최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.26 no.3, 2016년, pp.837 - 852
This study examined the life-log related ICT in terms of both positive effects and adverse effects. As results, from the perspective of positive effects, experience of using life-log related ICT affects the usefulness of ICT, whereas usefulness of ICT affects satisfaction of ICT. From the perspectiv...
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
잊혀질 권리의 등장을 촉진한 정보통신기술 환경에 대한 논의를 통해 정보통신기술 이용의 순기능과 역기능의 영향을 검증한 연구 결과는 어떻게 요약될 수 있는가? | 본 연구에서는 정보통신기술 이용의 순기능과 역기능을 연구하였고, 그 결과를 다음과 같이 요약할 수 있다. 첫째, 정보통신기술 이용 경험을 많이 할수록 정보통신기술의 유용성을 더 높게 인지하고 나아가 정보통신기술에 대한 만족도를 높게 느끼는 것으로 나타났다. 둘째, 정보통신기술 이용 경험을 많이 할수록 프라이버시 염려를 더 높게 인지하고 나아가 잊혀질 권리에 대한 필요성을 더 높게 인식하는 것으로 나타났다. 정보통신기술 이용에 따른 영향력은 순기능과 역기능 중에서 순기능이 더 높은 것으로 나타났다. 자기효능감이 높은 집단은 낮은 집단에 비하여 프라이버시 염려가 상대적으로 낮은 것으로 나타났다. | |
라이프로그의 개념은 어디서 등장하였는가? | 최근 잊혀질 권리와 함께 논의되고 있는 개념으로 라이프로그가 있다[1,2]. 라이프로그의 개념은 ‘As We May Think’에서 처음 등장하였다[3]. Bush는 인간의 사고능력에 도움을 주기 위하여 완전한 기억을 할 수 있는 ‘Memex’ 라는 기계장치를 고안해냈다. | |
잊혀질 권리와 함께 논의되고 있는 개념으로 무엇이 있는가? | 최근 잊혀질 권리와 함께 논의되고 있는 개념으로 라이프로그가 있다[1,2]. 라이프로그의 개념은 ‘As We May Think’에서 처음 등장하였다[3]. |
A.L. Allen, "Dredging up the past: Lifelogging, memory, and surveillance", The University of Chicago Law Review, Vol.75. No.1, pp. 47-74, 2008.
C. Conley, "The Right to Delete", In AAAI Spring Symposium: Intelligent Information Privacy Management, 2010.
V. Bush, "As we may think", The atlantic monthly, Vol.176. No.1, pp. 101-108, 1945.
R. Whitaker, "The end of privacy: How total surveillance is becoming a reality", The New Press, 1999.
F. Webster and K. Robbins, "Information Technology: A Luddite Analysis", Ablex, N.J. 1986.
C.G. Bell, and J. Gemmell, "Total recall: How the e-memory revolution will change everything", New York: Dutton, 2009.
E. Schmidt, and J. Cohen, "The new digital age, Reshaping the Future of People", Nations and Business Hodder And Stoughton Limited, 2013.
White house, "CONSUMER DATA PRIVACY IN A NETWORKED WORLD: A FRAMEWORK FOR PROTECTING PRIVACY AND PROMOTING INNOVATION IN THE GLOBAL DIGITAL ECONOMY", from http://www.whitehouse.gov/sites/default/files/privacy-final.pdf, 2012
J. Gemmell, G. Bell, R. Lueder, S. Drucker, and C. Wong, "MyLifeBits: fulfilling the Memex vision", In Proceedings of the tenth ACM international conference on Multimedia, ACM, pp. 235-238, 2002.
A.J. Sellen, A. Fogg, M. Aitken, S. Hodges, C. Rother, and K. Wood, "Do life-logging technologies support memory for the past?: an experimental study using sensecam", In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, pp. 81-90, 2007.
D. Stuttard, and M. Pinto, "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws", John Wiley & Sons, 2011.
J.S. Huh, "A Study on the Problem of SNS's Infringement of Personal Information and its Countermeasures", Journal of Media Law, Ethics and Policy Research, Vol.9. No.2, pp. 75-103, 2010.
