• Title/Summary/Keyword: Protect privacy Information

Search Result 310, Processing Time 0.024 seconds

Differences in Privacy-Protective Behaviors by Internet Users in Korea and China (인터넷 사용자의 개인정보보호 행동의 차이에 관한 연구)

  • Zhang, Chao;Wan, Lili;Min, Dai-Hwan;Rim, Seong-Taek
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.93-107
    • /
    • 2012
  • Privacy-protective behavior can be classified into passive behavior and active behavior. Passive behavior includes refusal, misrepresentation, and removal, while word-of-mouth, complaint, and seeking for help belong to active behavior. Internet users in different countries may take different types of privacy-protective behavior because of cultural and social differences. This study analyzes the differences in Internet users' privacy-protective behavior between Korea and China. Korean Internet users take refusal, complaint, and seeking to protect their privacy information, while misrepresentation is not an option for Korean Internet users. Chinese Internet users take refusal, complaint, seeking, and misrepresentation to protect their privacy information. In Korea, passive behavior (refusal) is chosen more often than active behavior (complaint and seeking for help), while in China active behavior(complaint and seeking for help) is preferred to passive behavior (refusal and misrepresentation). The differences of privacy-protective behavior in the two countries may provide some implications for online companies, if they want to avoid the business risk due to privacy concerns and to take appropriate steps to deal with privacy-protective behavior by Internet users.

Neonatal Nurse's Professional Self-concept and Behavior to Protect Patient Privacy (신생아를 돌보는 간호사들의 전문직 자아개념 및 환자 프라이버시 보호행동)

  • Yu, Mi;Kim, Miok
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.18 no.4
    • /
    • pp.424-433
    • /
    • 2012
  • Purpose: With the rapid increase in information technology in the medical environment, protection of patient's privacy is a crucial issue to hospital nurses. The purpose of this study was to determine neonatal nurses' perception and performance of behavior to protect patient privacy, and professional self-concept, and to investigate the relationships among these variables. Methods: The participants in this descriptive correlation study were 182 nurses in nursery and neonatal intensive care units using EMR or OCS in November, 2011. Results: Perception and performance averaged 4.61 and 4.04 (out of 5) respectively, and the average score for professional self-concept was 2.73 (out of 4). There was a significant difference between perception and performance. The performance of behaviour to protect patient privacy had a positive correlation with perception and professional self-concept. Multiple regression analysis showed that the key determinants of performance were recognition of necessity of patient privacy education, professional self-concept and perception, and these explained 36% of the total variance of performance. Conclusion: Study results indicate a need to establish policy to protect privacy of neonates and their families, and to develop educational programs to enhance neonatal nurses' perception and performance.

Determinants of the Intention to Protect Personal Information among Facebook Users

  • Chon, Bum Soo;Lee, Jeong-Ki;Jeong, HyeonJu;Park, Jowon;Park, Jonghwa
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.146-155
    • /
    • 2018
  • This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability) had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

A REID privacy protect scheme based on mobile (모바일 기반의 RFID 프라이버시 보호 기법)

  • Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.89-96
    • /
    • 2007
  • Radio Frequency Identification system based on EPC(Electronic Product Code) Network Environment can read or write information of tagged objects, using Rf signals without direct contact. This advantage which is to provide storage ability and contactless property is better than Bar-code system. Mobile RFID system which integrates Mobile system with RFID system will provide new additional service to users. However, an advantage for obtaining information of objects using RF signal causes personal privacy problem. In this paper, we propose techniques that can protect personal privacy based on mobile. Our scheme provides privacy protection of users and is more efficiently than another application service.

Multi-group Information Management Techniques to efficiently Protect User Privacy in Heterogeneous Environments of 5G (5G의 이질적인 환경에서 사용자 프라이버시를 효율적으로 보호하기 위한 다중 그룹 정보 관리 기법)

  • Kim, Kyoum-Sun;Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.1-7
    • /
    • 2019
  • With the recent commercialization of the next generation of wireless 5G in everyday life, many changes have been made to organizations, industries and businesses of various sizes in various fields. However, although the improved speed and latency of 5G has improved, improvements in encryption, authentication and privacy are still required. In this paper, multiple groups of information management techniques are proposed to efficiently protect users' privacy in the heterogeneous environment of 5G. The proposed technique aims to allow distributed management of users' privacy links by clouding the privacy information generated by different heterogeneous devices to efficiently interface with different groups. Suggestion techniques process user-specific privacy information independently in a virtual space so that users can periodically synchronize their privacy information.

The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users (개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로)

  • Lee, Eun Suk;Lee, Zoon Ky;Cha, Kyung Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.135-150
    • /
    • 2016
  • As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.

Standard Implementation for Privacy Framework and Privacy Reference Architecture for Protecting Personally Identifiable Information

  • Shin, Yong-Nyuo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.3
    • /
    • pp.197-203
    • /
    • 2011
  • Personal Identifiable Information (PII) is considered information that identifies or can be used to identify, contact, or locate a person to whom such information pertains or that is or might be linked to a natural person directly or indirectly. In order to recognize such data processed within information and communication technologies such as PII, it should be determined at which stage the information identifies, or can be associated with, an individual. For this, there has been ongoing research for privacy protection mechanism to protect PII, which now becomes one of hot issues in the International Standard as privacy framework and privacy reference architecture. Data processing flow models should be developed as an integral component of privacy risk assessments. Such diagrams are also the basis for categorizing PII. The data processing flow may not only show areas where the PII has a certain level of sensitivity or importance and, as a consequence, requires the implementation of stronger safeguarding measures. This paper propose a standard format for satisfying the ISO/IEC 29100 "Privacy Framework" and shows an implementation example for privacy reference architecture implementing privacy controls for the processing of PII in information and communication technology.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF