• Title/Summary/Keyword: Privacy Data

Search Result 1,309, Processing Time 0.033 seconds

An Impact Assessment Index for the RFID Privacy (RFID 개인정보 영향평가지수 개발)

  • Han, Pil-Koo;Kang, Byung-Goo
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.69-86
    • /
    • 2009
  • The biggest paradigm of the latest telecommunications is ubiquitous computing. It is a technology basis to realize ubiquitous society that would affect social, economical and cultural industries with positive influence. However, there is a simultaneous concern that the approach to ubiquitous society may violate one's privacy. Therefore, the existence of legal and technological regulation would be the biggest obstacle in further RFID technology and industry dissemination. Also, in business side, they must invest with enormous expense and technology if technological method is only approached for the solution. As in the research, 8 RFID applications, application process and inspection items and 85 appraisal list of "An impact assessment for the privacy protection in RFID applications" developed by P. K. Han(2006), will be used as an indicator to measure RFID privacy impact assessment. In addition, it is to develop RFID privacy impact assessment index by applying objective data with survey of applied specialists. This would provide a data with feasibility and reliability to RFID related companies and able to utilize policy making on RFID private data. In addition, it is expected to contribute as an efficiency tool for individual data to build basis of ubiquitous society.

A Study on the Protection for Personal Information in Private Security Provider's (경비업자의 개인정보보호에 관한 연구)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.99-108
    • /
    • 2011
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection / use of privacy data, processing of sensitive information / personal ID information, and encryption of privacy information); restrictions on installation / operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study. Possible solutions proposed by this study can be summed up as follows: By changing minds with sufficient legal reviews, it is required for security service providers to 1) clearly and further specify any purposes of collecting and using privacy information, if possible, 2) obtain any privacy information by legitimate means as it is necessary to collect such information, 3) stop providing any personal information for the 3rd parties or for any other purposes except fundamental purposes of using privacy information, and 4) have full knowledge about duty of safety measure in accordance with safe maintenance of privacy information and protect any personal information from unwanted or intentional leakage to others.

How Does Smart-device Literacy Shape Privacy Concerns: The Moderation of Privacy and the Mediation of Online Social Participation and Information Veracity (스마트기기 활용역량과 프라이버시 우려: 온라인 사회참여 활동과 정보 사실성 판단 능력의 매개효과 및 프라이버시의 조절효과)

  • Hyeon-jeong Kim;Beomsoo Kim
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.51-72
    • /
    • 2023
  • Digital literacy is vital knowledge and ability of an individual in the information society. As the level of digital literacy increases, the interest in privacy protection increases. This change may hinder the use of digital technologies and services. This research examines (1) the mediating effect of online social participation and information veracity on smart device literacy and privacy concerns, and (2) the moderating effect of privacy literacy. Using Korean media panel survey data reported in 2020 and in 2021, this study analyzes the responses of 7,737 people who use smart devices and participate in online activities. SPSS and PROCESS Macro are used to test the research model and hypotheses. In the analysis of 2020 and 2021 survey, this research shows that smart device literacy has major effects on privacy concerns; confirms that the mediating effect of online social participation; moderated meditating effect of privacy literacy. Although information veracity is not significant in 2020, mediating and moderated mediating effects are found in 2021.

Dummy Data Insert Scheme for Privacy Preserving Frequent Itemset Mining in Data Stream (데이터 스트림 빈발항목 마이닝의 프라이버시 보호를 위한 더미 데이터 삽입 기법)

  • Jung, Jay Yeol;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.383-393
    • /
    • 2013
  • Data stream mining is a technique to obtain the useful information by analyzing the data generated in real time. In data stream mining technology, frequent itemset mining is a method to find the frequent itemset while data is transmitting, and these itemsets are used for the purpose of pattern analyze and marketing in various fields. Existing techniques of finding frequent itemset mining are having problems when a malicious attacker sniffing the data, it reveals data provider's real-time information. These problems can be solved by using a method of inserting dummy data. By using this method, a attacker cannot distinguish the original data from the transmitting data. In this paper, we propose a method for privacy preserving frequent itemset mining by using the technique of inserting dummy data. In addition, the proposed method is effective in terms of calculation because it does not require encryption technology or other mathematical operations.

Moderating Effect of Security Ability on the Relation between Privacy Concern and Internet Activities

  • Hong, Jae-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.151-157
    • /
    • 2020
  • This study explored the moderating effects of security ability on the influence of privacy concerns on internet activity using Korea media panel survey data. To this end, we applied between-subjects factorial design between 2 (privacy concern high / low) × 2 (security ability high / low) groups and compared five types of internet activity among four groups by variance analysis. As a result, privacy concerns have a main effect on internet activity, and security ability have a moderating role in this relationship. Despite the privacy concerns, people do their internet activities in order to enjoy the benefit from the internet. This study have academic implication in that it focus on the issue of privacy paradox in terms of the type of internet activity. In addition, practical implications are that, in order to activate online activities of individuals in an internet-connected society, efforts for enhancing their security abilities are necessary.

