• Title/Summary/Keyword: 인지된 보안

Search Result 345, Processing Time 0.023 seconds

A Study on the Effects of After-purchase Feedback About Customer Service Quality on Purchase Process - Focusing on Internet Shopping Mall - (고객 서비스 품질에 대한 구매 후기 댓글이 구매과정에 미치는 영향 - 인터넷 쇼핑몰을 중심으로 -)

  • Shin, Chang-Nag;Kim, Young-Ei;Park, Young-Kyun
    • Journal of Distribution Research
    • /
    • v.14 no.1
    • /
    • pp.27-44
    • /
    • 2009
  • This research classified the customer service factor of on-line shopping mall into tangibility, reliability, responsiveness, and empathy and analyzed the effect that the factors affect to consumer's purchase and re-purchase. If we present suggestions on the basis of these results of study, we would provide next two points: First, purchasers have utilized online shopping mall who pursued free from hard sell that being done in off-line and convenience of purchase affected more by reliability and responsiveness such as the fame of shopping mall that visit, reliability of security, and quick product search than the Customer of After-purchase Feedback influence for online purchasers decision factor out of consumer's purchase and re-purchase by on-line shopping mall customer service factor. Second, This study analyzed that online re-purchaser recognized the Customer of After-purchase Feedback factor high and built their loyalty through friendly emotion of on-line shopping mall and satisfaction of shopping mall service, and recommendation. In addition, they behave themselves as an affirmative messenger that is role of the Customer of After-purchase Feedback that make active opinion presentation and participation through community by important adjustment impact that empathy factor of on-line shopping mall customer service.

  • PDF

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

A Study on Exercise Intervention for Improving Physical Activity for the Disabled: From the Perspective of Convergence Device (장애인 신체활동 증가를 위한 운동중재에 관한 연구: 융합형 디바이스 활용 관점에서)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.85-90
    • /
    • 2019
  • The purpose of this study is to analyze the trend of exercise intervention applying various devices to increase the physical activity of the disabled, and to suggest the exercise intervention using converged devices that meet the needs of the times due to the increase of elderly people with disabilities. Exercise intervention using converged devices applicable to the disabled is divided into two types: first, exercise intervention using virtual reality-based gamification, and second, exercise intervention based on wearable devices of wearable or body-attached such as bands and watches. For exercise intervention using converged devices that can be enjoyed by the elderly with disability, minimize of environmental limitations, and easy to personalize, there is a need for configuration requirements such as easy operation and simple rules of operation, easy device installation and wearing, a trainer who can complement immature device utilization. In order to maintain and improve the daily living performance of the elderly with disabilities who experience a significant decrease in their cognitive and physical functions, it is necessary to use a physical activity game that can be experienced and can be interested in everyday life or a variety of devices to increase the amount of physical activity.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

Effect of Education about Blockchain Technology on Trust, Security, and Technology Acceptance Model of Virtual Assets (블록체인 기술에 대한 교육이 가상자산에 대한 신뢰, 보안성 및 기술수용모형에 미치는 영향)

  • Oh, SoYun;Han, KwangHee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.675-683
    • /
    • 2022
  • Blockchain, which is the basis of virtual assets such as cryptocurrency, is receiving great attention as one of the cornerstone technologies of the 4th industrial revolution. Blockchain is a technology that can fundamentally change our lives not only in finance, but also in politics, logistics, and culture. However, it shows lower-than-expected usability because it is complicated to learn and is continuously being developed. In this study, we tried to investigate whether the Technology Acceptance Model(TAM) of virtual assets can be changed through education on the underlying technology, blockchain. A video-based online experiment was conducted with a total of 103 participants and examined how the type of training(positive, negative) and measurement timing(before, after) affect perceived usefulness, perceived ease of use, acceptance, which are TAM variables, and trust and security, which are related to blockchain characteristics. As a result of the experiment, interactions were found in all dependent variables according to the type of education and measurement timing. Specifically, groups that received negative education had no difference in all variables before and after, but it was found that groups that received positive education showed an increase afterwards. Through this, it can be seen that the effect of education based on the anchoring effect is also shown in the intention to use virtual assets using block chain technology, suggesting that the intention to use blockchain related technology can be increased through positive education.

Malicious Traffic Classification Using Mitre ATT&CK and Machine Learning Based on UNSW-NB15 Dataset (마이터 어택과 머신러닝을 이용한 UNSW-NB15 데이터셋 기반 유해 트래픽 분류)

  • Yoon, Dong Hyun;Koo, Ja Hwan;Won, Dong Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.99-110
    • /
    • 2023
  • This study proposed a classification of malicious network traffic using the cyber threat framework(Mitre ATT&CK) and machine learning to solve the real-time traffic detection problems faced by current security monitoring systems. We applied a network traffic dataset called UNSW-NB15 to the Mitre ATT&CK framework to transform the label and generate the final dataset through rare class processing. After learning several boosting-based ensemble models using the generated final dataset, we demonstrated how these ensemble models classify network traffic using various performance metrics. Based on the F-1 score, we showed that XGBoost with no rare class processing is the best in the multi-class traffic environment. We recognized that machine learning ensemble models through Mitre ATT&CK label conversion and oversampling processing have differences over existing studies, but have limitations due to (1) the inability to match perfectly when converting between existing datasets and Mitre ATT&CK labels and (2) the presence of excessive sparse classes. Nevertheless, Catboost with B-SMOTE achieved the classification accuracy of 0.9526, which is expected to be able to automatically detect normal/abnormal network traffic.

A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services (안전한 AI 서비스를 위한 국내 정책 및 가이드라인 개선방안 연구)

  • Jiyoun Kim;Byougjin Seok;Yeog Kim;Changhoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.975-987
    • /
    • 2023
  • With the advancement of Artificial Intelligence (AI) technologies, the provision of data-driven AI services that enable automation and intelligence is increasing across industries, raising concerns about the AI security risks that may arise from the use of AI. Accordingly, Foreign countries recognize the need and importance of AI regulation and are focusing on developing related policies and regulations. This movement is also happening in Korea, and AI regulations have not been specified, so it is necessary to compare and analyze existing policy proposals or guidelines to derive common factors and identify complementary points, and discuss the direction of domestic AI regulation. In this paper, we investigate AI security risks that may arise in the AI life cycle and derive six points to be considered in establishing domestic AI regulations through analysis of each risk. Based on this, we analyze AI policy proposals and recommendations in Korea and validate additional issues. In addition, based on a review of the main content of AI laws in the US and EU and the analysis of this paper, we propose measures to improve domestic guidelines and policies in the field of AI.

Effect of Customer's Emotion Experienced during Internet Shopping On Shopping Behavior According to Internet Shopping Motivation (인터넷 쇼핑동기에 따른 인터넷 쇼핑몰 특성과 고객감정 및 행동과의 관계)

  • Kim, Sang Hee;Kim, Kyung Ae;Park, Man Suk;Yang, Ji Hoon
    • Management & Information Systems Review
    • /
    • v.30 no.1
    • /
    • pp.1-37
    • /
    • 2011
  • Prior researches on Internet shopping have focused on cognitive, technological factors, but this research is focused on emotions experienced during internet shopping. Examines emotion types experienced during internet shopping and shopping mall characteristics influencing emotional response and effect of emotions on internet shopping behavior, specifically focusing on shopping motivation difference. The data, collected from a sample of 323 internet shoppers, indicate that emotion types experienced during internet shopping and shopping mall characteristics influencing emotional response and emotional response influencing internet shopping behavior are difference among shopping motivation. Theses results provide insights on internet shopping mall management according to shopping motivation.

  • PDF

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.