• Title/Summary/Keyword: Privacy policy

Search Result 408, Processing Time 0.031 seconds

World Without Boundaries and Trends in User Authentication Technology (경계없는 세상과 사용자 인증기술 동향)

  • Jin, S.H.;Cho, J.M.;Cho, S.R.;Cho, Y.S.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.4
    • /
    • pp.135-144
    • /
    • 2021
  • The field of user authentication in Korea has experienced new dimensions since December 2020. Accredited certificate, which had been in use for 21 years since 1999, has been abolished. Accredited certificates have provided a trust foundation for various ICT-based industrial developments; however, new changes in the authentication sector are also required due to changes in the service and policy environment. Changes in the service environment occur rapidly because of the emergence of new technologies such as AI, IoT, Bio, Blockchain, and the daily use of non-face-to-face environments caused by COVID-19. Even with changes in the service environment, user authentication remains an essential foundation for providing services. This paper summarizes the current status of user authentication techniques, analyzes major changes in the service environment (such as Metaverse) associated with user authentication, and presents the direction of authentication techniques (Decentralized, Invisible, Privacy-preserving) through the derived implications.

Analysis of the Facebook Profiles for Korean Users: Description and Determinants (페이스북 이용자의 개인정보 공개와 결정 요인)

  • Lee, Mina;Lee, Seungah;Choi, Inhye
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.73-85
    • /
    • 2014
  • This study analyzed the profile of a Facebook account to examine how personal information is revealed and what kinds of factors influence personal information revelation. Categories of user's profile on Facebook were analyzed and two dimensions were developed; the degree that how much personal information is revealed and the network limits that personal information is accessed. Main variables to determine personal information revelation are Facebook privacy concern and uses for social relationships along with gender, the duration of Facebook use, and average time of use. Data were collected from college students. Factor analysis produced two factors of Facebook privacy concern, Facebook privacy concern with users and Facebook privacy concern with the Facebook system. Regression analyses were performed to identify significant determinants of the degree of information revelation and the network limits of personal information. The results found out that the degree of personal information revelation is explained by gender, the duration of use, and use for social relationships while the network limit is explained by the duration of use and Facebook privacy concern with users. Worthy of notice is that use for social relationships and Facebook privacy concern with the Facebook system offset each other. The implications of the results are discussed. Additionally and finally the categories of profiles are graphically re-grouped to show how personal information revelation is associated with social relationship generation and maintenance.

Influences Information Privacy Concerns and Personal Innovation of Smartphone-based Shopping Mall on Usefulness, Ease-of-Use and Satisfaction (스마트폰 기반 쇼핑몰에 대한 정보프라이버시 염려와 개인적 혁신성이 유용성과 사용편이성 및 만족에 미치는 영향)

  • Shin, Mi-Hyang
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.197-209
    • /
    • 2014
  • This study analyzed information privacy concerns and personal innovation influences effects of perceived usefulness, ease-of-use and satisfaction for a smartphone-based shopping mall, using technology acceptance model. For empirical analysis, the structural equation modeling analysis method was used. The results are as follows. First, information privacy concern is the usefulness of smartphone-based shopping mall has significantly negative, but did not affect the ease of use. Second, personal innovation is the usefulness and ease of use smartphone-based shopping mall have significant positive effect. Third, ease of use smartphone-based shopping mall is usefulness and satisfaction have significant positive influence. Finally, the usefulness of use of the shopping mall based smartphone significant satisfaction in positively influencing.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

A study on the professional ethical relationship between librarian and library work (도서관 업무와 전문사서간의 윤리적 관계에 관한 이론적 고찰)

  • 손연옥
    • Journal of Korean Library and Information Science Society
    • /
    • v.24
    • /
    • pp.485-517
    • /
    • 1996
  • The purpose of this study is to investigate typical ethical problems found in the technical and public services areas. The followings are the summary of the study. There are three distinct elements that govern ethical problems. One element is legal laws. The copyright law and the privacy act are exact examples. The copyright law has strong influence on the inter library loan service where the majority requests from the users are reproduction of copies. The privacy act also creates difficulties for librarians. Most requests for circulation records infringe on the privacy of library user. And advance online access systems also violates the privacy of library users. The second element is the code or rules that private organization has created. American Library Association created many statements that regulate the conduct of librarians. The bill of right, the professional code of ethics and policy on the confidentiality of library records have strong implications in the obligation of librarian. In the case of censorship at the selection of library materials, the code is a defensive tool against intellectual freedom. Yet self-censoring are prevailing practice among librarians. The thirds element is the competence of librarians. The analyzed table 3 showed that beside two elements, the rest of matters are competence required by librarians. The one aspect of it is humaneness and the other one is technical aspects. Technical aspect of competence are:(l) managerial and operational ability (2) communication skill (3) leadership (4) structure of knowledge and (5) self developing professionalism. Humanity aspect of competence are:(l) trust(fiduciary relationship) gained by diligence, objective judgement, ability, belief, rationality, integrity, kindness) (2) objectiveness (free from bias) (3) user-oriented consideration (need, interest, equal treatment, information gap) (4) caution in providing information (5) pride and (6) ability to distinguish advice and guidance specially in medical and law library.

  • PDF

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

The effects of multiphasic components of home environment on life satisfaction (다면적 주거환경 구성요소가 삶의 만족에 미치는 영향)

  • Hong, Sun-Gwan
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.419-425
    • /
    • 2016
  • This paper was to explore the effects of multiphasic components of home environment on life satisfaction. This survey was conducted from September, 2015 to November, 2015 and 298 responses from the survey were used for the analysis. The data was analyzed by descriptive statistics, t-test, ANOVA, pearson correlation and Multiple Regression. The research findings could be summarized as the followings. First, each of the elements of home environment was generally recognized as average level. while, the mean score of privacy was higher than average. Second, privacy, economics, high income and good health were the significant predictors to explain life satisfaction. In conclusion, privacy and economics among the multiphasic components of home environment were major variables that affect life satisfaction.

Trend and Improvement for Privacy Protection of Future Internet (미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선)

  • Kim, DaeYoub
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.405-413
    • /
    • 2016
  • To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users' privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

Tackling Privacy Paradox : Protecting Right to Self-determination of Personal Information by Estimating the Economic Value of Personal Information and Visualizing the Price

  • Lim, Sejoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.244-259
    • /
    • 2021
  • The economic value of personal information has its importance as an objective measure of valuation in commercial, legal, and policy areas. Until recently, however, personal information subjects have not properly recognized the economic value of personal information, which has led to the inability to exercise the right to self-determination of personal information by unconsciously agreeing to the terms and conditions of personal information service without recognizing the value of personal information provided to the service provider when subscribing to a specific service. Therefore, we will examine the methodologies for calculating the economic value of personal information and the practical guarantee of the right to self-determination of personal information and analyze the economic value of personal information through a survey. Also, we would like to propose various ways for the subject of personal information with limited cognitive resources to visually accept the economic value of personal information required by the terms and conditions and suggest the optimal visualization of personal information economic value to exercise the right to self-determination of personal information. To do so, in this paper, we have conducted two survey experiments to estimate the economic value of personal information. Based on the price of personal information by category retrieved from surveys, we have visualized the price of personal information in various forms and asked respondents to choose the optimal infographic that best represents the value of personal information visually. As a result, we have proposed an optimal usage of the infographic to 'nudge' information subjects about their right to self-determination of personal information, therefore opening the possibility of diminishing privacy paradox.