• Title/Summary/Keyword: Online protection

Search Result 257, Processing Time 0.024 seconds

On China's Intellectual Property Rights Protection Online

  • Wang, Guo-An;Lim, Yong-Taek
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.237-247
    • /
    • 2004
  • Online people conduct all kinds of business activities, such as promoting the sales of products and services, reading newspapers, watching TV and movies, and sending business messages by e-mail, by e-voice and by e-fax. Computers with access to the Internet are defined by the United Nations as the fourth media characterized by instantaneousness, openness, limitlessness, boundlessness and globalization. With the development and popularization of the Internet and the advance of the information technology in China, Intellectual Property Rights (IPRs) violations online have frequently occurred in e-business activities. IPRs protection online has posed a great challenge not only for business managers and officials, but also for judges and lawyers because the rapid development of the Internet has created a legal vacuum governed by no laws in IPRs violation and protection online in China.. The paper at first classifies IPRs into several categories, then reveals China's serious problems and challenges of IPRs violations online and stresses the necessity of China's IPRs protection online. Finally it puts forward some suggestions concerning IPRs protection online.

  • PDF

A Study of Relationship between Dataveillance and Online Privacy Protection Behavior under the Advent of Big Data Environment (빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구)

  • Park, Min-Jeong;Chae, Sang-Mi
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.63-80
    • /
    • 2017
  • Big Data environment is established by accumulating vast amounts of data as users continuously share and provide personal information in online environment. Accordingly, the more data is accumulated in online environment, the more data is accessible easily by third parties without users' permissions compared to the past. By utilizing strategies based on data-driven, firms recently make it possible to predict customers' preferences and consuming propensity relatively exactly. This Big Data environment, on the other hand, establishes 'Dataveillance' which means anybody can watch or control users' behaviors by using data itself which is stored online. Main objective of this study is to identify the relationship between Dataveillance and users' online privacy protection behaviors. To achieve it, we first investigate perceived online service efficiency; loss of control on privacy; offline surveillance; necessity of regulation influences on users' perceived threats which is generated by Dataveillance.

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

Analyzing the Differences among Online Gaming Users' Gaming Addiction Prevention Behaviors based on Risk Perception and Self-efficacy : Testing RPA Framework on Korean College Students (온라인 게임 사용자의 위험지각과 자기효능감에 따른 게임 중독 예방행위 간 차이분석 : 국내 대학생을 대상으로 한 위험지각태도 프레임웍을 기반으로)

  • Choi, Byounggu;Wang, ChenWei;Lee, Jae-Nam
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.19-41
    • /
    • 2015
  • Many studies have focused on the influences and outcomes of online game addiction. However, few studies have investigated how the online game addiction prevention behavior differs depending on online game user. In order to fill this gap, this study attempts to classify online game users based on risk perception attitude (RPA) framework. More specifically, this research tries to show online game user can be classified into four groups based on perceived risk of online game addiction and efficacy beliefs of online game addiction protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for online game addiction prevention. For this purpose, analysis on survey data from 240 Korean college students who use online game reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for online game addiction prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of online game addiction prevention strategies and policy.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

A New Online News Service Model, based on NewsML and UCI Systems (NewsML과 UCI를 적용한 뉴스 콘텐츠의 온라인 유통모델)

  • Park, Chang-Shin;Kil, Duke
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.641-645
    • /
    • 2007
  • News contents, produced for paper readers, are more and more being used online instead of offline. Internet sites, expecially portals(naver, daum, nate etc.) are dominant marketplaces, where news are exchanged and values are added. So, establishing a new online news service system, which can satisfy news provider(copyright owner) and internet service provider together, is a necessary task under current online-dominant news service environment. UCI(Universal & Ubiquitous Content Identifier) and IPTC NewsML(News Mark-up Language) are considered as useful standards to compromise protection of news-copyright and enhancement of online use of news contents. This study is based on a real case of 'NewsBank' in korea, We expect that this study can show an inspiration to obtain two contradictory goals of copyright protection and free online use of copyright.

