• Title/Summary/Keyword: privacy trust

Search Result 163, Processing Time 0.019 seconds

Democratic Values, Collective Security, and Privacy: Taiwan People's Response to COVID-19

  • Yang, Wan-Ying;Tsai, Chia-hung
    • Asian Journal for Public Opinion Research
    • /
    • v.8 no.3
    • /
    • pp.222-245
    • /
    • 2020
  • In the pandemic crisis, many governments implemented harsh interventions that might contradict democratic values and civil liberties. In Taiwan, the debate over whether or not to reveal personal information of infected persons to limit the coronavirus's spread poses the democratic dilemma between public health and civil liberties. This study examines whether and explains how Taiwan's people respond to the choice between individual privacy and collective security. We used survey data gathered in May 2020 to show that, first, the democratic values did not deter the pursuit of collective safety at the cost of civil liberty; rather, people with higher social trust were more likely to give up their civil liberties in exchange for public safety. Second, people who support democratic values and pursue collective security tend to avoid violating privacy by opposing the release of personal information. This study proves that democratic values do not necessarily threaten collective safety and that the pursuit of common good can co-exist with personal privacy.

Predictors of Mobile Advertising Avoidance: What Makes People Avoid Mobile Advertising?

  • Um, Nam-Hyun
    • International Journal of Contents
    • /
    • v.15 no.4
    • /
    • pp.44-49
    • /
    • 2019
  • This study is designed to examine antecedents and consequences of mobile advertising avoidance. However, to date, research on mobile advertising avoidance has been scarce. Thus, this study makes significant contributions by addressing understudied areas in mobile advertising. Study results show that the perceived mobile advertising risk is positively related to mobile advertising avoidance. This study found that the perceived trust in mobile advertising is negatively linked to mobile advertising avoidance. The study results show that the perceived Internet users' data privacy concerns is positively linked to mobile advertising avoidance. Finally, study results suggest that mobile advertising avoidance is positively linked to intention to delete the ad.

A Study on the Intention to Provide Personal Information by Type of Big Data Services (빅데이터 서비스 유형에 따른 개인정보 제공 의도에 관한 연구)

  • Jung, Seungmin
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.3
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, big data services have been used in various fields. In this situation, this research studied the intention to provide personal information from users, which is necessary to provide useful big data services. A survey was conducted on college students and ordinary people who have understood big data services. And path analysis was performed through Amos' structural equation. As a result of the study, it was found that privacy risks, trust in service providers, individual innovativeness, service incentives, social influence, and service design are major variables influencing the intention to provide personal information. And it was found that trust in service providers plays a mediating role in influencing the intention to provide personal information. In addition, big data services were classified into types for information acquisition and types related to purchase. Accordingly, it was further analyzed whether major variables differ in the path affecting the intention to provide personal information, and new implications were found. Companies that actually develop and provide big data services should establish different strategies by reflecting research results depending on the type of big data service provided.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

An Empirical Study on the Customer Value Factors Affecting Trust of Mobile Entertainment (모바일 엔터테인먼트의 신뢰에 영향을 미치는 고객가치 요인에 관한 실증적 연구)

  • Lee, Yi-jin;Yum, Chang-sun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.59-71
    • /
    • 2020
  • The purpose of this study is to analyze the relationship between customer value and trust and the effect of trust on loyalty in the field of mobile entertainment. As smartphone use becomes more popular, the mobile business is growing rapidly. In particular, the mobile entertainment industry, such as mobile games and mobile video, is growing faster. This study was based on the main survey had conducted from 25th September 2019 to 7th October 2019 by 300 users who had experienced mobile entertainment applications in the past. Statistical analysis was performed by using the IBM SPSS v.22.0. The analysis results are as follows. First, the utility and quality of utilitarian value, enjoyment and aesthetics of hedonic value, and status enhancing of social value have significantly positive influence on trust. Second, privacy risk of social value have significantly negative influence on trust. Finally, trust has significantly positive influence on loyalty. Based on the results, we discussed the implications for the successful operation of mobile entertainment.

Dynamic User Reliability Evaluation Scheme for Social Network Service (소셜 네트워크 서비스에서의 동적 사용자 신뢰도 평가 스킴)

  • Lee, Changhoon;Jung, Youngman;Jung, Jaewook;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.157-168
    • /
    • 2013
  • The social network service is the bidirectional media that all of the users are be able to directly produce, process, and distribute the information without distinction of the producer and consumer. Over increasing the users rapidly, the users are be able to obtain and share the various information, but the problems occur due to the spread of unreliable information on the service. Moreover, it is spreading the problems violating the privacy and decreasing the reliability of the users by exploiting the open environment. Therefore, sensitive information can be delivered only to users which information producer can trust, and the users should get the information from the trustworthy users. Due to this necessity, it needs the efficient method can evaluates the reliability of the users. In this paper, we define the reliability in the service, make the trust parameter by using the function of the service, and propose the dynamic user reliability evaluation scheme evaluating the reliability of users. We draw the trust range on the reliability of users by analyzing the proposed reliability evaluation scheme.

Access Control Mechanism Based on Key Assignment and User Trust Level for Social Network Services (소셜 네트워크 서비스를 위한 키 분배와 사용자 평판을 이용한 접근 제어 메커니즘)

  • Quan, Wenji;Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.410-415
    • /
    • 2013
  • Recently, as Internet enters WEB 2.0, many social network services through such as Facebook, Twitter and Youtube appeared. In these social network sites, users can easily make friends, join groups and access others personal information. Therefore, a malicious user can easily gather information of others. In order to protect user's personal information from the unauthenticated users, we propose privacy protection mechanism based on key assignment and user's trust level. A master-key is generated for each users and is segmented into a core-key and several sub-key. The master-key stores at the information owner's side and the sub-key will be distributed to requestor according to the relation and trust level. At last, in order to proof the efficiency, the performance of our proposed mechanism is compared with those of existing mechanisms.