• Title, Summary, Keyword: information

Search Result 232,186, Processing Time 0.239 seconds

A Study on the right to be forgotten in Digital Information Societies

  • Gu, Hyung-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.151-157
    • /
    • 2017
  • In the case of uploading privacy information of an information owner in the Internet, the information owner may want to deliver the privacy information itself or remove such information from the search list in order to prevent third parties from accessing the privacy information of the information owner. Such a right to be forgotten may collide with the freedom of expression of a third party. The right to be forgotten, which originates from the self-determination right on privacy information based on Article 10 and 17 of the Constitution and the freedom of expression, which is based on Article 21 thereof are all relative basic rights and are both limited by Item 2 under Article 37 of the same law, which is the general limitation provision for the basic rights. Therefore, when the right to be forgotten and the freedom of expression collides, it is not possible to give priority to one of the those unilaterally. It depends on the nature of the case at hand to find a natural balance for the harmonious solution for both parties. The criteria can be the sensitivity to the privacy of the information owner caused by the disclose of the privacy information, the public benefits such information may serve, the social common good that could be expected by the disclosure of the privacy information and the damages suffered in terms of the personal interest caused by the disclosure of the information, in a comprehensive manner.

Factors Causing Information Gap and Policy Principles to Bridge the Gap (정보격차의 요인과 정보격차 해고를 위한 정책적 원칙)

  • 황혜선
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.4
    • /
    • pp.279-298
    • /
    • 1999
  • Information gap widens as the information society matures. This paper delineates the factors causing information gap as socioeconomic gap, commercialization of information privation of information means and information explosion. Due to these factors information gap between the information poor and the information rich inevitably widens. To bridge the information gap requires policy efforts that are based on democratic principles. This paper asserts that the public domain of information should be secured to ensure the fair and equal access to information and use of information. It is also argued that the function and role of the public information systems such as public libraries, public schools should be expanded and fortified to ensure the minimum level of fairness and equality in an information society. It is suggested that a public site in a cyber-space might be needed to form public opinions and exchange basic information.

  • PDF

The Information Seeking Behavior of Koreans in the United States (미국 로스앤젤레스 지역 한인의 정보 추구 행태)

  • Yoon Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.389-413
    • /
    • 1993
  • This study was inspired by the growing importance of information as a resource for improving the quality of life, the lack of systematic research about the information environment of Koreans in the United States and the lack of understanding of the relationships between individual characteristics and information seeking behavior. During 1990 and 1991, 204 Koreans, 18 years old and more, residing in the City of Los Angeles, were interviewed. Generally the information seeking behavior of Koreans appeared to be similar to that of the socioeconomically advantaged segment of the general public. They are relatively well aware of their information needs. capable of articulating them, and willing to pursue information to meet their needs. Major findings include: (1) the dominance of educational information needs: (2) positive feelings of hope, curiosity. and interest associated with information needs: (3) the tendency to pursue information with the expectation of potential rather than immediate rewards: (4) the expertise of information sources and their ability to provide information directly relevant to a need as criteria for selecting an information source: (5) the generally heavy reliance on informal interpersonal information sources and the high ranking of professionals as the starting point for information seeking and in judgements of usefulness: and (6) the dominant use of Korean ethnic information sources. Statistically significant correlations found at the 0.05 level relate (1) level of education, age, and gender with type of information need, the feelings associated with an information need, motivations to seek information, and the use of information sources, (2) proficiency in English and length of residence in the United States with the extent to which ethnic information sources are used, and (3) pattern of daily use of media with the use of media in seeking information.

  • PDF

A Study on the Causes of Information Privacy Concerns and Protective Responses in e-Commerce: Focusing on the Principal-Agent Theory (전자상거래에서 정보 프라이버시 염려를 유발하는 원인과 보호반응에 관한 연구: 주인-대리인 이론을 중심으로)

  • Kim, Jongki;Kim, Jinsung
    • The Journal of Information Systems
    • /
    • v.23 no.4
    • /
    • pp.119-145
    • /
    • 2014
  • Under the premise that information privacy concerns can atrophy e-commerce by causing particular behaviors of Internet users, this study focused on exploring the causes of information privacy concerns, the related information privacy protective responses of Internet users, and measures for alleviating the information privacy concerns. This study is based on the 'principal-agent theory,' and established the following as factors that cause information privacy concerns of Internet users: perceived information non-transparency; perceived action uncertainty. Also, the information privacy concerns caused by the factors were established as the cause of information privacy protective responses of Internet users. Also, the concept of 'signaling' and 'incentive,' which were presented to solve the adverse selection and moral hazard issue in the host-agent theory, was introduced to establish the following as factors that alleviate information privacy concerns: trust; informativeness. Those factors were included in the research model to conduct an empirical analysis. The analysis has revealed that both the perceived information non-transparency (p<0.01) and perceived action uncertainty (p<0.01) as to websites had a significant impact on information privacy concerns. Also, information privacy concerns of Internet users (p<0.01) had a significant impact on their information privacy protective responses who strive to protect their personal information. In addition, when trust and informativeness, which were established as factors that can alleviate information privacy concerns, were empirically analyzed, trust and informativeness had the effect of alleviating information privacy concerns. Based on the findings, the following was confirmed: Boosting the trust of Internet users in websites and offering useful information related to personal data can play a key role in alleviating the information privacy concerns of Internet users.

