• Title/Summary/Keyword: Privacy Needs

Search Result 183, Processing Time 0.024 seconds

Pre-school Children′s Privacy Needs in the Residential Space (주거공간 내에서의 유아의 프라이버시 욕구)

  • Lee, In-Soo
    • Journal of the Korean housing association
    • /
    • v.15 no.5
    • /
    • pp.1-11
    • /
    • 2004
  • This study has been performed to review pre-school children's needs for privacy within normal residential space. In this study, there were three circumstances in which children need to stay alone without being interrupted by their parents; First, they strongly want to be stay quiet until relieving their anger or fear, shortly after disciplined and impugned by their parents. Second, infant children need to obtain their own territory in order to demonstrate ownership and dignity in their sley space. Third, there are also special circumstances of privacy needs among families with intrusive parents such as alcoholics and heavy smokers, or for the children of disability. In Korea, it is presumed that more than 60 percent the pre-school children aging three to six are in deficit of privacy for relieving their emotional disturbance, but no research has been documented for the case of disabled or interrupted children. Therefore in this study, it was primarily proposed that empirical studies need to be peformed among Korean preschoolers, in order to evaluate privacy needs in the perspectives of ordinary family lives, individual household behaviors, and special conditions of disability or offensive family members.

Testing an Irrational Model of Information Privacy Based on Competence Needs Satisfaction

  • Kim, Gimun;Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.241-248
    • /
    • 2018
  • Recently, there have been calls for approaching from the irrationality point of view to better explain the privacy paradox phenomenon. This study is a kind of response to them. The aim of the study is to investigate how satisfying competence needs, one of basic psychological needs suggested in self-determination theory, affects irrational information disclosure decision (i.e., risk-benefit assessment). To do this, the study builds an irrationality-based model in which competence needs satisfaction affects both perceived risks negatively and perceived benefits (i.e., relationship building and maintenance), which in turn determine a level of self-disclosure. Based on the data from Facebook users which is collected by a large sample survey (N=1050), the study analyzes it using Mplus, a powerful structure equation modeling tool. The study results reveal that while the relationship between competence needs satisfaction and perceived relationship building and maintenance is statistically significant, the relationship between competence needs satisfaction and perceived risks insignificant. These findings imply that people who is in a high level of competence needs satisfaction is more likely to respond to some opportunities for social benefits and in turn disclose more information about self.

Unified Modeling for RFID Privacy to Enhance Security Issues (보안성 문제를 개선하기 위한 RFID 보안성에 대한 모델링 기법)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.899-900
    • /
    • 2012
  • RFID technology can help automatically and remotely identify objects, which raises many security concerns. We review and categorize several RFID security and privacy solutions, and conclude that the most promising and low-cost approach currently attracts little academic attention. We therefore concluded that, from a privacy perspective, the user scheme is an important strategy for meeting the consumer's needs. Furthermore, we call for the privacy research community to put more effort into this line of thinking about RFID privacy.

  • PDF

A Framework and Process Design for RFID Privacy Protection (RFID 프라이버시 보호 프레임웍 및 프로세스 설계에 관한 연구)

  • Kim, Jin-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.3
    • /
    • pp.151-168
    • /
    • 2007
  • RFID is an emerging technology and rapidly applied to various industries due to its high-tech characteristic and convenience. Although RFID provides valuable benefits. it might also generate serious privacy problems. Previous studies show that privacy issues should be incorporated in developing RFID systems and more detailed privacy protection methods. However. they just provide basic concept, rough guideline. and simple architecture about RFID privacy protection. Industry needs more structured framework and detailed systematic process to incorporate privacy issues into the RFID system. The purpose of this paper is to develop a framework and detailed process design of RFID privacy protection issues in retail industries. A framework is developed based on individual sensitivity concept, RFID contents, and interface with EPC global standard. Case study is applied to validate the framework and it turns out to be useful. It is expected that the proposed framework and process design would provide more systematic guide lines to solving RFID privacy problems.

  • PDF

Exploring the Impact of Interaction Privacy Controls on Self-disclosure

  • Gimun, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.171-178
    • /
    • 2023
  • As the risk of privacy invasion due to self-disclosure increases in SNS environment, many studies have tried to discover the influencing factors of self-disclosure. This study is an extension of this research stream and pays attention to the role of interaction privacy controls(friend list and privacy settings) as a new influencing factor. Specifically, the study theorizes and test the logic that the ability to effectively control interactions between individuals using IPC(called IPC usefulness) satisfies the three psychological needs(autonomy, relationship, and competency needs) suggested by the Self-Determination Theory, and in turn increase the amount of self-disclosure. As a result of data analysis, it was found that IPC usefulness has a very strong influence on the satisfaction of psychological needs and is a major factor in increasing the degree of self-disclosure by users. Based on these findings, the study discusses the theoretical and practical implications as well as future research directions.

