South Korea virus control model has privacy drawbacks

Significance The country has avoided a full lockdown even though the epidemic initially gained strength. Nonetheless, Seoul managed to reduce the infection rate, and in late April was reporting no new cases, before a new cluster resurfaced this month. Secondary waves are expected and many countries are looking to South Korea’s coronavirus response as a model for controlling the epidemic. Impacts Centralised storage of personal data during the pandemic could be an attractive target for state-sponsored hackers and cyber criminals. A more decentralised surveillance approach would keep effectiveness high and mitigate privacy concerns. People identified as having had or spread COVID-19 are sometimes subject to stigmatisation and online harassment.

Subject Gender discrimination in South Korea. Significance A growing feminist mass movement -- with much to protest about, including new perils such as 'spy porn' -- is sparking overdue public debate. It confronts not only traditional Confucian prejudice, but also hostility from angry young men. Impacts South Korea's highly educated female population could provide a significant economic boost if fully utilised. Addressing demographic decline requires policies incentivising families to have more children while enabling mothers to work. New technology will create new dangers, as seen in 'spy porn' and online harassment of non-conformists.


2017 ◽  
Vol 25 (5) ◽  
pp. 560-579 ◽  
Author(s):  
Joyce Hoese Addae ◽  
Michael Brown ◽  
Xu Sun ◽  
Dave Towey ◽  
Milena Radenkovic

Purpose This paper presents an initial development of a personal data attitude (PDA) measurement instrument based on established psychometric principles. The aim of the research was to develop a reliable measurement scale for quantifying and comparing attitudes towards personal data that can be incorporated into cybersecurity behavioural research models. Such a scale has become necessary for understanding individuals’ attitudes towards specific sets of data, as more technologies are being designed to harvest, collate, share and analyse personal data. Design/methodology/approach An initial set of 34 five-point Likert-style items were developed with eight subscales and administered to participants online. The data collected were subjected to exploratory and confirmatory factor analyses and MANOVA. The results are consistent with the multidimensionality of attitude theories and suggest that the adopted methodology for the study is appropriate for future research with a more representative sample. Findings Factor analysis of 247 responses identified six constructs of individuals’ attitude towards personal data: protective behaviour, privacy concerns, cost-benefit, awareness, responsibility and security. This paper illustrates how the PDA scale can be a useful guide for information security research and design by briefly discussing the factor structure of the PDA and related results. Originality/value This study addresses a genuine gap in research by taking the first step towards establishing empirical evidence for dimensions underlying personal data attitudes. It also adds a significant benchmark to a growing body of literature on understanding and modelling computer users’ security behaviours.


2015 ◽  
Vol 23 (4) ◽  
pp. 394-405 ◽  
Author(s):  
Matina Tsavli ◽  
Pavlos S. Efraimidis ◽  
Vasilios Katos ◽  
Lilian Mitrou

Purpose – This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not been adequately addressed. Design/methodology/approach – The impact of the applications’ evolutionary increment of permission requests from both the user’s and the developer’s point of view is studied, and finally, a series of remedies against the erosion of users’ privacy is proposed. Findings – The results of this work indicate that, even though providing access to personal data of smartphone users is by definition neither problematic nor unlawful, today’s smartphone operating systems do not provide an adequate level of protection for the user’s personal data. However, there are several ideas that can significantly improve the situation and mitigate privacy concerns of users of smart devices. Research limitations/implications – The proposed approach was evaluated through an examination of the Android’s permission model, although issues arise in other operating systems. The authors’ future intention is to conduct a user study to measure the user’s awareness and concepts surrounding privacy concerns to empirically investigate the above-mentioned suggestions. Practical implications – The proposed suggestions in this paper, if adopted in practice, could significantly improve the situation and mitigate privacy concerns of users of smart devices. Social implications – The recommendations proposed in this paper would strongly enhance the control of users over their personal data and improve their ability to distinguish legitimate apps from malware or grayware. Originality/value – This paper emphasises two shortcomings of the permissions models of mobile operating systems which, in authors’ view, have not been adequately addressed to date and propose an inherent way for apps and other entities of the mobile computing ecosystem to commit to responsible and transparent practices on mobile users’ privacy.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
José Luis Gómez-Barroso

