• Title/Summary/Keyword: Perceived Privacy

Search Result 196, Processing Time 0.025 seconds

Effects on the continuous use intention of AI-based voice assistant services: Focusing on the interaction between trust in AI and privacy concerns (인공지능 기반 음성비서 서비스의 지속이용 의도에 미치는 영향: 인공지능에 대한 신뢰와 프라이버시 염려의 상호작용을 중심으로)

  • Jang, Changki;Heo, Deokwon;Sung, WookJoon
    • Informatization Policy
    • /
    • v.30 no.2
    • /
    • pp.22-45
    • /
    • 2023
  • In research on the use of AI-based voice assistant services, problems related to the user's trust and privacy protection arising from the experience of service use are constantly being raised. The purpose of this study was to investigate empirically the effects of individual trust in AI and online privacy concerns on the continued use of AI-based voice assistants, specifically the impact of their interaction. In this study, question items were constructed based on previous studies, with an online survey conducted among 405 respondents. The effect of the user's trust in AI and privacy concerns on the adoption and continuous use intention of AI-based voice assistant services was analyzed using the Heckman selection model. As the main findings of the study, first, AI-based voice assistant service usage behavior was positively influenced by factors that promote technology acceptance, such as perceived usefulness, perceived ease of use, and social influence. Second, trust in AI had no statistically significant effect on AI-based voice assistant service usage behavior but had a positive effect on continuous use intention. Third, the privacy concern level was confirmed to have the effect of suppressing continuous use intention through interaction with trust in AI. These research results suggest the need to strengthen user experience through user opinion collection and action to improve trust in technology and alleviate users' concerns about privacy as governance for realizing digital government. When introducing artificial intelligence-based policy services, it is necessary to disclose transparently the scope of application of artificial intelligence technology through a public deliberation process, and the development of a system that can track and evaluate privacy issues ex-post and an algorithm that considers privacy protection is required.

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

Effects of Perceived Control on Usage Intention toward Digital Finance Service: Moderating Role of Privacy Concern (사용자의 지각된 통제력이 디지털 금융서비스 이용의도에 미치는 영향: 프라이버시 염려 조절효과를 중심으로)

  • Jun Mo Kang;Cheol Park
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.161-181
    • /
    • 2023
  • As the post-COVID-19 consumer life environment is rapidly becoming non-face-to-face, changing non-face-to-face financial life services are having a significant impact on consumers' daily lives. People who do not have access to digital devices and services that have become essential goods are at risk of being left behind in the "digital blind spot," where they are marginalized not only in their daily lives but also in society and the economy as a whole (Kim Min-Jeung A, Kim Min-Jung B, Park Joo-Yung, 2022). In this study, we examined the effects of perceived control factors, Cognitive control, behavioral control, and decisional control, on intention to use digital finance. For this study, we surveyed 133 customers who are aware of and intend to use digital finance. The results show that cognitive control, behavioral control, and decisional control have significant effects on intention to use digital finance. In this relationship, the moderating effect of privacy concerns differs from the effect of decision control on intention to use digital finance. These findings suggest that digital financial services firms should consider whether to reduce or increase customer control. Based on these findings, we discuss marketing strategies and implications for digital financial services companies.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Perceived Usefulness and Risks and Behavioral Intentions of Mobile Fashion Apps -Focus Group Interviews with Chinese Students Studying in Korea- (모바일 패션 앱의 지각된 유용성과 위험 및 행동의도 -중국인 유학생 초점집단 면접 조사-)

  • Hong, Heesook;Sun, Yu;Lee, Seung-Eun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.2
    • /
    • pp.255-272
    • /
    • 2020
  • This exploratory study investigated Chinese consumers' perceived usefulness and risks of fashion apps and identified reasons for continuance and discontinuance intentions. This study conducted focus group interviews with a convenience sample of 13 Chinese students majoring in fashion in Korea. Based on interviewee responses, this study identified five attributes leading the perceived usefulness of mobile fashion apps (ubiquity and convenience, multi-media information, personalization, interactivity between consumers, and immediateness) and sub elements related to the five attributes. Five types of perceived risk (privacy risk, security risk, product risk, loss of future opportunity, and time risk) were identified in relation to Chinese consumers' use of fashion apps. The important role of live streaming services was uniquely identified by Chinese fashion app users. Usefulness of location-based information provided by mobile fashion apps were differently perceived according to respondents' use purpose, and augmented reality services provided by the apps were related to entertainment rather than usefulness. This study provides meaningful insights into Chinese consumers' perceptions of fashion apps and important app attributes that influence their continuance and discontinuance intentions. The findings from this study lend preliminary implications for future researchers and fashion businesses interested in the Chinese app market.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

