• Title/Summary/Keyword: Privacy Cognition

Search Result 13, Processing Time 0.026 seconds

A Comparative Study of the Effects of Consumer Innovativeness, Self-esteem, and Need for Cognition on Online Activity before and after COVID-19

  • Myung Gwan Lee;Sang Hyeok Park;Seung Hee Oh
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.5
    • /
    • pp.121-139
    • /
    • 2023
  • This study tried to identify factors affecting online activity before and after the COVID-19 pandemic. To this end, the effects of consumer innovativeness, self-esteem, and need for cognition on the activity of online media such as Internet and social media were investigated, and whether privacy concerns had a moderating effect. For this study, survey data from 2019(before the outbreak of COVID-19) to 2021(after the outbreak of COVID-19) of the 'Korea Media Panel Survey' surveyed by the Korea Information Society Development Institute was used for analysis. The research results that affect Internet activity are as follows. Before the outback of COVID-19, it was found that hedonic innovativeness and social innovativeness had a positive effect and cognitive innovativeness had a negative effect on increasing Internet activity. There was no moderating effect on privacy concerns. The period after the outbreak of COVID-19, need for cognition was found to have a positive effect on increasing social media activity. In addition, the moderating effect of privacy concerns was found in the relationship between need for cognition and Internet activity. There was no privacy concern effect before the outbreak of COVID-19, and the privacy concern effect appeared on functional innovation and need for cognition after the outbreak of COVID-19. This study aims to present various implications for companies to understand the characteristics of online consumers using the Internet and social media after the pandemic.

Privacy ; Concept and Estimation Model in Outdoor Space Design (외부공간 설계에 있어 "프라이버시" 개념의 응용 및 측정"모델"의 개발에 관한 연구)

  • 엄붕훈
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.23 no.1
    • /
    • pp.95-109
    • /
    • 1995
  • All human spatial behavior and psychological stress are affected by the 'Privacy'of each space. This Paper deals with the theoretical review of 'privacy'concept and establishment of 'Privacy Model' that can be a useful design tool. 'Privacy Index(Pl)' model of 10 point scale, which is based on 'Hierarchic system of Privacy' in urban spaces by Chermeyeff and Alexander(1963), was established as a hypothetical model in this study. And'Activity Suitability', based on each hierarchy of primacy level, was investigated at each site to construct the validity of 'Privacy Model'. Total 67 sites were investigated by on.-site questionnaire in 3 types of outdoor spaces, (Park), (Campus), and (Garden) respectively. The major results are as follows; 1. The P7rivacy level of earth spaces, distributed from to in and . and (Groun Private> spaces are dominant In , spaces are dondnant 2, Privacy level, based on , showed higher privacy level than that of . This means the criteria of each privacy level should be modified for more specific space. The . could be derived from the (Activity Suitability) of each space. 3.The cognition of privacy level. by user group, showed no significant difference in dach group by sex, age, education, and job, respectively.

  • PDF

Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing

  • Bai, Yanan;Feng, Yong;Wu, Wenyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4345-4363
    • /
    • 2021
  • Deep Learning as a Service (DLaaS), utilizing the cloud-based deep neural network models to provide customer prediction services, has been widely deployed on mobile cloud computing (MCC). Such services raise privacy concerns since customers need to send private data to untrusted service providers. In this paper, we devote ourselves to building an efficient protocol to classify users' images using the convolutional neural network (CNN) model trained and held by the server, while keeping both parties' data secure. Most previous solutions commonly employ homomorphic encryption schemes based on Ring Learning with Errors (RLWE) hardness or two-party secure computation protocols to achieve it. However, they have limitations on large communication overheads and costs in MCC. To address this issue, we present LeHE4SCNN, a scalable privacy-preserving and communication-efficient framework for CNN-based DLaaS. Firstly, we design a novel low-expansion rate homomorphic encryption scheme with packing and unpacking methods (LeHE). It supports fast homomorphic operations such as vector-matrix multiplication and addition. Then we propose a secure prediction framework for CNN. It employs the LeHE scheme to compute linear layers while exploiting the data shuffling technique to perform non-linear operations. Finally, we implement and evaluate LeHE4SCNN with various CNN models on a real-world dataset. Experimental results demonstrate the effectiveness and superiority of the LeHE4SCNN framework in terms of response time, usage cost, and communication overhead compared to the state-of-the-art methods in the mobile cloud computing environment.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users (개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로)

  • Lee, Eun Suk;Lee, Zoon Ky;Cha, Kyung Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.135-150
    • /
    • 2016
  • As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.

An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection (SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구)

  • Lim, Jung-Ho;Kwon, Sun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.681-694
    • /
    • 2018
  • This paper studied the effects of risk cognition of personal information and self-expression information on conation of privacy protection. In the first study, 88 college students who volunteered for this research were surveyed about risk cognition of personal information and conation to protect it. In the second study, after an information-seeking expert collected and organized the self-expression information that 88 volunteers had expressed on SNS, and then showed the organized self-expression information to 88 volunteers, and then 88 volunteers were surveyed about risk cognition of self-expression information and conation to protect it. As results of the first data analysis, the risk cognition of personal information had the greatest influence on non-disclosure of personal information, followed by reduction of the disclosure scope and law institutionalization requirement. As results of the second data analysis, SNS users openly expressed their opinion or life-style, but when they realized that self-expression information can be accumulated and become sensitive information, they had conation to protect their self-expression information such as non-disclosure, reduction of disclosure scope, and law institutionalization requirement. The implication of this study is that we have overcome the limitations of existing researches that can not explain information protection behavior on SNS.

