최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.15 no.2, 2014년, pp.59 - 71
박찬욱 (Graduate School of Information, Yonsei University) , 이상우 (Graduate School of Information, Yonsei University)
This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
빅데이터가 개인정보에 대한 우려를 증가시키는 이유는? | 최근 각광받고 있는 빅데이터 기술은 이러한 상황을 더욱 더 악화시키고 있다. 빅데이터 기술을 통해서 대량의 개인 정보에 대한 접근, 수집, 저장을 용이하게 할 수 있고 개인이 원치 않는 민감한 정보까지 분석할 수 있다. 데이터 마이닝과 프로파일링 등의 추론 기술은 사용자가 자발적으로 제공하는 정보 외에도 온라인에서의 사용자 행태 및 성향 정보까지 수집 할 수 있게 해주었다. | |
프라이버시의 정의는 무엇인가? | 프라이버시의 개념은 여러 학문 분야에서 다양하게 정의되었다. 초기에는 프라이버시를 “외부의 간섭이나 침해로부터 벗어나 자유롭게 혼자 있을 수 있는 권리”로 개인에 대한 불가침의 권리로 정의하였다[1]. 그러나 정보통신기술의 발전에 따라 온라인에서 사용되는 개인정보가 본인의 의지와 관계없이 수집 · 이용되는 프라이버시 침해문제가 생겨남에 따라서 프라이버시가 정보에 대한 프라이버시 개념으로 확대되었다. | |
온라인상의 프라이버시는 어떻게 구분 되는가? | 온라인상의 프라이버시는 정보적 프라이버시, 표현적 프라이버시, 접근 프라이버시의 세 가지로 구분되어 설명된다. 정보적 프라이버시는 온라인에서의 개인정보에 대한 통제력을 가지는 정도를 의미하고, 표현적 프라이버시는 정보주체가 개인정보를 표현하는 것에 대한 자유를 의미한다. |
Warren, Samuel D., and Louis D. Brandeis. "The right to privacy." Harvard law review 4, no. 5 (1890): 193-220.
Mayer-Schonberger, Viktor. "The Internet and Privacy Legislation: Cookies for a Treat?." Computer Law & Security Review 14, no. 3 (1998): 166-174.
DeCew, Judith W. In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, 1997.
McCullagh, Karen. "Blogging: self presentation and privacy." Information & communications technology law 17, no. 1 (2008): 3-23.
Lee, Mi-Na, and Shim, Jae-Woong. "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy." Media, gender&culture 12 (2009): 166-190
Ki, Sojin, and Lee, Sooyoung. "Exploring Categories of SNS User on the Basis of Privacy Concern and Self-Efficacy." Korean Journal of Journalism & Communication Studies 57, no. 1 (2013): 81-110.
Culnan, Mary J. "How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use." Mis Quarterly 17, no. 3 (1993): 341-363.
Choi, Hyuk-ra, and Shin, Jeoung-shin. "Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users." Journal of information technology applications & m 16, no. 3 (2007): 21-44.
Rogers, Ronald W. "A Protection Motivation Theory of Fear Appeals and Attitude Change1." The Journal of Psychology 91, no. 1 (1975): 93-114.
Ifinedo, Princely. "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory." Computers & Security 31, no. 1 (2012): 83-95.
Kim, Jongki, and Kim, Sanghee. "Privacy Protection Behavior of Online User : Based on Privacy Paradox Perspective" The Journal of internet electronic commerce research 13, no. 1 (2013): 41-64.
Maddux, James E., and Ronald W. Rogers. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change." Journal of Experimental Social Psychology 19, no. 5 (1983): 469-479.
Rogers, Ronald W. "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation." Social psychophysiology (1983): 153-176.
Woon, Irene, Gek-Woo Tan, and R. Low. "A protection motivation theory approach to home wireless security." (2005).
Chenoweth, Tim, Robert Minch, and Tom Gattiker. "Application of protection motivation theory to adoption of protective technologies." In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, pp. 1-10. IEEE, 2009.
Lee, Younghwa. "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective." Decision Support Systems 50, no. 2 (2011): 361-369.
Workman, Michael, William H. Bommer, and Detmar Straub. "The amplification effects of procedural justice on a threat control model of information systems security behaviours." Behaviour & Information Technology 28, no. 6 (2009): 563-575.
Liang, Huigang, and Yajiong Xue. "Understanding security behaviors in personal computer usage: A threat avoidance perspective." Journal of the Association for Information Systems 11, no. 7 (2010): 394-413.
Johnston, Allen C., and Merrill Warkentin. "Fear appeals and information security behaviors: an empirical study." MIS quarterly 34, no. 3 (2010): 549-566.
