• 제목/요약/키워드: Personal Privacy Protect

검색결과 148건 처리시간 0.028초

Determinants of the Intention to Protect Personal Information among Facebook Users

  • Chon, Bum Soo;Lee, Jeong-Ki;Jeong, HyeonJu;Park, Jowon;Park, Jonghwa
    • ETRI Journal
    • /
    • 제40권1호
    • /
    • pp.146-155
    • /
    • 2018
  • This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability) had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.

디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜 (A License Administration Protocol Providing User Privacy in Digital Rights Management)

  • 박복녕;김태윤
    • 한국정보과학회논문지:정보통신
    • /
    • 제30권2호
    • /
    • pp.189-198
    • /
    • 2003
  • 개인 정보 유출로 인한 피해사례가 늘어나면서 사용자 프라이버시 침해에 대한 인식이 높아지고 있다. 그러나 기존의 DRM 시스템은 사용자의 프라이버시 보호가 저작권을 보호하는데 직접적으로 필요하지 않다는 이유로 사용자의 프라이버시 보호에 대해 고려하지 않았다. 본 논문에서는 DRM에서 사용자 프라이버시 보호 측면이 강조된 라이센스 관리 프로토콜을 제안한다. 제안한 프로토콜은 사용자 식별 정보의 노출을 보호하기 위해 임시 ID와 token을 사용함으로 익명성을 보장하고 ECDH 세션키와 공개키 암호 시스템을 이용하여 메시지를 암호화함으로써 사용자 정보의 유출을 방지하여 사용자의 프라이버시를 보호한다.

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • 한국치위생학회지
    • /
    • 제18권4호
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

전자상거래 계약에 따른 개인정보보호에 있어 법적 문제점에 관한 연구 (A Legal Problems on the Protection of Personal Data and Privacy in the Electronic Commercial Transaction)

  • 이학승
    • 통상정보연구
    • /
    • 제1권2호
    • /
    • pp.249-271
    • /
    • 1999
  • This article deals with concept and theory of privacy and personal data on the basis of understanding of this matter, Especially concerns the infringement and protection of privacy and personal data that is violated by new media and electronic commercial transaction through case study and research of literature. The article seek to find out the resolution of legal problems on the protection of privacy and personal data. The resolution is in other words, that privacy and personal data protection law shall be established as a part of efforts to protect personal data and to activate electronic commercial transactions.

  • PDF

디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로 (Personal Information Protection in Digital Era -Reviewing Personal information protection Act-)

  • 유종락
    • 디지털융복합연구
    • /
    • 제9권6호
    • /
    • pp.81-90
    • /
    • 2011
  • 오늘날 인터넷을 통한 전자상거래의 확대추세에 따라 인터넷을 기업의 마케팅수단으로 활용하는 기업이 급속도로 증가하고 있으며, 소비자도 인터넷을 물품구매의 일상화된 생활수단으로 이용하고 있다. 즉, 인터넷을 통한 전자상거래는 시 공간적으로 접근성에 제한이 없다는 장점이 있어 일반 소비자들뿐만 아니라 불특정 다수가 인터넷을 통하여 물품을 구매하거나 거래하는 전자상거래가 본격화되고 있으며 그 내용도 광고, 계약, 대금결제, 클레임처리 등 거래행위 전반으로 확대되고 있는 것이 현실이다. 정보화시대에 정보통신기술의 발전으로 인한 개인정보 침해문제는 모든 국가가 직면하고 있는 가장 큰 문제 중의 하나이다. 따라서 개인정보보호법은 정보인권을 보호하는 기본적인 법률 중의 하나로써 개인정보보호법은 정보화시대에 없어서는 안 될 법률인 것이다. 그런 의미에서 새로운 개인정보보호법은 개인정보 유출로 인한 국민의 피해를 최소화하고 정보사회에서 개인정보자기결정권을 보호하기 위한 다양한 내용들을 담고 있는 진일보한 법이라 할 것이다. 이러한 법제정을 통하여 끊임없이 발생하는 개인정보 유출사고가 줄어들어 국민의 개인정보 보호수준이 월등히 높아지고, 개인정보 관련 산업발전에도 크게 기여할 것으로 전망된다. 그러나 합리적인 개인정보 이용 및 보호 문화의 정착을 위한 사회구성원 모두의 적극적인 참여와 인식개선이 선행되어야 할 것이다. 개인정보보호법의 목적이 개인정보의 수집 유출 오용 남용으로부터 사생활의 비밀 등을 보호함으로써 국민의 권익을 증진하고 개인의 존엄과 가치를 보호할 수 있지만, 사생활의 비밀보호와 정보의 자유로운 흐름을 조화하는 역할도 수행하여야 하기 때문이다.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

금융회사의 고객정보보호에 대한 내부직원의 태도 연구 (The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea)

  • 정우진;신유형;이상용
    • Asia pacific journal of information systems
    • /
    • 제22권1호
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

인터넷에서의 아동의 프라이버시 보호와 어머니의 역할 (The Role of Mothers in Children's Privacy Protection on the Internet)

  • 김소라
    • 대한가정학회지
    • /
    • 제46권2호
    • /
    • pp.59-71
    • /
    • 2008
  • The purpose of this study was to discuss the role of mothers in children's privacy protection on the Internet. Specifically, the study explored 1)children's privacy protection efforts on the Internet, 2)types of personal information children provided at Web sites, and 3)the effect of mothers' privacy protection efforts on their children's privacy protection levels. The Internet survey was conducted and total of 153 mothers and their children aged 12-13 were included for statistical analysis. The descriptive statistics and Ordinary Least Squares were used. The results yield that children showed relatively high levels in providing personal information on the Internet, while they have no sufficient competency at privacy protection. The effect of mothers' privacy protection efforts on children's privacy protection was partially supported. The longer hours of Internet use and frequent participation in online events increased the potential consequences of children's privacy invasion. Providing privacy standards for online service providers and marketers targeting children could help protect children's privacy. Moreover, education program targeting parents and children could contribute them reduce potential consequences of children's privacy invasion.

개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로 (The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users)

  • 이은숙;이준기;차경진
    • 한국전자거래학회지
    • /
    • 제21권2호
    • /
    • pp.135-150
    • /
    • 2016
  • 대부분의 웹 사이트에서는 법을 준수하기 위해 정보주체의 개인정보 수집에 동의를 구하는 이용약관이나 개인정보 취급방침(이하 '취급방침')을 마련하고 있다. 국내 온라인 및 모바일 서비스에서 이용자로부터 수집하는 개인정보의 항목을 명시하고자 마련한 취급방침을 대부분의 이용자는 읽지도 않고 그냥 넘기는 등 이용자 관점에서 인지하지 못하는 경우가 많다. 보다 구체적으로 취급방침을 확인했을 때 이용자가 제공하는 개인정보의 인지 및 서비스 이용에 어떤 영향이 있는지를 살펴보고자 카카오톡 이용자를 중심으로 실험하였다. 332명의 실험 참여 인원을 구성해 취급방침에 대해 기존 행동을 유지하는 그룹과 Display를 확인하여 내용을 인지하는 그룹을 구성해 개인 프라이버시 민감도의 차이를 고려하여 개인정보보호 행동의 차이를 분석하여 시사한다. 본 연구에서는 민감군과 무관심군으로 나누었을 때 취급방침 인지로 나타나는 보호행동을 제시하고 서비스 제공자의 정책 실현을 위한 가이드라인을 제시한 점에서 그 의의가 있다.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF