• Title/Summary/Keyword: 정보보안태도

Search Result 49, Processing Time 0.022 seconds

A Design of a Data Service providing Additional Information of ID Advertising (ID 광고의 부가정보를 제공하는 데이터서비스 설계)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2018
  • As the digital broadcasting era settled in, the TV, which was only used to watch broadcast programs, developed as a medium for operating various data services. This means that an environment, in which the viewers' TV usage behavior can be changed from a passive attitude to an attitude of actively consuming the media, has been established. Since the advertising market is an industry that is heavily influenced by changes in the media, these changes causes changes in the form of advertising and the advertising consumption behavior of viewers. In this environment, the broadcasting industry needs to think about the new growth strategy that links the possibility of data service with the advertisement market. In this study, we designed a data service that provides supplementary information of an ID advertisement, which has the weakness of short exposure time and shortage of information expression space. Specifically, we have designed the usage scenario and user interface of the data service and developed a method, based on the international digital broadcasting standard DV B, that provides the supplementary information defined by the type of ID advertisement to the data service.

  • PDF

Analyzing Effects on Firms' Market Value of Personal Information Security Breaches (개인정보 유출이 기업의 주가에 미치는 영향)

  • Kim, JeongYeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.1-12
    • /
    • 2013
  • With the increases of requirement for user identification in Internet services, we should let the service companies know my personal information. If the shared personal information with them are used in not-allowed area or delivered to un-authorized persons, we may have practical harms in several fields such as financial related operations. Korean Government has introduced new management method for personal information, but it is not hard to find the personal information management issues from Korean news papers. The proper measurement should be delivered to related companies to help them to decide investment for security. This paper review the indirect measurement method of demages by check the stock prices of related company for personal information management issue. We check the relationship between change of stock price and the information management issue. The result shows there are no changes in stock market. Korean government added strong regulations for personal information management though. To prevent further personal information issues, we should recognize the indirect damages properly and let the company pay higher reparations for any personal information abuse.

An Explorative Study of Consumer Response on O2O Service Types: Focusing on Delivery and Car sharing service (O2O(Online to Offline)서비스 사업 형태에 따른 소비자 반응에 관한 탐색적 연구 : 배달 서비스와 카셰어링 서비스 중심으로)

  • Sung, Jungyeon
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.129-135
    • /
    • 2020
  • This study examined the consumer response of the current O2O service between service types. Previous studies mainly focused on the quality factor of O2O service or Technology Acceptance Model or extended TAM, This study is different from the fact that there are differences in factors that consumers consider important and consumer reactions by service type. It is also significant that we compared between representative food delivery services and car sharing services that are actively used among O2O services. As O2O service is closely related to consumer's life, this study chose three factors that the issue of personal information security and trust of intermediary platform companies, and finally subjective norm based on individuals and groups who are aware of new O2O service. To test hypotheses, data were collected and analyzed for 301 samples, focusing on delivery and car sharing service, As a result, the delivery service among the O2O services was more positive to attitude toward service in the consumer group with lower personal information security, trust in platform, and subjective norm than car sharing service. Based on these results, implications and future research directions were presented.

A Study on Acceptance of Public Recording for SNS Post (SNS 게시물에 대한 공공기록화 수용에 관한 연구)

  • Yun, Sung-Uk;Chang, Jun-Gab;Kim, Geon
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.1-12
    • /
    • 2019
  • This study explored the factors affecting the acceptance of public recording in SNS post. Using SPSS 21.0 program and AMOS 21.0 program, major results were derived through exploratory factor analysis, confirmatory factor analysis, correlation analysis, and path analysis. The results are as follows: First, the risk of personal information leakage on SNS posting has a significant negative impact on the attitude toward SNS posting. Second, the security of the SNS posting has a significant effect on the attitude toward the SNS posting. Third, the concern about privacy of SNS posting has a significant negative impact on the attitude toward SNS posting. Fourth, the attitude toward SNS posting has a significant effect on the intention to accept the SNS posting. The above results suggest that the SNS post recording should be able to collect opinions of SNS users from a long-term viewpoint.

