• Title/Summary/Keyword: Personal information control

Search Result 694, Processing Time 0.029 seconds

Online Users' Cynical Attitudes towards Privacy Protection: Examining Privacy Cynicism

  • Hanbyul Choi;Yoonhyuk Jung
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.547-567
    • /
    • 2020
  • As the complexity of managing online personal information is increasing and data breach incidents frequently occur, online users feel a loss of control over their privacy. Such a situation leads to their cynical attitudes towards privacy protection, called privacy cynicism. This study aims to examine the role of privacy cynicism in online users' privacy behaviors. Data were gathered from a survey that 281 people participated in and were analyzed with covariance-based structural equation modeling. The findings of this study reveal that privacy cynicism has not only a direct influence on disclosure intention but also moderates an effect of privacy concerns on the intention. The analytical results also indicate that there is a nonlinear effect of privacy cynicism on the outcome variable. This study developed the concept of privacy cynicism—a phenomenon that significantly affects online privacy behavior but has been rarely examined. The study is an initial research into the nature and implications of privacy cynicism and furthermore clarified its role by the nonlinear relationship between privacy cynicism and the willingness to disclose personal information.

Call admissio control for provisioning Qos of wireless multimedia services (무선 멀티미디어 서비스의 QoS 보장을 위한 호 수락제어 기법)

  • 이종찬;문영성;이문호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1668-1676
    • /
    • 1997
  • The wireless communication network is evolving toward the Personal Communication System to provide various multimedia services. In order to accomplish this goal, the effective schemes are required which can dynamically utilize the limited wireless resources based on traffic characteristics of each services. This paper proposes a novel call admission control scheme for the hierarchical macrocell/microcell structured PCS. It is based on the bandwidth reservation procedure performed in the macrocell or neighboring microcell. Its effectiveness is investigated by simulation.

  • PDF

Effects and Causality of Measures for Personal Information: Empirical Studies on Firm and Individual Behaviors and their Implications (개인정보보호 대책의 효과 및 인과관계: 기업 및 개인의 개인정보보호 행동에 대한 실증분석 및 그 시사점)

  • Shin, Ilsoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.523-531
    • /
    • 2016
  • This paper studies the empirical relationship between various privacy protection measures and personal information invasion experience of firms and individuals using rich and heterogeneous survey data. By analyzing PSM models. we get the following results: first, the treatment group which have more technical measures and/or IS investment tends to experience more privacy invasion than the control group which have less of them. second, the reverse causality, that is firms and individuals with more experience of privacy invasion tends to take more measure for personal information protection, is found to exist. From these result, we discuss proper privacy policies implications in respects of attackers benefits and individual irrationality.

Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment (응급 상황에서 환자의 프라이버시를 보장하는 속성기반 접근 제어 프로토콜)

  • Jeong, Yoon-Su;Han, Kun-Hee;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.279-284
    • /
    • 2014
  • Recently, m-health care is be a problem that the patient's information is easily exposed to third parties in case of emergency situation. This paper propose an attribute-based access control protocol to minimize the exposure to patient privacy using patient information in the emergency environment. Proposed protocol, the patient's sensitive information to a third party do not expose sensitive information to the patient's personal health information, including hospital staff and patients on a random number to generate cryptographic keys to sign hash. In addition, patient information from a third party that is in order to prevent the illegal exploitation of the patient and the hospital staff to maintain synchronization between to prevent the leakage of personal health information.

Business Performance Impact Caused by Display Restriction of Customer Information Identifier: Focusing on Domestic Securities Business (고객정보 식별자 표시제한으로 인한 업무영향에 관한 연구 - 국내 증권 업무를 중심으로 -)

  • Shin, Sangchul;Lee, Youngjai
    • The Journal of Information Systems
    • /
    • v.22 no.4
    • /
    • pp.49-69
    • /
    • 2013
  • Recently, enterprises have reinforced security control in order to prevent infringement of personal information and abuse of customer information by insiders. However, the reinforcement of security control by enterprises makes it difficult for internal users to perform business by using a business information system. There is, therefore, a need for research on various fields, which makes it possible to establish an appropriate security control policy while minimizing an impact on business. The present research verifies and analyzes an impact on difficulty in business of internal users using customer information, which is caused by security control performed by display restriction on customer information identifiers. The present research is intended to academically develop a technique for statistically analyzing an impact degree and a causal relationship between security control and an impact on business, which is a dichotomous variable, and to practically contribute to the establishment of an efficient security policy in consideration of an impact on business when an enterprise applies security control. A research target was internal business information systems of domestic securities enterprises, data was collected by questionnaire, and verification/analysis was performed by logistic regression analysis.

A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance

  • Chang, Hwal-Sik;Jung, Dae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.73-80
    • /
    • 2015
  • Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.

