• Title/Summary/Keyword: digital privacy

Search Result 370, Processing Time 0.021 seconds

Effects of Omni-channel Service Characteristics on Utilitarian/Hedonic Shopping Value and Reuse Intention (옴니채널 서비스 특성이 실용적·쾌락적 쇼핑가치 지각과 재이용의도에 미치는 영향)

  • Shin, Jong-Kuk;Oh, Mi-Ok
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.183-191
    • /
    • 2017
  • This study tries to explain the relationships among omni-channel service characteristics, utilitarian/hedonic shopping value, and reuse intention. We derive instant connectivity, localization, consistency, integration, privacy risk as omni-channel service characteristics from previous studies and collect data from 190 omni-channel service users. The major findings are as follows. First, localization, consistency, and privacy risk have a significant effect on utilitarian shopping value but no significant effect on hedonic shopping value. Second, instant connectivity and integration have a positive effect on both utilitarian and hedonic value. Third, utilitarian and hedonic shopping value have a positive effect on reuse intention. This study extends the scope of omni-channel consumer behaviors by focusing on multi-dimensionality of shopping value. The results of this research can provide useful implications for practitioners to build successful strategies on omni-channel service.

A Study for Electronic Surveillance (REID, CCTV, Electronic Resident Card) in Augmented Reality Environment (증강현실 환경 하에서 전자감시(REID, 감시카메라, 전자주민카드)에 관한 소고)

  • Kang, Jang-Mook;Jung, Jo-Nam;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.75-82
    • /
    • 2006
  • Ubiquitous Computing is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous Computing. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the information revolution that Cyber Space saw a prime while world wide web service was expanded was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous Computing revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. This paper checks the present situation of currently proceeding Ubiquitous computing technology(RFID, CCTV) in augmented reality environment. Also, The main purpose of this paper is to analyze the concepts analysis of privacy, personal information, and electronic surveillance in augmented reality environment. Thus this paper treated the analysis of case, technological issue, problem and solution and so on.

  • PDF

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

Policies of Broadcasting and Telecommunication In Smart Media Convergence Age: Focus on the Policy Paradigm and Public Relations Strategies for Dynamic Quality of Life (스마트미디어융합시대 방송통신정책: 삶의 질을 위한 정책 패러다임과 정책 PR을 중심으로)

  • Park, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.99-111
    • /
    • 2011
  • Nowadays, the rapid progress and worldwide use of smart-media(SNS) has resulted in coming of the smart media convergence age. In practice, however, the effectiveness of smart media convergence society is limited by the difficulties of using it, which include accessibility, waiting for loading, clutter, old information, privacy risks, expensive communication, etc. The conquest of these difficulties must be policy target of broadcasting and telecommunication for high quality of communication life. From this perspective, this paper proposes a new policy of broadcasting and telecommunication based on the dynamic quality of life for the smart media convergence society. This smart convergence policy will not promote only the development and production of smart media contents but also its stable supply and it will secure the accessibility and privacy. In conclusion, this paper reveals that the components of quality of life are important elements of broadcasting and communication policies which will eventually lead to the popular use of smart media and enhance its quality.

The suggestion of new big data platform for the strengthening of privacy and enabled of big data (개인정보 보안강화 및 빅데이터 활성화를 위한 새로운 빅데이터 플랫폼 제시)

  • Song, Min-Gu
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.155-164
    • /
    • 2016
  • In this paper, we investigate and analyze big data platform published at home and abroad. The results had a problem with personal information security on each platform. In particular, there was a vulnerability in the encryption of personal information stored in big data representative of HBase NoSQL DB that is commonly used for big data platform. However, data encryption and decryption cause the system load. In this paper, we propose a method of encryption with HBase, encryption and decryption systems, and methods for applying the personal information management system (PMIS) for each step of the way and big data platform to reduce the load on the network to communicate. And we propose a new big data platform that reflects this. Therefore, the proposed Big Data platform will greatly contribute to the activation of Big Data used to obtain personal information security and system performance efficiency.

