• Title/Summary/Keyword: privacy trust

Search Result 163, Processing Time 0.026 seconds

Workspace Visibility Graph Analysis (VGA) for Concentration Privacy and Group Relations in the Open-Plan Office Environment

  • Hong, Yeon-Koo;Yoo, Uoo-Sang
    • Architectural research
    • /
    • v.12 no.1
    • /
    • pp.9-14
    • /
    • 2010
  • The present study explored the applicability of Visibility Graph Analysis (VGA) techniques to workplace design research. Six types of VGA measures in Depthmap encompassing visual connectivity, three types of visual integration, mean depth, and visual entropy were employed for the analysis of individual privacy for task concentration and group relationship behavior in the open-plan office environment. Data comprised 136 workers in 6 open-plan offices filled with low-paneled (1.2-1.5m) cubicle workspaces. For the statistical analysis, Spearman's rho correlations and t-tests were applied for the spatial and behavioral measures. The results showed that workspace VGA measures have a potential to be useful information to account for workers' concentration privacy and, limitedly, also informal relationships with team members. Visual entropy values especially offer reliable information to predict various aspects of office workers' privacy behavior while visual integration can be used to account for the workers' sense of trust in group relations. The study also discussed the limitation of VGA applications to the workplace context.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

A Study on Privacy Paradox from the Behavioral Economics Perspective (행동경제학 관점에서 프라이버시 역설에 관한 연구)

  • Kim, Jongki;Kim, Sanghee
    • Informatization Policy
    • /
    • v.22 no.3
    • /
    • pp.16-35
    • /
    • 2015
  • Recently, several studies in the field of privacy research suggested counterintuitive phenomenon about previous studies on existing perspectives. They claim that consistency of attitude and behavior does not exist, which is called privacy paradox. This study aims to clarify the relationship between intention to information disclosure and actual behavior based on the privacy paradox perspective. It attempts to explain the causes of privacy paradox phenomenon through the dual process theory being discussed in the field of behavioral economics. The results of empirical analysis are as follows. First, paired t-test analysis between intention to information disclosure and actual behavior was statistically significant. This means the existence of privacy paradox. Second, privacy risk had significant explanatory power to behavioral intention, and privacy trust had significant explanatory power to actual behavior. In conclusion, this study shows that negative belief influences decision making situation controlled by rational thinking whereas positive belief influences actual situations controlled by intuitive thinking.

A Study on Continued Intention of Social Network Services by Applying Privacy Calculus Model: Facebook and KakaoTalk Cases (프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로)

  • Min, Jinyoung;Kim, Byoungsoo
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.105-122
    • /
    • 2013
  • Given the proliferation of social network services, it has become important to understand its user's continued use behavior. As users' privacy concerns in SNS have been identified as a critical barrier against forming this continued intention, many studies have focused on inducing continued intention by mitigating privacy concerns. However, this paper suggests to approach users' continued intention not only from the perspective of mitigating privacy concerns but also from the perspective of increasing potential benefits. Under the theoretical framework of privacy calculus model, we conducted cross sectional survey on 150 Facebook and 150 KakaoTalk users. The result suggests that trust mediates the relationships between privacy concerns and continued intention and between network externality and continued intention, and the influence of support for network formation on continued intention. The effect of network externality on continued intention, however, is not significant among Facebook users while it is significant among KakaoTalk users.

  • PDF

A Study on Gender Difference in Antecedents of Trust and Continuance Intention to Purchase Voice Speakers

  • Youness EL Mezzi;Nicole Agnieszka Rydz;Kyung Jin Cha
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.614-635
    • /
    • 2020
  • This study aims at understanding gender difference in trust and the related factors affecting the intention to purchase voice speakers VS. VS are one of the innovations that are emerging at a fast pace in the market. Although it seems to be widely embraced by both genders, people do not intend to use them in some cases due to a lack of trust and the rumors circling these types of technologies. Nevertheless, there are particular barriers to the acceptance of VS technology between females and males due to unfamiliarity with the effective components of such technologies. Therefore, assuming that increasing the knowledge-based familiarity with an effective technique is essential for accepting it. So far, only little is known about VS and its concepts to increase the familiarity and, as a consequence, the acceptance of effective technology. Technology adoption in gender has been studied for many years, and there are many general models in the literature describing it. However, having more customized models for emerging technologies upon their features seems necessary. This study is based on Theory of Reasoned Action and trust-based acceptance which provides a background for understanding the relationships between beliefs, attitude, intentions, and subject norms and how it's affecting gender trust in VS. The statistical analysis results indicate that perceived system quality and perceived interaction quality have stronger influences on trust for males, while privacy concern and emotional trust have stronger influences on trust for females with the intention of purchase for both genders. Our study can be beneficial for future research in the areas of Perceived risk and Perceived utility and behavioral intention to use and human-technology interaction and psychology.

Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers (사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로)

  • Bae, Jinseok;Jung, Yoonhyuk;Cho, Wooje
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.23-40
    • /
    • 2015
  • Despite much interest and investment in the Internet of Things (IoT) which expand the Internet to a ubiquitous network including objects in the physical world, there is growing concerns of privacy protections. Because the risk of privacy invasion is higher in IoT environments than ever before, privacy need to be a key issue in the diffusion of IoT. Considering that the privacy concern is a critical barrier for user to adopt information technologies, it is important to investigate users' privacy concerns related to IoT applications. From the triad perspective (i.e., risk on technology, risk on service provider, and trust on legislation), this study aims to examine users' privacy concerns in the context of activity trackers.

An Empirical Analysis of the Impact of the Institution-based Trust Factors on the Survival of E-commerce Companies in Korea (제도기반 신뢰요소가 한국 전자상거래 기업의 생존에 미치는 영향에 관한 실증 분석 연구)

  • Park, Sho Yun;Kim, Seung Hyun
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.131-148
    • /
    • 2019
  • E-commerce in Korea has grown steadily in recent years. E-commerce has provided firms with an effective method to approach potential customers by overcoming geographical and physical barriers. However, despite the rapid growth, many e-commerce businesses closed their businesses and were not able to survive. This study aims to empirically examine the factors that determine the survival of e-commerce businesses in Korea. In particular, this study focuses on the factors related to the notion of institution-based trust that includes delivery, privacy, and security management. This research used the data set about 31,295 e-commerce businesses that have been registered in Seoul. We found that the e-commerce business that does not require extra personal information beyond the standard terms and conditions or provides a feedback mechanism by having an online board to submit a complaint has a higher chance of survival. In addition, the e-commerce business that has a secured web server, shows the specific information about the date of delivery, or provides escrow services is likely to survive longer than others. The research has extended the extant literature on the importance of trust in e-commerce by empirically examining the effects of the institution-based trust factors on the actual survival of e-commerce businesses.

Technical Trends of Media Trust for Healthy Media Consumption (건전한 미디어 소비를 위한 미디어 트러스트 기술 동향)

  • Lee, N.K.;Lee, E.J.;Lee, H.K.;Kim, J.H.;Jung, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.3
    • /
    • pp.22-33
    • /
    • 2018
  • Media trust technologies are capable of playing a significant role in the development of ICT, and may play a complementary role in existing security and privacy technologies to cope with the complex interactions among people, objects, media, and services that are being created. We hope that the results of this study will aid in strengthening the foundation of source technologies related to media trust, and to secure technological competitiveness through continuous research in this area.

Design and Development Study of a Trust-based Decentralized User Authentication System with Enhanced Data Preprocessing Functionality in a Metaverse Environment (메타버스 환경에서 Data Preprocessing 기능을 개선한 Trust-based Decentralized User Authentication 시스템 설계 및 개발 연구)

  • Suwan Park;Sangmin Lee;Kyoungjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.3-15
    • /
    • 2023
  • As remote services and remote work become commonplace, the use of the Metaverse has grown. This allows transactions like real estate and finance in virtual Second Life. However, conducting economic activities in the Metaverse presents unique security challenges compared to the physical world and conventional cyberspace. To address these, the paper proposes solutions centered on authentication and privacy. It suggests improving data preprocessing based on Metaverse data's uniqueness and introduces a new authentication service using NFTs while adhering to W3C's DID framework. The system is implemented using Hyperledger Indy blockchain, and its success is confirmed through implementation analysis.