• Title/Summary/Keyword: Security Behavior

Search Result 905, Processing Time 0.034 seconds

Design of Deep Learning-based Tourism Recommendation System Based on Perceived Value and Behavior in Intelligent Cloud Environment (지능형 클라우드 환경에서 지각된 가치 및 행동의도를 적용한 딥러닝 기반의 관광추천시스템 설계)

  • Moon, Seok-Jae;Yoo, Kyoung-Mi
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.3
    • /
    • pp.473-483
    • /
    • 2020
  • This paper proposes a tourism recommendation system in intelligent cloud environment using information of tourist behavior applied with perceived value. This proposed system applied tourist information and empirical analysis information that reflected the perceptual value of tourists in their behavior to the tourism recommendation system using wide and deep learning technology. This proposal system was applied to the tourism recommendation system by collecting and analyzing various tourist information that can be collected and analyzing the values that tourists were usually aware of and the intentions of people's behavior. It provides empirical information by analyzing and mapping the association of tourism information, perceived value and behavior to tourism platforms in various fields that have been used. In addition, the tourism recommendation system using wide and deep learning technology, which can achieve both memorization and generalization in one model by learning linear model components and neural only components together, and the method of pipeline operation was presented. As a result of applying wide and deep learning model, the recommendation system presented in this paper showed that the app subscription rate on the visiting page of the tourism-related app store increased by 3.9% compared to the control group, and the other 1% group applied a model using only the same variables and only the deep side of the neural network structure, resulting in a 1% increase in subscription rate compared to the model using only the deep side. In addition, by measuring the area (AUC) below the receiver operating characteristic curve for the dataset, offline AUC was also derived that the wide-and-deep learning model was somewhat higher, but more influential in online traffic.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

A Comparative Study of the Security Prevention Strategies on Arson: Focused on the Behavioral Characteristics between Serial Arsonists and Simple Arsonists (방화범죄의 경비예방 전략에 관한 비교연구 - 연쇄방화범과 단순방화범의 행위적 특성을 중심으로 -)

  • You, Wan-Seok;Hwang, Sung-Hyun
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.139-162
    • /
    • 2011
  • The purpose of this study is to compare with the general and behavioral characteristics between simple and serial arsonists using the data derived from Scientific Crime Analysis System, Criminal Filing Search System, and Crime Information Management System. The analysis and findings reported here are derived from data extracted from 160 arsonists arrested by police officer. The independent variables included such socio-economic characteristic as arsonists' gender, age, occupation, education level, and previous criminal records of arsonists, and finally the general characteristics of the scene of fire settings. The dependent variable is whether or not serial fire setter. To achieve the purpose, the analysis of frequencies and cross-tab were conducted. According to frequence and cross-tab analysis, there are great differences of the general and behavior characteristics between two groups. In the comparison of simple and serial arsonists, serial arsonists are more likely to have previous criminal records, low socio-economic status, unmarried and no cohabitants than simple arsonists. furthermore, serial arsonists are more likely to use garbage papers for fire setting in the scene of the crime, to have mental or psychological problems, and to get involved in fire setting for the psychological pleasure than simple arsonists do. The present research has some obvious limitations. First, the analysis is based only on arsonists arrested by police officers. These may be considerable differences in arsonists arrested by police officers and fire setters not arrested by them. Additional research is needed to assess the extent to which these findings would apply to fire setters not arrested by police officer in Korea. Secondly, the data in this study are cross-sectional and simple cross-tab analysis are used. Potential limitation of cross-sectional data concerns the inability to specify the changes in measures as arsonists behavioral characteristics. Therefore, further studies need to use longitudinal data and more complicate statistical techniques such as correlation analysis, multiple regression analysis, or LISREL models to specify the casual relationships between dependent and independent variables for fire settings. Even if this study has some limitations, it is meaningful in which it first investigated the comparison of simple and serial arsonists focusing on the general and behavioral characteristics between two groups in Korea.

  • PDF

An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection (SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구)

  • Lim, Jung-Ho;Kwon, Sun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.681-694
    • /
    • 2018
  • This paper studied the effects of risk cognition of personal information and self-expression information on conation of privacy protection. In the first study, 88 college students who volunteered for this research were surveyed about risk cognition of personal information and conation to protect it. In the second study, after an information-seeking expert collected and organized the self-expression information that 88 volunteers had expressed on SNS, and then showed the organized self-expression information to 88 volunteers, and then 88 volunteers were surveyed about risk cognition of self-expression information and conation to protect it. As results of the first data analysis, the risk cognition of personal information had the greatest influence on non-disclosure of personal information, followed by reduction of the disclosure scope and law institutionalization requirement. As results of the second data analysis, SNS users openly expressed their opinion or life-style, but when they realized that self-expression information can be accumulated and become sensitive information, they had conation to protect their self-expression information such as non-disclosure, reduction of disclosure scope, and law institutionalization requirement. The implication of this study is that we have overcome the limitations of existing researches that can not explain information protection behavior on SNS.

Structural Relationships among Health Concern, Health Practice and Health Status of the Disabled (장애인의 건강관심도, 건강실천행위 그리고 건강수준간의 구조분석)

  • Chun, Byung-Yeol;Kam, Sin;Yeh, Min-Hae;Kang, Yun-Sik;Kim, Keon-Yeop;Son, Jae-Hee;Lee, Young-Suk;Park, Ki-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.32 no.3
    • /
    • pp.276-288
    • /
    • 1999
  • Objectives: This study was performed to determine the relationships among health concern, health practice and health status of the disabled. Methods: A self-administered questionnaire survey was carried out for 1,662 disabled persons in Taegu city from April to July, 1997. Results: Health concern had a significant and positive relationship with health practice(p<0.05) and health practice also had a significant and positive relationship with self-rated health status(p<0.05) in men and women. To determine the structural model of the Health concern, health practice, health status and sociodemographic variables, the covariance structural analysis was used. In men, age, economic status, medical security type, educational level and type of disability had significant direct effects on Health concern(T>2.0). Educational level and type of disability had significant direct effects on health practice(T>2.0). And Economic status, medical security type and job status had significant direct effects on health status(T>2.0). In women, economic status and educational level had significant direct effects on Health concern(T>2.0). However there was no variable which had a significant direct effect on health practice. Job status had a significant direct effect or health status(T>2.0). In men and women, health practice was significantly increased with increasing health concern and the more health practice, the higher health status(T>2.0). Conclusions: It is recommended that the institutional approach which improve the economic status of the disabled with understanding their behavior and attitude should be established to increase health status, in addition, the health policy for encouraging the disabled, such as health education, consulting and health promotion program, should be done.

  • PDF

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

Customer Information Management of Online Fashion Companies: From CRM Perspectives (CRM 관점에서 본 온라인 의류업체의 고개정보관리)

  • Chung Ihn-Hee;Kim Soon-Chul;Hwang In-Do;Jung Ji-Wook;Choo Ho-Jung
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.2 s.101
    • /
    • pp.83-100
    • /
    • 2006
  • As online fashion businesses achieve rapid growth in the last few years, they gather various kinds of customer information through customer registration procedures and expect to utilize this information for CRM programs. The purpose of this study were to understand the current practices of customer information management of online fashion companies and to discuss how to improve it for the benefit of both customers and fashion businesses. This study included three steps of empirical data collection process: First, online fashion companies were visited and content analyzed at three time periods-2002, 2003, and 2004. Second, a questionnaire was developed and surveyed with 488 customers. And third, interviews with two groups were conducted, one with customers who experienced customer registration with online fashion companies and the other with experts of web developing. Through customer registration procedures, personal and contact information such as name, citizen registration number(social security number), home address, home telephone number, and cellular phone number were most frequently required. Customers were asked to provide more specific information regarding their privacy, online behavior, and taste recently. The variety of information category in 2004 observation was larger than 2002, but the amount of required information from each company got smaller. Customers tended to provide some false infor- mation, and the most frequently cited reason for that was 'too much hassle' and 'no practical benefit from information provision'. Customers were concerned with the exposure of personal information such as citizen registration number. The ideal number of pieces of information required was identified as 3 to 5 including name, phone number, and address. The paper was concluded with the discussion of customer information management from CRM perspective, CRM program, information analysis methods, and security.

The Analysis about Factors That Influence the Motive of Partner Homicide (배우자살인의 동기에 영향을 미치는 요인분석)

  • Shin, Shik;Gong, Jung-Sick
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.201-224
    • /
    • 2006
  • This study explained about the different motive of partner homicide and this homicide's elements which are feature of human sociology, home environment, school life and partner's trouble causes. After analyzed these element which affect to the motive of partner homicide, we couldn't find statistical differences of partner homicide motive by sex, having a job. However, there are small gap in an age group. Almost the homicide by expressive motive was a primary factor in the whole mass but, in the age of 40's, 11.1% is by the homicide of instrumental motive in the partner homicide. We need some more detail analysis and the partner murderer who growed up in very poor home circumstances commit Homicide by 100% expressive motive. This result suggested that murderer who was in the inferior home environment can do murder more easier than normal because of their emotional reason which are urgent, impulsive and contingent. On the other hand, their school life behavior during a growth process was useless for explain the motive of partner homicide. On one side, we could confirm that partner's trouble cause is a very useful element for explain the partner homicide, that is, if the if the level of conflict with partner's were high, the murder by expressive motive will grow up. But we must see the fact that the partner homicide's rate is 13.3% by instrumental motive in the low trouble causes very carefully for understand the partner homicide.

  • PDF

Study on the Realities in Seoul Subway Crimes: Criminal Psychology (서울지하철 범죄 실태에 대한 범죄심리학적 연구)

  • Rim, Sang-Gon
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.233-285
    • /
    • 2004
  • ‘Defined legally as a violation of law' (Sutherland, E. H. Principles of Criminology, Lippincott, Chicago, 1939) Crime within the group is essentially and primarily antisocial in that the criminal who is welfare of his group acts instead against it and breaks the principles of social solidarity not merely by not doing what these principles prescribe, but by doing something exactly opposites. Any program set up to attack crime and delinquent behavior at their sources. A program of his nature needs the constant and comprehensive collaboration of psychiatrists, social works, educations, lawmakers, and public officials, since crime is a social problem and it should be treated as such. Some crime preventives which should be mentioned are as follows, (1) The insurance that every child will be decently born and that his home life be socially and economically adequate; without socially mature parents the chid is handicapped at the start; thus parental education, integrated with the public school system, should be developed now. (2) A more meaningful educational program which would emphasize ideals of citizenship, moral integrity, and respect for the law and the police. (3) A periodic check made for potential delinquents throughout the public schools and treatment provided if possible; and if not, proper segregation in institutions. (4) Careful attention paid to press, movies, and radio so that crime may no longer appear to be glamorous. This can be done by women's clubs, civic bodies, and other educational groups exerting pressure on the movie syndicates and broadcasting companies to free their productions of the tawdry and lurid characteristics of crime and criminals. Aggression associated with the phallic stage of development, The child ordinarily comprehends sexual intercourse as an aggressive and sadistic act on the part of the male, and specifically on the part of the penis. Evidence that the penis is phantasied as a weapon of violence and destruction come from unconscious productions of normal adults. Limerick, for instance, often refer to the penis as square, or too large, etc., so that intercourse is dangerous and painful for the partner, This may wall be a projection of the male's own fear of coitus. A certain portion of the death-instinct always remains within the person; it is called 'primal sadism' and according to Freud is identical with masochism. 'After the chief part of it(the death instinct) has been directed outwards towards objects, there remains as a residuum within the organism the true erotogenic masochism, which on the one hand becomes a component of the libido and on the other still has the subject itself for a object.' Criminalism, compulsive-neurotic frequent repetition of criminal acts in a compulsive manner. Like most symptoms of the compulsive-neurotic, such antisocial act are closely rated to feelings of hostility and aggression, often against the father. Because these acts are symptomatic, they afford only temporary relief and are therefore repeated. One patient with compulsive-neurotic criminalism was apprehended after breaking into hardware store and stealing money. He later confessed to many similar incidents over the preceding two years. At the same time it was apparent that he stole only for the sake of stealing. He did not need the money he thus obtained and had no special plans for using it.

  • PDF