• 제목/요약/키워드: Privacy Concern

검색결과 172건 처리시간 0.032초

TSSEM을 이용한 정보 프라이버시 메타분석 (Meta-Analysis of Information Privacy Using TSSEM)

  • 김종기
    • 디지털융복합연구
    • /
    • 제17권11호
    • /
    • pp.149-156
    • /
    • 2019
  • 정보기술의 활용이 보편화되면서 대중과 연구자 모두 정보 프라이버시 문제에 대한 관심이 높아지고 있다. 이러한 문제에 대한 연구가 기하급수적으로 증가하면서 연구결과에 대한 전반적인 이해가 어려워졌다. 이에 따라 과거연구에 대한 체계적인 검토가 요구된다. 본 연구는 정보 프라이버시 연구에 핵심적인 네 가지 연구개념을 두 가지 연구모형으로 설정하고 기존 연구에서 수집된 데이터를 이용하여 실증 분석하였다. TSSEM이라는 정량적 메타분석 기법이 적용되었는데, 이 기법은 MASEM의 한 가지로서 구조방정식모형과 메타분석 기법을 통합하여 분석하는 기능을 제공한다. 분석결과는 위험 중심적 모형이 염려 중심적 모형과 비교하여 보다 높은 모형 적합도를 나타내었다. 본 연구의 결과는 전통적인 염려 중심적 모형의 설명력에 의문을 제시하며, 사용자의 프라이버시 정보 제공의도를 설명하기 위하여 위험 중심적 모형을 고려할 필요가 있다는 점을 시사한다.

Strategic Approach to Privacy Calculus of Wearable Device User Regarding Information Disclosure and Continuance Intention

  • Cho, Ji Yeon;Ko, Daesun;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권7호
    • /
    • pp.3356-3374
    • /
    • 2018
  • The healthcare and fitness wearable-device market is considered as the driving force of the entire wearable device market. However, there are concerns with respect to information privacy because wearable devices constantly collect sensitive data such as individuals' health information. Thus, there is a need for a comprehensive understanding from the perspective of information privacy concerns and related behavior. This study investigates factors considered in the privacy calculus of wearable fitness devices, and verifies differences obtained by the privacy calculus process according to the frequency of exercise. The results obtained from a survey of 248 undergraduate students in Korea revealed that service providers should consider users' interests and exercise characteristics in order to mitigate their privacy concerns and encourage continuous use of wearable devices. This study provides useful insights pertaining to users of wearable fitness devices, and targets researchers and practitioners.

위치기반서비스에서 구매의도에 영향을 미치는 요인: 프라이버시-신뢰-행동의도 모형을 중심으로 (Effect of Purchase Intention of Location-Based Services: Focused on Privacy-Trust-Behavioral Intention Model)

  • 장성희
    • 한국컴퓨터정보학회논문지
    • /
    • 제19권10호
    • /
    • pp.175-184
    • /
    • 2014
  • 본 연구의 목적은 위치기반서비스에서 구매의도에 영향을 미치는 요인을 프라이버시-신뢰-행동의도 모형을 이용하여 분석하는 것이다. 연구의 목적을 달성하기 위해 위치기반서비스, 프라이버시-신뢰-행동의도 모형, 프라이버시 염려의 측정모형(CFIP)에 대한 이론적 배경을 바탕으로 연구모형과 가설을 설정하였다. 본 연구의 조사기간은 2014년 1월 21부터 3월 20일까지이며, 위치기반서비스 이용자들을 대상으로 설문지를 배포하였다. 설문지는 231개가 회수되었고, 이 중 불성실하게 응답한 21개를 제외한 210개의 설문지를 분석에 이용하였다. 분석결과, 첫째, 위치인지는 프라이버시 염려에 정(+)의 영향을 미치는 것으로 나타났다. 둘째, 프라이버시 염려는 신뢰에 부(-)의 영향을 미치는 것으로 나타났으며, 마지막으로, 신뢰는 구매의도에 정(+)의 영향을 미치는 것으로 나타났다. 본 연구의 결과는 위치기반서비스에서 프라이버시 염려 및 구매의도에 관한 다양한 시사점을 제공할 것이다.

대화형 에이전트의 설명 기능과 프라이버시 염려 수준에 따른 사용자 경험 차이에 관한 연구 (A Study on the User Experience according to the Existence of Explanation Facilities and Individuals Privacy Concern Level)

  • 강찬영;최기은;강현민
    • 한국콘텐츠학회논문지
    • /
    • 제20권2호
    • /
    • pp.203-214
    • /
    • 2020
  • 오늘날 스마트 스피커는 점차 개인화되어 사용자들을 위해 특정 제품을 추천하는 추천 에이전트의 역할을 하고 있다. 본 연구의 목적은 스마트 스피커의 대화형 에이전트 맥락에서 '설명 기능'이 투명성, 인지된 신뢰, 사용자 만족도, 재사용 행동 의도, 프라이버시 위협, 추천 품질에 미치는 영향을 살펴보는 것이다. 또한 개인의 프라이버시 염려 수준이 평가에 영향을 미치는지 알아보기 위해 염려 수준을 사용자 구분을 위한 척도로 활용하였다. 연구결과, 설명이 있는 조건이 없는 조건 보다 모든 측정 변인에서 높게 평가되었음을 확인하였고, 프라이버시 염려 수준이 인지된 신뢰, 프라이버시 위협에 미치는 정적인 영향을 확인하였다. 본 연구는 스마트 스피커 맥락에서 설명 기능이 적용될 수 있다는 시사점과 프라이버시 역설 현상을 발견하였으며, 프라이버시 염려 수준에 따른 인지부조화의 가능성을 제시하였다.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