Mobile Terminal-Based User Interface for Intelligent Robots (휴대용 단말기 기반의 재능 로봇 사용자 인터페이스)

  • Kim Gi-Oh;Xuan Pham Dai;Park Ji-Hwan;Hong Soon-Hyuk;Jeon Jae-Wook
    • The KIPS Transactions:PartB
    • /
    • v.13B no.2 s.105
    • /
    • pp.179-186
    • /
    • 2006
  • A user interface that connects a user to intelligent robots needs to be designed for executing them efficiently. In this paper, it is analyzed how to organize a mobile terminal based user interface according to the function and level of autonomy of intelligent robots and the user interface of PDA (Personal Digital Assistant) and smart phone is developed for controlling intelligent robots remotely. In the image-based user interface, a user can see the motion of a robot directly and control the robot. In the map-based interface, the quantity of transmission information is reduced and therefore a user can control the robot with a small delay of transmission time.

The Influence of Community Characteristics on Food Insecurity Korean Adults (지역사회의 특성이 우리나라 성인의 식품불안정에 미치는 영향)

  • Park, Jun;Kang, Gilwon;Tak, Yangju;Chang, Sounghoon;Lee, Kunsei;Kim, Hyeongsu
    • Health Policy and Management
    • /
    • v.26 no.3
    • /
    • pp.226-232
    • /
    • 2016
  • Background: This study was conducted to analyze the influence of socioeconomic characteristics of community on the food insecurity under the control of personal socioeconomic factors which may be influence to the food security. Methods: Food insecurity and individual socioeconomic characteristics were obtained from 2012 community health survey. Socioeconomic characteristics of communities were extracted from the data of Statistics Korea and local governments. Personal socioeconomic factors were sex, age, educational status, job, and monthly family income. Socioeconomic characteristics of communities were administrative district (urban vs. rural), senior population rate, degree of financial self reliance, degree of financial independence, portion of welfare budget, number of welfare facilities, and unemployment rate. We analysed the relationships between the food insecurity and socioeconomic characteristics of community using multi-level analysis under the control of personal characteristics. Results: On personal level age, sex, education status, and monthly family income were related with food insecurity. On community level administrative district (urban vs. rural), degree of financial independence, unemployment rate, and proportion of welfare budget among local general government accounts were related to individual food insecurity. Rural area, district with low levels of financial independence, low portion of welfare budget, and greater unemployment rate showed a higher level of food insecurity. Conclusion: To reduce the level of food insecurity in a community it is necessary to decrease the unemployment rate, in addition to providing support from the central government by increasing the proportion of the welfare budget so that both factors contribute to raising the degree of financial independence.

A Study on Infra-Technology of RCP Interaction System

  • Kim, Seung-Woo;Choe, Jae-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1121-1125
    • /
    • 2004
  • The RT(Robot Technology) has been developed as the next generation of a future technology. According to the 2002 technical report from Mitsubishi R&D center, IT(Information Technology) and RT(Robotic Technology) fusion system will grow five times larger than the current IT market at the year 2015. Moreover, a recent IEEE report predicts that most people will have a robot in the next ten years. RCP(Robotic Cellular Phone), CP(Cellular Phone) having personal robot services, will be an intermediate hi-tech personal machine between one CP a person and one robot a person generations. RCP infra consists of $RCP^{Mobility}$, $RCP^{Interaction}$, $RCP^{Integration}$ technologies. For $RCP^{Mobility}$, human-friendly motion automation and personal service with walking and arming ability are developed. $RCP^{Interaction}$ ability is achieved by modeling an emotion-generating engine and $RCP^{Integration}$ that recognizes environmental and self conditions is developed. By joining intelligent algorithms and CP communication network with the three base modules, a RCP system is constructed. Especially, the RCP interaction system is really focused in this paper. The $RCP^{interaction}$(Robotic Cellular Phone for Interaction) is to be developed as an emotional model CP as shown in figure 1. $RCP^{interaction}$ refers to the sensitivity expression and the link technology of communication of the CP. It is interface technology between human and CP through various emotional models. The interactive emotion functions are designed through differing patterns of vibrator beat frequencies and a feeling system created by a smell injection switching control. As the music influences a person, one can feel a variety of emotion from the vibrator's beats, by converting musical chord frequencies into vibrator beat frequencies. So, this paper presents the definition, the basic theory and experiment results of the RCP interaction system. We confirm a good performance of the RCP interaction system through the experiment results.

  • PDF

Design and Implementation of a Location Privacy System supporting Privacy Self Controls (프라이버시 자기제어를 지원하는 위치정보 프라이버시 시스템의 설계 및 구현)

  • Lee, Eung-Jae;Ju, Yong-Wan;Nam, Kwang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.853-862
    • /
    • 2010
  • As the mobile device and broadband wireless internet such as WiBro, HSDPA is widely spreading, various types of advertisement and services based on personal location information can be provided. However, with convenience supported by these services, it is possible to be increased an invasion of privacy such as personal location and moving pattern. In this paper, we analysis an essential element for protection of privacy related on location information in mobile environment and propose location privacy protocol for managing location privacy self-control. And we design and implementation prototype of location privacy self-control system which is able to manage user's location privacy condition oneself using the proposed location privacy protocol.