• Title/Summary/Keyword: CS model

Search Result 639, Processing Time 0.021 seconds

The Structural Relationship among Customer Experience, Resort Use Satisfaction, and Customer Behavioral Intentions: The mediating effect of resort use satisfaction (리조트 이용객이 지각하는 고객 경험, 리조트 이용만족, 고객 행동의도 간 구조적 관계: 리조트 이용만족의 매개효과 검증)

  • Hyun Ki SHIN;Byung Min KIM;Chae Won HA
    • The Korean Journal of Franchise Management
    • /
    • v.15 no.1
    • /
    • pp.43-60
    • /
    • 2024
  • Purpose: According to previous studies, customer experience had a significant effect on consumer behaviors. In this perspective, this study investigates the structural relationship among customer experience, resort use satisfaction, and customer behavioral intentions, with focus on the mediating role of resort use satisfaction. Research design, data, and methodology: Data collected from 361 individuals who had experienced the resort service were analyzed using SPSS 29.0 and AMOS 29.0, involving frequency analysis, HTMT, reliability analysis, correlation analysis, confirmatory factor analysis, and structural equation model testing. Result: Firstly, cognitive, and relational experiences had significant effect on resort use satisfaction. Secondly, resort use satisfaction had significant effect on customer behavioral intentions. Thirdly, resort use satisfaction had partial mediating effects in the relationship between customer experiences and customer behavioral intentions. Conclusion: This study academically confirmed the empirical link between customer experience and consumer behaviors. From a practical standpoint, it suggests the necessity of marketing activities that enhance customers' perception of their experiences, as well as resort use satisfaction and customer behavioral intentions, through systematic CS education and management of the physical environment.

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

Proposals to improve government funding of domestic start-up businesses through Living Lab: Focus on Korea Credit Guarantee Fund (사용자 주도의 개방형 혁신을 통한 국내 스타트업 대상의 정부 자금지원 개선 방안 제언: 신용보증기금을 중심으로)

  • Park, Jun-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.301-312
    • /
    • 2018
  • The purpose of this study is to propose strategies for enhancing competitiveness through the utilization of policy funds, especially in the start-up companies supported by the Korea Credit Guarantee Fund. And then, the Korea Credit Guarantee Fund should develop 'user-centered policy funding model' in order to increase start-up's utilization of policy fund and support start-ups that are supported in the long run. The competitiveness of domestic start-up companies has been strengthened by 'user-centered policy funding model' and new innovations have been introduced through 'Living Lab', an open innovation. But, in order to overcome the limitation of reaching the stage of commercialization, the 'user-centered policy funding model' proposed in this study enables start-ups to be the subject of actual policy funding, and also allows users to freely apply for necessary funding at any time. Therefore, the Korea Credit Guarantee Fund has a significance in suggesting 'user-centered policy funding model' as a support model to be customized. However, since SMEs recognize the actual situation and limit acceptance of all the difficulties, the systematic analysis of the actual situation of the policy funds of the start-up by the credit guarantee fund and the related support institutions for the scientific approach of the user-oriented policy funding model need.

A Blockchain-based IIoT Information Collection Model for Improving the Productivity of Small and Medium Businesses (중소기업 생산성 향상을 위한 블록체인 기반의 IIoT 정보 수집 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.1-7
    • /
    • 2019
  • As the cloud environment has become more prevalent among large companies, small and medium-sized companies are also trying to utilize various technologies (IoT, blockchain, etc.) that use cloud services as a way to coexist with large companies. In this paper, a blockchain-based IoT information collection model is proposed to efficiently handle large volumes of IoT data produced by small businesses in order to improve information efficiency of SMEs. The proposed model allowe d small businesses to improve their production efficiency by independently creating groups of the same information so that data that could be generated at the endpoints of small businesses can be block-chained and forwarded to the data center for analysis. In addition, the proposed model's performance assessment was assumed to handle the production throughput of data processed in IoT for small and medium businesses, not large enterprises, so the link between large volumes of data processed in the proposed model could be maintained evenly. One of the biggest features of the proposed model is the ability to expand processes to efficiently control the information of prod ucts produced, as well as the productivity of small and medium enterprises.

An Efficient Personal Information Collection Model Design Using In-Hospital IoT System (병원내 구축된 IoT 시스템을 활용한 효율적인 개인 정보 수집 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.140-145
    • /
    • 2019
  • With the development of IT technology, many changes are taking place in the health service environment over the past. However, even if medical technology is converged with IT technology, the problem of medical costs and management of health services are still one of the things that needs to be addressed. In this paper, we propose a model for hospitals that have established the IoT system to efficiently analyze and manage the personal information of users who receive medical services. The proposed model aims to efficiently check and manage users' medical information through an in-house IoT system. The proposed model can be used in a variety of heterogeneous cloud environments, and users' medical information can be managed efficiently and quickly without additional human and physical resources. In particular, because users' medical information collected in the proposed model is stored on servers through the IoT gateway, medical staff can analyze users' medical information accurately regardless of time and place. As a result of performance evaluation, the proposed model achieved 19.6% improvement in the efficiency of health care services for occupational health care staff over traditional medical system models that did not use the IoT system, and 22.1% improvement in post-health care for users who received medical services. In addition, the burden on medical staff was 17.6 percent lower on average than the existing medical system models.

