• Title/Summary/Keyword: Security Factor

Search Result 1,100, Processing Time 0.033 seconds

A Study on the Determinants of Long-term Boarding of Prospective Seafarer (예비 해기사의 장기승선 결정 요인에 관한 연구)

  • Seungyeon Kim;Kyunghwan Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.4
    • /
    • pp.308-316
    • /
    • 2024
  • Maintaining the appropriate number of national seafarers is essential for securing the competitiveness of maritime industry and security in Korea. However, the number of national seafarers in Korea has been decreased continuously recently. The government recognizes the repercussion of this issue and has been attempting to solve it. One of the most significant reasons contributing to the rapid decrease in national seafarers is presumed to be the high initial turnover rate due to the decreased preference for maritime careers among people in the 20s and 30s. Therefore, plans have been devised to prepare various policies that allow young people to select long-term boarding. This study analyzed the determinants of long-term boarding decisions among students enrolled in the Maritime College of 'M' University and verifies the relationship with the desired boarding period. Additionally, the crew composition (CC), long-term planning (LP), work environment (WE), and family environment (FE) were derived as the determinants of long-term boarding recognized by prospective seafarers. Among them, LP and WE significantly affect the desired boarding period, thus suggesting that the stronger the perception toward long-term planning and the more insensitive one is to the work environment, the longer is the desired boarding period. In terms of group differences in the perception of long-term boarding, analysis results show that the several determinants of long-term boarding are recognized differently depending on gender. This study may facilitate the preparation of factors and group-specific policy measures to promote long-term boarding among prospective seafarers.

A Study of Service Innovation in the Airport Industry using AHP (계층화 분석법을 활용한 공항 산업 서비스 혁신 연구)

  • Hong hwan Ahn;Han Sol Lim;Seung Kyun Ra;Bong Gyou Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.71-81
    • /
    • 2024
  • In response to the COVID-19 pandemic, the global airport industry is actively introducing 4th Industrial Revolution technology-based systems for quarantine and passenger safety, and test bed construction and prior verification using airport infrastructure and resources are actively being conducted. Analysis of recent cases shows that despite the changing travel patterns of airport users and the diversification of airport service demands, most testbeds construction studies are still focused on suppliers, and task prioritization is also determined by decision makers. There is a tendency to rely on subjective judgment. In order to find practical ways to become a first mover that leads innovation in the aviation industry, this study selected tasks and derived priorities to build testbeds from a service perspective that reflects various customer service needs and changes. Research results using the AHP analysis method resulted in priorities in the order of access transportation and parking services (29.2%), security screening services (23.4%), and departure services (21.8%), and these analysis results were tested in the airport industry. It shows that innovation in testbeds construction is an important factor. In particular, the establishment of smart parking and UAM transportation testbeds not only helps strengthen airports as centers of technological innovation, but also promotes cooperation with companies, research institutes, and governments, and provides an environment for testing and developing new technologies and services. It can be a foundation for what can be done. The results and implications produced through this study can serve as useful guidelines for domestic and foreign airport practitioners to build testbeds and establish strategies.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Determinants of Demand for Long-Term Care (장기요양서비스 수요의 결정요인)

  • Chung, Wankyo
    • KDI Journal of Economic Policy
    • /
    • v.31 no.1
    • /
    • pp.139-167
    • /
    • 2009
  • A new public insurance for long-term care was introduced in July 2008 to provide for the rising demand for long-term care as the population is aging rapidly. The demand for long-term care is expected to rise further because more and more elderly are living alone or in households with only other elderly, such as his/her spouse, without informal care of their adult children. Even when the elderly are living together with their adult children, daughters and daughters in law, once the main informal care-givers, are not available because they choose to become economically active and work more over time. Experiences of countries such as Japan and Germany with similar public long-term care insurance scheme highlight the importance of detailed analysis on the demand for long-term care for the financial stability of the insurance scheme. Countries which had underestimated the demand for long-term care at the time of adopting the scheme went through financial instability of insurance schemes. This study analyzes the determinants of the demand for long-term care using data from the second demonstration project (April 2006~April 2007) of the long-term care insurance scheme for the elderly in Korea. Taking full advantage of detailed data on the long-term care, this paper analyzes the eligibility for the long-term care insurance scheme and its use. According to study results, even when common diseases among the elderly such as cancer, diabetes, arthritis, dementia, hypertension, etc. are controlled together with other individual and socioeconomic factors, limitations the elderly are faced with in their twelve activities of daily living significantly affect the eligibility for the Korean Long-term Care Insurance Scheme. This means that limitations in daily living activities are more critical than common diseases among the elderly are to the eligibility for the Korean Long-term Care Insurance Scheme. Bathing and toileting problems have been found to be the most important factor affecting the eligibility for the insurance scheme, followed by eating, dressing and moving around inside the house. Moreover, the choices of whether to use long-term care and which to use between home care and institutional care are found to be significantly influenced by health status and various socioeconomic factors of the elderly. In particular, those with more limitations in daily living activities and the female elderly are more likely to use long-term care and institutional care rather than home care. As for home care users, those living alone or with adult children and those with monthly household income of more than 500,000 won are more likely to use home care. Most importantly, even when the monthly household income of the elderly is controlled, the elderly recipients of the National Basic Living Security, who are not charged for long-term care, are more likely to choose home care. This implies that price as well as income is a critical factor for the decision to use long-term care. Further study on the duration of long-term care use will surely enhance the long-term care policy, when panel data is available for simultaneous analysis of the likelihood of long-term care use and its use duration.

