• Title/Summary/Keyword: A Breach of Trust

Search Result 13, Processing Time 0.02 seconds

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

Real Estate Double Contract and It's Prevention (부동산 이중매매와 그 예방)

  • Park, Jong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.325-332
    • /
    • 2009
  • The Korean real estate transaction makes a contract after the buying and selling person concerned agreed a business condition. As for vendee, business consists of the method that I issue documents before provision and money left over provision and the registration at the same time, and register a contract deposit in vendor. However, it latent for the real estate transaction various accidents such as fraud from a contract day to time to finish a real estate registration transfer, embezzlement, double contract by the breach of trust. Nevertheless vendee comes to match vendor by an asymmetry of the information one-sidedly to the front completing a registration transfer. I may prevent stellionate by the breach of trust of vendor if I use an ESCROW system in such a responsibility blank state.

Optimization of Information Security Investment Portfolios based on Data Breach Statistics: A Genetic Algorithm Approach (침해사고 통계 기반 정보보호 투자 포트폴리오 최적화: 유전자 알고리즘 접근법)

  • Jung-Hyun Lim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.201-217
    • /
    • 2020
  • Information security is an essential element not only to ensure the operation of the company and trust with customers but also to mitigate uncertain damage by preventing information data breach. Therefore, It is important to select appropriate information security countermeasures and determine the appropriate level of investment. This study presents a decision support model for the appropriate investment amount for each countermeasure as well as an optimal portfolio of information countermeasures within a limited budget. We analyze statistics on the types of information security breach by industry and derive an optimal portfolio of information security countermeasures by using genetic algorithms. The results of this study suggest guidelines for investing in information security countermeasures in various industries and help to support objective information security investment decisions.

Information Security on Learning Management System Platform from the Perspective of the User during the COVID-19 Pandemic

  • Mujiono, Sadikin;Rakhmat, Purnomo;Rafika, Sari;Dyah Ayu Nabilla, Ariswanto;Juanda, Wijaya;Lydia, Vintari
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.1
    • /
    • pp.32-44
    • /
    • 2023
  • Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Fashion Product Salesperson's Perception of Fashion Company in the Middle Management System of Department Store (백화점 중간관리 형태에서 패션제품 판매원의 패션업체에 대한 인식)

  • Lee, Hyun-Jin;Choo, Tae-Gue
    • Fashion & Textile Research Journal
    • /
    • v.13 no.5
    • /
    • pp.705-716
    • /
    • 2011
  • The purpose of this study was to investigate salesperson's perception of fashion company in the middle management system of department store. This study was conducted by a qualitative research method. An in-depth interview was managed to 14 fashion shop managers and salesperson who have three or more years of work experience at the department store. Interview details were classified three categories: relations with fashion company and others, concern with products supply, concern with products sales. First, the positive factors on relations with fashion company are mutual trust, stability of fashion company, coordination and consideration for shop, communication with fashion company, methodical IT system, methodical education, and social gathering support. The negative factors are unilateral breach of contract from fashion company, communication problem, gap between sales status in shop and product design in fashion company, lack of professional education, difficulty of participating in education, and inadequate employee benefits. Second, the positive factor on products supply is priority of products supply. The negative factors are lack of main items, product procurement lacking rapidity, and problem of securing a supply. Third, the positive factors on products sales are brand pride, display and information support about products, and free gift support. The negative factors are unfair selling commission policy, sales pressure, and excessive responsibility.

An Analysis of Factors Affecting Fintech Payment Service Acceptance Using Logistic Regression (로지스틱 회귀분석을 이용한 핀테크 결제 서비스 수용 요인 분석)

  • Hwang, Sin-Hae;Kim, Jeoung Kun
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.51-60
    • /
    • 2018
  • This study aims to understand crucial factors affecting user's Fintech payment service adoption. On the basis of innovation diffusion theory and prior Fintech literature, this study classifies the influence factors of users' adoption of Fintech payment service into two dimensions - service dimension containing complexity, perceived benefit, trust in service provider and user dimension containing personal innovativeness and security breach experience. The data analysis results using binary logistic regression shows the negative direct effects of perceived risk, complexity, security accident experience on user's service adoption are statistically significant. Personal innovativeness has a positive effect on user's Fintech payment service adoption. The moderation effect of security accident experience is also significant at p<0.05.

