• Title/Summary/Keyword: privacy concern

Search Result 180, Processing Time 0.027 seconds

A Dynamic Investigation of iBeacon Adoption at Tourism Destination (관광지에서의 iBeacon 도입에 대한 동태적 분석)

  • Choedon, Tenzin;Lee, Young-Chan
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.1-14
    • /
    • 2018
  • The interconnectedness of all things is continuously expanding. For example, bluetooth low energy (BLE) beacons are wireless radio transmitters that can send an identifier to nearby receivers and trigger a number of applications, from proximity marketing to indoor location-based service. iBeacon technology which is one of the newest technologies in the smart tourism field, is reckoned as being very useful for travelers in enhancing the experience with visiting places. However, there is consequently not much existing research yet about the connection between iBeacon technology and tourism destination. Considering that, this study analyzes the adoption of iBeacon in tourism destination, this study examine the interrelationships and feedback structures of key factors in iBeacon adoption. To serve the purpose, this study used system dynamics approach to develop a model of iBeacon adoption in tourism destination. The analysis results showed that the concept of 'Social Influences' is one of the significant predictors for individual's intention behavior to accept iBeacon, and word of mouth (WOM), subjective norm, privacy concern, and perceived usefulness are key factors influencing the iBeacon adoption.

The Study on the User Behavioral Effects of Perception and Characteristics on the Common Essential Applications of Smartphones (스마트폰 공통 필수앱에 대한 이용자 인식과 특성이 이용 행동에 미치는 영향)

  • Youn, Bo Heum;Lee, Yoon Jae;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.415-436
    • /
    • 2022
  • This study was conducted by the customer survey of 15 to 65 years old in order to identify the user behavioral effects of perception and characteristics on the common essential applications of smartphones with the United Theory of Acceptance and Use of Technology (UTAUT) and Value-based Acceptance Model (VAM). As a result, it was found that performance expectancy, enjoyment, facilitating conditions, effort expectancy, and social influences, excluding information privacy concern, have a positive effect on use behavior. The moderating effect by age was found that the youth was higher between perceived value and behavioral intention, and the middle-aged was higher between enjoyment and perceived value. This study has significance in providing implications for establishing strategies on designing and pre-loading apps, and increasing usage rate.

A Study on Gender Difference in Antecedents of Trust and Continuance Intention to Purchase Voice Speakers

  • Youness EL Mezzi;Nicole Agnieszka Rydz;Kyung Jin Cha
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.614-635
    • /
    • 2020
  • This study aims at understanding gender difference in trust and the related factors affecting the intention to purchase voice speakers VS. VS are one of the innovations that are emerging at a fast pace in the market. Although it seems to be widely embraced by both genders, people do not intend to use them in some cases due to a lack of trust and the rumors circling these types of technologies. Nevertheless, there are particular barriers to the acceptance of VS technology between females and males due to unfamiliarity with the effective components of such technologies. Therefore, assuming that increasing the knowledge-based familiarity with an effective technique is essential for accepting it. So far, only little is known about VS and its concepts to increase the familiarity and, as a consequence, the acceptance of effective technology. Technology adoption in gender has been studied for many years, and there are many general models in the literature describing it. However, having more customized models for emerging technologies upon their features seems necessary. This study is based on Theory of Reasoned Action and trust-based acceptance which provides a background for understanding the relationships between beliefs, attitude, intentions, and subject norms and how it's affecting gender trust in VS. The statistical analysis results indicate that perceived system quality and perceived interaction quality have stronger influences on trust for males, while privacy concern and emotional trust have stronger influences on trust for females with the intention of purchase for both genders. Our study can be beneficial for future research in the areas of Perceived risk and Perceived utility and behavioral intention to use and human-technology interaction and psychology.

Assessing the Impact of Defacing Algorithms on Brain Volumetry Accuracy in MRI Analyses

  • Dong-Woo Ryu;ChungHwee Lee;Hyuk-je Lee;Yong S Shim;Yun Jeong Hong;Jung Hee Cho;Seonggyu Kim;Jong-Min Lee;Dong Won Yang
    • Dementia and Neurocognitive Disorders
    • /
    • v.23 no.3
    • /
    • pp.127-135
    • /
    • 2024
  • Background and Purpose: To ensure data privacy, the development of defacing processes, which anonymize brain images by obscuring facial features, is crucial. However, the impact of these defacing methods on brain imaging analysis poses significant concern. This study aimed to evaluate the reliability of three different defacing methods in automated brain volumetry. Methods: Magnetic resonance imaging with three-dimensional T1 sequences was performed on ten patients diagnosed with subjective cognitive decline. Defacing was executed using mri_deface, BioImage Suite Web-based defacing, and Defacer. Brain volumes were measured employing the QBraVo program and FreeSurfer, assessing intraclass correlation coefficient (ICC) and the mean differences in brain volume measurements between the original and defaced images. Results: The mean age of the patients was 71.10±6.17 years, with 4 (40.0%) being male. The total intracranial volume, total brain volume, and ventricle volume exhibited high ICCs across the three defacing methods and 2 volumetry analyses. All regional brain volumes showed high ICCs with all three defacing methods. Despite variations among some brain regions, no significant mean differences in regional brain volume were observed between the original and defaced images across all regions. Conclusions: The three defacing algorithms evaluated did not significantly affect the results of image analysis for the entire brain or specific cerebral regions. These findings suggest that these algorithms can serve as robust methods for defacing in neuroimaging analysis, thereby supporting data anonymization without compromising the integrity of brain volume measurements.

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

Legal Research about the Public Offering of Director Compensation (이사보수의 공개에 관한 법적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.169-177
    • /
    • 2012
  • Due to the influences of global financial crisis, countries are putting their efforts on the enhancement of appropriateness and transparency of director compensation. In several countries including Germany, the United States, the United Kingdom, France, and Italy, listed companies and financial institutions in certain levels make public announcement for compensations of individual directors, not the averages. Recently, even Asian countries including China, Hong Kong, and Singapore are introducing individual director compensation public announcement policies. On the other hand, in cases of companies, which must submit annual reports, under current Korean capital market laws and enforcement ordinances, they are obligated to mention 'total wage paid to all executives in that business year' on the annual report, but does not have to mention individual wages of each executive. About this, at the 17th national assembly, revised bill for the Securities and Exchange Act for companies to mention wages of each executive. The financial world is opposing to open individual director compensation to the public as they concern about the shrinking of outstanding human resources recruitment, breach of corporate confidence, privacy invasion, deterioration of labor-management relations, and downfall of the executive's management will as director compensation will be standardized downward; however, if public opening of individual director compensation is forced, domestic companies will prepare more objective and rational standards when they calculate director compensations, and moreover, it will prevent arbitrary intervention of dominant shareholders. Therefore, to clearly and efficiently control director compensation, we need regulations for obligating public opening of individual director compensation.

The Effectiveness of Service Characteristics of Car Sharing on User Evaluation and Net Benefit (카 쉐어링 서비스 특성이 사용자 평가와 순 편익에 미치는 영향)

  • Sohn, Bongjin;Choi, Jaewon;Kwon, Hyuk-Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.2
    • /
    • pp.1-20
    • /
    • 2018
  • Car Sharing Service is provided with sharing the vehicleas you can use it anywhere and anytime. The paper verified the factors impact between providing infrastructure characteristics such as scarcity, system quality and service quality and user evaluation factors based on DeLone & McLean IS Success Model. User evaluation factors have an influence on net benefit. D&M IS model mainly proved inner organization impact. The research collected experienced car sharing service, we analyzed the 224 respondents. The result of the hypothesis follows. The scarcity of time is negatively related to perceived social support and app trust. Provisional coupon is positively related to perceived social support and app trust. But, scarcity of quantity is not related to user evaluation factors. Most of the system qualities are related to app trust, however, privacy concern isn't related to app trust. the paper's demographic characteristic is lack of experience frequency. User evaluation factors that are perceived social support and app trust are positively related to user satisfaction and WoM intention. User satisfaction is individual impact and WoM intention is organization impact. Two factors are the net benefit in car sharing service. The area of sharing economy should more study about correlation among experimental various factors. Thus, the paper has different significant from antecedent research. because of trying to experimental analysis.

A Study on the Physician's Behavior of Notifiable Communicable Diseases Reporting and its Characteristics Related (법정전염병 신고행태 및 관련특성 연구)

  • 이윤현;맹광호
    • Health Policy and Management
    • /
    • v.9 no.4
    • /
    • pp.41-64
    • /
    • 1999
  • The major concern for this research is to discuss and to offer some solutions to bring the effectiveness of existing notifiable diseases reporting system over the physicians' attitudes of reporting, the actual condition of performance and the reasons of inertia in notifiable diseases reporting through examining the physicians of medical institutions in nationwide such as pediatrics, internal medicine and family medicine. The actual conditions of notifiable communicable diseases(NCD) reporting was surveyed by mail objectifying an internal medicine, pediatrics and family medicine in nationwide on the basis of stratified random sampling method divided into the classification of medical institutions and areas. As a result of survey. the rate of respondents showed 145 persons from physicians, 105 persons from hospitals. 120 persons from general hospitals, and 51 persons from tertiary hospitals. The total number of respondents were 421 and was rated 59.0 %. The analysis of collected survey went through a descriptive analysis primarily to grasp physicians' attitudes on the notifiable communicable diseases reporting, and then upon the dependent variables. Following are major findings obtained form the data analysis. 1. The results of a descriptive analysis on physicians' attitudes towards reporting NCD were as follows: First, the respondents who didn't know that yellow fever is reporting NCD were 11.0% of clinic, 10.5% of hospital. 5.0% of general hospital. 11.8% of tertiary hospital. and in case of hepatitis B, were 26.9% of clinic, 35.2% of hospital. 35.0% of general hospital. 23.5% of tertiary hospital. Second, The rate of physicians' knowledge on penalties of not reporting the NCD by their medical institution were 35.2% of clinic, 45.7% of hospital. 36.7% of general hospital. 62.7% of tertiary hospital. Third, among the no-reporting physicians in whole, the major reason of not reporting NCD were uncertainty of diagnosis(78.9%), no need to report(46.4%), no adequate actions from PHC(29.1%), no knowledge of the cases being notifiable ones in the order of their frequencies(30.4%), meddling from PHC(29.1%), concerning of patient's privacy(26.3%). 2. To analyze the characteristics related to the physicians' behaviors to report NCD, univariate and multiple logistic regression analyses were applied to the variables related to physician, 4 medical facility, PHC, and reporting system. The result were as follows: First, the result of the univariate analysis on physicians' attitude to report NCD and characteristics related to reporting in odds ratio was in the case of hospital. 3.4 times higher positive responses on physicians' attitude to report NCD came up as compared to the clinic. Second, the result of the univariate analysis on physicians' action of reporting NCD and characteristics related to reporting by the classification of medical institutions showed that the odds ratio of hospital was 2.3 times, the odds ratio of general hospital was 2.0 times, the odds ratio of tertiary was 6.8 times significantly higher than clinic. And the medical institution with significantly higher positive attitudes rate by multiple logistic regression analysis was hospital that rated 2.5 times significantly higher than clinic. Also in the PHC related characteristics of reporting, the rate of action in reporting NCD was significantly higher in medical institution that were endowed with the good condition of reporting. In multiple logistic regression analysis, the medical institution that has a good conditions of reporting showed a significantly higher positive rate on the action of reporting than the others.

  • PDF

Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment (모바일 환경에서 적용 가능한 SIP기반 인터넷전화(VoIP) 보안 통신 프로토콜 성능 평가)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Che, Xuemei;Chu, Gyeong-Ho;Park, Han;Baek, Jae-Jong;Song, Joo-Seok;Yoo, Hyeong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.143-150
    • /
    • 2011
  • The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.

A Study on the Safety of Evacuation according to Evacuation Delay Time and Fire Door Openness: Based on Residence Types (피난 지연시간의 적용과 방화문 개방 정도에 따른 피난 안전성 확보에 관한 고찰 : 주거형태를 중심으로)

  • Seo, Dong-Gil;Kim, Mi-Seon;Gu, Seon-Hwan;Song, Young-Joo
    • Fire Science and Engineering
    • /
    • v.34 no.2
    • /
    • pp.156-165
    • /
    • 2020
  • In this paper, the application of evacuation delay time (Cognition time + initiation time) and examine the degree of opening of fire doors in households for evaluating evacuation safety and suggest a realistic alternative. In order to proceed with this study, first of all, the preliminary investigation on evacuation safety evacuation of residential-type buildings (Apartment, urban living houses, etc.) among the performance-oriented design targets of Gwangju Metropolitan City, which was implemented until June 2018. Then, for the two representative types that are commonly used among the previously surveyed buildings, evacuation delay time is applied to W1, W2, and respectively simulating the opening of the doors is applied to th full open, 1/4 open, the leakage gap and evacuation safety evaluation was performed. As a result of evaluating evacuation safety was found that it is difficult to secure evacuation safety regardless of evacuation delay time W1 and W2 when the fire door is fully open and 1/4 open, Only when the leakage gap is applied evacuation safety was ensured even if evacuation delay time W2 was applied. Therefore, when a residential building is subject to performance-oriented design, evaluating the application of W2 rather than W1 is considered for evacuation delay time to reflect concern about privacy infringement due to CCTV installation, etc. In order to secure the Smoke blocking performance of the fire door and to improve the performance-oriented design, I would like to propose to consider the method of applying a leak gap to the degree of opening of the fire door. Through this, it is expected that the performance-oriented design will be a step further by performing evacuation safety evaluation with more realistic data.