Healing Design for Adolescent Patients and the Meaning of Home - American Adolescents' Preferences on Hospital Settings - (청소년을 위한 치유병원 디자인과 집의 의미와의 관계 - 미국 청소년을 대상으로 한 선호도 조사를 중심으로 -)

  • Kim, Eun Young
    • Journal of the Korean housing association
    • /
    • v.25 no.3
    • /
    • pp.93-103
    • /
    • 2014
  • The objective of the present study is to investigate healing design attributes for adolescent patients and to identify the relationship among healing design attributes and the meaning of home. This study examined the environmental preferences of American adolescents for hospital rooms to investigate age-appropriate healing design attributes. The health-related quality of life (HRQOL) concept was adapted to this study as a theoretical framework. One hundred six American adolescents participated in the survey. Participant adolescents consisted of two groups by their health status: forty-seven adolescent patients who were waiting for their surgical operations in waiting rooms and fifty-nine healthy high school students while they were at school. Participants aged in range from 14-year to 18-year olds with a mean of 16-year olds. Data collection consisted of two different instruments: Emotional state survey with demographics and environmental preference survey. Environmental values that are important to adolescents were control of privacy, having outside view, and quiet places to go. However, staying in a single-bed room for hospitalization is ranked the lowest score for the participating adolescents. Adolescents who perceived higher stress level preferred to have quiet places to go, to control over privacy and to have outside view significantly. The study resulted that the most important design attribute for American Adolescents was "privacy control", which is the essence of the meaning of home. There are some significant discrepancies in environmental preferences of hospital rooms by different genders and different health status.

Intention to Use and Group Difference in Adopting Big Data: Towards a Comprehensive View (활용 주체별 빅데이터 수용 인식 차이에 관한 연구: 활용 목적, 조직 규모, 업종 특성을 중심으로)

  • Lee, Young-Joo;Yang, Hyun-Cheol
    • Informatization Policy
    • /
    • v.24 no.1
    • /
    • pp.79-99
    • /
    • 2017
  • Despite the early success story, the pan-industry diffusion of big data has been slow mostly due to lack of confidence of the value creation and privacy-related concerns. The problem leads us to the need to a stakeholder analysis on the adoption process of big data. The present study combines technology acceptance model, task-technology fit theory, and privacy calculus theory to integrate the positive and negative factors on the big data adoption. The empirical analysis was performed based on the survey from the current and potential big data users. Results revealed perceived usefulness, task-technology fit, and privacy concern are significant antecedents to the intention to use big data. Furthermore, there are significant differences in the perceptions of each constructs among groups divided by the types of big data use, with several exceptions. And the control effect was found in the magnitude of the relation between independent variables and dependent variable. The theoretical and politic implications of the analysis are discussed as to the promotion of big data industry.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

An Empirical Study of the Effect of Perceived Risk upon Intention to LBS Use (위치기반서비스 이용에 대한 인지된 위험의 영향 연구)

  • Kim, Sang Min;Lee, Ji-Eun;Park, Chankwon
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.119-127
    • /
    • 2014
  • As the disclosure of privacy information has grown steadily, concerns about mobile services based on the personal information also increased. We aspired to reveal factors influencing the use of Location-Based services(LBS) App and analyse how the perceived risk affected between these factors and the use of LBS App. Results showed that usefulness and social influence influenced on the use of LBS App. We also found that the group who highly recognized the perceived risk was highly affected by usefulness and the group who lowly recognized the perceived risk was highly affected by social influence. Findings show that the company's strategy should be different depending on the level of consumers' perceived risk.