• 제목/요약/키워드: Information Protection Behavior

Search Result 203, Processing Time 0.062 seconds

A Study of Relationship between Dataveillance and Online Privacy Protection Behavior under the Advent of Big Data Environment (빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구)

  • Park, Min-Jeong;Chae, Sang-Mi
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.63-80
    • /
    • 2017
  • Big Data environment is established by accumulating vast amounts of data as users continuously share and provide personal information in online environment. Accordingly, the more data is accumulated in online environment, the more data is accessible easily by third parties without users' permissions compared to the past. By utilizing strategies based on data-driven, firms recently make it possible to predict customers' preferences and consuming propensity relatively exactly. This Big Data environment, on the other hand, establishes 'Dataveillance' which means anybody can watch or control users' behaviors by using data itself which is stored online. Main objective of this study is to identify the relationship between Dataveillance and users' online privacy protection behaviors. To achieve it, we first investigate perceived online service efficiency; loss of control on privacy; offline surveillance; necessity of regulation influences on users' perceived threats which is generated by Dataveillance.

Understanding the Behavior of Physical Therapists and Occupational Therapists in Protecting Patient’s Medical Information - An Application of the Theory of Planned Behavior - (일부 물리치료사와 작업치료사의 환자 의료정보보호 행동 이해)

  • Lee, In-Hee;Shin, A-Mi;Son, Chang-Sik;Park, Sang-Young;Park, Hee-Joon;Yoon, Kyung-Il;Kim, Yoon-Nyun
    • The Journal of Korean Physical Therapy
    • /
    • v.22 no.2
    • /
    • pp.55-60
    • /
    • 2010
  • Purpose: The purpose of this study was to use the theory of planned behavior, past habit and moral obligation to better understand the behavior of physical therapists (PTs) and occupational therapists (OTs) in protecting the medical information of patients. Methods: We conducted a survey using self-writting questionnaires structured within the framework of the theory of planned behavior to understand to analyze information from 103 clinical PTs and OTs in their efforts to protect patient medical information. Results: The PTs and OTs' medical information protecting behavior was 2.85 mean points. That point failed to reach 1.0 points. Behavior intention was 3.83 mean points. That was judged to be improved. Behavioral intention was closely correlated with behavior, behavioral attitude, subjective norms, behavior control, and past habit. Variables related to the theory of planned behavior, attitude, subjective norms, and perceived behavior control all explained 50% of the behavioral intention of PTs and OTs regarding future divulgence of patient information. The past habits of PTs and OTs were also a significant predictor in explaining the behavioral intention to protect a patient's medical information (p<0.01). Conclusion: Revising the behavioral attitudes, subjective norms, perceived behavior control, and past habits of PTs and OTs helped improve their behavior regarding protection of the medical information of patents.

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.2
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

Perceived Relevance of Educative Information on Public (Skin) Health: A Cross-sectional Questionnaire Survey

  • Haluza, Daniela;Cervinka, Renate
    • Journal of Preventive Medicine and Public Health
    • /
    • v.46 no.2
    • /
    • pp.82-88
    • /
    • 2013
  • Objectives: Unprotected leisure time exposure to ultraviolet radiation from the sun or artificial tanning beds is the most important environmental risk factor for melanoma, a malignant skin cancer with increasing incidences over the past decades. The aim of the present study was to assess the impact of skin health information provided by several sources and different publishing issues on knowledge, risk perception, and sun protective behavior of sunbathers. Methods: A cross-sectional questionnaire survey was conducted among Austrian residents (n=563) spending leisure time outdoors in August 2010. Results: Print media, television, and family were perceived as the most relevant sources of information on skin health, whereas the source physician was only ranked as fourth important source. Compared to other sources, information provided by doctors positively influenced participants' knowledge on skin risk and sun protective behavior resulting in higher scores in the knowledge test (p=0.009), higher risk perception (p<0.001), and more sun protection (p<0.001). Regarding gender differences, internet was more often used by males as health information source, whereas females were more familiar with printed information material in general. Conclusions: The results of this survey put emphasis on the demand for information provided by medical professionals in order to attain effective, long-lasting promotion of photoprotective habits.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

Analysis of Environmental Consciousness and Protection Behavior to Establish Protected Area Management - Focused on Hebei Spirit Oil Spill - (보호지역 관리정책 수립을 위한 국민 환경의식 및 실천 행동수준 분석 - 허베이 스피리트호 유류유출사고를 중심으로 -)

  • Sim, Kyu-Won
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.2
    • /
    • pp.259-265
    • /
    • 2012
  • The purpose of this study intends to suggest a basic information to establish protected area policy by analyzing environmental consciousness and environmental protection behavior of citizen after Hebei Spirit oil spill. During May-June of 2011, a total of 987 respondents completed at 5 major cities (Seoul, Busan, Daegu, Daejeon, Gwangju) in Korea. The result showed that more previous experience of environment as recognition of oil spill damaged area, volunteer activity experience, participation in the organization for environmental conservation, and participation in education program led to more positive attitude to environment. Therefore, the result of this study will contribute to manage protected area in balancing ecological conservation and utilization.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

Pro-environmental Health Behavior : A Concept Analysis (친환경적 건강 행위(pro-environmental health behavior) 개념 분석)

  • Kim, Hyun-Kyoung
    • Korean Journal of Adult Nursing
    • /
    • v.23 no.6
    • /
    • pp.527-542
    • /
    • 2011
  • Purpose: This paper is a report of an analysis of the concept of pro-environmental health behavior. Methods: Rodgers' method of evolutionary concept analysis was used to analyze the concept. A literature search using keywords 'pro-environmental health behavior, 'environmental health behavior', and 'eco-friendly health behavior' was conducted using PubMed, CINAHL, PsychINFO, and RISS and utilizing the results published from 1983 to 2011. Database and bibliographic searches yielded 84 records. Results: Four critical attributes of pro-environmental health behavior were identified as 'prevention and protection', 'internal process', 'altruism', and 'alternative'. Antecedents to pro-environmental health behavior were climate change, environmental pollution, and health risk. The consequences of pro-environmental health behavior were individual and social behavioral changes. Conclusion: The concept of pro-environmental health behavior developed in this project may offer information to be considered as the concept is further develop and efforts are made to measure the attributes of pro-environmental health behavior.