• 제목/요약/키워드: privacy trust

검색결과 166건 처리시간 0.023초

온라인 고객정보 수집에서의 프라이버시와 심리적 반발 (Information Privacy and Reactance in Online Profiling)

  • 이규동;이원준
    • Asia pacific journal of information systems
    • /
    • 제19권4호
    • /
    • pp.29-45
    • /
    • 2009
  • In the information age, cheap price of information processing and advances in personalization technology have allowed companies to enhance the relationships with their existing customers and to expand their customer base by effectively attracting new customers. However, most customers are reluctant to provide their personal information to companies. This study explores the tension between companies' desire to collect personal information to offer personalized services and their customers' privacy concerns. The psychological reactance theory suggests that when individuals feel that their behavioral choice is threatened or restricted, they are motivated to restore their freedom. Therefore, despite the expected benefits from personalized services, customers may perceive the services to be restrictive of their freedom to choose. This adverse effect may undermine the relationships between companies and their customers. We conducted experiments to explore the dynamic roles of transactional and environmental factors in motivating customers to provide personal information. We revisited online privacy issues from the perspective of psychological reactance. For the experiments, we created an online shop and randomly assigned the participants to one of the two experimental conditions-high and low levels of information requirements. The results of the experiment indicate that threatening the free choice serves as a transactional cost in online profiling. On the other hand, the expected benefits of personalization services have positive correlations with customers' willingness to provide personal information. This study explains privacy based on transactional and environmental factors. Our findings also indicate that the environmental factors such as the Internet privacy risk and trust propensity do not significantly affect the willingness to provide personal information when firms required much personal information. Implications and contributions are discussed.

The role of corporate image and privacy concerns in adopting online travel services

  • Tapanainen, Tommi;Nguyen, Thi Thanh Hai;Dao, Kien Trung
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제28권3호
    • /
    • pp.1-23
    • /
    • 2019
  • Purpose This study examines the role of corporate image and privacy concerns in intention to use of online travel services using data from Vietnam. Design/methodology/approach The data collection was implemented to a student sample at the Foreign Trade University in Hanoi, which has a high concentration of young people who are interested in online travel in Vietnam. The paper based questionnaire was directly delivered to the respondents. After sorting to eliminate unfit samples, the number of responses was 541, which exceeds 500, the minimum number typically required. To test the hypotheses, we applied structural equation modeling (SEM) and Confirmatory Factor Analysis (CFA) was used to evaluate the reliability and validity of constructs in the model. We also used direct, indirect and total effect coefficient to evaluate the total impact of factors on the intention to use online services. Findings This study found that corporate image is positively associated to intention to use online services. It found a link between corporate image and privacy concerns, which suggests another way for firms to address their customers' privacy concerns; corporate image, which has received great attention in traditional offline sales channels, but not in online services, should receive higher attention in IS research. Online travel businesses, besides increasing ease of use, perceived usefulness and trust in their services, should focus on build a reliable corporate image, which can not only promote the service use but also help to eliminate users' the privacy concerns.

국내 이동통신 3사별 서비스 품질 요인이 신뢰, 고객만족도 및 고객충성도에 미치는 영향 분석 (Analyzing the Impact of Service Quality Factors on Trust, Customer Satisfaction, and Customer Loyalty of Major Telecommunication Companies in Korea)

  • 구현모;김경주;신완선;송호준
    • 품질경영학회지
    • /
    • 제49권4호
    • /
    • pp.483-503
    • /
    • 2021
  • Purpose: The purpose of this study is to investigate the service quality factors in terms of customer trust, satisfaction and loyalty of the Korean telecommunication companies(SKT, KT, LG U+). Specifically, this study presents new business strategies of the each company, thereby pursuing the innovation for mature stage. Methods: To analyze the telecommunication service quality factors that contribute to customer trust, satisfaction and loyalty, this study conducted a survey targeting customers of each company. Using the data collected, the research model was built, and empirical analysis was performed through statistical processing to verify the model. Furthermore, the clarification of each hypothesis were held including the comparison analysis of each company data. Results: The results of this study are as follows; (1) When it comes to total dataset, all quality factors including trust, satisfaction and loyalty showed significant relationship, accepting every hypothesis. (2) However, for SKT and LG U+, empathy showed no significant impact on trust while the others showed significant effect. (3) Finally for KT, all service quality factors such as responsiveness, empathy, security, and customer enablement had a significant effect on trust. Conclusion: As the development of platform industry are intensified, telecommunication companies are required to manage service quality factors thoroughly, especially focusing on customer privacy and security.

