• Title/Summary/Keyword: Personal Information Concern

Search Result 138, Processing Time 0.022 seconds

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

A Study on the Privacy Concern of e-commerce Users: Focused on Information Boundary Theory (전자상거래 이용자의 프라이버시 염려에 관한 연구 : 정보경계이론을 중심으로)

  • Kim, Jong-Ki;Oh, Da-Woon
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.43-62
    • /
    • 2017
  • Purpose This study provided empirical support for the model that explain the formation of privacy concerns in the perspective of Information Boundary Theory. This study investigated an integrated model suggesting that privacy concerns are formed by the individual's disposition to value privacy, privacy awareness, awareness of privacy policy, and government legislation. The Information Boundary Theory suggests that the boundaries of information space dependends on the individual's personal characteristics and environmental factors of e-commerce. When receiving a request for personal information from e-commerce websites, an individual assesses the risk depending on the risk-control assessment, the perception of intrusion give rise to privacy concerns. Design/methodology/approach This study empirically tested the hypotheses with the data collected in a survey that included the items measuring the constructs in the model. The survey was aimed at university students. and a causal modeling statistical technique(PLS) is used for data analysis in this research. Findings The results of the survey indicated significant relationships among environmental factors of e-commerce websites, individual's personal privacy characteristics and privacy concerns. Both individual's awareness of institutional privacy assurance on e-commerce and the privacy characteristics affect the risk-control assessment towards information disclosure, which becomes an essential components of privacy concerns.

A Study on the Influential Factor of the Formation of Psychological Ownership on Personal Information (개인정보 소유감을 형성하는 영향 요인에 관한 연구)

  • Minjung Park;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.3
    • /
    • pp.33-49
    • /
    • 2018
  • Since there are growing concerns regarding personal information, users have perceived the importance of it. It makes users try to manage and control personal information by their own intentions. Therefore, we assume users now have begun to perceive psychological ownership on personal information. A main objective of this study is to identitythe relationship between accountability, self-identity, self-efficacy and sense of belongingness and psychological ownership on personal information. We conduct an online-basedsurvey and establish a structural equation model for testing hypothesis. The results show that users' accountability, self-identity and sense of belongingness positively influence to psychological ownership on personal information. Additionally, users' perceived psychological ownership on personal information increase their concern for information privacy. This study suggests a new concept as 'perceived psychological ownership on personal information' to explain for intentions of their psychological possessions toward personal information. The findings of this study can provide a way for how firms have to require clients' personal information with increasing their satisfactions.

The effect of Privacy Factors on the Provision Intention of Individual Information from the SNS Users (SNS 이용자의 프라이버시 요인이 개인정보 제공의도에 미치는 영향)

  • Min, Hyeon-Hong;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.1-12
    • /
    • 2016
  • Today, with the popularity of smart phones and the proliferation of SNS, anyone is exposed to the risk of personal information leakage. Unlike the prior studies of privacy, this research aims to identify the privacy factors affecting the provision intention of individual information from the SNS Users. This study also analyses how the perceived privacy risks and corporate trust affect the provision intention of individual information. The analysis results of empirical data show that despite experiencing the privacy leakage such as direct hacking and being aware of the risk, people are providing firms with personal information. The most influential variables to perceived privacy risk are information privacy policy, information privacy concern, previous privacy experience and information privacy awareness in the decreasing order of importance. Those to the corporate trust are information privacy policy, information privacy awareness, previous privacy concern and information privacy experience. Besides, the corporate trust and the perceived privacy risk also affect the provision intention of personal information. Finally, this study proposes the implications for personal information privacy.

Impact of Privacy Concern and Institutional Trust on Privacy Decision Making: A Comparison of E-Commerce and Location-Based Service (프라이버시 염려와 제도적 신뢰가 프라이버시 의사결정에 미치는 영향: 전자상거래와 위치기반서비스의 비교)

  • Kim, Sanghee;Kim, Jongki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.69-87
    • /
    • 2017
  • This Research Attempted to Clarify the Eeffect of Privacy Concern and Institutional Trust on Privacy Decision based on Privacy Calculus Perspective. We Developed a Research Model Suggesting that the Influence of Privacy Benefit and Privacy risk on the Information Disclosure Behavior and the Influence of Privacy Concern and Institutional Trust on the Privacy Calculus. In this Regard, in Order to Examine the Difference According to the Target whose Personal Information was Collected, an Empirical Analysis was Conducted to Compare the E-commerce Field and LBS(Location Based Service) Field. The Results of Empirical Analysis are as follows. First, it is Founded that other Relations were All Statistically Significant Except the Relation between Privacy Risk and Information Disclosure Behavior in the LBS group. Next, as a Results of Comparison of Constructs in the E-commerce and Institutional trust than the LBS group, Identifying that the Consumers are more Sensitive to the Personal Information Collected in the E-commerce site.

