• Title/Summary/Keyword: Information Protection Behavior

Search Result 201, Processing Time 0.026 seconds

The Consumer Complaining Behavior according to Consumer Problems -in case of household electric goods- (소비자문제경험에 따른 대응행동 -가전제품을 중심으로-)

  • 이승신
    • Journal of the Korean Home Economics Association
    • /
    • v.33 no.3
    • /
    • pp.179-191
    • /
    • 1995
  • The purpose of this study was to investgate consumer problems which were severe for consumers and their complaining behavior. This research had a purpose to enhance the ability of consumer protection by the well-developed consumer education. The subjects were 342 homewives in Seoul, Feb. 1995. The major results were as follows : Younger, higher-educated, small sized family and white-collor and professional occupation homewives experienced more consumer problems. Also theses homewives with higher level of consumer attitude, information search and more consumer problems had more complaining behavior. For the causal relation of consumer problems experience, several independent variables and consumer complaining behavior, the path analysis was used. Only the consumer problem experience which was a intervening variable had direct affect to the consumer complaining behavior. Education level, number of family, consumer knowledge had inderect affect through the intervening variable to the consumer complaining behavior.

  • PDF

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A Study on the Influence of the Components Related to Information Security Governance on the Perception and Behavior of Employees (정보보안 거버넌스의 구성요소가 종업원의 보안 인식과 행위에 미치는 영향에 관한 연구)

  • Kim, Young-Gon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.935-950
    • /
    • 2010
  • The purpose of this study is to try to find out the relationship between the perception and behavior of employees and the Information Security Governance (ISG) which consists of leadership and governance, security management and organization, security policies, security program management, user security management, and technology protection and operations. Some effective suggestions from the verification of research hypotheses and the analysis of the most appropriate model were drawn out.

A Study on the Surveillance Camera System for Privacy Protection (프라이버시 보호를 위한 감시카메라 시스템에 관한 연구)

  • Moon, Hae-Min;Pan, Sung-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1779-1786
    • /
    • 2009
  • Due to increased terrors and crimes, the use of surveillance camera systems including CCTV is also increasing. Private information such as faces or behavior patterns can be recorded in CCTV and when it is exposed, it may cause infringement to privacy and crimes. This paper analyses conventional methods on protection of privacy in surveillance camera system and then suggests an RFID-based surveillance camera system that can both watch crimes and protect privacy. The proposed system protects privacy and watches crimes using scrambling and an RFID system.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

A Study on the Mitigation of Information Security Avoid Behavior: From Goal Setting, Justice, Trust perspective (정보보안 회피행동 완화에 대한 연구: 정보보안 관련 목표설정, 공정성, 신뢰의 관점을 중심으로)

  • Hwang, In-Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.217-229
    • /
    • 2020
  • Globally, information protection of organization has become an essential management factor, and organizations continue to invest high-level resources for information security. Security threats from insiders are not decreasing. The purpose of this study is to present the antecedence factors to mitigate the role conflict that is the cause of the security avoid behavior. For the study, a survey was conducted for employees of organizations with information security policies, and structural equation modeling was conducted using a total of 383 samples for hypothesis verification. As a result of the analysis, role conflict increased avoid behavior, and goal difficulty, goal specificity, justice, and trust mitigated role conflict. In particular, justice influenced the reduction of role conflict and avoid behavior through trust. The implications were to present the causes and mitigation factors for avoid behavior of employee, and it is judged that it will help the organization to establish a security strategy.

Artificial immune network-based cooperative beharior strategies in collective autonomous mobile rotos (인공면역계 기반의 자율이동로봇군의 협조행동전략 결정)

  • 이동욱;심귀보
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.3
    • /
    • pp.102-109
    • /
    • 1998
  • In this paper, we propose a method of cooperative control based on immune system in distributed autonomous robotic system(DARS). Immune system is living body's self-protection and self-maintenance system. Thus these features can be applied to decision making of optimal swarm behavior in dynamically changing environment.For the purpose of applying immune system to DARS, a robot is regarded as a B lymphocyte(B cell), each environmental condition as an antigen, and a behavior strategy as an antibody respectively. The executing process of proposed method is as follows. When the environmental codintion changes, a robot select an appropriate beharior stategy. And its behavior stategy is stimulated and suppressed by other robot using communiation. Finally much stimulated strategy is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and idotopic network hypothesis. And it is used for decision making of optimal swarm stragegy.

  • PDF

A Study of Indonesian Online Marketplace: Information Processing Theory Paradigm

  • TEOFILUS, Teofilus;SUTRISNO, Timotius F.C.W.;HONGDIYANTO, Charly;WANANDA, Veronica
    • Journal of Distribution Science
    • /
    • v.18 no.8
    • /
    • pp.75-87
    • /
    • 2020
  • Purpose: This study uses the protection motivation theory and information processing theory to discuss the high number of fraud phenomenon in Indonesia which causes worries to the internet users. The second problem is the large amount of information transparency in e-commerce which actually hinders the users in making decisions so it causes a negative behavior pattern, namely discontinue usage intention. Design/methodology: Therefore, this research hopes to provide insight to the online or e-commerce business community, especially for Tokopedia, to develop its business from understanding the factors influencing consumer attitude when shopping online. The sample are students from Universitas Indonesia, Institut Teknologi Bandung, Institut Pertanian Bogor, Universitas Gadjah Mada and Institut Teknologi Surabaya, with total 900 respondents. Result: The results of this research indicate that ubiquitous connectivity (UC) variable significantly affects variables such as the privacy concern (PC), information transparency (IT) and information overload (IO). PC and IO variables also significantly affect Discontinue Usage Intention (DUI). Conclusion: This study gives a new perspective that despite the phenomenon, the millennial generation especially are not entirely concerned about the privacy concern, however, this study clearly shows that the privacy issue in the digital word continues to be something that needs to be cared for.

Factors Affecting Breast Self-examination Behavior Among Female Healthcare Workers in Iran: The Role of Social Support Theory

  • Bashirian, Saeed;Barati, Majid;Shoar, Leila Moaddab;Mohammadi, Younes;Dogonchi, Mitra
    • Journal of Preventive Medicine and Public Health
    • /
    • v.52 no.4
    • /
    • pp.224-233
    • /
    • 2019
  • Objectives: In women, breast cancer is the most common cancer and the leading cause of cancer death. Screening tests are the basis for early diagnosis. In Iranian women, the mortality rate of breast cancer is high due to insufficient screening examinations and delayed visits for care. Therefore, this study aimed to determine the factors affecting breast self-examinations among Iranian women employed in medical careers. Methods: This cross-sectional study included 501 women working in the medical professions at Hamadan University of Medical Sciences in western Iran in 2018. The subjects were selected by stratified random sampling. Data were collected using a researcher-developed, self-report questionnaire that contained demographic information and questions based on protection motivation theory and social support theory. Descriptive data analysis was conducted using SPSS version 23 and model fitting with PLS version 2. Results: The mean age of the participants was $37.1{\pm}8.3years$, and most of the women (80.4%) were married. Most women had a bachelor's degree (67.5%). The findings of this study showed that the coping appraisal construct was a predictor of protection motivation (${\beta}=0.380$, p<0.05), and protection motivation (${\beta}=0.604$, p<0.05) was a predictor of breast self-examination behavior. Additionally, social support theory (${\beta}=0.202$, p<0.05) had a significant positive effect on breast self-examination behavior. Conclusions: The frequency of practicing self-examinations among women employees in the medical sector was low; considering the influence of social support as a factor promoting screening, it is necessary to pay attention to influential people in women's lives when designing educational interventions.