• Title/Summary/Keyword: Privacy policy

Search Result 407, Processing Time 0.031 seconds

Privacy Framework in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경내 개인정보보호 프레임워크 적용 방안)

  • Hong Seng-Phil;Lee Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.157-164
    • /
    • 2006
  • Information is playing a key role in sufficing the needs of individual members of the society in today's rapidly changing environment. Especially, the cases of illegal gathering of privacy information will increase and the leakage of privacy information will grow as the individual activities in the ubiquitous computing environment. In this paper, we suggested the privacy framework in order to make design and implementation of secure and effective privacy management system. Ant we also introduced the methodology which is represent to 5 specific stages in order to suggest to the privacy system development guideline from the standpoints of the privacy system operator or developer. Especially, we tried to determine whether the suggested methodology can be effectively used in the real computing environment or not by making necessary investments in management (privacy policy) and technical (system architecture) sides. We believe that the privacy framework and methodology introduced in this research can be utilized to suggest new approach for showing direction from the privacy protection perspective, which is becoming more important in ubiquitous environments, and practical application rather than providing conceptual explanation from the views of engineer or developer.

Information Privacy Concerns and Trust in SNS

  • Kim, Yujin;Lee, Hyung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.223-233
    • /
    • 2022
  • In this paper, we examined the causes of information privacy concerns, trust and related factors in social network services. On the basis of the 'elaboration likelihood model,' we established factors such as information quality, privacy policy, perceived SNS app popularity and optimism bias affecting information privacy concern of SNS users. In addition, we analyzed the relationship between information privacy concern, trust in SNS members, trust in SNS platform and intention to use. Finally, on the basis of the 'trust transfer theory', we analyzed the relationship between trust in SNS members and trust in SNS platform. The results of the study showed that (1) information quality, privacy policy and optimism bias had the significant effects on information privacy concerns, (2) perceived SNS app popularity didn't affect information privacy concerns, (3) information privacy concerns had the significant effects on trust in SNS platforms (4) in accordance with the trust transfer theory, trust in SNS members had the significant effect on trust in SNS platforms, and (5) trust in SNS members had the significant effect on intention to use, while trust in SNS platform didn't have the significant effect on intention to use. The findings of the study are expected to help to improve the SNS firms' understanding towards customers' information privacy protection behaviors and trust.

Protecting Children's Online Privacy : Privacy Issues and Its Implications (아동 이용자에게 특화된 온라인 개인정보보호 이슈 : 사례연구를 중심으로)

  • Rha, Jong-Youn;Cho, EunSun;Lee, SeungEun
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.23-31
    • /
    • 2020
  • As children's participation in online activities has recently increased, online services for children are also rapidly increasing, but children are not sufficiently guaranteed their rights. The purpose of this study is to classify and analyze issues related to the children's online privacy issues in Korea through the current status and case studies of application services mainly used by children. For this purpose, this research analyzed problems related to the children's online privacy protection according to the stage of using the application. As a result of the application content analysis, 1) issues of child identification, 2) effectiveness of notice and consent, and 3) issues of children's rights as subjects of information were derived. Based on the current status analysis, the policy implications were drawn based on the children's online privacy protection in the online environment, and suggestions were made for improvement.

A Study on the Development Plan of Smart City in Korea

  • KIM, Sun-Ju
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.6
    • /
    • pp.17-26
    • /
    • 2022
  • Purpose: This study analyzes advanced cases of overseas smart cities and examines policy implications related to the creation of smart cities in Korea. Research design, data, and methodology: Analysis standards were established through the analysis of best practices. Analysis criteria include Technology, Privacy, Security, and Governance. Results: In terms of technology, U-City construction experience and communication infrastructure are strengths. Korea's ICT technology is inferior to major countries. On the other hand, mobile communication, IoT, Internet, and public data are at the highest level. The privacy section created six principles: legality, purpose limitation, transparency, safety, control, and accountability. Security issues enable urban crime, disaster and catastrophe prediction and security through the establishment of an integrated platform. Governance issues are handled by the Smart Special Committee, which serves as policy advisory to the central government for legal system, standardization, and external cooperation in the district. Conclusions: Private technology improvement and participation are necessary for privacy and urban security. Citizens should participate in smart city governance.

An Extended Role-based Access Control Model with Privacy Enforcement (프라이버시 보호를 갖는 확장된 역할기반 접근제어 모델)

  • 박종화;김동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1076-1085
    • /
    • 2004
  • Privacy enforcement has been one of the most important problems in IT area. Privacy protection can be achieved by enforcing privacy policies within an organization's data processing systems. Traditional security models are more or less inappropriate for enforcing basic privacy requirements, such as privacy binding. This paper proposes an extended role-based access control (RBAC) model for enforcing privacy policies within an organization. For providing privacy protection and context based access control, this model combines RBAC, Domain-Type Enforcement, and privacy policies Privacy policies are to assign privacy levels to user roles according to their tasks and to assign data privacy levels to data according to consented consumer privacy preferences recorded as data usage policies. For application of this model, small hospital model is considered.

