• Title/Summary/Keyword: Price and Security

Search Result 250, Processing Time 0.032 seconds

Factors Influencing the Adoption of mHealth Services in Saudi Arabia: A Patient-centered Study

  • Almegbel, Halah;Aloud, Monira
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.313-324
    • /
    • 2021
  • This study empirically investigates the factors influencing the intention to accept mobile technology in Saudi healthcare service delivery using the extended unified theory of acceptance and use of technology model (UTAUT) with perceived reliability and price value. Accordingly, a conceptual model combining behavioral constructs with those linked to the technology acceptance model is developed. This model aims to identify factors that predict patients' acceptance of mobile technology healthcare service delivery. The developed model is examined using responses obtained from a survey on 545 participants receiving healthcare services in Saudi Arabia. Thus, we have conceptualized the developed model and validated seven hypotheses involving key constructs. Results suggest that performance expectancy, effort expectancy, social influence, facilitating conditions, price value, and perceived reliability are direct predictors of user behavior to accept mobile technology in healthcare service delivery. The results provide empirical evidence to the literature on the effect of facilitating conditions and effort expectancy on mobile health (mHealth) adoption. The results show that the COVID-19 pandemic has significantly increased the adoption of mHealth services in Saudi Arabia.

Basic Concepts and Detailed Dimensions of Food Security and Related Indicators for Policy Development and Evaluation (식품보장 기준선 마련을 위한 기본 개념과 세부 영역 설정 및 관련 지표 탐색)

  • Park, Sohyun;Hwang, Ji-Yun;Shim, Jae Eun;Kim, Kirang
    • Korean Journal of Community Nutrition
    • /
    • v.26 no.6
    • /
    • pp.429-440
    • /
    • 2021
  • Objectives: Standardized guidelines and reference points for a food security policy are necessary to guarantee that basic social safety nets work properly. Therefore, this study aimed to explore the basic concepts and detailed dimensions of food security, including the potential relevant indicators, and sought to establish standardized well-being baselines. Methods: A literature review and 14 expert roundtable discussions were carried out to analyze and extract the key concepts of food security. After determining these concepts and detailed dimensions of food security, a conceptual framework was modeled. Then, indicators for each local government that could be monitored and evaluated for each sub-area were suggested. Results: The concept of food security was defined as follows: Individuals should be provided with sufficient, safe, and quality food, which should be accessible to the community and available for use to achieve health and well-being. In addition, food security should be ensured sustainably in a changing environment. Four dimensions were suggested while conceptualizing food security. First, sufficient food, which means sufficient food supply in quantity, quality, and safety. Second, equitable food which includes creating environments in which high-quality and safe food can be purchased at an appropriate price and can be provided regardless of the socioeconomic gap. Third, healthy food which should be provided to promote people's health and happiness through the eco-friendly consumption of food. Fourth, sustainable food, which can be supplied in a sustainable manner and as part of an eco-friendly food system that considers the conservation of natural environments. Conclusions: The basic concepts and detailed areas of food security including the potential indicators proposed in this study, may be useful for developing and implementing various policies and programs to support food and nutrition security in the future.

Estimating the Determinants for the Sales of Retail Trade:A Panel Data Model Approach (페널 데이터모형을 적용한 소매업 매출액 결정요인 추정에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.83-92
    • /
    • 2008
  • In respect complication of group and period, the sales of retail trade is composed of various factors. This paper studies focus on estimating the determinants of the sales of retail trade. The volume of analysis consist of 7 groups. Analyzing period be formed over a 36 point(2005. 1$\sim$2007. 12). In this paper dependent variable setting up sales of retail trade, explanatory(independent) variables composed of composite stock price index, the number of the consumer's online buying behavior company, the coincident composite index, the index of trading price of APT, employment rate, an average of the rate of operation(the manufacturing industry), the consumer price index. The result of estimating the determinants of sales of retail trade provides empirical evidences of significance positive relationships between the coincident composite index, the index of trading price of APT, employment rate, an average of the rate of operation(the manufacturing industry). However this study provides empirical evidences of significance negative relationships between the consumer price index. The explanatory variables, that is, composite stock price and the number of the consumer's online buying behavior company, are non-significance variables. Implication of these findings are discussed for content research and practices.

