooperative driving) 단계에서 사용되는 메시지에 대한 인증, 무결성, 부인방지 등이다. 본 논문에서는 익명 아이디(pseudonym), 그룹화 등을 통해 차량의 위치 프라이버시를 제공하고 또한 이를 이용해 VANET 환경에서 사용할 수 있는 라우팅 프로토콜을 제안하고자 한다. RA(Registration Authority)에서 발급되는 익명 아이디의 집합과 차량의 전송 범위를 고려해서 구성되는 그룹화는 그룹에 속한 차량에 대해 익명성을 제공하고, 또한 그룹리더에 의해 생성되는 그룹키를 통해 효율적인 협력 운전 메시지 전달을 할 수 있게 된다. 그리고 각각의 그룹리더를 라우터로 이용해 전달되는 라우팅 프로토콜은 노드가 매우 유동적으로 움직이는 VANET 환경에서 효과적으로 메시지를 전달할 수 있도록 해줄 것이다.

국내 유통업체 부설 인터넷 쇼핑몰의 문제점과 발전방안

  • Yun, Myeong-Gil;Seol, Seong-Su
    • Journal of Global Scholars of Marketing Science
    • /
    • v.3
    • /
    • pp.155-171
    • /
    • 1999
  • 유통업체 부설 인터넷 쇼핑몰은 타 쇼핑몰에 비해 우수한 유통인력, 배송, 상품매입이나 관리시스템 등의 노하우가 있기 때문에 유리하다고 판단된다. 그러나 현실적으로는 이들 업체가 유리한 여건을 십분 활용치 못하고 있다. 따라서 본 연구는 이들이 왜 유리한 여건을 제대로 활용하지 못한가를 분석하고 어떻게 하면 활성화시킬 수 있을 것인가를 분석하였다. 특히 본고는 유통전문가의 입장에서 본, 기존 유통업체 부설 인터넷 쇼핑몰의 문제점 분석과 활성화 방안이다. 기존 유통업체에서 운영하는 인터넷 쇼핑몰의 영업 활성화를 저해하는 가장 중요한 요인은 이들 업체들이 '남들이 하니까 하는'식의 막연한 자세에서 찾을 수 있다. 자세히 분석해보면 먼저 단기적인 수익보다 장기성을 보는 혜안이 필요하고, 상품 품목수의 확대가 필요하다. 또한 가격경쟁력 회복, 택배시스템의 전문화, 목표 고객층과 상품의 괴리 해소, 보안문제 해결 및 소비자의 이용상 편리성 제고 등이 이루어져야 한다. 이 외에도 해외시장을 겨냥한 도메인명(domain name)의 부여와 영문사용, 소비자의 프라이버시 침해없는 정보수집 등이 제시된다.

  • PDF

Self-disclosure and Privacy in the Age of Web 2.0 A Case Study (웹 2.0 시대의 프라이버시 청년 UCC 이용자들의 인식과 실천을 중심으로)

  • Lee, Dong-Hoo
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.556-589
    • /
    • 2009
  • With the advent of the so-called Web 2.0 age, the interconnections of various contents on the web, as well as the user-participatory services from blogs, web-based communities, picture sharing sites, and social networking sites, to the sites for collective knowledge productions, have been further vitalized. As the User Generated Contents(UGCs) are flourishing on the web, they have channeled users' desires for self-expression and social acknowledgement, and yet have created the new kinds of invasion of privacy. This study attempts to look at how the networked individuals' everyday perceptions of privacy have been reconstructed in the age of Web 2.0. By investigating how users have used the UGCs for their sociality on the web and how they have set the boundaries of the private and the public in these public or semi-public disclosures of self-expressions, it has traced the changing perceptions of privacy in everyday communication practices. For this study, it has interviewed Korean youngsters in their 10s and 20s who have grown up with the Internet and have received self-expressions and social communication on the web as everyday activities. Based on their interviews, it inquires into the concurrent notion of privacy and discuss its cultural implications.

  • PDF