A Study on Transborder Data Flow of Personal Information: Policy Suggestion based on EU's Approach (국경간 개인정보 이전 규제에 대한 개선방안 연구: EU사례를 중심으로)

  • Lee, Sang-Hyuk;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1013-1023
    • /
    • 2016
  • Transborder data flow(TBDF) of personal information in Korea has been limited by current Privacy law which request data subject to give consent. As the IT industry is growing at an incredible rate, there is a need to review the existing law to cope with growing industrial demand and increasing numbers of international data transfer. The transfer of personal data overseas not only allow businesses providing IT services including finance, internet, e-commerce to thrive, but also impact every aspect of our lives which are increasingly depended on these technology. Transmitting personal data across borders raises serious questions of privacy protection and restriction of business operation. In ordrer to promote interoperability of personal data in international environment, a considerable amount of research and debate needs to be taken before implementing a sound policy. This paper presents a need for a sound TBDF policy in Korea by examine the main policy challenges associated with TBDF. Finally, the paper identify policy suggestions based on European Union's approach as they have successfully implemented TBDF policy that balanced data privacy and economic agenda.

A Study on Consumer Personal Information in Information Society (정보사회에서의 소비자 개인정보보호에 관한 연구)

  • 남수정;김기옥
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.10
    • /
    • pp.55-66
    • /
    • 1999
  • The purpose of this study is to propose consumer policy related to the protection of personal information on the basis of regulations and laws in the developed countries. From this study, implications for the protection consumer privacy are discussed as follows. First, Consumer education is needed to enhance consumers'knowledge on their privacy right and this should be done not only by private consumer organization but also by businesses. Second, Businesses should realize ethical responsibilities of consumers'privacy right when they use personal information by databasemarketing. Finally, Government should establish a privacy law concerning both public and private sectors.

  • PDF

A Study on the Privacy Concern of e-commerce Users: Focused on Information Boundary Theory (전자상거래 이용자의 프라이버시 염려에 관한 연구 : 정보경계이론을 중심으로)

  • Kim, Jong-Ki;Oh, Da-Woon
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.43-62
    • /
    • 2017
  • Purpose This study provided empirical support for the model that explain the formation of privacy concerns in the perspective of Information Boundary Theory. This study investigated an integrated model suggesting that privacy concerns are formed by the individual's disposition to value privacy, privacy awareness, awareness of privacy policy, and government legislation. The Information Boundary Theory suggests that the boundaries of information space dependends on the individual's personal characteristics and environmental factors of e-commerce. When receiving a request for personal information from e-commerce websites, an individual assesses the risk depending on the risk-control assessment, the perception of intrusion give rise to privacy concerns. Design/methodology/approach This study empirically tested the hypotheses with the data collected in a survey that included the items measuring the constructs in the model. The survey was aimed at university students. and a causal modeling statistical technique(PLS) is used for data analysis in this research. Findings The results of the survey indicated significant relationships among environmental factors of e-commerce websites, individual's personal privacy characteristics and privacy concerns. Both individual's awareness of institutional privacy assurance on e-commerce and the privacy characteristics affect the risk-control assessment towards information disclosure, which becomes an essential components of privacy concerns.

On the Double-Sidedness of Facebook Users: The Desire to Hide vs. Peeping Voyeurism (Facebook 사용자들의 양면성에 대하여 - 감추고 싶은 욕구와 타인을 훔쳐보는 관음증적 욕구)

  • Lee, Eunji;Li, Hyung-Chul O.;Kim, ShinWoo
    • Journal of the HCI Society of Korea
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2014
  • Use of smart phones and other means allowed ready access to social networking service (SNS) and its users have explosively increased. In the meantime, Facebook which has the largest user community has caused various social problems due to its conservative privacy policy; yet its users are continuously increasing and committed to the service although its privacy policy has not so much changed. In this research, we studied the irony of increasing popularity of Facebook despite its negative privacy policy in the light of its users' double-sided desire. That is, users use Facebook because they are curious about other users' personal information and activities although they are at the same time anxious about public exposure of their own personal information and activities. To test this conjecture, we investigated users' double-sided desire (privacy protection, viewing others' activities) using questionnaire and reverse scenario test and confirmed that proper balance of privacy protection and activity exposure is an important contributor to continued popularity of Facebook. Much research studied SNS focusing on self-presentation that is on the side of self-exposure. This research highlights the importance of balance keeping between hide-and-seek for SNS companies such as Facebook in the use of privacy policy.