• Title/Summary/Keyword: Personal Finance

Search Result 170, Processing Time 0.022 seconds

Energy Consumption and Exercise Effect of University Students During Automatic Stepper Exercise

  • LIU, Shuchang;WU, Renhong;LI, Xinlong
    • The Korean Journal of Food & Health Convergence
    • /
    • v.8 no.3
    • /
    • pp.1-9
    • /
    • 2022
  • Purpose-Meat plays an important role in the Chinese daily diet, however, due to the spread of COVID-19, food supply and safety have become a major concern. The safety and health features of chilled fresh meat have attracted the attention of consumers. To study consumers' purchasing behavior and willingness to pay for chilled meat under the influence of the epidemic. Research methodology- The data were obtained by questionnaire survey, major issues include consumers' meat consumption habits in the wake of the COVID-19 and their awareness of meat product quality labels. In addition, the gender, age, family income, and other basic personal information of the interviewees were also counted. Based on the binary Logit regression method, we study consumers' purchasing behavior and willingness to pay for chilled meat under different demographic characteristics. Results-The results showed that brand and quality certification are important factors influencing purchases. In addition, the presence of children under the age of 12 in the household and the level of income and education also influence consumers' purchase intention of the chilled fresh meat. However, mart promotions and city ratings can significantly lower consumers' propensity to buy the chilled fresh meat. Apart from this, such factors as gender, age, and living conditions have no significant influence on consumers' purchase of chilled fresh meat.

Happiness Leisure Experiences in Consumption

  • RODRIGUES, Paula;SOUSA, Ana;VELOSO, Monica
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.3
    • /
    • pp.377-388
    • /
    • 2022
  • The Personal sense of uniqueness (PSU) is positively associated with subjective well-being and has been recently shown its correlation with happiness, influencing consumer's experience behavior. However, the effects of hedonic and eudaimonic experience on conspicuous and inconspicuous (consumer's need for status and inner fulfillment) are unknown. The purpose of this research is to address a gap existing in the literature by testing the effects of PSU on hedonic and eudaimonic leisure experiences and how happiness leisure experiences effects conspicuous and inconspicuous consumption. The relationships hypothesized in the model are tested using partial least squares structural equation modeling (PLS-SEM) and bootstrapping procedure. Data was gathered using a self-administrated survey, answered by 200 consumers based on consumers' leisure experiences. The findings of this study suggest that (i) PSU positively and significantly influence hedonic and eudaimonic happiness; (ii) the effect of PSU on eudaimonic happiness is higher than in hedonic happiness; (iii) eudaimonic happiness positively and significantly influence conspicuous and inconspicuous consumption; and (iv) hedonic happiness negatively and significantly influence conspicuous and inconspicuous consumption. This study helps fill a gap in the literature by introducing and testing the effect of hedonic and eudaimonic leisure experiences and the relationship between these constructs and PSU and (in) conspicuous consumption.

A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations (정보보호 관리체계를 위한 주요 통제영역 연구: 금융 관련 조직을 중심으로)

  • Kang, Youn-chul;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.9-20
    • /
    • 2018
  • Financial service industry has introduced and operated management systems such as information security management system (ISMS), personal information security management system, business continuity management system to protect and maintain suitably customer's financial information and financial service. This study started that it's desirable financial industry takes consideration of ISMS and it can be different types among various organizations taking consideration of culture, practical work, and guideline of information security. The study derives primary control areas of ISMS through analyzing non-conformity trends and control factors according to certification audit for finance-related organizations introduced international ISMS of ISO27001 which is well known and commonly applicable irrespective of areas in financial service industry. Through case analyses for five finance-related organizations operating ISMS, this study analyzed improvement effects of ISMS. It has a meaning as an initial research though it was difficulty in acquiring data for empirical study because of rare organizations maintaining certification in financial sector. As a result, number of non-confirmity from the first audit to three years' elapse was decreased every year. Physical and environmental security, communication and operations management, and access control having the highest frequency of non-conformity each presented 23%, 19%, and 17%, which reached 59% in total and they are derived into primary control areas. ISMS can fulfill technical, managerial, physical security issues, which have not been treated importantly in financial industry. In addition, this study presented that ISMS can be an effective management system applicable for financial service industry.

A Study on the Intention of Early Users of Digital Finance baesd Mydata Service Application (디지털금융 기반 마이데이터 앱 초기 사용자들의 이용의도에 관한 연구)

  • Lee, Tae Won;Sung, Haeng Nam
    • The Journal of Information Systems
    • /
    • v.32 no.1
    • /
    • pp.1-21
    • /
    • 2023
  • Purpose The purpose of this study is to investigate the intention of early application users in consideration of the characteristics of digital finance-based MyData service users. It is expected that user characteristics will affect the intention to use MyData service, which has not yet been advanced, and accordingly, it will examine how the characteristics of the initial users of MyData service and the intention to use it are connected. Design/methodology/approach The model used in this study is a value-based adoption model (VAM), and a lot of research has been conducted on information technology and online user acceptance and continuous use intention of online users. VAM has been proven useful through empirical analysis in many studies. The value-based acceptance model is a method of analyzing the intention to use Benefits and Sacrifices as the main elements of perceived value. It can be said to be a model that can analyze the benefits of use and the sacrifices to be made. Findings According to the analysis results of this study, it was found that usefulness, enjoyment, and reliability, which are the benefits of MyData service apps, had a positive effect on perceived value, which is partially consistent with existing research results. However, it was found that complexity, which is the sacrifice of MyData service apps, negatively affects perceived value and security has no negative impact. The results of security are considered to be complementary to financial institutions because MyData service deals with financial data based on personal information, and the research hypothesis is rejected because users' demands are relatively low. Therefore, MyData service apps should do more to increase benefits (usefulness, enjoyment, and reliability) than to reduce sacrifice (complexity) to users.

