• Title/Summary/Keyword: Privacy Data

Search Result 1,309, Processing Time 0.033 seconds

The role of corporate image and privacy concerns in adopting online travel services

  • Tapanainen, Tommi;Nguyen, Thi Thanh Hai;Dao, Kien Trung
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.1-23
    • /
    • 2019
  • Purpose This study examines the role of corporate image and privacy concerns in intention to use of online travel services using data from Vietnam. Design/methodology/approach The data collection was implemented to a student sample at the Foreign Trade University in Hanoi, which has a high concentration of young people who are interested in online travel in Vietnam. The paper based questionnaire was directly delivered to the respondents. After sorting to eliminate unfit samples, the number of responses was 541, which exceeds 500, the minimum number typically required. To test the hypotheses, we applied structural equation modeling (SEM) and Confirmatory Factor Analysis (CFA) was used to evaluate the reliability and validity of constructs in the model. We also used direct, indirect and total effect coefficient to evaluate the total impact of factors on the intention to use online services. Findings This study found that corporate image is positively associated to intention to use online services. It found a link between corporate image and privacy concerns, which suggests another way for firms to address their customers' privacy concerns; corporate image, which has received great attention in traditional offline sales channels, but not in online services, should receive higher attention in IS research. Online travel businesses, besides increasing ease of use, perceived usefulness and trust in their services, should focus on build a reliable corporate image, which can not only promote the service use but also help to eliminate users' the privacy concerns.

Moderating Effect of Internet Activity on Privacy Attitude and Expectations of the fourth Industrial Revolution

  • Park, Seungbae;Hong, Jaewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.253-258
    • /
    • 2021
  • In this study, we explored consumers' the privacy attitudes and Internet activities on the expectations of the fourth industrial revolution. Furthermore, we examined the moderating effect of Internet activities between the privacy attitudes and the expectations of the fourth industrial revolution. Research data are 2018 Korea media panel survey provided by Korea Information Society Development Institute. As a result, concerns about privacy were negative on the expectations of the fourth industrial revolution. Consumer's internet activities had a positive effect on the expectations of the fourth industrial revolution. Concerns about privacy have a negative effect on the expectations of the fourth industrial revolution, but active internet activities have mitigated it or turned it into a positive. This study will contribute as basic data for more active responses in the economic structure facing the 4th industrial revolution.

Implementation of Privacy Protection Policy Language and Module For Social Network Services (소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현)

  • Kim, Ji-Hye;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • An SNS(Social Network Service) enables people to form a social network on online as in the real world. With the rising popularity of the service, side effects of SNSs were issued. Therefore we propose and implement a policy-based privacy protection module and access control policy language for ensuring the right of control of personal information and sharing data among SNSs. The policy language for protecting privacy is based on an attribute-based access control model which grants an access to personal information based on a user's attributes. The policy language and the privacy protection module proposed to give the right of control of personal information to the owner, they can be adopted to other application domains in which privacy protection is needed as well as secure sharing data among SNSs.

A study on the application of PbD considering the GDPR principle (GDPR원칙을 고려한 PbD 적용 방안에 관한 연구)

  • Youngcheon Yoo;Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.109-118
    • /
    • 2022
  • Countries around the world have recognized the importance of personal information protection and have discussed protecting the rights of data subjects in various forms such as laws, regulations, and guidelines. PbD (Privacy by Design) is one of the concepts that are commonly emphasized as a precautionary measure for the protection of personal information, and it is starting to attract attention as an essential element for protecting the privacy of information subjects. However, the concept of PbD to prioritize individual privacy in system development or service operation in advance is still only at the declarative level, so there is relatively little discussion on specific methods to implement it. Therefore, this study discusses which principles and rights should be prioritized to implement PbD based on the basic principles of GDPR and the rights of data subjects. This study is meaningful in that it suggests a plan for the practical implementation of PbD by presenting the privacy considerations that should be prioritized when developing systems or services in the domestic environment.

Analysis of the relationship between nursing students' Internet ethics awareness, self-control, nursing professional intuition, and patient privacy protection awareness (간호대학생의 인터넷 윤리의식, 자기통제력, 간호전문직관 및 환자개인정보 보호인식간의 관계분석)

  • Oe Nam Kim;Jae Woo Oh;Jung Hoe Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.693-701
    • /
    • 2024
  • This study examined the relationship between internet ethics, self-control, nursing professionalism, and patient privacy awareness among nursing students with clinical practice experience, and attempted to provide basic data for the development of patient privacy awareness improvement programs reflecting the flow of information age. The data collection period was from November 20 to December 15, 2023. The questionnaires of 142 nursing students who agreed to participate in this study and were enrolled in D and C universities in Daejeon Metropolitan City and Cheongju City were analyzed. The results showed that nursing professionalism and self-control were the influential factors on nursing students' perception of patient privacy. The explanatory power of these variables was 24%. In conclusion, in order to improve the patient privacy awareness of nursing students, it is necessary to explore ways to promote the ethical awareness of internets and develop educational programs to increase nursing professionalism.

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

Assessment for Efficiency of Two-Stage Randomized Response Technique

  • Park, Kyung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.7 no.2
    • /
    • pp.427-433
    • /
    • 2000
  • In this paper, we review several two-stage randomized response techniques for gathering self-report data when persons are asked sensitive question. Also efficiencies and privacy protections based on the two-stage randomized response procedures are compared. Finally, we find optimal parameter conditions.

  • PDF

The Protection of Privacy and the Restriction of Its Commercial Use in Telecommunications (통신산업에서 개인정보의 보호와 영업적 이용의 한계)

  • Hong, Myung-Su
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.303-335
    • /
    • 2011
  • The rapid changes in telecommunications have exercised an important influence on the telecommunications law system, including the protection of the privacy. It was a decisive assignment that telecommunications law protected the confidentiality of privacy. But in new digitalized telecommunications circumstance, every steps of the conveyance of the individual informations should be protected, in particular by telecommunications carriers as a subject of the protection of information. EU Privacy Directive in 2003 and the amendment of Communications Act in U. S. A. in 1996 have reflected the necessity of the privacy from a new point of view. In Korea, "Protection of Privacy Act" has been established as general law as to the protection of privacy and "Electronic Communications Net-work Act" and "Location Data Act" have been functioned as special law in telecommunications, and these laws have developed the legal systems about the protection of privacy in telecommunications. Such a legal system could be affirmatively evaluated. But the regulations should be reformed in a way that corresponds to the detailed types of the privacy and it should be devised a method, that the consent of users could be fulfilled practically.

Secure Data Sharing in The Cloud Through Enhanced RSA

  • Islam abdalla mohamed;Loay F. Hussein;Anis Ben Aissa;Tarak kallel
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.89-95
    • /
    • 2023
  • Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema.

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.