스마트폰 위치기반서비스에서 정보제공의도 : 프라이버시 계산 관점을 중심으로 (Intention to Disclose Personal Information in LBS : Based on Privacy Calculus Perspective)

  • 김종기;김상희
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제21권4호
    • /
    • pp.55-79
    • /
    • 2012
  • LBS(Location-Based Service) is one of the smartphone application services which has been receiving great attention recently. Various applications of smartphone use LBS to provide innovative services. However, use of LBS raises privacy concerns because the location information of users is constantly exposed. Privacy calculus perspective attempts to understand the characteristics of the user's privacy. It is based on the risk-benefit analysis in the economics' perspective. That is, when the benefit expected through personal information disclosure is higher than risk, we are willing to provide personal information. This research suggested a research model based on the privacy calculus perspective to clarify the effect of information disclosure intention of smartphone LBS application users. Based on the main factors of privacy calculus, perception of privacy risk and privacy benefit, the relationship of the perceived value and the information disclosure intention was empirically analyzed by utilizing structural equation modeling(SEM) methodology. According to the results of the empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between privacy concern and information disclosure intention. This study showed a strong evidence of antecedent factors based on privacy calculus of personal information disclosure in smartphone LBS applications.

인터넷 사용자의 개인정보보호 행동의 차이에 관한 연구 (Differences in Privacy-Protective Behaviors by Internet Users in Korea and China)

  • 장초;만리리;민대환;임성택
    • 한국IT서비스학회지
    • /
    • 제11권1호
    • /
    • pp.93-107
    • /
    • 2012
  • Privacy-protective behavior can be classified into passive behavior and active behavior. Passive behavior includes refusal, misrepresentation, and removal, while word-of-mouth, complaint, and seeking for help belong to active behavior. Internet users in different countries may take different types of privacy-protective behavior because of cultural and social differences. This study analyzes the differences in Internet users' privacy-protective behavior between Korea and China. Korean Internet users take refusal, complaint, and seeking to protect their privacy information, while misrepresentation is not an option for Korean Internet users. Chinese Internet users take refusal, complaint, seeking, and misrepresentation to protect their privacy information. In Korea, passive behavior (refusal) is chosen more often than active behavior (complaint and seeking for help), while in China active behavior(complaint and seeking for help) is preferred to passive behavior (refusal and misrepresentation). The differences of privacy-protective behavior in the two countries may provide some implications for online companies, if they want to avoid the business risk due to privacy concerns and to take appropriate steps to deal with privacy-protective behavior by Internet users.

Factors Influencing Use of Social Commerce: An Empirical Study from Indonesia

  • RAHMAN, Arief;FAUZIA, Refika Nurliani;PAMUNGKAS, Sigit
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권12호
    • /
    • pp.711-720
    • /
    • 2020
  • This research aims to analyze the factors affecting the acceptance of social commerce, including performance expectancy, effort expectancy, social support, facilitating conditions, hedonic motivation, habitability, price saving orientation, and privacy concerns using the Unified Theory of Acceptance and Use of Technology (UTAUT2). UTAUT2 has been examined and modified in various contexts. The research model studies the acceptance and use of technology in the context of customers. This study adopts a quantitative method using the partial least squares regression (PLS) approach involving 244 respondents. The respondents are users of social commerce in Indonesia. The result of this research indicates that social influence, facilitating conditions, hedonic motivation, habit, price value orientation, and privacy concerns have a significant effect on behavioral intention. On the other hand, performance expectancy and effort expectancy does not affect behavioral intention. Furthermore, price value has a significant effect on social commerce user behavior. Lastly, facilitating conditions and habits does not affect social commerce user behavior. This research contributes to the development of theory by examining an additional variable, which is privacy concern. This study is significant since social media and social commerce have grown exponentially nowadays. Implications of the results for the development of the theory (UTAUT2) and practice are discussed in the article.

전자정부서비스에 대한 개인정보제공의 영향요인 (Factors Influencing the Provision of Personal Information in Electronic Government Services)

  • 박정애;손달호
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제26권1호
    • /
    • pp.53-73
    • /
    • 2017
  • Frequent outbreak of intrusion of private information is occurring recently not only at portal sites but also in electronic information service of public agencies. Due to these intrusions, it is observed that the citizens tend to avoid providing their private information even to the service for public agencies. Therefore, the object of this research can be explained as demonstrating the influence of the intention of provision for private information to foster the selectronic information ervice of the public agencies. In order to achieve this, this research intends to demonstrate how the experience of the intrusion of the private information affects the concern about the privacy and how the information factor from the public electronic information service has influence on the reliability toward the public. The results showed that the experience of intrusion of privacy, awareness of the danger of privacy, and the sense protection of the information from the manager at public agencies have direct influence on the concern of privacy. Meanwhile, it has been verified that the awareness of information protection of a manager, the systemicity of information protection, and the surveillance and punishment of information protection have influence on the reliability of public agencies.

A Privacy-aware Graph-based Access Control System for the Healthcare Domain

  • Tian, Yuan;Song, Biao;Hassan, M.Mehedi.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권10호
    • /
    • pp.2708-2730
    • /
    • 2012
  • The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing approaches, we found that there is an urgent need for a flexible, privacy-aware system that is able to meet the privacy preservation needs at both the role levels and the personal levels. We proposed a conceptual system that considered these two requirements: a graph-based, access control model to safeguard patient privacy. We present a case study of the healthcare field in this paper. While our model was tested in the field of healthcare, it is generic and can be adapted to use in other fields. The proof-of-concept demos were also provided with the aim of valuating the efficacy of our system. In the end, based on the hospital scenarios, we present the experimental results to demonstrate the performance of our system, and we also compared those results to existing privacy-aware systems. As a result, we ensured a high quality of medical care service by preserving patient privacy.