  • PDF

New Government's Responsibility and Achievement in Records & Archives Management (공공기록물 관리에 있어 이명박정부의 책임과 '업적')

  • Lee, Seung-Hwi
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.257-280
    • /
    • 2008
  • The purpose of this paper is reviewing the hot issue called 'draining away the presidential records' case occurred recently and finding the root cause why the state of affairs has been happened in Korea. Though the presidential records management law ensures the rights for the prior president to view his presidential records, the prior president has copied his presidential records produced while in office and moved to his private house at his retirement. He might have interpreted his right to his presidential records too broadly and done the 'draining away' them. There was a motive why the prior president did that at that time. The reason was because the National Archives didn't guarantee the services for right viewing the records to him who wanted to review his records from right after his retirement. The National Archives have judged the draining away the prior presidential records as illegal and accused a few public servants suspected to be responsible for the affairs. The formal accuser is the National Archives, but the actual accuser might be the current Presidential Secretariat. Whatever the results of juristic judgement are, the reason why the records management field should focus and treat this case importantly is that the collapse possibility of the protection wall needed essentially and critically to the Presidential records becomes very high. The root cause of this case might exist in the fact that the records and archives management organizations have not owned the political independence. But the National Archives has submitted the revised bill of the public records and archives management law which lower the position of the National Records Management Committee controlled under from the Prime Minister to the Ministry of Administration and Security. It might be hot concern that the records and archives management organizations have difficulty for keeping the political independence if the revision would be passed. Besides the political independence factor, the most important factor needed for the right records management is the establishing the professional specificity of records management. The specific action for the establishing professional specificity would be employing of specialists and introducing the open official appointment. But it was found from the reorganization after the governmental change that the professional specificity of the National Archives have been reduced. Although the policies introduced by the new government are worrying, it might be an inheritance from the prior government. If new government would build establish the institution for the political independence of the records and archives management organizations and expand the employment of the records management professions to the local government, these affairs can be not only the responsibilities but also the achievements of the new government.

A Structural Equation Modeling of Internalizing Problem Behaviors of Korean Chinese'left-behind'Children in China (중국 조선족 유수아동의 내재화 문제행동에 관한 구조모형)

  • Hyun, Mina;Park, Jisun;Shin, Dong-Myeon
    • 한국사회정책
    • /
    • v.24 no.1
    • /
    • pp.153-185
    • /
    • 2017
  • The purpose of this study is to investigate the actual conditions and causes of the problem behaviors of Korean Chinese'left-behind'children in China in order to propose a support system to prevent problem behaviors of them. For this purpose, a questionnaire survey was conducted on 399 children who attend at three Korean Chines schools in Yonbian in China. The questionnaire consisted of general characteristics, internalizing problem behavior, social support, self-esteem, and self-resilience. This paper analysed the survey data by employing one-way ANOVA and a structural equation modeling. It verified if there is significant difference in internalizing problem behaviour, self-esteem, self-resilience, and social support between left-behind children's group and non left-behind children's group. It also identified a structural causal relationship and direct or indirect effects among problematic behaviour, self-esteem, self-resilience, and social support. The results of the analysis are as follows. First, there was a statistically significant difference in the social withdrawal and depression of internalizing problem behaviors between left-behind children's group and non left-behind children's group. Second, the left-behind children's group showed no significant difference in self-resilience and social support compared to non left-behind children's group, but showed a significant difference in self-esteem. In the positive self- esteem factor, non left-behind children's group showed much higher score whereas left-behind children's group was higher in the negative self-esteem factor. Third, social support for left-behind children's group has a statistically significant direct negative effect on internalizing problem behaviors, and indirectly negative effects on problem behavior through self-resilience. These results suggest the necessity of establishing a social support system for mitigating and preventing problem behaviors and the necessity of preparing measures to improve self-resilience. Based on the results of the study, we discussed how to establish a social support system in China to mitigate internalizing problem behaviors of Korean Chinese left-behind children.

