• Title/Summary/Keyword: Permission Management

Search Result 187, Processing Time 0.021 seconds

The interaction effect of descriptive norm message and regulatory focus in online context of franchise system (프랜차이즈 시스템의 온라인 맥락에서 서술적 규범 메시지와 조절초점의 상호작용 효과)

  • Kim, Sae-Rom;Lee, Dong-il
    • The Korean Journal of Franchise Management
    • /
    • v.9 no.2
    • /
    • pp.31-38
    • /
    • 2018
  • Purpose - In recent years, many companies include franchises have acquire customers by making an online stores and they are carrying out permission marketing activities with e-mail and SMS. Permission marketing requires voluntary customer approval for receiving commercial messages such as cross-selling and upselling. Therefore, it is necessary for the business to induce the customer's acceptance. The purpose of this study is to examine which type of different messages can affect higher in consumer persuasion. Thus, we investigated the impact of descriptive norm message on intention of reception in an online store context, and its interaction with chronic regulatory focus. Research design, data, and methodology - This study hypothesized that the descriptive norm message would affect positive influences to consumers' intension of reception. Specially, this study inquired into whether the interaction effect between descriptive norm and regulatory focus. To verify the hypothesis, we conducted 2 × 2 between-subject factorial design with message type (general message and descriptive norm message) and regulatory focus(promotion focus and prevention focus) as independent variables. Participants of the experiment were assigned to one of 2 kind experimental situations randomly according to characteristics of message type. A total of 131 participants (descriptive norm message: 65, general message: 66) responded for this study. The data were analyzed using frequency analysis, exploratory factor analysis, and two-way ANOVA. Result - The results of the study are as follows. First, we found main effects of the descriptive norm message. The intention of reception were significantly higher in the descriptive norm message rather than general message as in previous researches. Second, interaction effect between the descriptive norm message and regulatory focus was significant. The prevention focus (vs. promotion focus) were hight in a positive behavior intention when the descriptive norm message was given. Conclusions - This study verifies the main effect and interaction effect of descriptive norm message and regulatory focus on the consumers' intention of reception in permission marketing, and persuasive message in the online store context. The results of this study will provide various advantages to companies that want to establish long lasting relationship with customers by carrying out permission marketing in the future.

Study on Applicability of Slope Types to Permission Standard for Forestland Use Conversion (산지의 사면유형을 고려한 산지전용허가기준에 관한 연구)

  • CHOI, Jung-Sun;KWAK, Doo-Ahn;KWON, Soon-Duck;BAEK, Seung-A
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.145-157
    • /
    • 2018
  • Mountainous areas are 64% in Korea and are allowed to be used by the permission standards of the "Mountainous Districts Management Act". In the act, slope and elevation criteria are defined to regulate the use of vulnerable land parcels to disaster. However, the standards cannot represent topographical variation in a land parcel such as terrain relief. Therefore, the applicability of slope type standard as a permission standard was tested using Catena in this study. Based on the theoretical grounds, two slope types were analyzed as 'risky slope' with disaster risk. The slope types of landslides in Namwon City were analyzed that 'risky slope' types were distributed about 57%. This study analyzed the forestland parcels that could be used when applying the current permission standards and the parcels that were already used in Namwon City. The ratio of the 'risky slope' in the parcels was more than 50%. Therefore, it is necessary to prevent the mountain development in 'risky slope' by establishing permission standard related to slope types. In addition, this study suggested the ratio of 'risky slope' in the parcel for the permission standard for forestland use conversion.

The Subjective Perception and Characteristics of the Middle-aged on Death with Dignity (존엄사에 대한 한국 중년층의 인식유형과 특성)

  • Shin, Sun-Ho;Shin, Won-Shik
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.413-422
    • /
    • 2015
  • This study is to grasp fundamental data to prepare the policy about death with dignity(DwD) by grasping perception type of the middle-aged about DwD. 32 middle-ages test Q-sort with 30 statements which is related to DwD. The result of analysis shows that subjective perception types are permission type, opposition type, and limited permission type. First, 'permission type' indicates that DwD by self-determination of patients should be accepted; it is necessary to patients with extreme pain. Second, 'opposition type' insists that there will be more people dying unfairly; a trend to make light of human life could be in everywhere if DwD is permitted. Third, 'limited permission type' agrees with permitting DwD but insists on preparing specific legal system before that. The subject, DwD, itself seems not to be able to draw a complete agreement from people, but national opinions should be reflected during the process of DwD system.