How Consumers Perceive Online Behavioral Advertising: Consumer Typology and Determining Factors (온라인 맞춤형 광고 인식에 따른 소비자유형 연구: 효용과 비용을 중심으로)

  • Lee, Jin-Myong;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.105-114
    • /
    • 2015
  • This study aims 1) to identify distinctive consumer groups according to their perception of benefits and costs of Online Behavioral Advertising(OBA), 2) to explore differences among them, and 3) to investigate antecedent variables that affect the consumers' perception of OBA. Online survey data collected from 1,000 online users. The findings of this study are as follows. First, the result of cluster analysis identified four distinctive consumer groups according to the levels of perceived benefits and costs of OBA: 'Indifferent group', 'cost-centered group', 'benefit-centered group', and 'Benefit-cost balanced group'. Second, four consumer groups showed differences in their demographics, advertising related variables, privacy related variables, and technology related variables. Third, according to multinomial logistic analysis, it was found that there were different factors affecting consumers' perception of benefits and costs of OBA.

The Role of Perceived Value on the Continuance Intention in Mobile Social Network Service (모바일 SNS 지속 사용의도에 있어 지각된 가치의 역할)

  • Kim, Ji Yoon;Chu, Kyounghee
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.211-222
    • /
    • 2014
  • This study investigates the antecedents of continuance intention of mobile SNS. In addition, it also explores the mediating role of perceived value in the relationship between the antecedent and continuance intention. This study posits that a social influence, perceived usefulness, privacy concern, and a perceived effort of use are major factors to influence continuance intention of SNS. By using a PLS analysis, this finding suggests that consumers' perception of the value of SNS which is previously overlooked, is a primary determinant of continuance intention, and the other exploratory factors are mediated through perceived value in cognitive aspect. This research aims to examine consumer's SNS continuance intention in terms of consumer's perspective, not just from the technology user perspective. Therefore, this research provides a useful guideline for marketing managers on how to manage Mobile SNS properly.

Internet ID Management System based on ID Federation: e-IDMS (ID 연계 기반의 인터넷 ID Management System: e-IDMS)

  • Cho Yeong-Sub;Jin Seung-Hun;Moon Phil-Joo;Chung Kyo-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.104-114
    • /
    • 2006
  • In order to use an Internet service, it is a general procedure that user subscribes to the service and then registers her or his id(identifier). As Internet has been more widely used, however, user has more and more ids than ever before. In this environments, whenever user uses an Internet service, she or he must authenticate to the service provider, which makes her or him inconvenient. As user's data is scattered and unmanaged on various web sites, user privacy has been revealed more often. This paper specifies e-IDMS which ETRI has been developing to solve such problems. e-IDMS is an Internet ID(IDentity) management system based on ID Federation Mechanism e-IDMS provides ID Federation-based facilities such as composite authentication, Internet SSG, ID information management, privacy protection and interactive query. e-IDMS is used in establishing integrated ill management system for public institutions.

Exploring Information Ethics Issues based on Text Mining using Big Data from Web of Science (Web of Science 빅데이터를 활용한 텍스트 마이닝 기반의 정보윤리 이슈 탐색)

  • Kim, Han Sung
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.3
    • /
    • pp.67-78
    • /
    • 2019
  • The purpose of this study is to explore information ethics issues based on academic big data from Web of Science (WoS) and to provide implications for information ethics education in informatics subject. To this end, 318 published papers from WoS related to information ethics were text mined. Specifically, this paper analyzed the frequency of key-words(TF, DF, TF-IDF), information ethics issues using topic modeling, and frequency of appearances by year for each issue. This paper used 'tm', 'topicmodel' package of R for text mining. The main results are as follows. First, this paper confirmed that the words 'digital', 'student', 'software', and 'privacy' were the main key-words through TF-IDF. Second, the topic modeling analysis showed 8 issues such as 'Professional value', 'Cyber-bullying', 'AI and Social Impact' et al., and the proportion of 'Professional value' and 'Cyber-bullying' was relatively high. This study discussed the implications for information ethics education in Korea based on the results of this analysis.

The Brainwave Analyzer of Server System Applied Security Functions (보안기능을 강화한 뇌파 분석 서버시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon;Kim, Gui-jung
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.343-349
    • /
    • 2018
  • Electroencephalograph(EEG) information, which is an important data of brain science, reflects various levels of information from the molecular level to the behavior and cognitive stages, and the explosively amplified information is provided at each stage. Therefore, EEG information is an intrinsic privacy area of an individual, which is important information to be protected. In this paper, we apply spring security to web based system of spring MVC (Model, View, Control) framework to build independent and lightweight server system with powerful security system. Through the proposal of the platform type EEG analysis system which enhances the security function, the web service security of the EEG information is enhanced and the privacy of the EEG information can be protected.