• Title/Summary/Keyword: Information Privacy Concern

Search Result 140, Processing Time 0.031 seconds

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

The Study on the User Behavioral Effects of Perception and Characteristics on the Common Essential Applications of Smartphones (스마트폰 공통 필수앱에 대한 이용자 인식과 특성이 이용 행동에 미치는 영향)

  • Youn, Bo Heum;Lee, Yoon Jae;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.415-436
    • /
    • 2022
  • This study was conducted by the customer survey of 15 to 65 years old in order to identify the user behavioral effects of perception and characteristics on the common essential applications of smartphones with the United Theory of Acceptance and Use of Technology (UTAUT) and Value-based Acceptance Model (VAM). As a result, it was found that performance expectancy, enjoyment, facilitating conditions, effort expectancy, and social influences, excluding information privacy concern, have a positive effect on use behavior. The moderating effect by age was found that the youth was higher between perceived value and behavioral intention, and the middle-aged was higher between enjoyment and perceived value. This study has significance in providing implications for establishing strategies on designing and pre-loading apps, and increasing usage rate.

A Study on Gender Difference in Antecedents of Trust and Continuance Intention to Purchase Voice Speakers

  • Youness EL Mezzi;Nicole Agnieszka Rydz;Kyung Jin Cha
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.614-635
    • /
    • 2020
  • This study aims at understanding gender difference in trust and the related factors affecting the intention to purchase voice speakers VS. VS are one of the innovations that are emerging at a fast pace in the market. Although it seems to be widely embraced by both genders, people do not intend to use them in some cases due to a lack of trust and the rumors circling these types of technologies. Nevertheless, there are particular barriers to the acceptance of VS technology between females and males due to unfamiliarity with the effective components of such technologies. Therefore, assuming that increasing the knowledge-based familiarity with an effective technique is essential for accepting it. So far, only little is known about VS and its concepts to increase the familiarity and, as a consequence, the acceptance of effective technology. Technology adoption in gender has been studied for many years, and there are many general models in the literature describing it. However, having more customized models for emerging technologies upon their features seems necessary. This study is based on Theory of Reasoned Action and trust-based acceptance which provides a background for understanding the relationships between beliefs, attitude, intentions, and subject norms and how it's affecting gender trust in VS. The statistical analysis results indicate that perceived system quality and perceived interaction quality have stronger influences on trust for males, while privacy concern and emotional trust have stronger influences on trust for females with the intention of purchase for both genders. Our study can be beneficial for future research in the areas of Perceived risk and Perceived utility and behavioral intention to use and human-technology interaction and psychology.

Continuous Use of Corporate SNS Accounts from a Habit and Emotional Perspective (SNS 사용자의 이용습관과 감정적 요인 관점에서 기업 SNS 계정의 지속적 사용의도에 관한 연구)

  • Ham, Juyeon;Ryu, Hyun-Sun;Ji, Sung-Hun;Lee, Jae-Nam
    • Knowledge Management Research
    • /
    • v.15 no.3
    • /
    • pp.37-66
    • /
    • 2014
  • Since social network service (SNS) has been widely used as a effective way for people to connect and communication with each other, the use of corporate SNS account also has increased. However, compared to a private SNS account, only few people have a continuous relationship with their corporate SNS account because the use of corporate SNS account tends to be one-time and temporary activity whenever the users just need events and information. Given the psychological side effects of using SNS, the relative lack of empirical studies on the impacts of emotional factor in SNS prevents the deeper understanding of the intention to continuous using corporate SNS account. Therefore, this study aims to explore key determinants of the intension to continuous using the corporate SNS account from a habit and emotional perspective. To bridge research gap, we attempt to divide emotional factor into the following 5 factors based on Mehrabian and Russell model (1974): intimacy, enjoyment (positive factor), privacy concern, anxiety (negative factor), arousal (arousal factor) and (dominant factor). The basic model is proposed to explore the effects of habit and emotional factors on the intension to continuous using the corporate SNS account. We then examine how the effects of habit and emotional factors differ depending on social media types (e.g., facebook and twitter). The results indicates that habit is related to emotional factors, and each emotional factor differently influences the intension to continuous using the corporate SNS account. The results also confirm that the effects of the habit and emotional factors on the intension to continuous using the corporate SNS account differ according to social media types. This study provides practical and useful guidance and the strategic marketing insight for managers in maintaining and improving the intension to continuous using the corporate SNS account.