Factors Influencing the Provision of Personal Information in Electronic Government Services (전자정부서비스에 대한 개인정보제공의 영향요인)

  • Park, Jung Ae;Son, Dal Ho
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.53-73
    • /
    • 2017
  • Frequent outbreak of intrusion of private information is occurring recently not only at portal sites but also in electronic information service of public agencies. Due to these intrusions, it is observed that the citizens tend to avoid providing their private information even to the service for public agencies. Therefore, the object of this research can be explained as demonstrating the influence of the intention of provision for private information to foster the selectronic information ervice of the public agencies. In order to achieve this, this research intends to demonstrate how the experience of the intrusion of the private information affects the concern about the privacy and how the information factor from the public electronic information service has influence on the reliability toward the public. The results showed that the experience of intrusion of privacy, awareness of the danger of privacy, and the sense protection of the information from the manager at public agencies have direct influence on the concern of privacy. Meanwhile, it has been verified that the awareness of information protection of a manager, the systemicity of information protection, and the surveillance and punishment of information protection have influence on the reliability of public agencies.

Protection of Personal Information on Cloud Service Models (클라우드 서비스 유형별 개인정보보호 방안)

  • Lee, Bosung;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1245-1255
    • /
    • 2015
  • As cloud computing services become popular, the concern on the data security of cloud services increases and the efforts for the data security become essential. In this paper, we describe the pros and cons of cloud computing including the definition of cloud. Then, we discuss the regulations about the protection of user data defined in cloud promotion act. Previous studies related to the privacy protection and the entrustment of personal information in cloud computing are reviewed. We examine how to store the personal information depending on the cloud service model. As a result, we argue that the entrustment of personal information should vary according to the cloud service model and we propose how to protect the personal information on IaaS and SaaS cloud service models.

Difference of Factors Affecting Continuance Use and Self-Disclosure of SNS Users: Focused on a Dual-Factor Model (SNS 사용자들의 지속 사용과 정보 공유에 영향을 미치는 선행 요인의 차이: 듀얼 팩터 모형을 중심으로)

  • Kim, Byoungsoo;Kim, Hyoeun;Kim, Dae-Kil
    • The Journal of Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-21
    • /
    • 2016
  • Purpose The study analyzed the factors affecting continuance use and self-disclosure in the SNS(social networking service) context based on a dual-factor model. As SNS users have concerned privacy for a long time, privacy concern affects continuous use and self-disclosure. In details, concern over privacy may have a stronger effect on self-disclosure than on continuance use as users' personal information can be more exposed during posting their dailies and photos. Design/Methodology/Approach SNS benefits, trust in SNS providers, and social influence are served as the key enablers and privacy concern as the inhibitor. Moreover, the relative impacts of SNS benefits and privacy concern on continuance use and self-disclosure were analysed in this study. From the data of 327 Facebook users, the researchers tested proposed theoretical model by using PLS. Findings Users' continuance intention and self-disclosure behavior are differently affected by different antecedents. Trust in SNS provider had a significant effect on self-disclosure intention, while it has no significant effect on continuance intention. Concern over privacy was negatively related to self-disclosure intention, while it was positively associated with continuance intention.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

A study on the Development Plan of Personal Information Protection System (개인정보보호 체계 발전 방안에 대한 연구)

  • Sang-Hyun Joo;Byoung-Hoon Choi;Jin-Yong Lee;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.167-176
    • /
    • 2024
  • The Personal Information Protection Commission was launched in August 2020 as an integrated control tower for personal information protection, but several problems have been pointed out in the personal information protection operation system. First, despite the fact that Korea's personal information protection system has an integrated legal system that regulates both the public and private sectors, it has been pointed out that it is difficult to carry out smooth personal information protection functions due to incomplete integration of protection functions, such as the Financial Services Commission being in charge of personal credit information protection and the Korea Communications Commission being in charge of personal location information protection. Next, despite the increasing number of public sector personal information leakage incidents, there is a lack of personnel with expertise and specialized support organizations to efficiently investigate them, and there is a concern that the lack of an efficient response system to personal information infringement by global IT companies in Korea in the era of digital commerce may weaken the protection of citizens' personal information. In order to solve these problems, I reviewed overseas cases and literature and proposed the following measures. First, it is necessary to centralize the personal information protection supervision function for credit information and location information to the Personal Information Protection Commission. Second, it is necessary to secure expertise by securing specialized personnel and establishing specialized institutions to respond to public sector personal information leakage incidents. Third, it is necessary to revitalize the domestic agency designation system and establish an international cooperation system to protect people's personal information in the digital commerce era. I believe that these measures to develop the personal information protection system will lead to more systematic personal information protection.