PurposeThe goal of the article is twofold: to determine the effectiveness of monetary incentives for disclosing personal information and to confirm the existence of a “bite the bullet” effect whereby people more easily accept providing personal data if they become aware of the requirement when the purchasing decision is almost taken.Design/methodology/approachAn experiment in which participants made a real purchase on the AliExpress marketplace was carried out. They were asked to login either via the Facebook button or by creating a username and password. A different reimbursement of the price paid for their purchase was offered in each case. This information was presented either at the beginning of the purchasing process or just before completing the purchase order.FindingsThe monetary incentive proved to work well. The “bite the bullet” effect could not be assessed because many participants willingly gave their data to the company even if they had decided not to buy anything.Practical implicationsFrom a managerial perspective, this is good news. This is a calamity from a policy perspective. More experiments carried out in real settings are needed as a first step for reconsidering public action.Social implicationsWhile people continue to publicly declare that they have privacy concerns, their behavior could not be further removed from such concerns.Originality/valueExperiment in a completely real setting, in which participants made a purchase using their own credit card.


2019 ◽  
Vol 8 (23) ◽  
Author(s):  
Si Chul Kim ◽  
Hyo Jung Lee

Here, we report the draft genome sequence of Pseudorhodobacter sp. strain E13, a Gram-negative, aerobic, nonflagellated, and rod-shaped bacterium which was isolated from the Yellow Sea in South Korea. The assembled genome sequence is 3,878,578 bp long with 3,646 protein-coding sequences in 159 contigs.


2020 ◽  
Vol 35 (4) ◽  
pp. 329-347
Author(s):  
Lisa Mainiero

Purpose The #MeToo movement has brought questions of sexuality and power in the workplace to the forefront. The purpose of this paper is to review the research on hierarchial consensual workplace romances and sexual harassment examining the underlying mechanisms of power relations. It concludes with a call to action for organizational leaders to adopt fair consensual workplace romance policies alongside strong sexual harassment policies. Design/methodology/approach This paper represents a conceptual review of the literature on consensual workplace romance, sexual harassment, passive leadership and power relations. Passive leadership leads to a climate of incivility that in turn suppresses disclosures of sexual harassment (Lee, 2016). Consensual workplace romances across hierarchical power relations carry significant risks and may turn into harassment should the romance turn sour. Findings Two new concepts, sexual hubris and sexploitation, are defined in this paper. Sexual hubris, defined as an opportunistic mindset that allows the powerful to abuse their power to acquire sexual liaisons, and its opposite, sexploitation, defined as a lower-status member using sexuality to gain advantage and favor from an upper-level power target, are dual opportunistic outcomes of an imbalanced power relation. Sexual hubris may increase the likelihood for sexual harassment such that a mindset occurs on the part of the dominant coalition that results in feelings of entitlement. Sexploitation is a micromanipulation tactic designed to create sexual favoritism that excludes others from the power relation. Research limitations/implications Sexual hubris and sexploitation are conceptualized as an opportunistic mechanisms associated with imbalanced power relations to spur future research to tease out complex issues of gender, sexuality and hierarchy in the workplace. Sexual hubris serves to protect the dominant coalition and shapes organizational norms of a climate of oppression and incivility. Conversely, sexploitation is a micromanipulation tactic that allows a lower-status member to receive favoritism from a higher-power target. Four research propositions on sexual hubris and sexploitation are presented for future scholarship. Practical implications Most organizational leaders believe consensual romance in the office cannot be legislated owing to privacy concerns. Passive leadership is discussed as a leadership style that looks the other way and does not intervene, leading to workplace hostility and incivility (Lee, 2016). Inadequate leadership creates a climate of passivity that in turn silences victims. Policies concerning consensual workplace romance should stand alongside sexual harassment policies regardless of privacy concerns. Social implications The #MeToo movement has allowed victims to disclose sexual misconduct and abuse in the workplace. However, the prevalence of sexual harassment claims most often can be traced to a leadership problem. Employers must recognize that sexual hubris and sexploitation arise from imbalances of power, where sex can be traded for advancement, and that often consensual workplace romances end badly, leading to claims of sexual harassment. Consensual romance policies must stand alongside sexual harassment policies. Originality/value Sexual hubris and sexploitation are offered as novel concepts that provide a mechanism for conceptualizing the potential for abuse and manipulation from unbalanced power relations. These are original concepts derived from the arguments within this paper that help make the case for consensual workplace romance policies alongside sexual harassment policies.