  • PDF

Approach to History and Problems of Health Insurance through Politics of Law (국민건강보험법의 발전과정과 법정책적 과제)

  • Cho, Hyong-Won
    • The Korean Society of Law and Medicine
    • /
    • v.8 no.2
    • /
    • pp.37-68
    • /
    • 2007
  • Health insurance has gone far toward solving Korea's health related problems through thirty years. Health Insurance as social security system has a role of national system to secure national health. But there are many problems in health insurance. There is a dispute about many issues, coverage of health security, compulsory appointment of health insurance organization, coverage and level of health insurance benefit, decisionmaking right of health insurance price, examination of health insurance etc. Generally, the opinion for health insurance policy to be leaded by nation sets against the opinion to be leaded by private sector. It is necessary to study politics of law, constitute law and comparative law for rational solving these problems. If desirable setting of health law system can be made, legal system must be set during a long time and be discussed synthetically in different standpoint.

  • PDF

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

Optimal Bidding Strategy for VM Spot Instances for Cloud Computing (클라우드 컴퓨팅을 위한 VM 스팟 인스턴스 입찰 최적화 전략)

  • Choi, Yeongho;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.9
    • /
    • pp.1802-1807
    • /
    • 2015
  • The cloud computing service provides physical IT resources to VM instances to users using virtual technique and the users pay cost of VM instances to service provider. The auction model based on cloud computing provides available resources of service provider to users through auction mechanism. The users bid spot instances to process their a job until its deadline time. If the bidding price of users is higher than the spot price, the user will be provided the spot instances by service provider. In this paper, we propose a new bidding strategy to minimize the total cost for job completion. Typically, the users propose bidding price as high as possible to get the spot instances and the spot price get high. we lower the spot price using proposed strategy and minimize the total cost for job completion. To evaluate the performance of our strategy, we compare the spot price and the total cost for job completion with real workload data.

Determination of Nursing Price using Willingness to Pay (지불용의접근법을 이용한 간호서비스의 가격결정)

  • Ko, Su-Kyoung;Park, Jeong-Young
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.7 no.2
    • /
    • pp.205-221
    • /
    • 2001
  • It will become more and more popular to use the long-term care facilities and home health care services with the chronic disease increasing. It depends on how much the consumers would pay and purchase the services. They might get more benefits from that kind of services than from ordinary hospitalization. So far, the study of determining the medical service price has focused most often on the efforts from the providers' view. But it must be reasonable to include the consumers' value for the service. This study was performed to assess WTP(Willingness to Pay) for home health care service in order to apply to the determination of nursing price in a reasonable manner. In this study, respondents were asked if they would pay for the service's intangible benefits under the four different types(open-ended minimum WTP, open-ended maximum WTP, bidding WTP, referendum WTP). The contingent valuation method is a potentially useful tool in understanding how people value the benefits of the service. As a result, average open-ended minimum WTP was W16,015 per day among 65 respondents. Average open-ended maximum WTP was W29,154 per day among 65 respondents. Average bidding WTP was W26,300 per day among 65 respondents. Average referendum WTP was W22,200 per day among 70 respondents. The results of regression analyses were also consistent with theoretical prediction, e.g., increasing WTP with consumers' value for the service, state of patients, and household income. This study demonstrated that it was more reasonable to consider the consumers' value in determining the services' price. In addition, a further study is needed to test the validity of this CV method and to determine a proper nursing price based on the consumers' view.

  • PDF

An Ordinary Management System for Updating Construction Equipment Prices in the Poom-Saem Based on the Standard Market Price1 (시가표준액표를 활용한 건설공사표준품셈 건설기계가격 상시관리 시스템 개발)

  • Ahn, Bang-Ryul;Tae, Yong-Ho;Kim, Dae;Huh, Young-Ki
    • Journal of the Korea Institute of Building Construction
    • /
    • v.15 no.4
    • /
    • pp.397-404
    • /
    • 2015
  • Construction equipment cost is critical to estimate the total construction costs, particularly in large and complicated projects. Public construction projects are typically estimated using the Poom-Saem which includes hourly rates for workers and equipments. Despite its importance, the construction equipment cost may not properly reflect the current market value because it is being updated every six years at most. To keep the data for construction equipment cost estimation up to date, it is highly recommended to use the standard market price that is reported each year by the Ministry of Security and Public Administration (MOSPA). However, there is still a wide gap to directly adopt the standard market price for updating the construction equipment prices. Therefore, this paper suggests an effective way to develop an ordinary management systems for updating construction equipment prices in the Poom-saem based on the standard market price.

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Method Decoder for Low-Cost RFID Tags

  • Juels, Ari
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.47-52
    • /
    • 2008
  • A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.

  • PDF