Bum-suk Jee, Liu Fan, Sang-Chul Lee, Yung-Ho Suh. "Personal information Protection behavior for Information quality: Health psychology Therory perspectives" Journal of the Korean Society for Quality Management 39, no. 3 (2011): 432-443.
Heider, Fritz. "Attitudes and cognitive organization." The Journal of psychology 21, no. 1 (1946): 107-112.
Chan, Ricky YK. "Determinants of Chinese consumers' green purchase behavior." Psychology & Marketing 18, no. 4 (2001): 389-413.
Youn, Seounmi. "Teenagers' perceptions of online privacy and coping behaviors: a risk-benefit appraisal approach." Journal of Broadcasting & Electronic Media 49, no. 1 (2005): 86-110.
Youn, Seounmi. "Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents." Journal of Consumer Affairs 43, no. 3 (2009): 389-418.
HyungJinWoo. "Exploring the Relationship between Television News Viewing and Audiences' Intention to the Health Promotion." Korean Journal of Journalism & Communication Studies 51, no. 2 (2007): 308-333.
Gurung, Anil, Xin Luo, and Qinyu Liao. "Consumer motivations in taking action against spyware: an empirical investigation." Information Management & Computer Security 17, no. 3 (2009): 276-289.
Milne, George R., Andrew J. Rohm, and Shalini Bahl. "Consumers' protection of online privacy and identity." Journal of Consumer Affairs 38, no. 2 (2004): 217-232.
Buchanan, Tom, Carina Paine, Adam N. Joinson, and Ulf-Dietrich Reips. "Development of measures of online privacy concern and protection for use on the Internet." Journal of the American Society for Information Science and Technology 58, no. 2 (2007): 157-165.
LaRose, Robert, Nora Rifon, Sunny Liu, and Doohwang Lee. "Understanding online safety behavior: A multivariate model." In The 55th Annual Conference of the International Communication Association, New York City. 2005.
Bandura, Albert. "Self-efficacy: toward a unifying theory of behavioral change." Psychological review 84, no. 2 (1977): 191.
Milne, George R., Lauren I. Labrecque, and Cory Cromer. "Toward an understanding of the online consumer's risky behavior and protection practices." Journal of Consumer Affairs 43, no. 3 (2009): 449-473.
Yao, Mike Z., and Daniel G. Linz. "Predicting self-protections of online privacy." CyberPsychology & Behavior 11, no. 5 (2008): 615-617.
J. Hun Park and Suk Hyun Lee. "Privacy,User Behavior,User Attitude, Attitude-Behavior Inconsistency,Path Analysis." Korean Journal of Public Administration 45, no. 1 (2007): 281-307.
Lee, Doohwang, Robert Larose, and Nora Rifon. "Keeping our network safe: a model of online protection behaviour." Behaviour & Information Technology 27, no. 5 (2008): 445-454.
Zhang, Lixuan, and William C. McDowell. "Am I really at risk? Determinants of online users' intentions to use strong passwords." Journal of Internet Commerce 8, no. 3-4 (2009): 180-197.
Mattson, Marifran. "Toward a reconceptualization of communication cues to action in the health belief model: HIV test counseling." Communications Monographs 66, no. 3 (1999): 240-265.
Jun Hong Kim. "The Effects of Victimization Experiences as Internal Cues to Action on Preventive Behavioral Intentions in Cyber Communication: Modifying Health Belief Model." Journal of Cybercommunication 27, no. 3 (2010): 5-46.
Wonchang Jang, and Ilsoon Shin. "The Online Privacy Policy: Recognition, Confirmation and its Effects on Online Transaction Behavior*." Journal of The Korea Institute of Information Security and Cryptology 22, no. 6 (2012): 1419-1427.
Min Sik Lee. "The Reactions to Cybercrime Victimization: Testing a Generic Model.." Jounal of Victimology 10, no. 2 (2002): 209-247
Jihye Kim. "Analysis of the consumer privacy protection behavior in online based on protection motivation theory." Doctoral Dissertation, Seoul National University (2010).
Hoffman, Donna L., Thomas P. Novak, and Patrali Chatterjee. "Commercial scenarios for the Web: opportunities and challenges." Journal of Computer-Mediated Communication 1, no. 3 (1995): 0-0.
McCole, Patrick, Elaine Ramsey, and John Williams. "Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns." Journal of Business Research 63, no. 9 (2010): 1018-1024.
Song, J. J. "SPSS/AMOS statistical analytic method for thesis." Paju: 21C Book Company (2008).
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.