• Title/Summary/Keyword: online privacy

Search Result 222, Processing Time 0.031 seconds

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

A study on the professional ethical relationship between librarian and library work (도서관 업무와 전문사서간의 윤리적 관계에 관한 이론적 고찰)

  • 손연옥
    • Journal of Korean Library and Information Science Society
    • /
    • v.24
    • /
    • pp.485-517
    • /
    • 1996
  • The purpose of this study is to investigate typical ethical problems found in the technical and public services areas. The followings are the summary of the study. There are three distinct elements that govern ethical problems. One element is legal laws. The copyright law and the privacy act are exact examples. The copyright law has strong influence on the inter library loan service where the majority requests from the users are reproduction of copies. The privacy act also creates difficulties for librarians. Most requests for circulation records infringe on the privacy of library user. And advance online access systems also violates the privacy of library users. The second element is the code or rules that private organization has created. American Library Association created many statements that regulate the conduct of librarians. The bill of right, the professional code of ethics and policy on the confidentiality of library records have strong implications in the obligation of librarian. In the case of censorship at the selection of library materials, the code is a defensive tool against intellectual freedom. Yet self-censoring are prevailing practice among librarians. The thirds element is the competence of librarians. The analyzed table 3 showed that beside two elements, the rest of matters are competence required by librarians. The one aspect of it is humaneness and the other one is technical aspects. Technical aspect of competence are:(l) managerial and operational ability (2) communication skill (3) leadership (4) structure of knowledge and (5) self developing professionalism. Humanity aspect of competence are:(l) trust(fiduciary relationship) gained by diligence, objective judgement, ability, belief, rationality, integrity, kindness) (2) objectiveness (free from bias) (3) user-oriented consideration (need, interest, equal treatment, information gap) (4) caution in providing information (5) pride and (6) ability to distinguish advice and guidance specially in medical and law library.

  • PDF

The Effect of Information Privacy Concerns in Web Sites (웹사이트에서 정보보안 우려감의 영향)

  • Kim, Minsun;Moon, Yun Ji;Park, Gun-Ryung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.549-552
    • /
    • 2013
  • The research conducted here focuses on the definition and organization of information privacy concerns in e-commerce process. Based on the identified concept of information privacy concerns(IPC), this study additionally explores the interrelationships among consumers' individual characteristics(self-efficacy, digital literacy, customer alienation), customer satisfaction and intention to buy. Through empirical model analysis, this study found that self-efficacy and digital literacy affect negatively IPC, while customer alienation has an positive effect on IPC. IPC affects positively customer satisfaction. Academically, this study extends IPC to an empirical research model by identifying the conceptualization and organization of IPC. Moreover, practically, e-commerce providers can develop how to relieve IPC of online consumers.

  • PDF

Effect of TikTok's Level-specific Recommendation Service on Continuous Use Intention: Focusing on the Privacy Calculation Model (틱톡의 수준별 추천 서비스에 따른 지속적 사용의도에 미치는 영향: 프라이버시계산 모델을 중심으로)

  • Yue Zhang;JeongSuk Jin;Joo-Seok Park
    • Information Systems Review
    • /
    • v.24 no.3
    • /
    • pp.69-91
    • /
    • 2022
  • The video recommendation services help to save the user's information search time in the overflowing online information, and algorithms for more efficient and accurate recommendation are continuously developed. In particular, TikTok has the largest number of users in the short video industry due to its unique recommendation algorithms. In this study, by applying a privacy calculation model, the research tried to compare users' responses to each type of TikTok's recommendation service. Users are well aware of the privacy concerns and benefits of TikTok's recommendation service. Although there is a risk, it was found that users continue to use TikTok's recommendation service because the benefits are greater.

Total internet Trust Service (안전한 인터넷 거래를 위한 토탈 전자인증 서비스)

  • 신홍식
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.238-241
    • /
    • 2002
  • ·전자상거래: 서로 보지 않고 하는 거래 온라인 범죄(Online Fraud)급증 90% of information security managers have detected breaches at their organizations within a year 74% of companies have experienced financial losses because of cybercrime price tag on e-security breaches:>$17 billion worldwide in 2000(source: CIO Magazine, March 2001) ·전자상거래 최대의 걸림돌: 신뢰 62% cited trust as the top E-commerce barrier -Authentication was key to 60%: Privacy was key to 56% ·(1999 ITAA and E&Y Survey) 인터넷을 신뢰의 공간(Trust Network)으로 만들자. (OECD의 Global Theme. 1998.10) 전자상거래 신뢰 확보→인증기관 출현(중략)

