• Title/Summary/Keyword: Privacy policy

Search Result 407, Processing Time 0.028 seconds

Policy Based Privacy Technology in Web Environment (웹 환경에서 정책 기반 개인정보보호 기술)

  • No, Jong-Hyeok;Jin, Seung-Heon
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.4 s.106
    • /
    • pp.144-155
    • /
    • 2007
  • 본 논문에서는 웹 환경에서 개인정보를 안전하게 관리할 수 있는 기술을 소개한다. 프라이버시와 관련된 기술을 분류하고, 웹 환경에서 적용될 수 있는 정책 기반 프라이버시 기술인 P3P, EPAL, XACML을 설명한다. 또한 이 기술을 활용한 마이크로소프트 인터넷 익스플로러의 P3P 기능, AT&T의 웹 브라우저용 P3P 사용자 에이전트 privacy bird, 그리고 identity 관리 시스템 환경에서 XACML을 이용한 ETRI IDMS의 privacy controller에 대하여 자세히 기술한다. 그리고 상기 기술의 장단점을 비교하여 향후 해결해야 할 점을 고찰한다.

Influence of Privacy Concerns on Intention to Use Location-based Services Based on Privacy Calculus Perspective (프라이버시 계산 관점에서 위치기반서비스 이용의도에 대한 프라이버시 염려의 영향)

  • Kim, Jongki
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.265-272
    • /
    • 2017
  • As Location-based services on smartphone are getting more popular, users have more concern on exposing their location information. This study developed a research model to identify how smartphone users perceive on providing information pertaining to their location based on privacy calculus theory. 203 responses were analyzed with SmartPLS 2.0. The outcome of this research is quite interesting because conventional belief of privacy calculus perspective does not hold. The privacy calculus theory is based on assumption that human being is rational and decision to provide privacy information is determined by risk and benefit aspects. However, the result of this study is in accordance with behavioral economics perspective in which emotional judgment and behavioral judgement are affected by different factors.

A Study on the Possibility of Self-Correction in the Market for Protecting Internet Privacy (인터넷 개인정보보호의 시장자체해결가능성에 대한 연구)

  • Chung, Sukkyun
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.27-37
    • /
    • 2012
  • Internet privacy has become a significant issue in recent years in light of the sharp increase in internet-based social and economic activities. The technology which collects, processes and disseminates personal information is improving significantly and the demand for personal information is rising given its inherent value in regard to targeted marketing and customized services. The high value placed on personal information has turned it into a commodity with economic worth which can be transacted in the marketplace. Therefore, it is strongly required to approach the issue of privacy from economic perspective in addition to the prevailing approaches. This article analyzes the behaviors of consumers and firms in gathering personal information, and shielding it from unauthorized access, using a game theory framework in which players strive to do their best under the given conditions. The analysis shows that there exist no market forces which require all firms to respect consumer privacy, and that government intervention in the form of a nudging incentive for information sharing and/or strict regulation is necessary.

Efficient Secret Sharing Data Management Scheme for Privacy Protection in Smart Grid Environment (스마트 그리드 환경에서 개인정보 보호를 위한 효율적인 비밀분산 데이터 관리 방안)

  • Lee, Sung-Yong;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.311-318
    • /
    • 2013
  • It is very important to design security policy and technical framework on sensitive private data in order to protect user privacy in smart grid environment. This paper introduces secret data sharing schemes proposed for privacy protection in smart grid, and presents technical problems of them. The proposed scheme in this paper, reduces the number of rounds in sharing process and also in restoration process, and can select how many databases would be used, so eventually it shows enhancements in terms of efficiency and security.

Residents' Opinions on Apartment Living in Lahore, Pakistan

  • Fatima, Tehniyat;Bano, Shermeen;Hussain, Basharat;Zaidi, Rabiya;Shahzad, Asif
    • Asian Journal for Public Opinion Research
    • /
    • v.9 no.3
    • /
    • pp.266-292
    • /
    • 2021
  • Vertical growth is viewed as the solution to the problem of urban housing. The present study aims to be multifocal in approaching the phenomenon of apartment living in Lahore, Pakistan. The primary focus of the research was to evaluate the satisfaction with and favorability of vertical living among the dwellers; however, the research was extended to include the in-depth experiences of adolescents regarding privacy because it was observed that this age group was being neglected severely in the distribution of privacy in apartments, as well as in research. The data was first collected from 150 respondents through a survey, and then interviews of 10 adolescents were conducted to explore notion of privacy. The findings highlight that, despite being satisfied with the infrastructural aspects of the building, the residents do not prefer vertical living over horizontal housing. The adolescents in apartments also prefer horizontal housing over vertical living to avoid the feeling of crowdedness that is associated with vertical growth due to shared space and proximity. The utilization of spaces within apartments is associated with certain elements of development of the personality during this age. The findings of the present study can be helpful for sustainable vertical housing policy development and implementation.

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim;Jungyeon Sung;Daekil Kim;Dan J. Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.3
    • /
    • pp.156-175
    • /
    • 2017
  • The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.

The SME Informatization Level Analysis and Design for Privacy (개인정보보호를 고려한 중소기업 정보화 수준 분석 설계)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.121-126
    • /
    • 2015
  • SME informatization level analysis is significant as an indicator for analyzing the performance and competitiveness of enterprises. However, as has recently been highlighted, the importance of privacy recognized as infrastructure, and mindset are very important indicators for security and privacy. Therefore, In this study, analysis of SMEs at the informatization level, with a focus on how we can assess whether the privacy-related activities were carried out.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

Privacy Behavioral Intention in Online Environment: Based on Protection Motivation Theory (온라인 환경에서 프라이버시 행동의도에 미치는 영향 - 보호동기이론을 중심으로 -)

  • Kim, Jongki;Kim, Sanghee
    • Informatization Policy
    • /
    • v.20 no.3
    • /
    • pp.63-85
    • /
    • 2013
  • Drawing on Protection Motivation Theory(PMT), this study attempts to clarify antecedents that influence the intention to protect individuals' privacy on the Internet. Protection motivation forms through individuals' cognitive appeal involving threat and efficacy. Then protection motivation causes privacy behavioral change. Protection motivation factors are established privacy trust and privacy risk, which are related to privacy attitude and belief. This proposed model is empirically analyzed by utilizing structural equation analysis(SEM). According to the result of the empirical analysis, it is founded that almost paths have statistically significant explanatory power except path from efficacy to privacy risk and path from privacy trust to privacy behavioral intention. This study shows powerful evidence of antecedent factors based on protection motivation of individuals' privacy behavioral intention in online environment.

  • PDF

Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies (개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석)

  • Lee, Jae-Geun;Kang, Sang-Ug;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.767-779
    • /
    • 2013
  • A field of privacy protection lacks statistical information about the current status, compared to other fields. On top of that, since it has not been classified as a concrete separate field, the related survey is only conducted as a part of such concrete areas. Furthermore, this trend of being regarded as a part of fields such as informatization, information protection and law will continue in the near future. In this paper, a novel and practical way for collecting and storing a big amout of data from 110,000 privacy policies by data controller is proposed and the real analysis results is also shown. The proposed method can save time and cost compared with the traditional survey-based method while maintaining or even advancing the accuracy of results and speediness of process. The collected big personal data can be used to set up various kinds of statistical models and they will play an important role as a breakthrough of observing the present status of privacy information protection policy. The big data concept is incorporated into the privacy protection and we can observe the method and some results throughout the paper.