Multi-blockchain model ensures scalability and reliability based on intelligent Internet of Things (지능형 사물인터넷 기반의 확장성과 신뢰성을 보장하는 다중 블록체인 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.140-146
    • /
    • 2021
  • As the environment using intelligent IoT devices increases, various studies are underway to ensure the integrity of information sent and received from intelligent IoT devices. However, all IoT information generated in heterogeneous environments is not fully provided with reliable protocols and services. In this paper, we propose an intelligent-based multi-blockchain model that can extract only critical information among various information processed by intelligent IoT devices. In the proposed model, blockchain is used to ensure the integrity of IoT information sent and received from IoT devices. The proposed model uses the correlation index of the collected information to trust a large number of IoT information to extract only the information with a high correlation index and bind it with blockchain. This is because the collected information can be extended to the n-tier structure as well as guaranteed reliability. Furthermore, since the proposed model can give weight information to the collection information based on blockchain, similar information can be selected (or bound) according to priority. The proposed model is able to extend the collection information to the n-layer structure while maintaining the data processing cost processed in real time regardless of the number of IoT devices.

Study on measures to introduce Drone Delivery Service for domestic logistics (국내 물류기업의 드론배송서비스 도입방안에 관한 연구)

  • Yoo, Hyun Tae;You, Hak Soo;Jeong, Yoon Say
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.243-249
    • /
    • 2018
  • This study is to verify the accommodation attitudes and intention of use of the end-users to use the drone distribution delivery service that is to be introduced in Korea. For a research purpose, the research model and hypothesis in this study have been set based on by using the SPSS 22.0. Upon these, the extended technology acceptance model has been used to verify the correlation service of new technology, and the result has shown that the user of drone distribution delivery service has a causal relationship with individual innovation and that the accommodation behavior and intention of use have a causal relationship with economic efficiency and convenience. However, there was no causal relation from a perceived risk. Hence, based on the results of study about accommodation behaviors and intention of use of the end users of drone distribution delivery service, the marketing implications have been provided for commercialization of drone delivery service.

6th Industrialization of Agriculture Utilizing the Technology of 4th Industrial Revolution (4차 산업혁명 기술을 활용한 농업의 6차 산업화)

  • Jung, Jin-Sup;Khoe, Kyung-Il
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.211-217
    • /
    • 2018
  • The purpose of this paper is to explore the possibility and strategic directions of Korean agriculture in the future by analyzing domestic and foreign successful cases leading to the 6th industrialization of agriculture by utilizing 4th Industrial Revolution technologies. To do this, we surveyed the key technologies of the 4th Industrial Revolution, and examined successful cases of the US, Korea and China. As results of these case studies, we recognized that 4th Industrial Revolution technologies could play important roles in the 6th industrialization of agriculture, and suggested meaningful strategic implications using ABCD model.

Data Volume based Trust Metric for Blockchain Networks (블록체인 망을 위한 데이터 볼륨 기반 신뢰 메트릭)

  • Jeon, Seung Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.65-70
    • /
    • 2020
  • With the appearance of Bitcoin that builds peer-to-peer networks for transaction of digital content and issuance of cryptocurrency, lots of blockchain networks have been developed to improve transaction performance. Recently, Joseph Lubin discussed Decentralization Transaction per Second (DTPS) against alleviating the value of biased TPS. However, this Lubin's trust model did not enough consider a security issue in scalability trilemma. Accordingly, we proposed a trust metric based on blockchain size, stale block rate, and average block size, using a sigmoid function and convex optimization. Via numerical analysis, we presented the optimal blockchain size of popular blockchain networks and then compared the proposed trust metric with the Lubin's trust model. Besides, Bitcoin based blockchain networks such as Litecoin were superior to Ethereum for trust satisfaction and data volume.

Generalized Hough Transform using Internal Gradient Information (내부 그레디언트 정보를 이용한 일반화된 허프변환)

  • Chang, Ji Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • The generalized Hough transform (GHough) is a useful technique for detecting and locating 2-D model. However, GHough requires a 4-D parameter array and a large amount of time to detect objects of unknown scale and orientation because it enumerates all possible parameter values into a 4-D parameter space. Several n-to-1 mapping algorithms were proposed to reduce the parameter space from 4-D to 2-D. However, these algorithms are very likely to fail due to the random votes cast into the 2-D parameter space. This paper proposes to use internal gradient information in addition to the model boundary points to reduce the number of random votes cast into 2-D parameter space. Experimental result shows that our proposed method can reduce both the number of random votes cast into the parameter space and the execution time effectively.