A Study on the Information Behavior of Older Adults with Diabetes (노인 당뇨병 환자들의 정보행태에 관한 연구)

  • Kim, Jeong-A;Chang, Hye-Rhan
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.1
    • /
    • pp.197-223
    • /
    • 2016
  • The purpose of this study is to understand information behavior of older adults with diabetes. After reviewing previous research, related factors are identified and a questionnaire was devised. The structured interview was administered to the aged 60 and over in the B hospital (N=543). Data about awareness of the disease, health literacy, information environment, information need, information seeking, information use, information service, and personal background are collected and analyzed descriptively. Relationship between variables are examined and hypotheses are tested to find factors affecting information behavior. The level of the awareness of the disease and health literacy appeared to be low. It is proved that awareness of the disease is a factor affecting information need and information use. Health literacy affects information use. There is a statistical significant difference between information need and information use by disease education and duration. There is also a statistical significant difference between information use among groups divided by information environment, sex, age, and education. Based on the results, campaign to raise disease awareness, marketing promotion about information support facilities, customized information service for older adults are suggested.

The Influence of Information Security Behaviors on Information Security Performance in Shipping and Port Organization (해운항만조직의 정보보안이행이 정보보안성과에 미치는 영향)

  • Kang, Da-Yeon;Chang, Myung-Hee
    • Journal of Navigation and Port Research
    • /
    • v.40 no.4
    • /
    • pp.213-222
    • /
    • 2016
  • Recently, as cases of organizations' information disclosure occur continuously, it is urgent to manage security of information and establish measures to enhance security of information by an organization itself. Especially, members of an organization should be prepared with measures for information security, and an organization should do its efforts to raise its members' awareness toward information security. I set a research model to verify what effects an organization's fulfillment of regulations to secure information brings to performance of information security and selected members from maritime and port organizations and financial and insurance institutes as sample. Results of the analysis to identify factors affecting information security performance among members of maritime and port organizations are as follows. Firstly, I found that the factors affecting information security awareness are information security attitude and information security standards. Secondly, the factor giving influence on information security policy of an organization was found to be information security standards. In contrast, information security punishments and information security training were verified not to give influence on compliance of information security policy. Thirdly, information security awareness was identified to give significant influence on compliance of information security policy, information security competence and information security behavior. Fourthly, compliance of information security policy was verified to be those factors that give influence on information security competence and information security behavior. Lastly, information security competence and information security behavior were found to be such factors that give influence on information security performance.

A study on the model of the information service in the taylorian researcher's cognitive viewpoint (테일러(R. S. Taylor)계 연구자 관점에서의 정보요구 및 탐색모형에 관한 연구)

  • 이승채
    • Journal of Korean Library and Information Science Society
    • /
    • v.22
    • /
    • pp.245-276
    • /
    • 1995
  • This study analyzed the process of information service and its factors in the cognitive viewpoint. And developed a conceptual model to help in developing future information systems and services. The results of this study were summarized as follows : 1) The paradigm of information user study is changing from the system-centered to the user-centered one. 2) The researchers describe the user's internal cognitive process as the starting point of the information service. 3) The user's personal cognitive process influence the process of the information service over. And the focus is a microscopic one including the factors of the perception and recognition of the stimulus, remembering and searching information, reasoning the rules, recognition of the patterns, formalization of the concepts, etc. 4) The information librarian performs the role as a knowledge/ information system interface, and his knowledge structure reflects the organization of that knowledge/information system. 5) The information librarians can perform their role as information specialists actively and offensively. And the performance of the librarians can be measured on the scales of the su n.0, pplying capability of relevant information and the client satisfaction.

  • PDF

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

Analyzing the correlation of Spam Recall and Thesaurus

  • Kang, Sin-Jae;Kim, Jong-Wan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • /
    • pp.21-25
    • /
    • 2005
  • In this paper, we constructed a two-phase spam-mail filtering system based on the lexical and conceptual information. There are two kinds of information that can distinguish the spam mail from the legitimate mail. The definite information is the mail sender's information, URL, a certain spam list, and the less definite information is the word list and concept codes extracted from the mail body. We first classified the spam mail by using the definite information, and then used the less definite information. We used the lexical information and concept codes contained in the email body for SVM learning in the $2^{nd}$ phase. According to our results the spam precision was increased if more lexical information was used as features, and the spam recall was increased when the concept codes were included in features as well.

  • PDF

Cognitive Processing with Information Visualization Types and Contextual Reasoning (정보 시각화 형태와 정황 추론에 의한 인식 처리에 관한 연구)

  • Jung, Won-Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.75-96
    • /
    • 2007
  • The effects of information quality and the importance of information have been reported in the Information Systems (IS) literature. However, little has been learned about the impact of information visualization types and contextual information on decision quality. Therefore, this study investigated the interaction effects of these variables on decision quality by conducting a laboratory experiment. Based on two types of information visualization and the availableness of contextual information, this study had a $2{\times}2$ factorial design. The dependent variables used to measure the outcomes of decision quality were decision accuracy and time. The results demonstrated that the effects of contextual information on decision quality were significant. In addition, there was a significant main effect of information visualization on decision accuracy. The findings suggest that decision makers can expect to improve their decision quality by enhancing information visualization types and contextual information. This research may extend a body of research examining the effects of factors that can be tied to human decision-making performance.

  • PDF