• Title/Summary/Keyword: online privacy

Search Result 222, Processing Time 0.027 seconds

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.

A Study on Factors Affecting the Reception Attitude toward Electronic Medical Record (전자의무기록 수용태도에 영향을 미치는 요인에 관한 연구)

  • Jin, Hye-Eun;Choi, Eun-Mi
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.279-286
    • /
    • 2012
  • The purpose of this study was identified the influence of introducing Electronic Medical Records (EMR) on reception attitude, based on literature investigation, the study converted utility and serviceability from Davis TAM Model into awareness of effects in computerized database except attitude variable. The electronic survey for doctors, nurses, medical technicians of a general hospital located in Gangwon-do was performed for 4 weeks from Nov, 11th, 2009 to Dec, 2nd and the collected data was computerized through SPSS 12.0. The factors influencing reception attitude were divided into 4 categories; basic characteristics of the individual, awareness of privacy protection, awareness of effects in computerized database, technological preparation and measured detailed specific variables. As the result of this, the factors influencing reception intention were different depending on recognizing the effectiveness caused by computerization of medical information. Especially, in terms of the difference between basic characteristics of the individual and awareness of privacy protection, there were significant distinctions among 3 sectors; general, transactional, online information management. The significant effects were identified from information management related to business or online information management depending on experiencing security education.

Study on Dynamic Trust-based Access Control in Online Social Network Environment (소셜 네트워크 환경에서 동적 신뢰 중심의 접근 제어 모델에 관한 연구)

  • Baek, Seungsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1025-1035
    • /
    • 2013
  • There has been an explosive increase in the population of OSN(online social network) for 10 years. OSN provides users with many opportunities to have communication among friends, families and goes so far as to make relationships among unknown people having similar belief or interest. However, OSN also produced adverse effects such as privacy breaches, leaking uncontrolled information or disseminating false information. Access control models such as MAC, DAC, RBAC are applied to the OSN to control those problems but those models in OSN are not fit in dynamic OSN environment because user's acts in OSN are unpredictable and static access control imposes burden on users to change access control rules one by one. This paper proposes the dynamic trust-based access control to solve the problems of traditional static access control in OSN.

Legal and Ethical Insight about Witch Hunt Issues on Online News and 'Pseudo Press' (온라인 매체상의 현대식 마녀사냥 이슈와 '유사언론 행위'간 법적·윤리적 논쟁에 대한 고찰)

  • Jeung, Woon Gap
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.1-9
    • /
    • 2018
  • Present study investigated the crash phenomenon between freedom of press and pseudo press. For that researcher gathered online witch hunt cases from 2012 to 2017 and interpret with the logical basis of argument which needs to control pseudo press activity. On the other hand, present research arranged former studies about freedom of press and right of reputation and privacy as a counterpart that can be ethical debate. Futhermore, court case about right of small independent media where has less than 5 people also gathered. By Comparison of each ethical and legal basis, this study provide the insight which can inspire to think about real right of citizen and press.

Apparel purchase behavior among internet shoppers -Focusing on perceived risks- (인터넷 쇼핑몰에서의 의류제품 구매행동에 관한 연구 -위험지각을 중심으로-)

  • 조영주;임숙자;이승희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.7
    • /
    • pp.1247-1257
    • /
    • 2001
  • The objectives of the study were to examine apparel purchasing behavior in internet shopping malls and the level of perceived risk when internet users purchase online. For this research, 15,000 internet users were given questionaries via E-mail, or special website online. The sum of 1958 questionaries were used for statistical analyses. Using, SAS package, factor analysis, Crobach's ${\alpha}$, t-test, $\chi$$^2$-test, frequency and multi-response analysis were performed. As the results, 19% out of internet users had bought apparel products through internet shopping malls. Men had more purchasing experiences in apparels as well as general products than women. Among apparel products, T-shirts/shirts were purchased the most by internet shoppers. For perceived risks, 6 factors(quality risk, time/convenience risk, size and appearance risk, privacy risk and social/psychological risk) were investigated for this study. The level of perceived risk was lower when people had a purchasing experience in internet shopping mall than when they didn't. The level of perceived risk was lower when people had purchasing intend about apparels than when they didn't. Based on these results, marketing strategies will be suggested.

  • PDF

Determinants to Behavioral Intentions of Job Recruiters to Distribute to E-Recruitment Systems

  • NGUYEN, Nhu-Ty
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.91-98
    • /
    • 2021
  • Purpose: With the interest and ability in recruitment, it is totally worthy to discover how is labor market developed in Vietnam since the existence of the Internet. Considering employers as well as recruiters similar to jobseekers in term of technology adoption of job distribution, they should be treated fairly while performing their scopes of work. This paper aims to explore how employers perceive online recruiting platform as a supportive system, and this is to find out contributions of external factors regarding Job Boards behavioral intention to use. Research design, data and methodology: Conceptual framework tests the hypotheses involving in recruitment websites. Results: The results suggest that Board of Directors (BoD) or direct middle managers need to pay more attention on how their workforce performs through various channels of recruitment - both formal and informal, such as Linkedin or Facebook rather than a few compulsory job boards - no longer being accessed with high performance expectancy. However, the technology adaptation of recruitment is still a controversial issue due to its access to privacy of users. Conclusion: Therefore, employers should be more careful on how their personal contacts are going to be delivering without consent. Secondly, keeping systems up to date and "connected" is essential for both employees and employers.

