• Title/Summary/Keyword: Online privacy

Search Result 219, Processing Time 0.023 seconds

The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone (정보시스템 관련 교육의 정도가 보안 우려 및 온라인 거래 의도에 미치는 영향 - 인터넷 이용과 스마트 폰 이용의 비교 분석)

  • Jung, Seung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.145-161
    • /
    • 2012
  • This study aims to explore how the degree of education related to information systems and the Internet literacy affect perceived security risk and how these three variables affect online transaction intention based on the Technology Acceptance Model (TAM). Since using smartphone to purchase necessary products is increasing, the study provided two different cases of using the existing Internet and smartphone to buy products. As a result of an empirical test, the degree of information system education, internet literacy, and perceived security risk had significant effects on online transaction intention mediating perceived usefulness and perceived ease of use. Unlike the expectation, the more people have education related to information systems, the more they have knowledge about hacking or cases of privacy infringement, leading to even more concerns about security, thereby believing the Internet transactions require much effort. The more the education about information system, the more we have concerns about security; therefore, perceived security risk have a positive(+) effect on perceived usefulness not a negative(-) effect. Lastly, while the degree of education related to information systems has relations with the recognition of the usefulness of the Internet transaction, the study showed that there are no relations of recognizing the usefulness and the ease of use of smartphone.

Research on legal improvement measurements on drone use

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.147-153
    • /
    • 2017
  • The main subject of year 2016 Davos forum was "The 4th Industrial Revolution." Recently, interests and investment in drone market, so called industrial revolution in the sky is growing in many countries around the world. Before, drone was used for military purpose such as reconnaissance or attacking but today, it is used in various private sectors such as unmanned delivery service, agriculture, leisure activities, etc. Presently, many major countries in the world are already involved in the 'war without gunfire' to be dominant in this drone industry. Korean government also has announced an extreme relaxation of regulations for growing drone industry by opening a conference with Ministers related to economics. During the conference, business scope of drone which was limited to agriculture, photographing, and observation was expanded to all the fields except for cases hindering national safety and security. In terms of shooting purpose drone its process of receiving approval for flight and shooting is simplified to online registration. What is more, drone delivery service will be allowed in island areas such as Goheung, Yeongwol, etc from first term of year 2017. Finding the way to apply drone in criminal investigation is also speeding up. Recently, Public Safety Policy Research Center in Korean National Police University has inquired for research service and its result will be out around November. Likewise, although more and stronger foundation for supporting drone industry is made but there are still, some opinions saying that we should take a careful approach in consideration to the side effect such as abuse in crime. One may also try terror by placing a dangerous substance. If drone falls, it may hurt any civilians. Moreover, if shopping purpose drone is hacked, it may result in violation of privacy. Compared to America, Europe, and China, we are at the very beginning stage of drone industry and it is necessary to reorganize legal issues to grow this industry. This can be thought from two perspectives; first, the growth of drone industry is blocked by difficult regulations on Aviation Law and Radio Regulation Law. The second issue is the safety and privacy that are required for operating drone. For the advanced technologies to make human life more profitable, more active and proactive actions are required by criminal law side. In preparation to the second mechanical era where man and machines should go together, I hope that responsible preparation is required in all fields including the criminal law.

An Empirical Study of SNS Users' Switching Intention Toward Closed SNS (SNS 이용자의 폐쇄형 SNS로의 전환의도에 영향을 미치는 요인에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.135-160
    • /
    • 2014
  • Most Social Network Service (SNS) provide online chat, video and file sharing, blogging and others. Because of this advantage, people depend on SNS to communicate with others. However, recently SNS encourage people to reveal too much information broadly so SNS users are concerned about privacy invasion and data spill. They also feel fatigue in process of touching people they don't know while using SNSs. That is the reason why they attempt to switch from opened SNS to Closed SNS. Therefore, the purpose of this study is to empirically investigate and analyze the effect of the factors on the SNS users' switching behavior when using SNS. To accomplish this purpose, this research adopted "Push-Pull-Mooring (PPM)" framework. The PPM is proposed by population geologist, who used it to explain the incentives of demographic migration. Following PPM model, this research empirically examines the three categories of antecedents for SNS switching intention toward closed SNS: push (i.e., weak connection, privacy concern, relative complexity), pull (i.e., enjoyment, belongingness, peer influence), mooring (i.e., SNS fatigue, user resistance) factors. The survey was conducted for 285 users on SNS communities in Korea. The results of this study are as follows; First, wear connection and privacy concern are significantly related to SNS switching intention. Second, enjoyment and belongingness are significantly related to SNS switching intention. Finally, the results show that SNS fatigue has a moderating effect on the links between push factors and SNS switching Intention. Also, user resistance has a moderating effect on the links between pull factors and SNS switching Intention. These findings contribute to the SNS literature both theoretically and practically.

Determinants of U.S. Buyer Loyalty toward Gobizkorea.com: A Study Focused on Country Image, E-Service Quality, and Satisfaction (미국 바이어의 고비즈코리아에 대한 충성도 결정요인: 국가이미지, 서비스 품질 및 만족도를 중심으로)

  • Chung, Jae-Eun;Oh, Jeong Suk;Jeong, So Won
    • Korea Trade Review
    • /
    • v.43 no.5
    • /
    • pp.203-232
    • /
    • 2018
  • Gobizkorea is an online B2B matching platform operated by the Small & Medium Business Corporation. Gobizkorea provides an opportunity for resource-poor SMEs to promote their products and exploit new market opportunities at low cost. The successful operation of Gobizkorea will contribute to the increased exports of Korean SMEs. Accordingly, the present study examined determinants of foreign buyer loyalty toward Gobizkorea.com focusing on country image, e-service quality, and satisfaction. One hundred two survey questionnaires were collected from U.S. buyers registered with Gobizkorea.com. Exploratory and confirmatory factor analysis confirmed three dimensions of e-service quality including information & efficiency, reliability & privacy, and prompt communication & delivery. The path analysis results showed that the country image of Korea significantly and positively affected these three dimensions of e-service quality. Information & efficiency and reliability & privacy positively influenced buyer satisfaction. Reliability & privacy and satisfaction had a positive impact on buyer loyalty. This study enhances the understanding of the foreign buyers use of the domestic e-market platform by examining of determinants of U.S. buyer loyalty toward Gobizkorea.

