• Title/Summary/Keyword: 프라이버시 침해

Search Result 433, Processing Time 0.029 seconds

An Exploratory Study of Privacy Issues and Concerns in the Digital Convergence Environment (디지털 컨버전스 환경에서의 프라이버시 이슈와 프라이버시 침해 우려)

  • Bang, Young-Sok;Lee, Dong-Joo;Ahn, Jae-Hyeon
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.91-111
    • /
    • 2009
  • Collection and use of personal information have enabled firms to improve their value propositions by offering personalization. On the other hand, they have caused widespread concerns by consumers that their privacy is invaded. Because previously distributed personal information can be integrated and utilized to offer more personalized services, those concerns may be intensified with the progress of the digital convergence environment. In this study, factors for privacy invasion and their impact on the privacy concerns are suggested. Then, an empirical study is conducted to examine some of the suggestions. From the analysis, several results are derived. First, as more personal data are collected, secrecy and autonomy concerns increase exponentially rather than steadily. Second, as targeting accuracy is improved, greater secrecy and autonomy concerns are expressed by consumers, but less seclusion concerns. Finally, monetary reward such as coupons can reduce seclusion concerns when targeting accuracy is high. Based on the results, implications for managing consumer privacy concerns are provided under digital convergence environment.

A Case Study of Privacy Invasion Caused by Excessive Information Seeking on Mass Media (과도한 정보추구로 인한 미디어의 프라이버시 침해 사례 및 유형 분석 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.231-247
    • /
    • 2008
  • The purpose of this study was to try to describe types of invasion of privacy caused by excessive information seeking on mass media. Recent 5 years of cases were gathered and analyzed to see the types of invasion of privacy, and extracted only those cases showing the results by excessive information seeking. Three standards such as the intension, the subject, and the characteristics were selected to differentiate the types and cases. Five types of those three standards were introduced by case by case. The issues regarding ways of privacy protection and correct attitude of information seeking were explored and a few suggestions were included at the end.

Understanding Privacy Infringement Experiences in Courier Services and its Influence on User Psychology and Protective Action From Attitude Theory Perspective (택배 서비스 이용자의 프라이버시 침해 경험이 심리와 행동에 미치는 영향에 대한 이해: 태도이론 측면)

  • Se Hun Lim;Dan J. Kim;Hyeonmi Yoo
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.99-120
    • /
    • 2023
  • Courier services users' experience of violating privacy affects psychology and behavior of protecting personal privacy. Depending on what privacy infringement experience (PIE) of courier services users, learning about perceived privacy infringement incidents is made, recognition is formed, affection is formed, and behavior is appeared. This paradigm of changing in privacy psychologies of courier services users has an important impact on predicting responses of privacy protective action (PPA). In this study, a theoretical research framework are developed to explain the privacy protective action (PPA) of courier services users by applying attitude theory. Based on this framework, the relationships among past privacy infringement experience (PIE), perceived privacy risk (PPR), privacy concerns (i.e., concerns in unlicensed secondary use (CIUSU), concerns in information error (CIE), concerns in improper access (CIA), and concern in information collection (CIC), and privacy protective action (PPA) are analyzed. In this study, the proposed research model was surveyed by people with experience in using courier services and was analyzed for finding relationships among research variables using structured an equation modeling software, SMART-PLS. The empirical results show the causal relationships among PIE, PPR, privacy concerns (CIUSU, CIE, CIA, and CIC), and PPA. The results of this study provide useful theoretical implications for privacy management research in courier services, and practical implications for the development of courier services business model.

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

온라인상에서의 프라이버시 침해 우려와 이의 극복에 관한 실증적 분석

  • Choe, Mi-Yeong;Lee, Sang-Yong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.388-394
    • /
    • 2007
  • 정보기술(IT) 산업의 발달은 인터넷 활용을 급속도로 증가시켰으며, 인터넷 사용자의 수가 기하급수적으로 늘어감에 따라 인터넷을 상업적으로 활용하려는 욕구 또한 커져 가고 있다. 아울러 인터넷 관련 정보 기술의 발전속도가 매우 빠르게 발전되고 있다. 그러나 그 이면에는 개인정보의 무단유출, 사생활 노출 등의 역기능도 급격히 증가하고 있다. 이로 인해 오늘날 정보 유출로 인한 개인적 피해는 사회 문제로 대두되고 있으며, 개인의 프라이버시 침해에 대한 우려는 인터넷과 전자상거래 발달에 가장 큰 장애중의 하나로 대두되게 되었다. 온라인에서 비즈니스를 행하는 기업들은 이러한 사용자들의 프라이버시 침해에 대한 우려를 줄이고자 하는 다양한 노력들을 행하고 있다. 우선 프라이버시 보호에 관한 정책이나 규약을 홈페이지에 명시함으로써 사용자들을 안심시키려 하고 있으며, 동시에 금전적 인센티브나 편의를 제공함으로써 사용자들의 참여를 증가시키고 자신들의 비즈니스를 활성화시키고자 한다. 이에 본 연구에서는 기업의 어떠한 전략들이 사용자의 프라이버시 침해 우려를 낮추고 사용자들의 참여를 활성화시키는지를 동기부여의 기대이론에 근거하여 분석하고자 한다. 아울러 기업뿐만 아니라 사회적으로도 도움이 될 수 있는 프라이버시에 관한 전략들을 제안하고자 한다.

