• Title/Summary/Keyword: 기업행위

Search Result 550, Processing Time 0.026 seconds

A Study on the Factors of Individual Acceptance for Online Game (온라인게임의 개인적 수용 요인에 관한 연구)

  • Yoon, Gun-Woo;Kim, Won-Joon;Ryu, Seoung-Ho
    • Journal of Korea Game Society
    • /
    • v.9 no.3
    • /
    • pp.107-119
    • /
    • 2009
  • Online games belong to a technology-oriented service industry that has emerged from the assimilation of game contents and communication networks in the respective realms of culture technology (CT) and information technology (IT). This study examines the individual acceptance of online games as entertainment-oriented technology based on the belief-attitude-intention paradigm and the underlying hedonic and utilitarian motivations. To measure the latent variables influencing the acceptance process, a structured questionnaire was developed based on the existing Technology Acceptance Model. Research model analysis and hypothesis testing were carried out using a structural equation model. Results indicated that latent variables reflecting hedonic and utilitarian characteristics had a significant influence on user behavior in the acceptance of online games. By uncovering the core factors in! fluencing the acceptance of online games and thereby theoretically verifying the latent variables influencing the acceptance of entertainment-oriented technology, this study provides strategic implications for business models by game companies aimed at attracting a large user base and dominating the market.

  • PDF

Study on the Electronic Contract (전자계약에 관한 연구)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.129-138
    • /
    • 2014
  • The Electronic contract means creation sign management and storage of contract by online without limitations of the time and space through the electronic signature and encode which based on the Certificate instead of the past that treatment the contract such as creation sign management and storage of contract by face-to-face. Recently, the remarkable development of information and communication technology with supplying the high-speed Internet services. Accordingly, the transaction contract made by these also, the steady legal effect occurred by two or more parties by legal action which is the electronic agreement of expression. and it makes agreement improving corporate productivity and it can control the whole process such as contract documents and the actual buying store provision. Like this it has many benefits so, it suddenly rising as the new axis of economic activity area, it is a reality. In this change of era, with the establishment of electronic contracts, there are many problems are occurred to the expression of parties which is core of the contract on civil code so, the systematic legal composition is required. Thus, in this study will propose the reasonable improvements about the issue of electronic contract through the consideration.

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.

Study on Factors Affecting Intention of Switching China's Mobile Telecommunication Service - Focusing on PPM Theory (중국 이동통신시장에서 서비스 전환의도에 영향을 미치는 요인에 관한 연구 - PPM 이론을 중심으로)

  • Jang, Hae-won;Kwak, Na-yeon;Lee, Choong C.
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.169-180
    • /
    • 2017
  • China's mobile communication market has been growing quantitatively and qualitatively since 2000. Currently, it has secured 1.27 billion mobile subscribers and many of the Korean companies try to enter the Chinese market and cooperation with companies in China is being held. Thus understanding of the Chinese markets is the key to better prepare for future international competition. This study is to identify factors affecting switching intentions and behaviors for Chinese mobile subscribers to other mobile service providers by the PPM and it is to derive correlations between strategies of mobile service providers and users' switching intention by the groups classified by ARPU. We conducted a survey targeting 270 Chinese mobile users and analyze it by using Smart PLS 2.0. In conclusion, push effects have positive influence on intention to switching and relational switching cost among mooring effect have significantly negative influence on intention to switching In particular, intention to switching depending on the groups classified by a level of their ARPU have been shown as significantly different. This study will extend theoretical range of PPM theory in explaining users' switching behaviors and contribute to establish strategies to enter the chinese market.

Information Mediating in Social Network Sites : A Simulation Study (소셜 네트워크 사이트의 정보 매개하기 : 시뮬레이션 연구)

  • Rho, Sangkyu;Kim, Taekyung;Park, Jinsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.33-55
    • /
    • 2013
  • Information sharing behavior in the Internet has raised much interest. Recently, social network sites provide a new information sharing channel for the users who want to connect with others based on common social background or tastes. Especially, we focus that a social network site becomes one of major routes for information sharing about socially influential issues. Therefore, studying how information is diffused via a social network site may give theoretically, practically significant implication. Based on the assertion, we investigated user's behavior to mediate other user's information messages. We define information mediating behavior as concurrent actions of filtering and distributing behavior of the digital content that is originated from one of the connected users. In this study, we intended to understand the effects of information mediating behavior, and tried to understand characteristics of re-mediating of previously mediated information. Using an agent-based simulation model, we found that information mediating behavior increased the extent of information diffusion significantly. In addition, even a small degree of mediating probability could boost up the level of information diffusion in the case of a re-mediating condition. We believe that those findings provide remarkable insight of research and business application on both of information sharing and diffusion in a social network site.