  • PDF

The Effects of Characteristics of User and System on the Perceived Cognition and the Continuous Use Intention of Fintech (핀테크(fintech) 사용자와 시스템 특성이 지각된 인식과 지속사용의도에 미치는 영향)

  • Lee, Jun-Sang;Park, Jun-Hong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.291-301
    • /
    • 2018
  • The purpose of this study is to investigate the factors that affect the perceived awareness and the intention of continuous use by FinTech users and system characteristics. Data collection was carried out by targeting and surveying 600 people living in Gwangju, and office workers using smartphones. As a result, first, self-efficacy, innovation, and fitness for Fin-Tech services were found to influence the degree of perceptual awareness and intent to use of Fin-tech service users. Second, the system characteristics have a positive effect on perceived awareness and intention of using FinTech service. Third, the hypothesis about the dangers in the user attributes and system properties were dismissed. It seems that the priority concern was regarding the leakage of personal information and security as privacy and the increasing damage cases of financial fraud by electronic financial transactions spill. Therefore, in order to spread FinTech services, it would be effective if a Fin-Tech service strategy could eliminate inconveniences such as the risk of hindering convenience and intention to use by the marketing strategy established by the company.

Study on Chinese User Resistance of SNS : Focus on Renren Wang (SNS사용에 대한 중국 사용자 저항에 관한 연구: 런런왕(人人网)을 중심으로)

  • Fan, Peng-Fei;Lee, Sang-Joon;Lee, Kyeong-Rak
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.183-191
    • /
    • 2014
  • SNS uses the Internet as its base. It is created in order to achieve communication between the users. Up until now, most previous research were focused on the users of SNS. But, there are still a great deal of people who do not use or discontinuously use SNS. This is because users have natural resistance against SNS when using the service. In this study, time shortage perception, awareness of SNS, self-efficacy, suitability, information quality of SNS, subjective norm and privacy concern are considered as influence factors by previous research. An empirical study for Chinese students and internet users was conducted to identify how these factors influence perceived risk and perceived usefulness, and how this influence to user's resistance. This study can explain the reason why users don't use SNS and resist SNS use.

The complexity of opt-in procedures in mobile shopping: Moderating effects of visual attention using the eyetracker (모바일 쇼핑에서 옵트인의 절차적 복잡성 연구: 아이트래커(eyetracker) 기반 시각적 주의의 조절효과)

  • Kim, Sang-Hu;Kim, Yerang;Yang, Byunghwa
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.127-135
    • /
    • 2017
  • Consumers tend to feel concern about disclosure of personal information and, at the same time, to avoid inconvenience of procedural complexity caused by the privacy protections. The purpose of current paper is to investigate relationships between opt-in procedural complexity and shopping behavior using smart phones, moderating by the amount of visual attentions using eyetrackers. Therefore, we created a virtual mobile Web-site in which the complexity of opt-in procedures in our experiment is manipulated and measured. Also, we measured the dwell-time of area of interest using SMI-RED 250 instrument for tracking the real eye movement. Results indicated that the levels of procedural complexity are related to repurchase, indicating a moderating effect of the amount of visual attentions. Finally, we discussed several theoretical and practical implications of management for mobile commerce.

Women s Experience of Abortion : Phenomenological Perspectives (여성의 유산경험에 대한 현상학적 연구)

  • 이경혜;고명숙
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.2
    • /
    • pp.157-174
    • /
    • 1994
  • Women’s experience of abortion are not only widespread but also significant event in their lives. But this experience has not been a concern for professional care by health care providers, especially nurses. As professional nurses should have holistic approaches to clients, need to understand the lived experience of abortion from women’s perspectives. These Nurses must identify unique means for improving the quality of life of women. This study identified the meaning and structure of the lived experience of abortion. The participants were residents of Seoul and Kwang ju who were recruited through personal recommendation. Colaizzi’s method was used for the phenomenological analysis. The research question was aimed at revealing the covert meaning of abortion. The 14 women who had a spontaneous abortion and /or an artificial abortion and who argeed to participate in the study were informed of the purpose of the study, the possible risks and benefits of participation, the data generation method and they were assured of privacy and confidentiality. The investigator conducted in-depth unstructured interviews which were audiotaped with the permission of the participants. The investigator read the data repeatdly to identify and categorize themes and basic structural elements. Eight themes of abortion as experienced by these participants were : 1) complicated feelings about the anticipated abortion 2) feelings of fear and anxiety about the operation and complications 3) grieving related loss and injury 4) feelings of lonliness in perceiving no supportive person, 5) attributing the cause of the abortion to siginificant others or to self, 6) guilt feelings and resentment, 7) vacillating between regretting and not regretting, 8) struggling to a responsible person. Five basic structures identified were : 1) Complicated feelings 2) Feelings of loss and need for caring 3) Attributings to cause to significant others 4) Paradoxical emotion 5) Struggling to be a responsible being The significes of this study for nursing are : 1) It enables nurses and other health care providers understand more clearly the lived experience of abortion 2) It provides information which can be used in for women who experience abortion.

  • PDF

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment (모바일 환경에서 적용 가능한 SIP기반 인터넷전화(VoIP) 보안 통신 프로토콜 성능 평가)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Che, Xuemei;Chu, Gyeong-Ho;Park, Han;Baek, Jae-Jong;Song, Joo-Seok;Yoo, Hyeong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.143-150
    • /
    • 2011
  • The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.