Standards of Due Diligence and Separation of Responsibilities in the Division of Labor in Medicine (분업적 의료행위에 있어서 주의의무위반 판단기준과 그 제한규칙들)

  • Choi, Hojin
    • The Korean Society of Law and Medicine
    • /
    • v.19 no.2
    • /
    • pp.41-72
    • /
    • 2018
  • In the division of labor (or teamwork) in medicine, the responsibility of medical and nursing staff should be separated or distributed to justify negligent criminal offenses. The present work refers to the standards by which the due diligence and responsibility of the individual persons are to be determined and delimited. In this context, it has been proven that objective theory as a measure of due diligence is appropriate. From a moral point of view, when assessing due diligence, it makes sense to impose greater individual or higher performance demands on the perpetrator, but law and order require that due diligence should result from socially relevant human behavior. To give objective measure of negligence and to provide the highest level of personal responsibility, so that man can not be burdened too much responsibility and it is accordingly with an equality theorem. Afterwards some points are presented, which should be considered in a concrete fact in the determination of the medical negligence. Medical action has specific characteristics such as professionalism, discretionary and exclusive, unbalance of information. These characteristics distinguish medical actions from general negligence. The general level of knowledge, the urgency, working condition and working environment of the medical facility, duration of the professional practice, assessment of the medical activity are crucial in this context. As a standard of delineation of due diligence, I have used the permitted risk and the principle of trust. In the horizontal division of labor, the principle of trust applies. The principle of trust applies in principle in cases of division of labor interaction, when doctors in the same hospital exercise their own specific occupational field or everyone works in another hospital. However, this is not true for every case. In the vertical division of labor, the principle of trust does not apply and the senior physician can not trust the assistant doctors. In this case, the principle of trust is converted into a duty of supervision for assistant doctors by the senior physician. This supervision requirement could be used as a random check.

Choice of Law in International Antitrust Law (국제카르텔분쟁사건의 준거법)

  • Kim, Yong-Jin
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.801-828
    • /
    • 2013
  • This essay provides a legislative perspective on conflict-of-laws issues in the area of antitrust law. A consistent focus on the affected market question of applicable law is possible and yields content and acceptable results. The law applicable to damages claims should follow the law applicable to the antitrust relation itself. It is problematic, however, where more than one market is affected. In my view, the European perspective provides one general lesson for us. We are not yet prepared to accept american-style of class action in the field of antitrust law, at least until the european have made their legislative decision. Nevertheless we should make our antitrust system more effective, so that it would have strong deterrence to anti-competitive conducts. In this paper I present a proposal for adoption of a international conflict of law instrument, possibly a regulation, on damages actions for breach of art. 32 Korean Anti-trust Law.

Real Estate Management Strategy for The Prevention of Accidents Stater Founder Double Deal (초보창업자의 부동산 이중거래사고 예방을 위한 경영전략)

  • Lee, Mu Seon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.5
    • /
    • pp.127-135
    • /
    • 2015
  • The initial start-up founders are also often successful and sometimes unsuccessful. Conditions of establishment, it is necessary to management strategies such as site selection and strong entrepreneurial spirit with matching funds force to their aptitude. However, novice founder, in real estate transactions, there is a case in which a freak accident, such as the double sale occurs. South Korea's real estate transactions practice, difficult subject to systematic support, even as has been resolved legally, the damage of the victim so that the difficult issues that remain intact occurs. Therefore, beyond the problem to punish the perpetrators in such breach of trust crimes a legally double trade to this, is the strategy through the management histological approach received victim now of damage is required. We want to be viewed as discussion of What about the management strategy for accident prevention of real estate transactions in elementary founder accident concerning transactions such as real estate of double trafficking.

  • PDF