• Title/Summary/Keyword: Privacy Behavior

Search Result 197, Processing Time 0.024 seconds

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory (온라인 환경에서 프라이버시 행동의도에 미치는 영향 - 보호동기이론을 중심으로 -)

  • Kim, Jongki;Kim, Sanghee
    • Informatization Policy
    • /
    • v.20 no.3
    • /
    • pp.63-85
    • /
    • 2013
  • Drawing on Protection Motivation Theory(PMT), this study attempts to clarify antecedents that influence the intention to protect individuals' privacy on the Internet. Protection motivation forms through individuals' cognitive appeal involving threat and efficacy. Then protection motivation causes privacy behavioral change. Protection motivation factors are established privacy trust and privacy risk, which are related to privacy attitude and belief. This proposed model is empirically analyzed by utilizing structural equation analysis(SEM). According to the result of the empirical analysis, it is founded that almost paths have statistically significant explanatory power except path from efficacy to privacy risk and path from privacy trust to privacy behavioral intention. This study shows powerful evidence of antecedent factors based on protection motivation of individuals' privacy behavioral intention in online environment.

  • PDF

A Study of Relationship between Dataveillance and Online Privacy Protection Behavior under the Advent of Big Data Environment (빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구)

  • Park, Min-Jeong;Chae, Sang-Mi
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.63-80
    • /
    • 2017
  • Big Data environment is established by accumulating vast amounts of data as users continuously share and provide personal information in online environment. Accordingly, the more data is accumulated in online environment, the more data is accessible easily by third parties without users' permissions compared to the past. By utilizing strategies based on data-driven, firms recently make it possible to predict customers' preferences and consuming propensity relatively exactly. This Big Data environment, on the other hand, establishes 'Dataveillance' which means anybody can watch or control users' behaviors by using data itself which is stored online. Main objective of this study is to identify the relationship between Dataveillance and users' online privacy protection behaviors. To achieve it, we first investigate perceived online service efficiency; loss of control on privacy; offline surveillance; necessity of regulation influences on users' perceived threats which is generated by Dataveillance.

Factors Influencing Use of Social Commerce: An Empirical Study from Indonesia

  • RAHMAN, Arief;FAUZIA, Refika Nurliani;PAMUNGKAS, Sigit
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.711-720
    • /
    • 2020
  • This research aims to analyze the factors affecting the acceptance of social commerce, including performance expectancy, effort expectancy, social support, facilitating conditions, hedonic motivation, habitability, price saving orientation, and privacy concerns using the Unified Theory of Acceptance and Use of Technology (UTAUT2). UTAUT2 has been examined and modified in various contexts. The research model studies the acceptance and use of technology in the context of customers. This study adopts a quantitative method using the partial least squares regression (PLS) approach involving 244 respondents. The respondents are users of social commerce in Indonesia. The result of this research indicates that social influence, facilitating conditions, hedonic motivation, habit, price value orientation, and privacy concerns have a significant effect on behavioral intention. On the other hand, performance expectancy and effort expectancy does not affect behavioral intention. Furthermore, price value has a significant effect on social commerce user behavior. Lastly, facilitating conditions and habits does not affect social commerce user behavior. This research contributes to the development of theory by examining an additional variable, which is privacy concern. This study is significant since social media and social commerce have grown exponentially nowadays. Implications of the results for the development of the theory (UTAUT2) and practice are discussed in the article.

협업적 의사소통을 통한 B2C 웹사이트 정보 프라이버시 보호 활동의 성과에 관한 연구: 장기 관계적 성과 관점을 중심으로

  • Lee, Sang-Hun;Lee, Ho-Geun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.493-517
    • /
    • 2008
  • The purpose of this research is to identify effect of communication strategy as effectively communication method which is decreasing Internet Web site users' perceived information privacy concerns as important factor affecting to positive behavior or behavioral intentions on long-term relational outcome perspectives. This study suggests alternatives concepts and causal relationship about information privacy issues. First, it addressed collaborative communication strategy (CCS) model of effective communication method for Web site's IPP to users. Second, it provided comparing and integrating streams of information privacy research on long-term relational outcomes perspective. Third, it assessed effectiveness of Web site's IPP on organization legitimacy ensured continuous survival of organization. A research model was proposed and subsequent hypotheses were empirically tested with partial least square (PLS) based on 684 responses from the users of 21 Internet Website among entirely finance, recruit, portal /e-store Web site. It was learned that CCS(as a communication method) and relationship quality(representing long-term relational outcomes)was positively associated with decreasing user's IPC more than privacy risk. Also, legitimacy to information privacy practice positively associated with willingness to information providing more than negative effect of IPC. Lastly, their association strength was partially moderated by the type of real information sensitivity.

