• Title/Summary/Keyword: Privacy Protection Model

Search Result 180, Processing Time 0.024 seconds

A Study on the Causal Relationship of Perceived Risks, Service Quality and Customer Satisfaction in Ubiquitous Environment by Using Spatial Information (유비쿼터스 환경에서 공간정보 활용에 따른 고객의 지각된 위험, 서비스 품질과 고객만족의 구조적 관계 연구)

  • Chung, Nam-Ho;Kim, Yong-Bum
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.04a
    • /
    • pp.373-385
    • /
    • 2007
  • The Location Based Services (LBS) comprise spatial information and mobile technology allow users to receive various services based on Global Positioning Systems (GPS). Although, spatial information based services are very useful, it has lots of possibility to damage privacy protection. But the contents of the legislation by government have problems conflicted between protection of a person's location information and invigoration LBS. Therefore, in this study suggest a causal model to deal with user satisfaction and factors affecting spatial information based services to customer perspective. The proposed research model is tested empirically with one hundred and forty one usable questionnaires and partial least square (PLS) method. Experimental results showed that the usefulness, playfulness, and service quality play a prominent role in influencing the spatial information services satisfaction compared to other factors. But, easy of use and perceived risk are not significant.

  • PDF

Application of TRA in u-health system focusing on moderating effect of health privacy information (유헬스 시스템에 대한 TRA의 적용에 관한 연구: 건강개인정보의 조절 효과를 중심으로)

  • Kim, Mincheol;Yang, Young-Bae;Ha, Tai-Hyun
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.537-543
    • /
    • 2016
  • The purpose of this study is to analyze the moderating effect of health privacy information on the relationship between the factors that affect the behavioral intention of the usage of u-health system have. Therefore, as a research hypothesis in TRA (Theory of Reasoned Action), self-efficacy and perceived usefulness will have a positive effect on the behavioral intention of the u-health system, and in the path, that personal information factors have an effect on each path. This study used the PLS-SEM methodology to verify the proposed research model. As a result of the analysis, this study showed that the moderating effect of health personal information in the presented model affects to some extent by the increase of R2 explanatory power. However, it was found that it was more consistent with the role of the independent variable rather than the moderating influence on the perceived usefulness.

RCBAC(Relationship-Content based Access Control) Model for User Privacy Protection of Digital Contents in Web 2.0 Environment (웹 2.0 환경에서 사용되는 디지털 컨텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Kim, Jeong-Dong;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.697-705
    • /
    • 2008
  • The recent web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the RCBAC(Relationship-Content based Access Control) Model which applies both the concepts of Relationship and Content Semantic to the existing access control methods to protect the user's own digital contents in web 2.0 environment. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to web contents.

  • PDF

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

A Study on the Intention to Use MyData Service based on Open Banking (오픈뱅킹 기반의 마이데이터 서비스 이용의도에 관한 연구)

  • Lee, Jongsub;Choi, Jaeseob;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.1-19
    • /
    • 2022
  • With the revision of the Credit Information Use and Protection Act in August 2020, the MyData service based on open banking policy will take effect in January 2022. Nonetheless, the previous studies focused on the legal system or security-related issues of such service. Therefore, this paper conducted an empirical study on financial consumers aged 20 or older nationwide to analyze the factors which influence the intention to use MyData services based on open banking. Five characteristics representing open banking-based MyData service were derived through prior research, and a research model that combined value-based adoption model and privacy calculus theory was presented. The proposed research model and the relationship of its variables was analyzed using a sample of 400 users that is randomly selected. The results of empirical analysis showed that personalization had the greatest influence on benefits and reliability on sacrifice among service characteristics. They also suggested that MyData operators should devote themselves to providing customized services optimized for customers and establishing trust relationships. It was confirmed that both usefulness and enjoyment had a great influence on perceived value, and in terms of sacrifice, the burden of financial costs had a greater influence than privacy concerns. This study is meaningful in that it explored the psychological propensity of financial consumers to identify service utilization factors and presented a new approach that can contribute to the successful settlement of the domestic MyData industry.

