• Title/Summary/Keyword: Invasion of Privacy

Search Result 158, Processing Time 0.026 seconds

Ethical Issues in Business Marketing Researches

  • HWANG, Hee-Joong
    • Journal of Research and Publication Ethics
    • /
    • v.3 no.2
    • /
    • pp.1-5
    • /
    • 2022
  • Purpose: Various ethical issues arise in different stages of management and business marketing research. The current study aims to take look at practices that ensure informed consent, privacy and confidentiality, deception, and legal aspect in data management in procedures involved in marketing research. Research design, data and methodology: Literature content analysis was conducted for this research and the current author has investigated journal articles mostly to guarantee a high degree of content validity and to keep the advantages of qualitative content approach. The current study explores manifest topics regarding the ethical issues of business marketing research. Results: The current study found that ethical consideration needs to be similarly significant and learning from the previous researchers' approach to handling this issue is helpful for future research and is essential to have additional guidelines. Also, four findings (Lack of Informed Consent, Deception, Invasion of Privacy and Confidentiality, and Legal Data Management) indicate that marketing researchers need to consider before undertaking any project. Conclusions: Overall, the study presents practical suggestions though unexhausted. By raising these ethical marketing issues, consumer behavior disciplines will continue to expand and contribute positively towards attaining thoughts, feelings, and decisions that positively contribute to marketing research as the foundation for effective marking practices.

A Study on The Utilization and Secure Plan of Security in Social Media (소셜 미디어 이용 현황과 보안대책에 관한 연구)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.1-7
    • /
    • 2010
  • One of celebrities using Social media caught public's eye and interest in Korea. Thereby the number of the user has grown rapidly and by last year it had reached to about 770 million. But at the same time, it has brought us social issues such as invasion of privacy, spreading of malicious code, and stealing of ID. To solve these problems, first the government need to establish adequate law and policy. Second, Service provider should remove vulnerability in the security system and filter illegal information. Third, individual user should put more effort to protect their own privacy. This paper will suggest a solution of using the Social media more sound and secure.

Self-disclosure and Privacy in the Age of Web 2.0 A Case Study (웹 2.0 시대의 프라이버시 청년 UCC 이용자들의 인식과 실천을 중심으로)

  • Lee, Dong-Hoo
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.556-589
    • /
    • 2009
  • With the advent of the so-called Web 2.0 age, the interconnections of various contents on the web, as well as the user-participatory services from blogs, web-based communities, picture sharing sites, and social networking sites, to the sites for collective knowledge productions, have been further vitalized. As the User Generated Contents(UGCs) are flourishing on the web, they have channeled users' desires for self-expression and social acknowledgement, and yet have created the new kinds of invasion of privacy. This study attempts to look at how the networked individuals' everyday perceptions of privacy have been reconstructed in the age of Web 2.0. By investigating how users have used the UGCs for their sociality on the web and how they have set the boundaries of the private and the public in these public or semi-public disclosures of self-expressions, it has traced the changing perceptions of privacy in everyday communication practices. For this study, it has interviewed Korean youngsters in their 10s and 20s who have grown up with the Internet and have received self-expressions and social communication on the web as everyday activities. Based on their interviews, it inquires into the concurrent notion of privacy and discuss its cultural implications.

  • PDF

The structural relationships among user citizenship behavior, aberrant user behavior, social connectedness, privacy concern, and user satisfaction (SNS 이용자 시민행동, 불량행동, 사회적 유대감, 프라이버시 침해 우려 및 이용자 만족도간의 구조적 관계)

  • Kim, Yoo-Jung;Kim, Jae-Young;Han, Jae-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.4994-5004
    • /
    • 2012
  • This paper aims at investigating voluntary user participation such as user citizenship behavior and aberrant user behavior in the SNS context. Also it examines on how user participation behavior affects social connectedness, privacy concern, and user satisfaction. The empirical assessment of the research model was conducted using a total of 143 responses. The findings show that user citizenship behavior impacts on social connectedness positively and significantly whereas aberrant user behavior does not influence on social connectedness. Aberrant user behavior is proven not to be related to social connectedness, and to has positive relationship with concern for privacy invasion. Also, the results show that privacy concern is not associated with social connectedness. Finally, social connectedness is shown to be a key determinant of SNS user satisfaction whereas privacy concern is not related to user satisfaction.