  • PDF

Online Users' Cynical Attitudes towards Privacy Protection: Examining Privacy Cynicism

  • Hanbyul Choi;Yoonhyuk Jung
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.547-567
    • /
    • 2020
  • As the complexity of managing online personal information is increasing and data breach incidents frequently occur, online users feel a loss of control over their privacy. Such a situation leads to their cynical attitudes towards privacy protection, called privacy cynicism. This study aims to examine the role of privacy cynicism in online users' privacy behaviors. Data were gathered from a survey that 281 people participated in and were analyzed with covariance-based structural equation modeling. The findings of this study reveal that privacy cynicism has not only a direct influence on disclosure intention but also moderates an effect of privacy concerns on the intention. The analytical results also indicate that there is a nonlinear effect of privacy cynicism on the outcome variable. This study developed the concept of privacy cynicism—a phenomenon that significantly affects online privacy behavior but has been rarely examined. The study is an initial research into the nature and implications of privacy cynicism and furthermore clarified its role by the nonlinear relationship between privacy cynicism and the willingness to disclose personal information.

Status and Problems of Online Game Regulations for Juvenile Protection- Centered on the Online Game Shutdown System of Korea

  • Kim, Il Hwan;Kim, Jaehyoun;Kim, Myeong Sik;Hong, Seok Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1548-1568
    • /
    • 2015
  • Korea's Compulsive Shutdown System bans online game providers from offering their services to children under 16 years of age from midnight to 6 a.m. Although it was introduced only after lengthy rounds of discussion, controversy over the system still continues. The key question is whether the system, which unilaterally emphasizes juvenile protection, infringes upon the freedom of playing games for teenagers, the freedom of business for game products related business operators and the right to foster children for parents, which are basic rights under the Constitution. It is very encouraging that the State took up the issue and prepared various systems for juvenile protection through the Compulsive Shutdown System. Yet the government has to plan as comprehensive and effective of a measure as it possibly can by predicting the trends of technology development and game use, and also set detailed standards to ensure that the system should not become an excessive or inappropriate regulation. Although the State's compulsive intervention may be positive since it is hard to expect a self purification capability to exhibit itself concerning game use among teenagers, a plan to prevent game addiction among adolescents from the long-term and fundamental perspectives should be prepared as well.

A Study on the Factors of Online Information Security Behavior Failure: Focused on the Elderly (중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로)

  • TIAN, YANG;Park, Minjung;Chai, Sangmi
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.51-74
    • /
    • 2020
  • Purpose Since the number of personal information breach incidents increased, many people have perceived the importance of personal information protection, in the recent. Especially, the number of personal information breach targeting middle-aged and elderly people rapidly increases. Therefore, the purpose of this study is to identify the factors which influence to fail of online information security behaviors among the elderly. Design/methodology/approach This study made a research model by adopting the factors deducted from the protection motivation theory. To analyze the research model, we conducted an online survey targeted on the elderly and middle ages users who have nations of Korean and Chinese respectively. Findings According to the empirical analysis result, we identified that only perceived severity and perceived vulnerability affected information security awareness. On contrast, it was also discovered that perceived barriers, self-efficacy, and response efficacy did not affect information security awareness. Additionally, the awareness of information security also did not affect information security behaviors. Middle-aged and elderly people with personal information protection education did more information security behaviors than people those who no education experiences. Korean middle-aged and elderly people with education significantly did more information protection behaviors than the people without the education.

Protecting Children's Online Privacy : Privacy Issues and Its Implications (아동 이용자에게 특화된 온라인 개인정보보호 이슈 : 사례연구를 중심으로)

  • Rha, Jong-Youn;Cho, EunSun;Lee, SeungEun
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.23-31
    • /
    • 2020
  • As children's participation in online activities has recently increased, online services for children are also rapidly increasing, but children are not sufficiently guaranteed their rights. The purpose of this study is to classify and analyze issues related to the children's online privacy issues in Korea through the current status and case studies of application services mainly used by children. For this purpose, this research analyzed problems related to the children's online privacy protection according to the stage of using the application. As a result of the application content analysis, 1) issues of child identification, 2) effectiveness of notice and consent, and 3) issues of children's rights as subjects of information were derived. Based on the current status analysis, the policy implications were drawn based on the children's online privacy protection in the online environment, and suggestions were made for improvement.