The Environmental Privacy on the Perspective of Integration and Segregation of Spatial Areas in Facilities for the Elderly (노인시설 내 공간영역의 통합과 분리측면에서 본 환경적 프라이버시)

  • Lee, Min-Ah
    • Journal of the Korean housing association
    • /
    • v.25 no.2
    • /
    • pp.89-98
    • /
    • 2014
  • The purpose of this study was to analyze the environmental privacy on the perspective of integration and segregation of spatial areas in facilities for the elderly, through investigating required environmental privacy at each hierarchical space, the contextual situation and counterplan for the privacy. For the study, a content analysis for 35 foreign academic journal articles published from 1990 to August of 2013 was conducted. The results of the study were as follows: First, four hierarchical spaces had somewhat integrated characteristics as being required various types of privacy beyond the original features of each space. Especially semi-public and public spaces were needed the privacy similar to in private or semi-private areas. Second, the contextual situation for the privacy was mainly from undesirable access and psychological pressure of other residents, staff and etc. to the residents' personal space, stuff, and behaviors. The other was from no space (no sitting) or no equipments for privacy. Third, the counterplan for privacy was categorized as improvements of physical environments and making defensible space or keeping physical distance of the elderly. It is suggested that welfare of the aged act in Korea about the room capacity for the elderly facilities needs to be reconsidered for the privacy in their individual rooms and the privacy in semi-public and public area must be considered to make the behavior scope of the elderly extended.

A Privacy-aware Graph-based Access Control System for the Healthcare Domain

  • Tian, Yuan;Song, Biao;Hassan, M.Mehedi.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2708-2730
    • /
    • 2012
  • The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing approaches, we found that there is an urgent need for a flexible, privacy-aware system that is able to meet the privacy preservation needs at both the role levels and the personal levels. We proposed a conceptual system that considered these two requirements: a graph-based, access control model to safeguard patient privacy. We present a case study of the healthcare field in this paper. While our model was tested in the field of healthcare, it is generic and can be adapted to use in other fields. The proof-of-concept demos were also provided with the aim of valuating the efficacy of our system. In the end, based on the hospital scenarios, we present the experimental results to demonstrate the performance of our system, and we also compared those results to existing privacy-aware systems. As a result, we ensured a high quality of medical care service by preserving patient privacy.

A Moderating Effect of Use of Interaction Privacy Controls on the Relationship between Privacy Concerns and Self-disclosure

  • Kim, Gimun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.235-241
    • /
    • 2020
  • Many studies have tried to explain the privacy paradox but reported conflicting results; Some of them found connection between privacy concerns and information disclosure, while others did not. This study examines the role of interaction privacy controls (mainly friend lists and privacy settings) as a moderating variable that has the potential to affect the relationship in the SNS context. The reason for this is that most users use interactive privacy controls to create their own social environment before conducting SNS activities, so the relationship between privacy concerns and information disclosure may vary depending on the degree of use of interactive privacy controls. The study collected data using survey method, analyzed the moderating effect of use of interaction privacy controls using hierarchical multiple regression analysis, and as a result, found that effect. Therefore, the degree of use of interactive privacy controls may be an important contingent variable that needs to be considered in a study examining the privacy paradox in SNS context.

Study on Digital Investigation Model for Privacy Acts in Korea (개인정보보호법 기반 디지털 포렌식 수사 모델 연구)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1212-1219
    • /
    • 2011
  • As recently Privacy Acts in Korea enforced in domestic companies' personal information management needs of a growing obligation for the safety measures and the right of personal information collection, use, limitations, management, and destroyed specifically for handling personal information. Such this regulations should be required technical and policy supports. Accordingly, for the enterprise incident has occurred, the personal information management system behave correctly operating to verify that the safety measures taken, and be determined by the specific preparation to be done. So the first, preparation phase corresponds to the upcoming digital forensic investigation model. On the other hand, the response team also carried these measures out correctly, it needs to be done to check the compliance of Privacy Act. Thus a digital forensics investigation model is strictly related with the implementation of the Privacy Acts and improve the coping strategies are needed. In this paper, we suggest a digital forensic investigation model corresponding to Privacy Act.

Privacy Framework in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경내 개인정보보호 프레임워크 적용 방안)

  • Hong Seng-Phil;Lee Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.157-164
    • /
    • 2006
  • Information is playing a key role in sufficing the needs of individual members of the society in today's rapidly changing environment. Especially, the cases of illegal gathering of privacy information will increase and the leakage of privacy information will grow as the individual activities in the ubiquitous computing environment. In this paper, we suggested the privacy framework in order to make design and implementation of secure and effective privacy management system. Ant we also introduced the methodology which is represent to 5 specific stages in order to suggest to the privacy system development guideline from the standpoints of the privacy system operator or developer. Especially, we tried to determine whether the suggested methodology can be effectively used in the real computing environment or not by making necessary investments in management (privacy policy) and technical (system architecture) sides. We believe that the privacy framework and methodology introduced in this research can be utilized to suggest new approach for showing direction from the privacy protection perspective, which is becoming more important in ubiquitous environments, and practical application rather than providing conceptual explanation from the views of engineer or developer.