Client Authentication Scheme based on Infinitely Overlapped Hashchains on Hyperledger Fabric (Hyperledger Fabric을 이용한 중첩형 무한 해시체인 기반의 클라이언트 인증기법)

  • Shin, Dong Jin;Park, Chang Seop
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.3-10
    • /
    • 2018
  • Each online user should perform a separate registration and manage his ID and password for each online commerce or SNS service. Since a common secret is shared between the user and the SNS server, the server compromise induces the user privacy breach and financial loss. In this paper, it is considered that the user's authentication material is shared between multiple SNS servers for user authentication. A blockchain service architecture based on Hyperledger Fabric is proposed for each user to utilize an identical ID and OTP using the enhanced hash-chain-based OTP.

  • PDF

Detecting Fake Job Recruitment with a Machine Learning Approach (머신 러닝 접근 방식을 통한 가짜 채용 탐지)

  • Taghiyev Ilkin;Jae Heung Lee
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.36-41
    • /
    • 2023
  • With the advent of applicant tracking systems, online recruitment has become more popular, and recruitment fraud has become a serious problem. This research aims to develop a reliable model to detect recruitment fraud in online recruitment environments to reduce cost losses and enhance privacy. The main contribution of this paper is to provide an automated methodology that leverages insights gained from exploratory analysis of data to distinguish which job postings are fraudulent and which are legitimate. Using EMSCAD, a recruitment fraud dataset provided by Kaggle, we trained and evaluated various single-classifier and ensemble-classifier-based machine learning models, and found that the ensemble classifier, the random forest classifier, performed best with an accuracy of 98.67% and an F1 score of 0.81.

Enhancing Consumer Awareness and Privacy Protection in the Era of Over-the-Top(OTT) Services: Focused on Behavioral Information Collection and Personalized Content (OTT(Over The Top) 서비스 시대의 소비자 인식 및 개인정보 보호 강화: 행태정보 수집과 개인화 맞춤형 서비스를 중심으로)

  • Seung-Yeon Lee;Ji-Hyun Jeon;Jun-Hyoung Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.505-513
    • /
    • 2024
  • This study investigates how consumers perceive the collection of behavioral information through 'cookies' on OTT platforms and the impact it has on personalized services. Through SPSS analysis on 120 consumers, which was conducted to examine four hypotheses, correlations were found between awareness of OTT companies' behavioral information collection and online tracking recognition, awareness and willingness to provide cookies, and the extent of confirming behavioral information collection terms during registration and online tracking recognition. The study concludes that consumer knowledge about behavioral information significantly influences the importance and intention to use personalized services, highlighting the need for regulatory measures by both companies and government entities.

Customer Information Management of Online Fashion Companies: From CRM Perspectives (CRM 관점에서 본 온라인 의류업체의 고개정보관리)

  • Chung Ihn-Hee;Kim Soon-Chul;Hwang In-Do;Jung Ji-Wook;Choo Ho-Jung
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.2 s.101
    • /
    • pp.83-100
    • /
    • 2006
  • As online fashion businesses achieve rapid growth in the last few years, they gather various kinds of customer information through customer registration procedures and expect to utilize this information for CRM programs. The purpose of this study were to understand the current practices of customer information management of online fashion companies and to discuss how to improve it for the benefit of both customers and fashion businesses. This study included three steps of empirical data collection process: First, online fashion companies were visited and content analyzed at three time periods-2002, 2003, and 2004. Second, a questionnaire was developed and surveyed with 488 customers. And third, interviews with two groups were conducted, one with customers who experienced customer registration with online fashion companies and the other with experts of web developing. Through customer registration procedures, personal and contact information such as name, citizen registration number(social security number), home address, home telephone number, and cellular phone number were most frequently required. Customers were asked to provide more specific information regarding their privacy, online behavior, and taste recently. The variety of information category in 2004 observation was larger than 2002, but the amount of required information from each company got smaller. Customers tended to provide some false infor- mation, and the most frequently cited reason for that was 'too much hassle' and 'no practical benefit from information provision'. Customers were concerned with the exposure of personal information such as citizen registration number. The ideal number of pieces of information required was identified as 3 to 5 including name, phone number, and address. The paper was concluded with the discussion of customer information management from CRM perspective, CRM program, information analysis methods, and security.