• Title/Summary/Keyword: Information Security Strategic

Search Result 148, Processing Time 0.029 seconds

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare

  • Kim, Eun-Jin;Lee, Byeong-Tae
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.141-146
    • /
    • 2007
  • The importance of the net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of a well-implemented the net-based customer service are enhanced customer loyalty and higher lock-in of customers, and the resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such the net-based customer service. This is partly due to the e-commerce divide, and partly due to privacy and security concerns of the customer for sharing personal information with firms. The limited level of customer adoption of the net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We find that an increase in adoption of the net-based customer service by the customer base is not always desirable for firms. and that customers who utilize such services are better off only when the overall adoption is limited.

  • PDF

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

[Retracted] A Study on the Export Control System and its Effective Implementation Plan in Korea ([논문 철회] 한국의 전략물자 수출통제제도의 문제점과 효율적 이행방안)

  • Lee, Sang-Ok
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.353-375
    • /
    • 2011
  • Export control was first triggered by international export control system at US led COCOM in 1949. Numerous international efforts such as NPT in 1969, ZC in 1970, NSG in 1978, AG in 1985, MTCR in 1987, Wassenaar Arrangement(WA) establishment in 1995 with 1990's the fall of the Berlin Wall, have been made since. The concept of export control has been changed from weaponry and parts export control to preventing or blocking weaponry, respective goods and relevant technology from the hand of troubled regions and non-state actors as terrorist groups; and the new concept is described as Nonproliferation Control. Extent of control items is not only limited to conventional weaponry, but also includes weapons of mass destruction(WMD) and even dual use items which can be used for production, development, usage or storage. Control items include all items defined by NSG, MTCR, AG, WA, and CMC-Opec. The 9.11 terror had a strong influence on international society. Effort to prevent WMD proliferation has now become the most important issue for international security. This study aims to suggest improvement points for nonproliferation law and its effective implementation, based on problem and limitation identification along with analysis of nonproliferation law and implementation examples by type. Furthermore for the purpose of national and global security, export control system on strategic items which are considered to be a key issue in South and North Korea relationship needs to be effectively managed. Recently, North Korea's missile and nuclear tests have been criticized globally; and the global society including respective countries as China and South Korea is striving to urge export control in line with the UN resolution.

  • PDF

The Study on the e-Service Quality Factors in m-Shopping Mall App based on the Kano Model (카노 모형을 이용한 모바일 쇼핑몰 앱의 서비스 품질 요인 분석에 관한 연구)

  • Kim, Sang-Oh;Youn, Sun-Hee;Lee, Myung-Jin
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.63-72
    • /
    • 2018
  • Purpose - In this study, it is classified the service quality dimension of mobile shopping app using Kano model. In addition, it is evaluated quality factors suitable for strategic management from the viewpoint of service provider through mobile application through binary dimension analysis. Research design, data, and methodology - In this study, seven quality dimensions such as information quality, reliability, immediacy, convenience, design, security and customer service were derived through related studies to make binary shopping quality app quality measurement. 37 sub-variables were set by each quality dimensions. Each questionnaire was composed of positive and negative items like Kano's proposed method, and the satisfaction coefficient suggested by Timko(1993) was examined to understand the influence of each factors on customer satisfaction. Results - As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. And, in information quality, the information overload was classified as an apathetic quality component, while the related information provision belonged to an attractive quality component. In reliability quality, customized service provision was classified as an attractive quality component. In instant connectivity, the quality of the connection during transport was classified as an attractive quality component. In convenience quality, access to product information was classified as a one-way quality component. All components of designs quality were classified as attractive quality components, and in security quality, all of their components were all classified as one quality component. Lastly, in customer service, they components were all classified as a single quality component. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. Conclusion - In the online service environment, which is difficult to differentiate in terms of upward upgrading only by technological implementation and function, the results of this study can be suggested as a differentiating factor for major channels with customers rather than improve the brand image.

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF

An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication

  • S. Thangam;S. Sibi Chakkaravarthy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2253-2280
    • /
    • 2024
  • In the upcoming era of transportation, a groundbreaking technology, known as vehicle-to-everything (V2X) communication, is poised to redefine our driving experience and revolutionize traffic management. Real-time and secure communication plays a pivotal role in V2X networks, with the decision-making process being a key factor in establishing communication and determining malicious nodes. The proposed framework utilizes a directed acyclic graph (DAG) to facilitate real-time processing and expedite decision-making. This innovative approach ensures seamless connectivity among vehicles, the surrounding infrastructure, and various entities. To enhance communication efficiency, the entire roadside unit (RSU) region can be subdivided into various sub-regions, allowing RSUs to monitor and govern each sub-region. This strategic approach significantly reduces transaction approval time, thereby improving real-time communication. The framework incorporates a consensus mechanism to ensure robust security, even in the presence of malicious nodes. Recognizing the dynamic nature of V2X networks, the addition and removal of nodes are aligned. Communication latency is minimized through the deployment of computational resources near the data source and leveraging edge computing. This feature provides invaluable recommendations during critical situations that demand swift decision-making. The proposed architecture is further validated using the "veins" simulation tool. Simulation results demonstrate a remarkable success rate exceeding 95%, coupled with a significantly reduced consensus time compared to prevailing methodologies. This comprehensive approach not only addresses the evolving requirements of secure V2X communication but also substantiates practical success through simulation, laying the foundation for a transformative era in transportation.

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

A Machine Learning Univariate Time series Model for Forecasting COVID-19 Confirmed Cases: A Pilot Study in Botswana

  • Mphale, Ofaletse;Okike, Ezekiel U;Rafifing, Neo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.225-233
    • /
    • 2022
  • The recent outbreak of corona virus (COVID-19) infectious disease had made its forecasting critical cornerstones in most scientific studies. This study adopts a machine learning based time series model - Auto Regressive Integrated Moving Average (ARIMA) model to forecast COVID-19 confirmed cases in Botswana over 60 days period. Findings of the study show that COVID-19 confirmed cases in Botswana are steadily rising in a steep upward trend with random fluctuations. This trend can also be described effectively using an additive model when scrutinized in Seasonal Trend Decomposition method by Loess. In selecting the best fit ARIMA model, a Grid Search Algorithm was developed with python language and was used to optimize an Akaike Information Criterion (AIC) metric. The best fit ARIMA model was determined at ARIMA (5, 1, 1), which depicted the least AIC score of 3885.091. Results of the study proved that ARIMA model can be useful in generating reliable and volatile forecasts that can used to guide on understanding of the future spread of infectious diseases or pandemics. Most significantly, findings of the study are expected to raise social awareness to disease monitoring institutions and government regulatory bodies where it can be used to support strategic health decisions and initiate policy improvement for better management of the COVID-19 pandemic.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Forecasting the Diffusion of Technology using Patent Information: Focused on Information Security Technology for Network-Centric Warfare (특허정보를 활용한 기술 확산 예측: NCW 정보보호기술을 중심으로)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.125-132
    • /
    • 2009
  • The paradigm of economy has been transformed into knowledge based economic paradigm in 21th century. Analysis of patent trend is one of the strategic methods for increasing their patent competitive power. However, this method is just presenting statistical data about patent trend or qualitative analysis about some core technology. In this paper, we forecast technology diffusion using patent information for more progressive analysis. We make an experiment with bass model and logistic model and make use of patent data about information-security technology for NCW as input data. We conclude that the logistic model is more efficient for forecasting and this technology is approaching to the age of technology maturity.