미국의 항공보안정책 적용과 프라이버시 문제점 (Implementation of the U.S. Aviation Security Policy and Privacy Protection Problem)

  • 강자영;김장환
    • 한국항공운항학회지
    • /
    • 제13권3호
    • /
    • pp.110-116
    • /
    • 2005
  • TSA needs to be more transparent with the new passenger screening system and its functioning to build the citizen trust. The system is needed to be not only effective but supported by Congress and the general public. Until this occurs, skepticism will underlie any discussion about its effectiveness in balancing the protection from terrorism with respect to individual liberties. CAPPS II can be a viable system if it is developed appropriately. The objectives of the study are to introduce the security program in the U.S. aviation security policy and to discuss privacy problems when it applies. Korea also needs to study a harmonious plan with the basis of global approach mind in the case of considering the transferring of passenger information from other states for the purpose of security.

  • PDF

경계없는 세상과 사용자 인증기술 동향 (World Without Boundaries and Trends in User Authentication Technology)

  • 진승헌;조진만;조상래;조영섭;김수형
    • 전자통신동향분석
    • /
    • 제36권4호
    • /
    • pp.135-144
    • /
    • 2021
  • The field of user authentication in Korea has experienced new dimensions since December 2020. Accredited certificate, which had been in use for 21 years since 1999, has been abolished. Accredited certificates have provided a trust foundation for various ICT-based industrial developments; however, new changes in the authentication sector are also required due to changes in the service and policy environment. Changes in the service environment occur rapidly because of the emergence of new technologies such as AI, IoT, Bio, Blockchain, and the daily use of non-face-to-face environments caused by COVID-19. Even with changes in the service environment, user authentication remains an essential foundation for providing services. This paper summarizes the current status of user authentication techniques, analyzes major changes in the service environment (such as Metaverse) associated with user authentication, and presents the direction of authentication techniques (Decentralized, Invisible, Privacy-preserving) through the derived implications.

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

인터넷 위험지각 집단의 의복추구혜택, 인터넷 쇼핑태도 및 구매의도 (The internet perceived risk segments: clothing benefits sought, internet shopping attitude, and internet purchase intention)

  • 황진숙
    • 한국의류학회지
    • /
    • 제27권7호
    • /
    • pp.746-757
    • /
    • 2003
  • The purpose of this study was to investigate the internet perceived risk segments in regard to clothing benefits sought, internet shopping attitude, and internet purchase intention. The subjects used for the study were 210 male and 338 female college students. The internet perceived risk consisted of size/defect risk, social psychological risk, privacy risk, delivery risk, and price risk. The clothing benefits sought had impression improvement, fashion, individuality, figure flaws compensation, and comfort factors. The results showed that consumers were segmented by four groups based on internet perceived risk factors : 1) privacy risk group, 2) size risk group. 3) low risk group, and 4) price/social psychological risk group. The four segmented groups differed in regard to clothing benefits sought, internet shopping attitude, and internet purchase intention. For example, in regard to clothing benefits sought, the price/social Psychological risk group sought fashion more than other groups. The low risk group considered figure flaws compensation benefit less important than other groups. Concerning internet shopping attitude, the low risk group had more favorable altitude toward trust, safety, diversity, exchange/return attributes of internet shopping than other groups. The privacy risk group had more favorable attitude toward convenience and price attributes of internet shopping. Regarding internet purchase intention, the low risk group had higher intention to purchase formal, casual, and sportswear. The size risk group had higher intention to purchase fashion accessories. Further group differences and implications of the results were discussed.

The Blockchain-Based Decentralized Approaches for Cloud Computing to Offer Enhanced Quality of Service in terms of Privacy Preservation and Security: A Review.

  • Arun Kumar, B.R.;Komala, R
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.115-122
    • /
    • 2021
  • In the recent past enormous enterprise applications have migrated into the cloud computing (CC). The researchers have contributed to this ever growing technology and as a result several innovations strengthened to offer the quality of service (QoS) as per the demand of the customer. It was treated that management of resources as the major challenge to offer the QoS while focusing on the trade-offs among the performance, availability, reliability and the cost. Apart from these regular key focuses to meet the QoS other key issues in CC are data integrity, privacy, transparency, security and legal aspects (DIPTSL). This paper aims to carry out the literature survey by reflecting on the prior art of the work with regard to QoS in CC and possible implementation of block chain to implement decentralised CC solutions governing DIPTSL as an integral part of QoS.

폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구: 밴드 사용자를 중심으로 (A Study on Privacy Influencing the Continuous Intention to Use in Closed-Type SNS: Focusing on BAND Users)

  • 임병하;강동원
    • 경영정보학연구
    • /
    • 제16권3호
    • /
    • pp.191-214
    • /
    • 2014
  • 최근 모바일 환경의 발전으로 시간적, 공간적 제약이 없어짐으로서, SNS에서 실시간으로 서로간의 의사소통과 정보의 공유가 가능하게 되었다. 이로 인해 SNS는 빠르게 대중화가 이루어졌고 오늘날엔 SNS의 영역이 사회 전반으로 확대되면서 경제적, 사회적 가치를 지니게 되었다. 기업들은 SNS를 통해 마케팅 전략을 세우거나 소셜커머스로 사용자들과 전자상거래를 하게 되었고, 개인들은 다른 사용자와 특정 이슈에 대해 견해를 교류하거나 정보를 공유하여 오프라인의 영역에도 영향을 미치게 되었다. SNS의 빠른 대중화와 더불어 SNS를 통한 이득을 보기 위해 사용자들은 개인정보를 SNS와 기업에게 제공하고 있다. 하지만 이러한 개인정보가 무분별하게 제공됨에 따라 사용자의 의지와 상관없이 불법적으로 사용되는 사례가 빈번하게 발생하고 있고, 이로 인해 정보 프라이버시의 침해 우려는 사용자들이 SNS를 지속적으로 사용하는 데에 있어서 큰 방해 요인 중 하나가 되었다. 실제로 이를 시스템적으로 최대한 보호해주는 폐쇄형 SNS가 최근 등장함에 따라 많은 사용자들이 폐쇄형 SNS에 몰리고 있다. 따라서 본 연구에서는 프라이버시 계산 모형(Privacy Calculus Model)을 기반으로 하여 SNS를 사용함에 따라 사용자가 인지하는 이득을 시스템적인 보안과 개인의 심리적 프라이버시를 보장하는 것으로 제시하여 사용자가 인지된 이득을 위해 SNS를 지속적으로 사용하려는 의도가 정보 프라이버시 염려에 의해 어떤 영향을 받는지 알아보았다. 또한, 지속적인 사용 의도에 대표적인 요인들로 알려진 신뢰, 만족, 혜택이 정보 프라이버시 염려를 조절하는 역할을 할 수 있는 지 살펴보는 연구 모형을 제안하였다. 결과적으로 밴드의 경우에 보안과 프라이버시 염려 간에는 영향을 미치지 않았지만, 심리적 프라이버시의 경우엔 영향을 미쳤고, 신뢰 역시 지속적인 사용의도에 영향을 미쳤지만 사용자의 만족은 여전히 정보 프라이버시 염려를 완화시키지 않는 것으로 나타났다. 또한 심리적인 프라이버시가 지속적 사용의도에 영향을 미친다는 점으로 보아, 기업들은 SNS를 설계할 때 사회적 책임을 가지고 개인의 심리적인 프라이버시를 보장하는 것을 고려해야 한다는 것을 알 수 있었다. 본 연구는 폐쇄형 SNS를 서비스하는 기업들에게 SNS의 어떤 면을 강조해서 서비스해야 하는 지그 방향성을 제시해주고 정보 프라이버시 염려가 사용자가 인지하는 이득에 어떤 영향을 미치는 지, 또 이것을 어떤 요인으로 조절할 수 있는 지를 밝혔다는 데에서 학문적 의의를 찾아볼 수 있다.

추적이 가능한 스마트카드 사용자 인증 기법 (Anonymity User Authentication Scheme with Smart Cards preserving Traceability)

  • 김세일;천지영;이동훈
    • 정보보호학회논문지
    • /
    • 제18권5호
    • /
    • pp.31-39
    • /
    • 2008
  • 최근 스마트카드를 이용한 원격 사용자 인증 기법은 개인 프라이버시 보호에 대한 관심 및 요구가 증가됨에 따라 사용자 익명성을 제공하려는 방향으로 활발히 진행되고 있다. 초기에 제안된 인증 기법에서는 사용자와 사용자가 서비스를 제공받고자 하는 서버를 제외한 제3자에 대한 사용자 익명성만을 고려하였으나 최근 서비스 제공자에 의한 개인정보유출 사고 등이 증가하면서 제3자뿐만 아니라 원격 서버에 대해서도 사용자의 익명성이 보장되는 기법이 요구되고 있다. 하지만 이러한 사용자 익명 인증 기법은 원격 서버가 사용자의 악의적인 행동을 감지했을 때 신뢰기관의 협조를 얻어 악의적인 사용자를 추적할 수 있는 기능 또한 필요하다. 따라서 본 논문에서는 제3자뿐만 아니라 원격 서버에 대해서도 사용자의 신원에 대한 익명성을 보장하며, 악의적인 사용자의 행동에 따른 문제 발생 시에 이를 추적 가능한 익명 인증 기법을 제안한다.