  • PDF

PC통신과 명예.프라이버시 침해문제

  • Sin, Gak-Cheol
    • 정보화사회
    • /
    • s.83
    • /
    • pp.48-52
    • /
    • 1994
  • 최근 PC통신 인구가 증가함에 따라 사회 역기능으로 명예.프라이버시 침해가 사회문제로 확산되고 있다. 이번호에는 이에 따른 문제점을 점검하고 해결방안을 현행의 법률체제내에서 살펴본다.

  • PDF

A Study on Librarians' Perception of Library User Privacy (도서관 이용자 프라이버시에 대한 사서인식 조사연구)

  • Noh, Younghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.3
    • /
    • pp.73-96
    • /
    • 2013
  • This study investigates how librarians view library user privacy. To this end, a four-part survey was conducted: respondents' opinions about the privacy of library users, the degree to which library records violate the users' privacy, the role libraries and librarians fulfill to ensure user privacy protection, and librarians' need for privacy education. Results showed that librarians were very aware of privacy issues, but they perceived that library users' privacy awareness was not high. In particular, they had little knowledge of what library records or which library tasks might have the potential to violate users' privacy. In addition, awareness efforts of librarians to ensure user privacy was very low. On the other hand, the need for library user privacy educational programs was shown to be very high, and the willingness to participate was also relatively high.

A Research about Anonymity Based Privacy Protection Scheme for EMR System (EMR System에 대한 익명성 기반 프라이버시 보호기법 연구)

  • Choi, Eunseok;Eun, Hasoo;Ubaidullah, Ubaidullah;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.868-870
    • /
    • 2013
  • 전자의무기록(Electronic Medical Record, EMR) 시스템은 기존에 수기로 작성하던 의무기록을 디지털화 한 것이다. 이는 다양한 장점이 있지만 의료인이 관리 도메인을 통해 환자의 정보를 세밀하게 수집할 수 있는 환자 개인의 프라이버시 침해 문제가 발생하게 된다. 즉, 관계자에 의해 의도적인 유출이 발생하거나 의료정보의 거래, 복제 등 위험성이 존재한다. 특히 일부 의료정보는 고용 차별이나 사회적 차별 등 환자에게 정신적 고통을 안겨줄 수 있다. 이러한 프라이버시 침해는 유전성 질환 유전자를 가진 사람에게 유전적 요인에 근거하는 고용 차별이 발생할 수 있다. 관련연구에서는 환자의 임상적(Clinical) 또는 유전적(Genomic) 정보가 자신의 신원과 연계되어 있다면 프라이버시 침해가 발생할 수 있음을 나타낸다. 이러한 프라이버시 문제로 인해 EMR 시스템에 기반을 둔 전자건강기록(Electronic Health Record, EHR) 시스템 또한 개인 프라이버시 침해의 위험이 존재하게 된다. 따라서 의료정보의 프라이버시 보호를 위해 부당한 고용 차별 보험 차별 사회적 차별로 연결될 수 있는 개인 의료정보의 유출방지, 타인에게 알려지고 싶지 않은 개인 의료정보가 무단으로 거래되지 않는 것을 보장해야 한다. 이를 위해 본 논문에서는 의무기록의 익명화를 통해 환자와 의무기록 간의 관계를 제거하는 여러 방법들을 소개한다.

Privacy Preserving Clustering (프라이버시를 보존하는 군집화)

  • Yoo Hyun-Jin;Kim Min-Ho;Ramakrishna R.S.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.473-476
    • /
    • 2004
  • 본 논문에서는 프라이버시를 침해 하지 않는 데이터 마이닝에 대해 다룬다. 방대한 데이터에서 유용한 정보를 추출하는 데이터 마이닝분야에서 데이터로부터 프라이버시 보존의 중요성이 부각되고 있다. 그래서 프라이버시의 침해를 막기 위한 방법으로 실제 데이터를 사용하지 않고 잡음이 들어간 데이터를 사용한다. 그리고 프라이버시를 침해하지 않기 위해 잡음이 들어간 데이터로부터 데이터의 확률 밀도 함수(PDF)만을 복원한다. 이렇게 복원된 확률 밀도 함수만을 이용하여 데이터 마이닝기술, 예를 들면 분류화에 곧바로 적용함으로써 프라이버시를 보존하는 것이다. 하지만 분류화에 사용되는 데이터의 1차원적인 확률 밀도 함수만 가지고는 군집화에 사용하기가 부적절하다. 따라서 본 논문에서는 군집화를 하기 위해 잡음이 들어간 데이터로부터 결합 확률 밀도 함수(Joint PDF)를 복원하고, 복원된 결합 확률 밀도 함수만 가지고 군집화를 할 수 있는 방법을 다룬다.

  • PDF

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.