An Empirical Research on Information Privacy Risks and Policy Model in the Big data Era (빅데이터 시대의 정보 프라이버시 위험과 정책에 관한 실증 연구)

  • Park, Cheon Woong;Kim, Jun Woo;Kwon, Hyuk Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.131-145
    • /
    • 2016
  • This study built the theoretical frameworks for empirical analysis based on the analysis of the relationship among the concepts of risk of information privacy, the policy of information privacy via the provision studies. Also, in order to analyze the relationship among the factors such as the concern of information privacy, trust, intention to offer the personal information, this study investigated the concepts of information privacy and studies related with the privacy, and established a research model about the information privacy. Followings are the results of this study: First, the information privacy risk has the positive effects upon the information privacy concern and it has the negative effects upon the trust. Second, the information privacy policy has the positive effects upon the information privacy concern and it has the negative effects upon the trust. Third, the information privacy concern has the negative effects upon the trust. At last, the information privacy concern has the negative effects upon the provision intention of personal information and the trust has positive effects upon the offering intention of personal information.

Determinants of the Utilization of Micro-enterprise Support Services (소액창업 지원서비스 이용에 영향을 미치는 요인 분석)

  • Chung, Youngsoon;Shim, Haisun;Kim, Kyoyeon
    • Korean Journal of Social Welfare Studies
    • /
    • v.41 no.4
    • /
    • pp.135-160
    • /
    • 2010
  • This study was designed to analyze, by using a hierarchical logistic regression analysis method, how difficulties in business start-ups and personal characteristics independently determine the utilization of micro-enterprise support services. The services were categorized into eight areas: capital, technical service, psychological service, item feasibility and business plan, site selection and interior service, marketing, finance and accounting, employment service. This study found that difficulties in business start-ups were a significant factor in six areas. Personal characteristics were a significant factor in four areas, when difficulties in start-ups were controlled. Among the personal characteristics, higher possibility of service utilization was anticipated in people with start-ups experience than people without experience, and in women than men. This results point out that service strategies should be targeted for people with difficulties in order to improve the accessibility of micro-enterprises support services. The results also indicate that the strategies should be considered for people with no start-ups experience, low academic ability, and female entrepreneurs who are vulnerable.

A Personal Information Security System using Form Recognition and Optical Character Recognition in Electronic Documents (전자문서에서 서식인식과 광학문자인식을 이용한 개인정보 탐지 및 보호 시스템)

  • Baek, Jong-Kyung;Jee, Yoon-Seok;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.451-457
    • /
    • 2020
  • Format recognition and OCR techniques are widely used as methods for detecting and protecting personal information from electronic documents. However, due to the poor recognition rate of the OCR engine, personal information cannot be detected or false positives commonly occur. It also takes a long time to analyze a large amount of electronic documents. In this paper, we propose a method to improve the speed of image analysis of electronic documents, character recognition rate of the OCR engine, and detection rate of personal information by improving the existing method. The analysis speed was increased using the format recognition method while the analysis speed and character recognition rate of the OCR engine was improved by image correction. An algorithm for analyzing personal information from images was proposed to increase the reconnaissance rate of personal information. Through the experiments, 1755 image format recognition samples were analyzed in an average time of 0.24 seconds, which was 0.5 seconds higher than the conventional PAID system format recognition method, and the image recognition rate was 99%. The proposed method in this paper can be used in various fields such as public, telecommunications, finance, tourism, and security as a system to protect personal information in electronic documents.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Development of Data Fusion Human Identification System Based on Finger-Vein Pattern-Matching Method and photoplethysmography Identification

  • Ko, Kuk Won;Lee, Jiyeon;Moon, Hongsuk;Lee, Sangjoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.149-154
    • /
    • 2015
  • Biometric techniques for authentication using body parts such as a fingerprint, face, iris, voice, finger-vein and also photoplethysmography have become increasingly important in the personal security field, including door access control, finance security, electronic passport, and mobile device. Finger-vein images are now used to human identification, however, difficulties in recognizing finger-vein images are caused by capturing under various conditions, such as different temperatures and illumination, and noise in the acquisition camera. The human photoplethysmography is also important signal for human identification. In this paper To increase the recognition rate, we develop camera based identification method by combining finger vein image and photoplethysmography signal. We use a compact CMOS camera with a penetrating infrared LED light source to acquire images of finger vein and photoplethysmography signal. In addition, we suggest a simple pattern matching method to reduce the calculation time for embedded environments. The experimental results show that our simple system has good results in terms of speed and accuracy for personal identification compared to the result of only finger vein images.

Career Competencies of Human Resource Development Practitioners

  • PARK, Yong-Ho
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.4
    • /
    • pp.259-265
    • /
    • 2020
  • The study aims to define the career competency of HRD practitioners based on an intelligent career framework. This intelligent career framework has been described as having been achieved by the accumulation of career capital through the three ways of knowing, including knowing why, knowing how, and knowing with whom. The data were collected from the interviews with 15 HRD practitioners. Semi-structured interviews were used to collect data from the HRD practitioners. For the orientation about the interview, the researcher explained the importance of gathering data about the personal experiences of the respondents on their work and career. After that explanation, the researcher asked several questions based on the pre-structured interview guide. The data collected were qualitatively analyzed on the basis of the intelligent career framework. Based on the analysis of the interviews, the subcategories of each way of knowing competency were identified. For the knowing why, identity, credibility, and career clarity were identified. The subcategories of knowing how are remaining updates, hard skills, and soft skills, while the subcategories of knowing with whom are personal networking and professional networking. The interdependency among the three career competencies was found. The findings provide theoretical implications of applying an intelligent career framework.