A Study on the Successful Adoption of IoT Services : Focused on iBeacon and Nearby (IoT 서비스의 성공적 수용에 관한 연구 : iBeacon과 Nearby를 중심으로)

  • Kim, Yonghee;Choi, Byeongmoo;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.217-236
    • /
    • 2015
  • The purpose of this study is to propose the effective location-based IoT service acceptance model by integrating ELM (Elaboration Likelihood Model) with UTAUT (Unified Theory of Acceptance and Use of Technology). The Partial Least Squares was used to analyze the causal relationships with respect to the effects of central route and peripheral route on acceptance intention. The results shows that central route has more significant impacts on perceived usefulness than peripheral route and CFIP (Concern for Information Privacy) weaken the relationship of acceptance intention and perceived usefulness. Our findings indicate some meaningful implications in the acceptance research of IOT services. First, we noted that the easy of use significantly affects the adoption of location-based IoT service. Furthermore, it is important to build the secured mechanism of privacy protection to adopt of location-based IoT service. Second, we tried to attempt the newly integrated approach to technical acceptance using UTAUT's variables and ELM by Petty and Cacioppo (1986). Finally this research empirically analyzed the adoption case of location-based IoT service which is not well-known yet within our country.

Tag Identification Process Model with Scalability for Protecting Privacy of RFID on the Computational Grid (Computational Grid 환경에서 RFID 프라이버시 보호를 위한 확장성 있는 태그 판별 처리 모델)

  • Shin, Myeong-Sook;Kim, Choong-Woon;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.245-248
    • /
    • 2008
  • 최근 RFID 시스템의 채택이 다양한 분야에서 빠르게 진행되고 있다. 그러나 RFID 시스템의 대중화를 위해서는 RFID 태그의 정보를 무단으로 획득함으로써 발생할 수 있는 프라이버시 침해 문제를 해결해야 한다. 이 문제를 해결하기 위해서 기존 연구들 중에서 가장 안전한 M. Ohkubo 등의 Hash-Chain 기법이 있다. 그러나 이 기법은 태그를 판별할 때 엄청난 태그 수의 증가로 인해 막대한 계산 능력을 요구하는 문제점이 있다. 따라서 본 논문에서는 프라이버시 보호를 유지하면서 태그판별시간 절감을 위해서 그리드 환경으로의 이식과 노드별로 m/k개의 SP를 분할하는 균등분할 알고리즘을 적용한 태그 판별 처리 모델을 제안한다. 제안 모델을 그리드 환경에서 동시에 수행할 수 있다면 이상적인 경우 태그를 판별하는 시간은 1/k로 감소한다.

  • PDF

Analysis of Authentication Systems for Future Internet Service Environments (미래 인터넷 서비스 환경을 위한 인증 시스템 분석)

  • Park, Seung-Chul
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.163-176
    • /
    • 2011
  • In the current Internet environment, there may exist a number of independently-operating authentication systems even within a single organization, according to the service types and service providing entities. Current silo-style isolated authentication system model has revealed critical problems in the aspects of usability, cost-effectiveness, extensibility and flexibility, and privacy protection. Recently, several next generation authentication systems have been actively developed by leading industrial and standardization institutions. This paper firstly analyzes the problems of current Internet authentication system environments. And then, the underlying idea, operating procedures, and pros and cons of the newly developed next generation authentication systems are analyzed so as to provide the selection guidelines for the new authentication systems and drive further development directions for future Internet authentication systems.

Analyses of Framework for Enhanced RFID Security and Privacy (개선된 RFID 보안 및 비밀성을 위한 프레임워크의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.885-888
    • /
    • 2009
  • Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this paper we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy model a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her/his control, authenticated requests, release tags, transfer them to new owners, and so on. In this paper, we analyses a new type of simple a framework for enhancing RFID security by means of a proxy, a personal device that assumes control of a user's tags.

  • PDF

The Necessity of the Protection of Privacy of the Middle School Textbook and the Learning Model (중학교 교과서의 개인정보보호의 필요성과 학습의 모형)

  • Jang, Hae-Sook;Lee, Jin-Kwan;Park, Ki-Hong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.401-402
    • /
    • 2011
  • 인터넷 및 전자상거래의 활용이 급속히 확산되면서 인터넷 서비스업체에 제공된 개인정보가 범죄에 사용되는 등 무분별한 개인정보 수집. 이용이 급증하고 있다. 이제 개인정보 침해 문제는 남의 이야기가 아닌 인터넷을 활용하는 우리 사용자 자신의 문제로 여기면서, 정보화 역기능에 대한 철저한 대응이 필요하다. 하지만 학교에서의 정보 보호 교육은 관련 개념을 익히는 정도에 그칠뿐 실생활에서 정보를 보호하기에는 미흡한 실정이다. 본 연구에서는 중학교에서의 개인 정보를 보호할 수 있는 원리학습의 모형을 제시하고자 한다.

  • PDF