J. Jarvis, "Public parts: How sharing in the digital age improves the way we work and live", Simon and Schuster, 2011.
C.O. Ross, E. S. Sisic, M. Arseneault, J.M. M.G. Simmering, and R.R. Orr, "Personality and motivations associated with Facebook use", Computers in Human Behavior, Vol.25. No.2, pp. 578-586, 2009.
D.J. Solove, "The future of reputation: Gossip, rumor, and privacy on the Internet", Yale University Press, 2007.
V. Mayer-Schonberger, "Delete: the virtue of forgetting in the digital age", Princeton University Press, 2011.
J. Palfrey, and U. Gasser, "Born digital: Understanding the first generation of digital natives", Basic Books, 2013.
J. Bonneau, and S. Preibusch, "The privacy jungle: On the market for data protection in social networks", In Economics of information security and privacy, Springer US, pp. 121-167, 2010.
M. McLuhan, "Understanding media: The extensions of man", MIT press, 1994.
K.J. Song, "Feature: IT-based evolution of communication: SNS and smartphone that combines social media", Korea Local Information Research & Development Institute, Vol.64, pp. 4-9, 2010.
L. Winner, "Do artifacts have politics", Daedalus, Vol.109, No.1, pp. 121-136, 1980.
D.F. Noble, "Forces of Production: A Social History of Industrial Automation", Alfred. A. Knopf, New York, 1984.
W.W. Chin, "The partial least squares approach to structural equation modeling", Modern methods for business research, Vol.295. No.2, pp. 295-336, 1998.
K.M. Park, J.Y. Hwang, and K.H. Kwon, "The Impact of Competitive Strategy, Decentralization, and the Application of IT on Performance", Journal of Strategic Management, Vol.8. No.1, pp. 113-135, 2005.
M.J. Kim, "Study on the Model for Information and Culture", KADO, 2009.
S.W. Lee, B.M. Park, J.M. Kim, and S.W. Kim, "A case for flash memory ssd in enterprise database applications", In Proceedings of the 2008 ACM SIGMOD international conference on Management of data. ACM, pp. 1075-1086, 2008.
J. Greenberg, "Understanding metadata and metadata schemes", Cataloging & classification quarterly, Vol.40, No.3-4, pp. 17-36, 2005.
R. Anderson, "Security engineering", John Wiley & Sons. 2008.
D.J. Solove, "The digital person: Technology and privacy in the information age", NYU Press, 2004.
F.D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS quarterly, Vol.13. No.3, pp. 319-340, 1989.
M. Fishbein, and I. Ajzen, "Belief, attitude, intention, and behavior: An introduction to theory and research", Reading, MA: Addison-Wesley, 1975.
A.L. Lederer, J.M. Donna, P.S. Mark, and Z. Youlong, "The Technology Acceptance Model and the World Wide Web", Decision Support Systems, Vol.29. No.3, pp. 269-282, 2000.
R. Agarwal and J, Prasad, "The Role if Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technology," Decision science, Vol.28. No.3, pp. 557-582, 1997.
D.A. Adams, R.R. Nelson, and P.A. Todd, "Perceived Usefulness, Ease of Use, and Usage of Information Technology : A Replication", MIS Quarterly, Vol.16. No.2, pp. 227-248, 1992.
A.L. Cavaye, "User participation in system development revisited", Information & Management, Vol.28. No.5, pp. 311-323, 1995.
S.D. Warren, and L.D. Brandeis, "The right to privacy", Harvard law review, Vol.4. No.5, pp. 193-220, 1890.
A.F. Westin, "Privacy and freedom", Washington and Lee Law Review, Vol.25. No.1, pp. 166-170, 1968.
J. Kang, "Information privacy in cyber-space transactions", Stanford Law Review, Vol.50. No.4, pp. 1193-1294, 1998.
M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993.
M.N. Lee and J.W. Shim, "The Moderating Effect by Gender in the Relationship between the Perception of Online Privacy and Use of Privacy Protection Strategy", Media, gender&culture, Vol.12, pp. 165-190, 2009.