Analysis of the Level of Primary School Students about Secure Apps (안전한 앱에 대한 초등학교 학생의 수준 분석)

  • Ko, Yeong Hae;Kim, Chong Woo
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.1
    • /
    • pp.143-149
    • /
    • 2014
  • We study the level on the knowledge, attitudes, and practice of primary school (grades 3-6 students ) for the safe use of smart devices, and identify student status for the safe use of smart devices, and suggests ways of appropriate data collection, analyzing of data. Through this research, for the safe use of smart devices in education showed that the effect is very insignificant and the knowledge and practice of smart devices are widely recognized. We will suggests the suitable education contents for the smart devices safe use for primary school students. These education will be made up of 'smart devices safety using' and we will expect that primary students will be able to cultivate the 'smart devices security awareness'.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

A Study on Factors Affecting the Reception Attitude toward Electronic Medical Record (전자의무기록 수용태도에 영향을 미치는 요인에 관한 연구)

  • Jin, Hye-Eun;Choi, Eun-Mi
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.279-286
    • /
    • 2012
  • The purpose of this study was identified the influence of introducing Electronic Medical Records (EMR) on reception attitude, based on literature investigation, the study converted utility and serviceability from Davis TAM Model into awareness of effects in computerized database except attitude variable. The electronic survey for doctors, nurses, medical technicians of a general hospital located in Gangwon-do was performed for 4 weeks from Nov, 11th, 2009 to Dec, 2nd and the collected data was computerized through SPSS 12.0. The factors influencing reception attitude were divided into 4 categories; basic characteristics of the individual, awareness of privacy protection, awareness of effects in computerized database, technological preparation and measured detailed specific variables. As the result of this, the factors influencing reception intention were different depending on recognizing the effectiveness caused by computerization of medical information. Especially, in terms of the difference between basic characteristics of the individual and awareness of privacy protection, there were significant distinctions among 3 sectors; general, transactional, online information management. The significant effects were identified from information management related to business or online information management depending on experiencing security education.

Data Mining for Personalization Model Using Customer Belief under the Internet Banking Environment (인터넷 뱅킹에서 고객의 신념을 이용한 개인화 모형을 위한 데이터마이닝)

  • 홍태호;서보밀;한인구
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.11a
    • /
    • pp.215-219
    • /
    • 2002
  • 인터넷의 급속한 성장으로 e비즈니스의 인터넷 사용이 증대되었다. 인터넷 환경에서는 새로운 인터넷 사용자라는 소비자를 대상으로 인터넷 소비자 행동에 관한 연구가 중요한 분야로 자리잡게 되었다. 인터넷상에서의 소비자 행동을 설명하기 위해 온라인 인지절차 (Cognitive process)에 관한 연구로, 웹 사이트에 대한 소비자의 태도에 미치는 영향을 밝히는 연구들이 수행되었다. 웹 사이트에 대한 소비자의 태도에 따른 개인화된 마케팅을 위해서는 웹사이트를 소비자의 특성을 고려해서 개인화된 웹사이트를 운영해야 한다. 개인의 정보 시스템 사용에 대한 설명을 위하여 많은 모형들이 개발되어 왔다. 기술 수용 모형(Technology Acceptance Model: TAM)은 개인의 정보 시스템 수용에 영향을 미치는 요소를 설명하기 위하여 가장 폭 넓게 사용되고 있는 모형이다. TRA 모형에 따르면, 개인의 사회적 행위는 그 행위의 결과에 대한 신념에 의해 영향을 받는다고 할 수 있다. 본 연구에서는 고객의 신념을 신뢰 (Trust), 유용성 (Usefulness), 사용의 편의성 (Ease of Use), 위험 (Risk), 보안통제 (Security control)로 분류하고, 고객의 실제 사용 (Usage)을 인터넷 뱅킹 환경에서 측정하여 고객세분화에 적용하였다. 세분화된 고객집단을 분류하기 위해서 인공신경망, 판별 분석 기법을 적용하여 웹 사이트에서 사용할 수 있는 개인화 모형을 개발하였다.