An Investigation of a Role of Affective factors in Users' Coping with Privacy Risk from Location-based Services (위치기반 서비스(Location-based Service)의 프라이버시 위험 대응에 있어 사용자 감정(Affect)의 역할)

  • Park, Jonghwa;Jung, Yoonhyuk
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.201-213
    • /
    • 2020
  • Despite empirical research that the response to human risk is significantly influenced affective factors, the role of affective factors has been unexplored in information privacy research. This study aims to explore the privacy behaviors of location-based service (LBS) users from an affective point of view. Specifically, the study explored the relationship between three types of privacy threats (collection, hacking, secondary use), two affects (worry, anger), and a coping behavior (continuous use intentions). The structured survey was conducted with 552 users. In order to analyze the effect of the combination of perception of particular privacy threats and particular affects on the intention of continuous use, association rules, one of the data mining techniques, was employed. As a result, there was a difference in the intention to use according to the combination of the perception of risk and affect responses, and the most significant influence on the intention is when the second use of personal information was combined with anger. This study has significant theoretical contribution in that it includes affective factors in the research of information privacy users, complementing the biases of existing cognition-oriented approaches and providing a comprehensive understanding of privacy response behavior.

The Effects of Characteristics of User and System on the Perceived Cognition and the Continuous Use Intention of Fintech (핀테크(fintech) 사용자와 시스템 특성이 지각된 인식과 지속사용의도에 미치는 영향)

  • Lee, Jun-Sang;Park, Jun-Hong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.291-301
    • /
    • 2018
  • The purpose of this study is to investigate the factors that affect the perceived awareness and the intention of continuous use by FinTech users and system characteristics. Data collection was carried out by targeting and surveying 600 people living in Gwangju, and office workers using smartphones. As a result, first, self-efficacy, innovation, and fitness for Fin-Tech services were found to influence the degree of perceptual awareness and intent to use of Fin-tech service users. Second, the system characteristics have a positive effect on perceived awareness and intention of using FinTech service. Third, the hypothesis about the dangers in the user attributes and system properties were dismissed. It seems that the priority concern was regarding the leakage of personal information and security as privacy and the increasing damage cases of financial fraud by electronic financial transactions spill. Therefore, in order to spread FinTech services, it would be effective if a Fin-Tech service strategy could eliminate inconveniences such as the risk of hindering convenience and intention to use by the marketing strategy established by the company.

The Experience of Nursing Staff on the Dementia Patients′ Aggressive Behavior (간호제공자들의 치매노인 공격행동 경험에 대한 연구)

  • 오진주
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.2
    • /
    • pp.293-306
    • /
    • 2000
  • Providing care to the dementia elderly with behavioral problem is a major issue in nursing homes today. This study was aimed to explore the nursing staffs′ response to aggressive dementia patients, and the effect that the aggressive behavior had on Nsgstaff. The interviews used a semi-structured questionnaire are were carried out from May to July, 1999. The subjects were 23 nursing personnel working in the nursing homes for dementia elderly. The result are as follows; 1. The types of aggressive behavior cited by the subjects was "physical", "linguistic", and "sexual". 2. The factors that caused the behavior were "symptoms of disease", "under- conditioning", "context of nursing care", "unsatisfied need", "relationship to other patients", "change of outer environment", and "invasion of one′s own privacy". 3. The response of the subjects were "unhappiness", "stress", "anger", "exaggeration", "anxiety", and "fear". 4. The management strategies listed by nursing personnel used to alleviate aggressive behavior were "ignorance" "patience" "leaving the area" "soothing sounds" "verbal punishment" "restriction and isolation" and "various management skill appliance" "adaptation". 5. The effect that aggressive behavior and were "disturbance of relationship to elderly" "decline in the amount and quality of nursing care" "interruption of task performance" "job exhaustion" "desire to leave the job" "physical impact" "stress on the cognition of others" "anxiety about health and one own future" "interference to family life′. The findings of this study will be useful in understanding the difficulties of nursing personnel when confronting the aggressive behavior of dementia partients. It also is useful as basic data in preparing efficient intervention program for these difficulties.

  • PDF

Territory and Boundary of Residential Space in House Vision Exhibition (일본 하우스비전 전시에 나타난 주거 공간의 영역과 경계)

  • Lee, Kyung-Jin;Kim, Kyung-Jin
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.5
    • /
    • pp.3-10
    • /
    • 2019
  • This study is purposed to analyze of House Vision exhibition and projects in Japan. The contemporary residence has been planned and designed with fixed territory and boundary of rooms. According to the symposium of House Vision, the spatial boundary can be studied in the aspect of territory that molds the experience of residents. So, this study reviews Aldo van Eyck's concept of 'in-between'. Through the analysis, House Vision exhibition is revealed that the housing models present architectural characteristics of middleware and third place. The cognition of internal and external boundary stems from movements and activities of residents. That is the dwelling and residential space determined by users and residents. In this regard, 'in-between' of House Vision has structures(multilayer) causing various relationships to be perceived, so as to connect with the dwelling and activities of residents. As a result, it has relational meanings of sharing, as well as makes possible other community life to be done. According to the projects of House Vision, the units and cores have created the new connections and relationships between privacy and publicity. In conclusion, this research shows a new direction of the spatial strategies on House Vision exhibition in Japan.