  • PDF

Evaluation of Privacy Preserving Methods in Online Social Networks (온라인 사회 연결망을 위한 개인정보 보호 방안들의 평가)

  • Lee, Jong-Min;Bae, Duck-Ho;Kim, Sang-Wook
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.875-876
    • /
    • 2011
  • 본 논문은 온라인 사회 연결망을 위한 개인정보 보호 방안들에 대해 알아보고, 각 방안이 사회 연결망의 특성 변화에 미친 영향을 분석한다. 분석 결과, 개인정보 보호 방안들은 사회 연결망의 특성을 크게 훼손시키는 것으로 나타났다

Motivating Factors for Providing Personal Data in MyData Services: The Moderating Effect of Perceived Personal Information Self-Determination (마이데이터 서비스 이용을 위한 개인정보제공 동기 요인: 개인정보자기결정권 인지 수준의 조절효과)

  • Hyeonjeong Kim;Soohyun Kwon;Jeongu Choi;Beomsoo Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.219-243
    • /
    • 2024
  • This study investigates the impact of privacy concerns, perceived utility, and awareness of the right to personal data self-determination on the effective use and expansion of MyData services, which are critical to the data economy. Integrating the value-based adoption model with privacy calculus theory, the research examines how perceived utility, privacy concerns, trust, and personal innovativeness influence perceived value, perceived privacy, and the intention to provide personal information. Data collected from an online survey of 442 MyData service users and prospective users were analyzed using PLS-SEM and Bootstrapping methods via SmartPLS 4. The results indicate that perceived utility positively affects the intention to provide personal information, while privacy concerns have a negative impact. Trust and personal innovativeness positively influence the intention to adopt MyData services, and the awareness of personal data self-determination rights moderates these intentions. The findings underscore the importance of developing beneficial services that mitigate users' privacy concerns and build trust for the successful implementation of MyData services. Additionally, the study highlights the need for education and awareness campaigns to enhance understanding of the right to personal data self-determination.

Internet-Mediated Research in the Age of Social Distancing: Methodological Reflections and Recommendations from Two Online Research Projects (사회적 거리두기 시대의 인터넷 기반 연구: 두 온라인 연구 프로젝트로부터의 방법론적 고찰과 제안점)

  • Lee, Jisue;Hollister, Jonathan M.
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.319-353
    • /
    • 2020
  • Due to the COVID-19 pandemic, scholars at institutions of higher education around the world are transitioning their teaching, service, and research into online settings; for many this may be a new and challenging experience. While many of the best practices associated with research in traditional or face-to-face settings also apply to research in or via online settings, there are some additional challenges and nuances that researchers must adequately address and plan for due to the affordances and limitations of online settings. This paper discusses the key issues of privacy, informed consent, trust and trustworthiness, and retention through the literature and provides practical recommendations based on evidence and experience from two different online research projects. The reflections on and examples from these two research projects contextualize the above issues and act as evidence to inform research as a practice. The authors hope this evidence and practical guidance may help researchers better prepare for research in a socially distanced world.

Factors of Successful Online Marketing Strategy to Food Distribution SMEs

  • PANAWAN, Chusripat;PEERAWAT, Chailom
    • Journal of Distribution Science
    • /
    • v.20 no.12
    • /
    • pp.71-79
    • /
    • 2022
  • Purpose: This study aimed to apply factors of successful online marketing strategy for food distribution SMEs and the effects of these successful strategies to achieve higher performances. Research design, data, and methodology: Questionnaires were used to collect data from 400 samples of SMEs in Thailand. We employed structural Equation Modeling techniques for data analysis. Results: The results revealed that distribution strategies directly affected the success of business operations, as follows: 1) Customer communication channels, product variety, preserved privacy, and personal service had direct positive effects on the distribution success in terms of financial perspective, customer perspective, internal process perspective, and earning and growth perspectives; 2) Ability to learn a competitor had a positive direct relationship with the distribution success in terms of financial perspective and learning and growth perspectives, excluding customer perspective and internal process perspective; and 3) Responses to market on time had a positive and direct influence on distribution success in terms of customer, internal process perspective and learning and growth perspectives excluding financial perspective. Conclusions: This research has made an essential contribution to SMEs that they should focus on and adopt these 6ODS+4BSC concepts as development guidelines for food distribution SMEs to be more efficient and effective.