Industrial Fluctuations and Locality of Busan with Records (기록으로 본 부산의 산업변동과 로컬리티)

  • Song, Jung-Sook
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.16 no.2
    • /
    • pp.143-172
    • /
    • 2016
  • This study analyzes the process of growth of Busan from a fishing village to the capital city of South Gyeongsang Province and the central city of transportation and commerce, and an industry with records. The results of the analysis are as follows: after the port opened in 1876, there has been a decline in settlement spaces in Dongnae; on the other hand, there has been an increase in migration spaces around the port of Busan. Waegwan (倭館) nearby Yongdusan Mountain (龍頭山) was changed to the Japanese concession; thus, the number of Japanese moving into Busan had rapidly increased. As a result, the Japanese government carried out reclamation work for securing available lands for the construction of port facilities and other facilities. The Japanese government built public offices and houses, as well as production facilities for daily necessities around the port of Busan. The opening of the Seoul Busan railway (京釜線) and the cross-channel liner between Busan and Shimonoseki (釜關連絡船) led to the growth of Busan and the development of its status. At this time, as the main industry of Busan was trade, Busan had grown as a commercial city. As Busan had grown as a central city of transportation and commerce, the provincial government building of Gyeongsangnam-do (慶尙南道) moved to Busan. Thus, Busan became the central city of local politics and administration. After the Land Survey Project, a large scale of farmers were recruited for low-wage work in the new port. Because of the abolition of the corporation law, Japanese capitalists moved into their colony in Busan. There, large-scale factories, such as the Joseon cotton textile factory, were established. Through this process, the locality of Busan was changed from a fishing village to a commercial city and, finally, to a city of commerce and industry.

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

A Study on Interdisciplinary Understanding of Modern Science Culture - Focusing on Case Study of 'STS Course' (현대 과학문화의 간학문적 이해에 대한 연구 - '과학기술과 사회' 교양강좌 사례분석을 중심으로)

  • Kim Dong-Kwang
    • Journal of Science and Technology Studies
    • /
    • v.4 no.2 s.8
    • /
    • pp.33-66
    • /
    • 2004
  • In these days, science is too complex and comprehensive scientific practices to be reduced to scientific knowledge. Also it's actors go beyond the limit of scientist society to the broad range of supporting system scientific journalism, education, and business. Science is very important cultural practice of our times. This Study focus on the effect of interdisciplinary approach in understanding modern science culture. First, this paper suggest the approach of public understanding of science(PUS) as a framework PUS has provided new perspectives for the relation of scientific knowledge and understanding. Traditional approach(so-called 'deficit model') regarded understanding as mere transportation of scientific knowledge. So it may be called 'knowledge-oriented approach' to understanding. But PUS consider understanding process of 'dynamic reconstructing' which is occurred in complex socio-cultural context. Second, this article analysis the Korea University STS course(2002-2003) 'Science Technology & Society' as the case study. The case study examine how interdisciplinary approach help students to understand 'sciene in the making'.

  • PDF

A Study on Determinants of Financial Soundness of Savings Banks (저축은행 재무건전성 결정요인에 대한 연구)

  • Bae, Soo Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.277-282
    • /
    • 2019
  • This study analyzed the determinants of the financial Soundness of savings banks. In particular, empirical analysis was carried out on how the loan deposit ratio correlates with financial soundness after restructuring. As the restructuring of savings banks was finalized in 2014, asset management changed and it is time to analyze the financial characteristics of savings banks. In summary, the relationship between the savings bank lending rate and the NPL ratio is estimated to have a negative value at the 1% significance level. In other words, the higher the mortgage rate, the lower the substandard and below ratio. It can be said that it is not easy for a savings bank to build an aggressive loan portfolio. In other words, the more difficult it is to finance loans through savings deposits, the more likely the risk aversion tends to be. The higher the corporate loan ratio, average interest expense, and economic growth rate, the higher the risk index. The larger the asset size and the higher the loan growth rate, the lower the risk index. Increasing the mortgage rate may reduce risk-seeking behavior, but it does not mean that it is unconditionally positive for savings banks. Therefore, the loan deposit rate regulation should reduce the incentives for excessive asset expansion and manage preemptive soundness through lending portfolio management.