2015 ◽  
Vol 67 (1) ◽  
pp. 94-115 ◽  
Author(s):  
David Haynes ◽  
Lyn Robinson

Purpose – The purpose of this paper is to identify the risks faced by users of online social networking services (SNSs) in the UK and to develop a typology of risk that can be used to assess regulatory effectiveness. Design/methodology/approach – An initial investigation of the literature revealed no detailed taxonomies of risk in this area. Existing taxonomies were reviewed and merged with categories identified in a pilot survey and expanded in purposive sample survey directed at the library and information services (LIS) community in the UK. Findings – Analysis of the relationships between different risk categories yielded a grouping of risks by their consequences. This aligns with one of the objectives of regulation, which is to mitigate risks. Research limitations/implications – This research offers a tool for evaluation of different modes of regulation of social media. Practical implications – Awareness of the risks associated with use of online SNSs and wider social media contributes to the work of LIS professionals in their roles as: educators; intermediaries; and users of social media. An understanding of risk also informs the work of policy makers and legislators responsible for regulating access to personal data. Originality/value – A risk-based view of regulation of personal data on social media has not been attempted in such a comprehensive way before.


2017 ◽  
Vol 16 (2) ◽  
pp. 92-105 ◽  
Author(s):  
Joon-heon Song

Purpose The purpose of this study is to explore the essential cause for the policy failure of Trade Adjustment Assistance (TAA) in South Korea. Design/methodology/approach To substantiate the claims made for the failure of the policy, this paper focuses on the differences in policy preferences among the government ministries and agencies involved in TAA. Findings The failure in the TAA policy, according to this study, was attributed to the conflicts and miscoordination arising from the differences in policy preferences among government ministries and agencies. To rectify this failure, the South Korean government had to revise its laws and regulations several times over a short period. Originality/value Drawing on the analytical framework of the literature on policy failure, this paper examines the causal relationships between outcomes of TAA policy and the conflicts or miscoordination among government bodies at each stage: initiatives and planning, implementation and operation of the policy.


Significance Such programmes contribute not only to Indonesia’s efforts to boost the cyber readiness of its booming digital economy, but are also designed to maintain China's friendly relations with South-east Asia’s largest economy amid the intensifying technology tensions between China and the United States. Impacts The Personal Data Protection Law would need to clarify key provisions and concepts to be effective. The BSSN’s extensive powers will fuel civil society concerns about excessive state surveillance. Turning down Chinese technology suppliers carries cost and wider economic ramifications for Jakarta.


Significance Tehran’s more sophisticated sanctions avoidance tactics and greater willingness to test Washington’s enforcement have substantially boosted exports from 2019 lows. The slow progress on a US-Iranian mutual return to compliance with the 2015 nuclear deal, the Joint Comprehensive Plan of Action (JCPOA), has increased market uncertainty. Impacts Before sanctions lifting, limited waivers might add a few hundred thousand b/d of exports to US allies such as India, Japan and South Korea. New foreign oil investment will depend on views of Tehran’s domestic politics after June polls and the durability of a deal with Washington. Post-sanctions, Iran’s efforts to regain market share will create tensions with OPEC+ partners in quota negotiations.


Sign in / Sign up

Export Citation Format

Share Document