• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.03 seconds

Analysis of important decision factor for online platform use: an Analytical Hierarchy Process approach (온라인 플랫폼 사용에 대한 선정요인 중요도분석: AHP 기법을 중심으로)

  • Lee, DonHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.6
    • /
    • pp.81-96
    • /
    • 2021
  • This study examines the importance of factors that influence the online platform selection decision to support operational optimization strategies. For the research purpose, we first reviewed previous studies on service encounters and identified those factors that have been proven important for using online platforms. Second, this study analyzed the factors that customers perceived as important based on analytical hierarchy process (AHP) of the data we collected from 10 mobile or computer-based Internet users. The study results revealed that the important factors for the online platform selection were in the following order: product diversity (27.4%), ease of use (21.5%), brand credibility (18.1%), interactions with the service provider (17.7%), and ease of accessibility (15.3%). The study provides useful insights to online platform service providers in developing strategies for customer-focused value creation.

The Pattern of Portal News Use among Portal Users and Their Recognition of Portal as a Press (포털 이용자들의 포털 뉴스이용패턴 및 포털의 언론역할에 관한 인식)

  • Lee, Chang-Ho;Lee, Ho-Young
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.177-211
    • /
    • 2009
  • The purpose of this study is to investigate how portal users recognize the role and function of the portal as a press. Furthermore, this study aims to analyze the pattern of portal news use among portal users and their recognition about replies to news. For this, we conducted online survey of 1,036 people aged from 15 to 45, who used portal site at least once a week. As a result, most users(70.8%) agreed that portal news played a role as a press with other media. In addition, six out of ten agreed that portal news set the agenda of society. These results suggest that portal users think highly of the social impact and responsibility of portal in society. However, about 40 percent of respondents said that they did not trust in information shown in replies to news and many replies to news were written by albeit. Six out of ten thought that replies to news were written by intention. Therefore, to manage the quality of replies to news is necessary to secure the credibility of portal news. As respondents use portal news often, they tend to think that portals are convenient to use and their social impact is very large, at the same time considering their sensation and commercialization. On the other hand, as portal users use the internet often, they tend to think that portals are convenient to use and their social impact is immense. However, there was no significant relationship between income and portal users' recognition of portals as the press.

  • PDF

Implementaion Mechanism of Homepage Failure Notification System in Public Sector in IDC Environment (IDC환경에서 공공부문 홈페이지 장애상황공지 시스템 구축방안)

  • Kim, Yong-Tae;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.426-433
    • /
    • 2021
  • Investment in public sector information services has been on the rise in recent years. The supply of high-speed Internet and smartphones has become more common, and the stability of the information system provided to the public in the public sector has become an important management factor. In other words, tasks such as handling civil complaints and issuing certificates by public institutions, financial transactions by banks, customs clearance work, and e-commerce by individuals or institutions are mostly done online. Therefore, how to deal with obstacles arising from the information system, which is in charge of important civil service affairs, is becoming a very important issue. In other words, in the case of a disability that does not function normally even for a short period of time, various problems can occur when the work is delayed, as well as causing serious financial damage to the civil petitioner. This could be accompanied by a decline in public confidence and various other damages such as filing civil complaints. The reasons for the occurrence of information system failures are very diverse and realistically difficult to predict when. Among the various measures to cope with disability, this paper proposed a plan to establish a disability situation notification system that can minimize confusion caused by disability in the event of a homepage malfunction. The proposed disability situation notification system was established in the public IDC environment to show the possibility of utilization.

Factors Influencing Acceptance Resistance of Personal Health Record Apps: Focusing on the Privacy Calculus Model (개인건강기록 앱 수용저항에 영향을 미치는 요인: 프라이버시 계산모형을 중심으로)

  • Sang Ho Kim;Eunkyung Kang;Sung-Byung Yang
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.165-187
    • /
    • 2023
  • The continuous increase in life expectancy and high interest in health has brought about significant changes in the use of health information by the public according to the development of information technology represented by the Internet and smartphones. As the medical market expands to the mobile health environment, many health-related apps have been created and distributed, but the acceptance rate is slow as it has become challenging to provide services due to various regulations. In this study, perceived value, perceived risk factors (psychological risk, risk of time-loss, legal risk), and perceived benefits (usefulness, interaction, autonomy) were derived and verified as factors that affect the acceptance resistance of personal health record apps based on the privacy calculation model. In addition, by analyzing the moderating effect of trust in the manufacturer, how the perceived risk and perceived benefit affect the perceived value was verified. A survey was conducted on Korean college students who recognized the personal health record apps but did not use them, and 127 samples were analyzed using structural equations. As a result of hypothesis verification, perceived value has a negative effect on acceptance resistance, perceived risk (risk of time-loss) has a negative effect on perceived value, and perceived benefits (usefulness, interaction, autonomy) were found to have a positive effect on perceived value. Trust in manufacturers has weakened the impact of perceived risks (legal risk) on perceived values. This study is expected to play an important role in maintaining a competitive advantage in the personal health record app market environment by identifying and proposing detailed criteria for reducing the acceptance resistance of personal health record apps.

