• Title/Summary/Keyword: Personal Financial Management Systems

Search Result 42, Processing Time 0.027 seconds

A Study on the Intention of Financial Consumers to Accept AI Services Using UTAUT Model (통합기술수용이론을 이용한 금융소비자들의 인공지능 서비스 수용의도 연구)

  • Kim, Sun Mi;Son, Young Doo
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.1
    • /
    • pp.43-61
    • /
    • 2022
  • Purpose: The purpose of this study was verifying factors that affect to intention to use AI financial services and finding a way of building an user oriented AI ecology. Methods: This study used the UTAUT (Unified Theory of Acceptance and Use of Technology) model with independent variables such as performance expectancy, effort expectancy, social influence, facilitating conditions, trust, personal innovativeness and AI understanding as moderating variable. The data was collected through online & offline survey with questionnaire from 330 financial customers. Results: As a result, the analysis suggested that the performance expectancy, social influence, facilitating conditions, personal innovativeness are statistically significant to the intention to use AI. It was also found that AI knowledge of users differently influence the intention to use through the moderating effect on the facilitating conditions. Conclusion: Performance expectancy, social influence, facilitating conditions, personal innovativeness have positive causation to the intention to use in AI financial service. On the facilitating conditions, unlike other variables, it was found that the user's intention to use was different by the level of AI understanding. It means that customers could have the strong intention to use AI even though they don't have enough pieces of knowledge on the factors. Customers seem to be of recognition that the technology has certain benefits for themselves. The facilitating factors are significantly affected by AI understanding and differently effect on the intention to use AI.

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

A Study on the Information Security Control and Management Process in Mobile Banking Systems

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.218-232
    • /
    • 2015
  • According to the development of information processing technology and mobile communication technology, the utilization of mobile banking systems is drastically increasing in banking system. In the foreseeable future, it is expected to increase rapidly the demands of mobile banking in bank systems with the prevalence of smart devices and technologies. However, the keeping 'security' is very important in banking systems that handles personal information and financial assets. But it is very difficult to improve the security of banking systems only with the vulnerabilities and faults analysis methods of information security. Hence, in this paper, we accomplish the analysis of security risk factor and security vulnerability that occur in mobile banking system. With analyzed results, we propose the information security control and management processes for assessing and improving security based on the mechanisms which composes mobile banking system.

Improvement of the Certification Model for Enhancing Information Security Management Efficiency for the Financial Sector (금융권 정보보호 관리 효율을 제고하기 위한 인증모형 개선방안)

  • Oh, Eun;Kim, Tae-Sung;Cho, Tae-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.541-550
    • /
    • 2016
  • Considering the results of the 3.20 Cyber Attack, leaks of personal information by card companies, and so on, convenience and efficiency cannot be guaranteed without security as a prerequisite. In addition, it is more likely that customers' interests seem to be interfered with in financial institutions than in any other industry. Therefore, when a security accident occurs, users may suffer mental damage and monetary loss, leading to class action, customer defection, loss of reputation, and falloff in international credibility, which all may have a significant effect on the business continuity of corporations. This study integrates the representative information security certification systems in order to improve the efficiency of information security management and demonstrate the necessity of information security management system certification for the financial sector. If the certification is needed, we would like to recommend the desirable development direction.

Inadividual Behaviors Regarding Financial MyData Service Resistance: Impacts of Innovation Resistance and Distruct (금융 마이데이터 서비스 수용저항에 대한 개인의 행동: 혁신저항과 불신의 영향)

  • Sanghyun Kim;Hyunsun Park;Changyong Sohn
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.291-314
    • /
    • 2023
  • The concept of Mydata emerged with the expansion of the data economy. MyData aims to empower individuals by enhancing their right to self-determination over their personal data. The use of MyData is expected to enable the provision of innovative service in various fields. Since 2022, MyData has been introduced and actively used in the financial sector. In the future, not only financial institutions but also Bigtech and Fintech companies are expected to actively join and demonstrate rapid expansion. To ensure steady growth for MyData in the financial sector, it is necessary to assess acceptance behaviors from multiple perspectives. However, the majority of existing research solely focuses on positive acceptance. This study analyzed the impact of users' personal characteristics and innovation characteristics on both innovation resistance and acceptance resistance. The analysis revealed that personal and innovation characteristics contribute to an increase in distrust and innovation resistance in the MyData service. In addition, it has been confirmed that it can lead to actions such as delayed acceptance and refusal to accept. The results of this study offer both theoretical and practical insights into user behavior within the MyData service market.

The Impact of Mobile Technology Paradox Perception and Personal Risk-Taking Behaviors on Mobile Technology Adoption

  • Chae, Myung-Sin;Yeum, Dae-Sung
    • Management Science and Financial Engineering
    • /
    • v.16 no.2
    • /
    • pp.115-138
    • /
    • 2010
  • People acknowledge that mobile technology has improved their lives in terms of convenience, flexibility, connectedness, and new freedom of choice. However, as people increase usage of technology, they may become frustrated, challenged, annoyed, and irritated with it. This is the main characteristic of mobile technology paradoxes. Once technology gets into people's daily life, which it already has, people will look for a way to minimize the dependency on the technology, as well as finding a way to use the technology to improve the quality of their life. The focus of this study is to understand the mobile technology paradoxes and to develop coping strategies. As mobile technology is already a part of people's daily life, it is inevitable that people need to utilize technology as part of their lifestyles. This study developed a research model regarding the relationship between mobile technology perception and choice of coping strategies, including personal risk propensity as a mediating factor. Discussion on the importance of the technology paradoxes for developing mobile solution and services from the customers' perspectives followed after hypotheses testing.

Development of ASP Service Model for Small Retailers According to Their Characteristics (소규모 소매유통업체를 위한 ASP(Application Service Provider) 서비스 모델 개발에 관한 연구)

  • Kim, Gyeung-Min;Lee, Sook-Kyung
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.21-41
    • /
    • 2008
  • The development of POS (Point of Sales) systems for small retailers according to their needs is considered to be important to improve their competitive advantages. However, their financial statuses hinder the adoption of the tailored POS systems. Viewing ASP as a viable solution to provide tailored POS systems for the small retailers, this study develops ASP POS service models for the small retailers. First, this study elicits ASP POS requirements of the small retailers in the following areas: merchandising, pricing, store design and display, customer service, advertising and promotion and personal selling. Then, the requirements are clustered and the clusters are analyzed based on the characteristics of the retailers. Then, ASP service models are proposed according to the needs and profiles of the retailers.

  • PDF

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.

Study on the Solving Conflicts between Fishing Village Community and Residents in using Community Fishing Ground (마을어장 이용에 따른 어촌계와 주민간의 갈등 해소 방안 연구)

  • CHOI, Young-Chan
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.21 no.4
    • /
    • pp.568-575
    • /
    • 2009
  • On the conflict factors in using community fishing ground and their solutions, some conclusions are derived with the survey for fishing villages, residents, tourists as follows: Jeju Island has beautiful sceneries with seas in all the directions and so remarkable potential as personal experience fishing village. For sustainable development of ecological tourism in each fishing village, systematic, long-term development plans and management systems through decision making with residents in fishing and non-fishing villages are demanded. For tourist development of fishing village, protection management systems for marine and swampy land are needed first of all. Next, economical profit and the participation of resident have first priority, and also individual standards for each village are urgently prepared based on the results of basic research on each village. Finally, educations on environment and fishing village with professional tourist guide are needed. Ecological protection, environmental education, resident participation, local government's concern, and financial support could solve residential conflicts and make Jeju Island a Mecca of local fishing village tourism.