Exploiting Friend's Username to De-anonymize Users across Heterogeneous Social Networking Sites (이종 소셜 네트워크 상에서 친구계정의 이름을 이용한 사용자 식별 기법)

  • Kim, Dongkyu;Park, Seog
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1110-1116
    • /
    • 2014
  • Nowadays, social networking sites (SNSs), such as Twitter, LinkedIn, and Tumblr, are coming into the forefront, due to the growth in the number of users. While users voluntarily provide their information in SNSs, privacy leakages resulting from the use of SNSs is becoming a problem owing to the evolution of large data processing techniques and the raising awareness of privacy. In order to solve this problem, the studies on protecting privacy on SNSs, based on graph and machine learning, have been conducted. However, examples of privacy leakages resulting from the advent of a new SNS are consistently being uncovered. In this paper, we propose a technique enabling a user to detect privacy leakages beforehand in the case where the service provider or third-party application developer threatens the SNS user's privacy maliciously.

Privacy Policy Analysis Techniques Using Deep Learning (딥러닝을 활용한 개인정보 처리방침 분석 기법 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.305-312
    • /
    • 2020
  • The Privacy Act stipulates that the privacy policy document, which is a privacy statement, should be disclosed in order to guarantee the rights of the information subjects, and the Fair Trade Commission considers the privacy policy as a condition and conducts an unfair review of the terms and conditions under the Terms and Conditions Control Act. However, the information subjects tend not to read personal information because it is complicated and difficult to understand. Simple and legible information processing policies will increase the probability of participating in online transactions, contributing to the increase in corporate sales and resolving the problem of information asymmetry between operators and information entities. In this study, complex personal information processing policies are analyzed using deep learning, and models are presented for acquiring simplified personal information processing policies that are highly readable by the information subjects. To present the model, the personal information processing policies of 258 domestic companies were established as data sets and analyzed using deep learning technology.

An Exploratory Study of Privacy Issues and Concerns in the Digital Convergence Environment (디지털 컨버전스 환경에서의 프라이버시 이슈와 프라이버시 침해 우려)

  • Bang, Young-Sok;Lee, Dong-Joo;Ahn, Jae-Hyeon
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.91-111
    • /
    • 2009
  • Collection and use of personal information have enabled firms to improve their value propositions by offering personalization. On the other hand, they have caused widespread concerns by consumers that their privacy is invaded. Because previously distributed personal information can be integrated and utilized to offer more personalized services, those concerns may be intensified with the progress of the digital convergence environment. In this study, factors for privacy invasion and their impact on the privacy concerns are suggested. Then, an empirical study is conducted to examine some of the suggestions. From the analysis, several results are derived. First, as more personal data are collected, secrecy and autonomy concerns increase exponentially rather than steadily. Second, as targeting accuracy is improved, greater secrecy and autonomy concerns are expressed by consumers, but less seclusion concerns. Finally, monetary reward such as coupons can reduce seclusion concerns when targeting accuracy is high. Based on the results, implications for managing consumer privacy concerns are provided under digital convergence environment.

Antecedents and Consequences of Privacy Concern on the Online-Shopping (온라인 쇼핑에서 프라이버시 염려의 원인변수와 결과변수)

  • Min, Byung-Kwon;Kim, Yi-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.25-37
    • /
    • 2006
  • The purpose of this study examines the interrelationships among antecedents and consequences of privacy concern on the online-shopping mall. Based on relevant literature review, a customer's attitude toward direct marketing, a customer's desire to information control, and a customer's prediction of negative effect as antecedents that affect the privacy concern. Also, consequences are a firm's reputation and a customer's purchase experience. Then related hypotheses were tested using data from 165 online shopping mall customer. The results for empirical analysis are as follows; 1) a customer's attitude toward direct marketing affected negatively the privacy concern, 2) a customer's desire to information control and a customer's prediction of negative effect affected positively the privacy concern, 3) a firm's reputation negatively related to the privacy concern, 4) a customer's purchase experience positively related to a firm's reputation.

  • PDF

Factors Affecting an Individual's Intention to Disclose Personal Health Information: From Privacy Calculus Perspective (개인의 건강정보 제공의도에 영향을 미치는 요인: 프라이버시 계산 관점에서)

  • Jeong, Euiseon;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.4
    • /
    • pp.877-898
    • /
    • 2018
  • Purpose: This study empirically examines the effect of Communication Privacy Management(CPM) factors and Privacy Calculus factors to the intention to disclose Personal Health Information(PHI) in the context of healthcare ecosystem. Also, it investigates the moderating effects of CPM factors in the relationship between privacy calculus variables and the intention to disclose PHI. Methods: We conducted scenario-based repeated-measures quasiexperiment and used total 364 samples for analysis. Confirmatory factor analysis and repeated-measure ANOVA were employed using SPSS 24.0. Results: All CPM factors, such as type of information, requesting purpose, and requesting stakeholder, directly influence to the intention to disclose PHI, whereas only the medium trust out of the Privacy Calculus factors has direct influence on the intention to disclose PHI. With regard to the moderating effects, the requesting stakeholder is the most influential and the information type is the least influential construct. Conclusion: The findings suggest that healthcare system should be designed to provide more definite and personalized benefits to customers to enhance social and individual benefits by getting more participation from customers. Also, it is desirable that the requesting stakeholder of PHI would be non-profit organizations such as hospital, government or public agencies to secure more willingness of PHI from people. Furthermore, it is implied that extensive information gathering and utilization, instead of excluding sensitive information or critical patients' records, is recommended which is substantial to invigorate the healthcare industry.