  • PDF

Consumer Purchase Decision in a Mobile Shopping Mall: An Integrative View of Trust and Theory of Planned Behavior (모바일 쇼핑몰 고객들의 구매 의사 결정에 관한 연구: TPB와 신뢰의 통합적 관점에서)

  • Hong, Seil;Li, Bin;Kim, Byoungsoo
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.151-171
    • /
    • 2016
  • With the widespread adoption of mobile devices, such as smart phones and smart pads, as well as the rapid growth of mobile technologies, consumer shopping patterns are changing. This study investigates key factors of consumer purchasing intention in a mobile shopping mall context by incorporating trust belief into the theory of planned behavior. We posit perceived usefulness, perceived enjoyment, perceived ease of use, and trust belief as antecedents of behavioral attitude toward mobile shopping malls. Moreover, social influence and security are identified as key enablers of trust belief on mobile shopping malls. Data collected from 154 consumers with purchasing experience in mobile shopping malls are empirically tested against a research model using partial least squares. Analysis results show that behavioral attitude and perceived behavioral control significantly influence purchasing intention. Moreover, this study reveals the significant effects of perceived usefulness and perceived enjoyment on behavioral attitude. Trust belief indirectly influences purchasing intention through behavioral attitude and is significantly affected by social influence. Understanding consumer purchasing decision-making processes in mobile shopping malls can help service providers to develop effective marketing and operation strategies and campaigns.

정보 기술 유출 및 특허 침해 현상이 소비자 행동에 미치는 영향 연구 : 동화 - 대조 효과를 중심으로

  • Kim, Geon-U;Lee, Yeong-Jin;Park, Do-Hyeong
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.11a
    • /
    • pp.1279-1279
    • /
    • 2017
  • 본 연구는 기업의 기술 유출 및 특허 침해라는 정보 보안 문제 발생 시, 브랜드 기업의 시장 지위에 따라 가해 및 피해 기업에 대한 소비자 반응이 달라질 수 있다는 점에서 착안하였다. 같은 예로 대한민국 국가대표 축구팀이 약팀과의 경기에서 졌을 때, 일부는 경기력을 비난하지만, 일부는 선수 부상, 날씨, 시차 적응 등 상황이 불리했음에도 잘 싸웠다고 평가하는 경우가 있다. 이처럼 어떤 부정적 결과 대해 사람들은 각자 다른 평가를 한다는 맥락에서 기술 유출과 특허 침해와 같은 정보 보안 문제가 발생한 기업에 대해 소비자 인식과 태도는 다르게 나타날 수 있다. 이와 같이 소비자 관점에서 기대와 실제가 불일치한 지각과정을 설명하는 심리적 메카니즘에는 동화-대조 효과가 있다. 본 연구는 기술 유출 및 특허 침해에서 일어나는 소비자 동화-대조 효과를 심리학의 귀인 이론을 통해 설명하고, 이 때 사람들의 귀인 방향이 브랜드 명성이 높을 때와 낮을 때, 기술 유출 경로가 내부자일 때와 내부자가 아닐 때에 나타나는 소비자 반응을 확인하고자 한다. 또한, 이로써 나타나는 소비자 반응을 귀인 이론의 방향성과 메커니즘을 통해 설명하려 한다. 동화-대조 효과에서 나타나는 귀인의 방향성과 소비자 반응 관계를 분석한다면, 추후 기업의 R&D와 기술 개발 전략, 지적 재산권 침해 이후 사태에 대한 대응과 수습에 가이드를 제공할 수 있을 것이라 기대한다.

  • PDF