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

Performance of Passive UHF RFID System in Impulsive Noise Channel Based on Statistical Modeling (통계적 모델링 기반의 임펄스 잡음 채널에서 수동형 UHF RFID 시스템의 성능)

  • Jae-sung Roh
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.835-840
    • /
    • 2023
  • RFID(Radio Frequency Identification) systems are attracting attention as a key component of Internet of Things technology due to the cost and energy efficiency of application services. In order to use RFID technology in the IoT application service field, it is necessary to be able to store and manage various information for a long period of time as well as simple recognition between the reader and tag of the RFID system. And in order to read and write information to tags, a performance improvement technology that is strong and reliable in poor wireless channels is needed. In particular, in the UHF(Ultra High Frequency) RFID system, since multiple tags communicate passively in a crowded environment, it is essential to improve the recognition rate and transmission speed of individual tags. In this paper, Middleton's Class A impulsive noise model was selected to analyze the performance of the RFID system in an impulsive noise environment, and FM0 encoding and Miller encoding were applied to the tag to analyze the error rate performance of the RFID system. As a result of analyzing the performance of the RFID system in Middleton's Class A impulsive noise channel, it was found that the larger the Gaussian noise to impulsive noise power ratio and the impulsive noise index, the more similar the characteristics to the Gaussian noise channel.

The Effect of Collaboration and Organization's Performance Depending on the Partnership by Information Technology Using Level: Key Subject is Moderating Variable of Information Technology Using Level (정보기술 활용 수준이 기업 간 협업과 조직의 성과관계에 미치는 영향: 정보기술 활용수준의 조절효과를 중심으로)

  • Lee, Seung-Je;Han, Pil-Koo;Kang, Byung-Goo
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.67-90
    • /
    • 2009
  • This study addresses information technology using level has an effect on the collaboration and organization's performance depending on the partnership that is important because of rapid development of information technology and internet diffusion. In the long view, information technology persistently increases the performance and expects the useful factor for the examing the organization's performance. Information technology using level leaves the lowness or highly, information technical application effort for the future value of each enterprise is necessary, the staff education which continuous for this the fact that the introduction is more important what continuously is information technology which is suitable at the enterprise of execution. The main purpose of this study is to figure out the difference between collaboration and organization's outcome using information technology using level that is moderating variable and difference the effect.

The effects of the operation of an information security management system on the performance of information security (정보보호 관리체계의 지속적인 정보보호 관리과정(PDCA)이 정보보호 성과에 미치는 영향에 관한 실증 연구)

  • Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1123-1132
    • /
    • 2012
  • Many domestic organizations are introducing and operating various information security management systems capable of coping with technical, administrative, and legal issues comprehensively and systematically, in order to prevent various infringement incidents such as personal information disclosure and hacking preemptively and actively. However, empirical analyses regarding the extent to which an information security management system contributes to information security performance have not been fully conducted, even though enterprises and organizations are actively introducing such systems in order to achieve their information security objectives as a part of their organizational management activities in line with their respective business, by investing considerable effort and resources in developing and operating these systems. This approach can be used to apply, develop, and operate the information management system actively within an organization. this study focused on analyzing how each specific phase of the information security management system affects information security performance, compared with previous studies, which generally focus on the information security control item in analyzing information security performance. The information security management system was analyzed empirically to determine how the Security PCDA cycling model affects information security performance.

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

Design of Convergence Contents information quality of u-convergence tourist information3.0 using flow Theory (플로우 이론을 이용한 u-융복합 관광정보3.0 의 융복합 콘텐츠 정보품질 설계)

  • Sun, Su-Kyun;Lee, Seung-woo
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.191-199
    • /
    • 2015
  • The Journal of Digital Policy & Management. This space is for the abstract of your study in English. In this paper, we propose a u-convergence Tourist Information 3.0 System using Flow Theory. It generates a sense of u-challenge and u-skills to maximize the enjoyment of tourists is u-convergence Tourist Information 3.0. This is a challenge to good sense and adjust the rating of the Convergence Contents information quality(CCIQ) analysis to maximize the enjoyment of tourists. Convergence Contents information quality(CCIQ) of the conductive continuity of the content closed antecedents u-conductive sense, the tourist synchronization adequacy may generate data that can be analyzed. Content Information Quality of rating is the leading factor in the ability of the u-skill mastery of tourists, can generate data availability. The result is to create a meta-model is referred to as content information to reach the best quality maximize enjoyment. Design a sense of u-challenge the skill of the information quality of the tourist information content has the advantage of being able to identify the data formation has the pleasure of tourists. By applying to future national competent standard it is expected to maximize the enjoyment of the job.