J.Y. Shin, and H.D. Yang, "The Effects of Perceived Privacy Infringement and the Moderators on On-Line Community Activities in BLOG", Inspiring Insight in Business Society, Vol.35. No.1, pp. 81-108, 2006.
KISA, "A study on Internet users use SNS Survey", 2009.
F.Y. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, and G. Lai, "A study of the human flesh search engine: crowd-powered expansion of online knowledge", Computer, Vol.43. No.8, pp. 45-53, 2010.
P. Kotler, K.L. Keller, F. Ancarani, and M. Costabile, "Marketing management", 14/e. Pearson, 2014.
J.N. Sheth, and A. Parvatiyar, "The evolution of relationship marketing", International Business Review, Vol.4. No.4, pp. 397-418, 1995.
C. Flavian, M. Guinaliu, and R. Gurrea, "The role played by perceived usability, satisfaction and consumer trust on website loyalty", Information & Management, Vol.43. No.1, pp. 1-14, 2006.
R.E. Anderson, and S.S. Srinivasan, "E-satisfaction and e-loyalty: a contingency framework", Psychology and Marketing, Vol.20. No.2, pp. 123-138, 2003.
F.V Cespedes, and H.J. Smith, "Database marketing: new rules for policy and practice", Sloan Management Review, Vol.34. No.4, pp. 7-23, 1993.
D.H. Holtzman, "Privacy lost: how technology is endangering your privacy", John Wiley & Sons, 2006.
J.H. Park and S.H. Lee, "Path Analysis of User Attitudes and Behaviors Toward Information Privacy", Korea administrative argument, Vol.45. No.1, pp. 281-307, 2007.
G.R. Milne, L.I. Labrecque, and C. Cromer, "Toward an understanding of the online consumer's risky behavior and protection practices", Journal of Consumer Affairs, Vol.43. No.3, pp. 449-473, 2009.
M.Z. Yao, and D.G. Linz, "Predicting self-protections of online privacy", CyberPsychology & Behavior, Vol.11. No.5, pp. 615-617, 2008.
M.J. Culnan, ""How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS quarterly, Vol.17. No.3, pp. 341-363, 1993.
C. Fornell, and F.L. Bookstein, "Two structural equation models: LISREL and PLS applied to consumer exit-voice theory", Journal of Marketing research, Vol.19. No.4, pp. 440-452, 1982.
A. Rai, R. Patnayakuni, and N. Seth, "Firm performance impacts of digitally enabled supply chain integration capabilities", MIS quarterly, Vol.30. No.2, pp. 225-246, 2006.
R. Agarwal and E. Karahanna, "Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage", MIS quarterly, Vol.24. No.4, pp. 665-694, 2000.
R.F. Falk and N.B. Miller, A Primer on Soft Modeling. The University of Akron Press, Akron, OH, 1992.
B.H. Wixom, and H.J. Watson, "An empirical investigation of the factors affecting data warehousing success", MIS quarterly, Vol.25. No.1, pp. 17-41, 2001
D.L. Schacter, and P. Graf, "Effects of elaborative processing on implicit and explicit memory for new associations", Journal of experimental psychology: learning, memory, and cognition, Vol.12. No.3, pp. 432, 1986.
F. Werro, "The right to inform v. the right to be forgotten: A transatlantic clash", Georgetown University Law Center. Public Law and Legal Theory Research Paper Series, Paper 2, 2009.
D. Lyon, "Surveillance as social sorting: Privacy, risk, and digital discrimination", Psychology Press, 2003.
M. Igbaria, and J. Iivari, "The effects of self-efficacy on computer usage", Omega: International Journal of Management Science, Vol.23. No.6, pp. 587-605, 1995.
S.C. Park, G.S. Jung, and J.R. Lee, "An Empirical Study on Factors Affecting the Acceptance of Internet", Korean Management Review, Vol.29. No.4, pp. 885-909, 2000.
KCC, "How will my information is exposed to Twitter??". from http://kcc.go.kr, 2011.
T. Buchanan, C. Paine, A.N. Joinson, and U.D. Reips, "Development of measures of online privacy concern and protection for use on the Internet", Journal of the American Society for Information Science and Technology, Vol.58. No.2, pp. 157-165, 2007.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.