Determinants.influencing Consumer Perceptions of Web Site Trust and Outcomes (웹사이트 신뢰에 대한 소비자 지각과 성과에 영향을 미치는 요인에 관한 연구)

  • Ha, Hong-Youl
    • Journal of Global Scholars of Marketing Science
    • /
    • v.15 no.2
    • /
    • pp.1-25
    • /
    • 2005
  • Unlike the traditional bricks-and-mortar marketplace, the online environment includes several distinct factors that influence Web site trust. As consumers become more savvy about the Internet, the author contends they will insist on doing business with web companies they trust. This study examines 1) how Web site trust is affected by the following web purchase-related factors: security, privacy, brand name, word-of-mouth, good online experience, and quality of information, and 2) how it influences outcomes. Unlike Urban and colleagues' study (2000), the author argues that not all e-trust bUilding programs guarantee success in building Web site trust. In addition to the mechanism depending on a program, building e-brand trust requires a systematic relationship between a consumer and a particular web site. The findings show that Web site trust does not build one or two components but are established by the interrelationships of complex components. By carefully investigating these variables in formulating marketing strategies, marketers can cultivate brand loyalty and gain a formidable competitive edge.

  • PDF

A study of RMT buyer detection for the collapse of GFG in MMORPG (MMORPG에서 GFG 쇠퇴를 위한 현금거래 구매자 탐지 방안에 관한 연구)

  • Kang, Sung Wook;Lee, Jin;Lee, Jaehyuk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.849-861
    • /
    • 2015
  • As the rise in popularity of online games, the users start exchanging rare items for real money. As RMT (Real Money Trade) is prevalent, GFG (Gold Farming Group) who abuse RMT shows up. GFG causes social problems such as identity theft, privacy leaks. Because they needs many bot characters to gather game items. In addition, GFG induce RMT that makes in-game problems such as a destroying game economy, account hacking. Therefore, It is very important work to collapse GFG at the perspective of social and in-game. In this paper, we proposed a fundamental method for detecting RMT buyers for the collapse of GFG at the perspective of buyer by Law of Demand and Supply. We found two type of RMT by analyzing actual game data and detected RMT buyers with high recall ratio of 98% by ruled-based detection.

Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication (효율적인 인증을 위한 해시 저장방식의 가상카드번호 결제 시스템)

  • Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.5-15
    • /
    • 2015
  • Electronic transactions have been increasing with the development of the high-speed Internet and wireless communication. However, in recent years financial corporations and mobile carriers were attacked by hackers. And large numbers of privacy information have been leaked. In particular, in the case of credit card information can be misused in the online transaction, and the damage of this given to cardholder. To prevent these problems, it has been proposed to use a virtual card number instead of the actual card number. But it has security vulnerability and requires additional security infrastructure. In this paper, we analyzed the proposed virtual card number schemes. and we propose a new virtual credit card number scheme. In the newly proposed scheme, cardholder generates a key pair (public key/private key) and pre-register public key to the issuer. then, cardholder can pay no additional security infrastructure while still efficiently satisfy the security requirements.

Bias & Hate Speech Detection Using Deep Learning: Multi-channel CNN Modeling with Attention (딥러닝 기술을 활용한 차별 및 혐오 표현 탐지 : 어텐션 기반 다중 채널 CNN 모델링)

  • Lee, Wonseok;Lee, Hyunsang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1595-1603
    • /
    • 2020
  • Online defamation incidents such as Internet news comments on portal sites, SNS, and community sites are increasing in recent years. Bias and hate expressions threaten online service users in various forms, such as invasion of privacy and personal attacks, and defamation issues. In the past few years, academia and industry have been approaching in various ways to solve this problem The purpose of this study is to build a dataset and experiment with deep learning classification modeling for detecting various bias expressions as well as hate expressions. The dataset was annotated 7 labels that 10 personnel cross-checked. In this study, each of the 7 classes in a dataset of about 137,111 Korean internet news comments is binary classified and analyzed through deep learning techniques. The Proposed technique used in this study is multi-channel CNN model with attention. As a result of the experiment, the weighted average f1 score was 70.32% of performance.

Effective Strategies for Activating IT Ethics Education: A Study on Improving Internet Ethical Education for University Students (효과적인 IT윤리 교육 활성화 방안 : 대학생들의 인터넷 윤리적 교육 개선에 대한 연구)

  • Seung-Young Jang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.197-208
    • /
    • 2024
  • In today's era, where internet technology and culture are advancing rapidly, the importance of systematic internet ethics education has been underscored to address the insufficient levels of internet ethics among college students. This research primarily focused on assessing the level of internet ethics among college students, who represent a significant proportion of internet users. The innovative Flip Learning teaching method and the introduction of the Wheeler Model, along with the application of frequency measurement theory, allowed us to explore ways to maximize the effectiveness of the education. It was confirmed that students who received internet ethics education demonstrated improved levels of ethics. This study concluded that significant progress has been made in systematizing and effectively promoting internet ethics education. It also proposed the need for systematic ethics education and provided future directions for improving internet ethics education.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.