A Model of Role Hierarchies providing Restricted Permission Inheritance (권한상속 제한 기능을 제공하는 역할계층 모델)

  • 이용훈;김용민;이형효;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.37-45
    • /
    • 2003
  • Role-based Access Control(RBAC) model has advantage of easy management of access control with constraints such as permission inheritance and separation of duty in role hierarchy. However, previous RBAC studies could not properly reflect the real-world organization structure with its role hierarchy. User who is a member of senior role can perform all permissions because senior role inherits all permissions of junior roles in the role hierarchy. Therefore there is a possibility for senior role members to abuse permissions due to violation of the least privilege principle. In this paper, we present a new model of role hierarchy, which restricts the unconditional permission inheritance. In the proposed model, a role is divided into sub roles(unconditional inheritance. restricted inheritance, private role), keeping organization structure in corporate environment. With restricted inheritance, the proposed model prevents permission abuse by specifying the degree of inheritance in role hierarchy.

A Study on the Improvement of Legislation System for Activation of e-AIS(Internet Architectural Administration Information System) (법.제도 개선 측면에서의 e-AIS(인터넷 건축행정시스템)의 활성화 방안 연구)

  • Choi, Jung-Sik;Kim, In-Han
    • Korean Journal of Computational Design and Engineering
    • /
    • v.14 no.1
    • /
    • pp.25-32
    • /
    • 2009
  • Ministry of Land, Transport and Maritime Affairs(MLTM) has developed an administration system for architectural information management for completing the electronic application organization of the Architectural administrative information. The main purpose of this study is to suggest legislation system improvement for activation of e-AIS(internet Architectural administration Information System). To achieve this purpose, the authors have investigated the problems of current legislation and soliciting forms for civil affairs applicable to the e-AIS. To handle the current problems of the e-AIS legislation system, legislation and various soliciting forms for civil affairs such as building permission, usage approval, temporary building report are refined. In addition, the authors have suggested possible solutions of current legislation and soliciting forms for civil affairs problems by testing various types of building permission service examples.

A Study on an Improvement Scheme of ISM Management Regulation (전파응용설비 관리제도 개선방안 연구)

  • Park, Yeon-Gyu;Cho, Hyun-Mook;Lee, Il-Kyoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.7
    • /
    • pp.581-587
    • /
    • 2016
  • Recently, ISM(Industrial, Scientific and Medical) equipments that exceed 50 watts were expended at home, medical institutions and industrial sites. Therefore, the equipments that are subject to permission have been significantly increased. So, the present permission system that individually permits each equipment and inspects all equipments has a limitation. Thus, it is also difficult to reflect the environmental changes. In this paper, we reviewed the ISM management system in major foreign countries and domestic, and then proposed an improvement scheme of ISM management system for domestic environment. These results will be useful for revitalization of domestic industry related to ISM equipment and an efficient management of ISM equipments in the future.

APDM : Adding Attributes to Permission-Based Delegation Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.107-114
    • /
    • 2022
  • Delegation is a powerful mechanism that allocates access rights to users to provide flexible and dynamic access control decisions. It is also particularly useful in a distributed environment. Among the representative delegation models, the RBDM0 and RDM2000 models are role delegation as the user to user delegation. However, In RBAC, the concept of inheritance of the role class is not well harmonized with the management rules of the actual corporate organization. In this paper, we propose an Adding Attributes on Permission-Based Delegation Model (ABDM) that guarantees the permanence of delegated permissions. It does not violate the separation of duty and security principle of least privilege. ABDM based on RBAC model, supports both the role to role and user to user delegation with an attribute. whenever the delegator wants the permission can be withdrawn, and A delegator can give permission to a delegatee.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.