Reducing Process Time for RFID Tag Identification on the Grid Environment (그리드 환경에서 RFID 태그 판별 시간 절감을 위한 태그 판별 처리)

  • Shin, Myeong-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1049-1056
    • /
    • 2010
  • Recently RFID system has been adopted in various fields rapidly. However, we should solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system. To solve these problems, There is the Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of creasing numbers of Tag. Therefore We, suggest SP-Division algorithm satisfied with all necessary security of Privacy Protection Scheme and decreased in Tag Identification Time in this paper. And this paper implemented it in time standard finding the first key among the data devided into each nodes. The length of Hash-Chain holds 1000, and the total number of SPs increases 1000, 2000, 3000, and 4000. Comparing tag identification time by the total number of SPs and the number of Nodes with single node, extending the number of nodes to 1, 2, 3 and 4, when the number of nodes is 2, 40% of Performance, when the number of nodes is 3, 56%, and when the number of nodes is 4, 71% is improved.

Design of a Privacy-based Confirmed Case Contact Notification System in the With-Corona Era (With-Corona 시대에 프라이버시 보호 기반의 확진자 접촉 여부 알림 시스템 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.138-143
    • /
    • 2021
  • As of this moment, we are tracing people who are closed contact with Covid-19 patients and trying to block the spread of Covid-19 through diagnostic tests. However, the incubation period of the confirmed case is two weeks, and it takes a lot of human resources, time, and money to trace the routes of the confirmed case. In particular, as the number of confirmed cases have been increasing, the cost for finding closed contacts and blocking them in advance exponentially have almost reached the limitation of the budget. In finding closed contacts, all citizens must record an electronic access list every time they visit an amenities such as a store or a restaurant. This is likely the invasion of the privacy of personal location information. In this study, we designed a system that keeps one's location in real time, it will download the movement information of the confirmed case which is collected by KDCA, and it will notify the user when there is an overlap. Moreover, then guide for diagnostic test in advance will be used. The proposed method can solve the difficulty of recording in an electronic access list when visiting a store, and it can block infringement of privacy without providing personal information from KDCA.

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

Analysis of k Value from k-anonymity Model Based on Re-identification Time (재식별 시간에 기반한 k-익명성 프라이버시 모델에서의 k값에 대한 연구)

  • Kim, Chaewoon;Oh, Junhyoung;Lee, Kyungho
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.43-52
    • /
    • 2020
  • With the development of data technology, storing and sharing of data has increased, resulting in privacy invasion. Although de-identification technology has been introduced to solve this problem, it has been proved many times that identifying individuals using de-identified data is possible. Even if it cannot be completely safe, sufficient de-identification is necessary. But current laws and regulations do not quantitatively specify the degree of how much de-identification should be performed. In this paper, we propose an appropriate de-identification criterion considering the time required for re-identification. We focused on the case of using the k-anonymity model among various privacy models. We analyzed the time taken to re-identify data according to the change in the k value. We used a re-identification method based on linkability. As a result of the analysis, we determined which k value is appropriate. If the generalized model can be developed by results of this paper, the model can be used to define the appropriate level of de-identification in various laws and regulations.

A Study on the Improvements of the Big Data Guideline in Korea (빅데이터 개인정보보호 가이드라인(안)의 개선 방향에 관한 연구)

  • Kim, Sunnam;Lee, Hwansoo
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.20-39
    • /
    • 2014
  • The age of big data has not only opened new opportunities for economic growth in various industries, but it has also created new problems related to personal information protection and privacy invasion. Given this situation, Korea's communications commission has proposed a big data guideline that specifies how companies should collect and utilize personal information in the big data environment. However, this guideline is more focused on industrial development than personal information protection, and it contains many features that conflict with personal information protection law as it currently exists. As a result, civic groups strongly oppose the guideline, as it may create serious privacy issues for subjects of information gathering. Thus, this paper analyses the limitations of the guideline by comparing it with domestic and foreign laws about personal information protection and privacy. We also discuss the direction of legalization and institutionalization with respect to the secure use of big data.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.