  • PDF

Difference of Factors Affecting Continuance Use and Self-Disclosure of SNS Users: Focused on a Dual-Factor Model (SNS 사용자들의 지속 사용과 정보 공유에 영향을 미치는 선행 요인의 차이: 듀얼 팩터 모형을 중심으로)

  • Kim, Byoungsoo;Kim, Hyoeun;Kim, Dae-Kil
    • The Journal of Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-21
    • /
    • 2016
  • Purpose The study analyzed the factors affecting continuance use and self-disclosure in the SNS(social networking service) context based on a dual-factor model. As SNS users have concerned privacy for a long time, privacy concern affects continuous use and self-disclosure. In details, concern over privacy may have a stronger effect on self-disclosure than on continuance use as users' personal information can be more exposed during posting their dailies and photos. Design/Methodology/Approach SNS benefits, trust in SNS providers, and social influence are served as the key enablers and privacy concern as the inhibitor. Moreover, the relative impacts of SNS benefits and privacy concern on continuance use and self-disclosure were analysed in this study. From the data of 327 Facebook users, the researchers tested proposed theoretical model by using PLS. Findings Users' continuance intention and self-disclosure behavior are differently affected by different antecedents. Trust in SNS provider had a significant effect on self-disclosure intention, while it has no significant effect on continuance intention. Concern over privacy was negatively related to self-disclosure intention, while it was positively associated with continuance intention.

A Study on the Protection of Personal Privacy on Online Environment (온라인 환경에서 개인 프라이버시 보호에 관한 연구)

  • Nam, Soo-tai;Kim, Do-Goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.183-186
    • /
    • 2014
  • Increasingly important user based service on the smart media era, and increasing awareness about the user experience. As the connected Internet information systems increases, one of the problems happening between users and information systems such as Internet shopping-malls, portal sites, and corporate web sites is related with the information privacy concerns issues. Thus, we have reviewed extensive previous studies on information privacy in local and foreign information systems, marketing and other fields. The purpose of this study is to provide future directions of studies on information privacy concerns by analyzing past and recent trends of the studies. By considering these realities, we were conducted review on the influencing factors of information privacy concerns on behavior intention based the online environment. Based on these findings, several theoretical and practical implications were suggested and discussed.

  • PDF

A Study on the Surveillance Camera System for Privacy Protection (프라이버시 보호를 위한 감시카메라 시스템에 관한 연구)

  • Moon, Hae-Min;Pan, Sung-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1779-1786
    • /
    • 2009
  • Due to increased terrors and crimes, the use of surveillance camera systems including CCTV is also increasing. Private information such as faces or behavior patterns can be recorded in CCTV and when it is exposed, it may cause infringement to privacy and crimes. This paper analyses conventional methods on protection of privacy in surveillance camera system and then suggests an RFID-based surveillance camera system that can both watch crimes and protect privacy. The proposed system protects privacy and watches crimes using scrambling and an RFID system.

A Study of Antecedents of Continuance Intention in Mobile Social Network Service: The Role of Trust and Privacy Concerns (모바일 소셜네트워크서비스 환경에서 지속 사용 의도의 선행 요인에 관한 연구: 신뢰와 프라이버시 우려의 역할)

  • Kim, Byoungsoo
    • Knowledge Management Research
    • /
    • v.13 no.4
    • /
    • pp.83-100
    • /
    • 2012
  • Given the prevalence of mobile social network services (SNS) such as Facebook and Kakaotalk, it has become important to understand user's continuance behavior in a mobile SNS environment. Although trust and privacy concerns play a key role in SNS users' decision-making processes, most studies on SNS have shed little light on the effects of trust and privacy concerns on SNS continuance intention. In this regard, this paper developed an integrated model to deeply understand the key antecedents of user's continuance intention to use mobile SNS by incorporating trust and privacy concerns into extended expectation-confirmation model. The proposed research model was tested by using survey data collected from 170 users who have experience with Kakaotalk. The findings of this study found that the proposed theoretical framework provides a statistically significant explanation of the variance in continuance intention of mobile SNS. The analysis results indicate that trust serves as the salient antecedent of continuance intention to use mobile SNS. However, it was found that privacy concerns negatively influence trust, whereas it is not significantly related to continuance intention of mobile SNS. The theoretical and practical implications of the findings were described.

  • PDF

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.