Effect of the Suicide Prevention Program to the Impulsive Psychology of the Elementary School Student (자살예방 프로그램이 초등학교 충동심리에 미치는 영향)

  • Kang, Soo Jin;Kang, Ho Jung;Cho, Won Cheol;Lee, Tae Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.65-72
    • /
    • 2013
  • In this study, the early suicide prevention program was applied to the elementary school students and compared the prior & post effect of the program, and verified the status of psychology change like emotional status, or temptation to take a suicide, and presented the possibility as a suicide prevention program. The period of adolescence is the very unstable period in the process of growth being cognitively immature, emotionally impulsive period. It is the period emotionally unstable and unpredictable possible to select the method of suicide as an extreme method to escape the reality, or impulsive problem solving against small conflict or dispute situation. Many stress of the student such as recent nuclear family, expectation of parents to their children, education problem, socio-environmental elements, individual psychological factor lead students to the extreme activity of suicide in recent days. In this study, the scope of stress experienced in the elementary school as well as idea and degree of temptation regarding suicide by the suicide prevention program were identified, and through prevention program such as meditation training, breath training and through experience of anger control, emotion-expression, self overcome and establish positive self-identity and make understanding Self-control, Self-esteem & preciousness of life based on which the effect to suicide prevention was analyzed. The study was made targeting 51 students of 2 classes of 6th grade of elementary school of Goyang-si and processed 30 minutes every morning focused on through experience & activity of the principle & method of brain science. The data was collected for 20 times before starting morning class by using Suicide Probability Scale(herein SPS-A) designed to predict effectively suicide Probability, suicide risk prediction scale, surveyed by 7 areas such as Positive outlook, Within the family closeness, Impulsivity, Interpersonal hostility, Hopelessness, Hopelessness syndrome, suicide accident. Analytical methods and validation was used the Wilcoxon's signed rank test using SPSS Program. Though the process of program in short period, but there was a effective and positive results in the 7 areas in the average comparison. But in the t-test result, there was a different outcome. It indicated changes in the 3 questionnaires (No.7, No.14, No.19) out of 31 SPS-A questionnaires, and there was a no change to the rest item. It also indicated more changes of the students in the class A than class B. And in case of the class A students, psychological changes were verified in the areas of Hopelessness syndrome, suicide accident among 7 areas after the program was processed. Through this study, it could be verified that different results could be derived depending on the Student tendency, program professional(teacher in charge, processing lecturer). The suicide prevention program presented in this article can be a help in learning and suicide prevention with consistent systematization, activation through emotion and impulse control based on emotional stress relief and positive self-identity recovery, stabilization of brain waves, and let the short period program not to be died out but to be continued connecting from childhood to adolescence capable to make surrounding environment for spiritual, physical healthy growth for which this could be an effective program for suicide prevention of the social problem.

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A Study on Users' Recognition of Selection Attributes for Connection between Recreational Forest and Rural Tourism Village (자연휴양림과 체험마을 연계를 위한 이용객의 선택속성 인식 연구)

  • Lee, Yong-hak;Cho, Yeong-Eun;Kang, Eun-jee;Kim, Yong-Geun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.1
    • /
    • pp.16-28
    • /
    • 2016
  • The study was conducted to compare and analyze the importance and performance of leisure destination selection attributes of persons who use recreational forests and rural tourism villages. This researcher investigated the use patterns of users to identify the ground for connection between recreational forest and rural tourism village, analyzed their recognition differences in physical selection attribute, program selection attribute, and service selection attribute in order for leisure destination selection, and conducted importance-performance analysis(IPA analysis) to draw a plan for connection. The main results and suggestions are presented as follows. First, recreational forests were visited by family users in order for rest and emotional cultivation and provided experience programs using simple public interest function of forest, whereas rural tourism villages were visited by family users, friends and co-workers, groups and club members to experience a variety of annual programs and understand regional cultures. It was found that it was necessary to connect natural forest with rural tourism village in order to meet the leisure needs of the people changed in diversified ways. Secondly, it was found that the connection between rural tourism village and recreational forest visited mainly for simple rest led to positive visit intention of users. It was expected that there will be various kinds of uses, including experience program participation, child education, and safe accommodations security. In other words, the connection between recreational forest and rural tourism village is an alternative to trigger actual demands and recreational forest activities with high quality. Thirdly, in the case of users of recreational forests, their performance of all selection attributes was lower than their importance of them. Therefore, overall improvements were needed. In particular, needed were the diversity, benefit, and promotion of programs, improvements in locality(themes), supply of lodges and convenient facilities, booking system, the purchase system of local special products, and professional skills of operators and managers. On contrary, the performance of program selection attribute of rural tourism village was high. Therefore, it was found that program attribute of rural tourism village was the main connection factor to activate recreational forest use. Fourthly, according to IPA analysis, the proper connections between loges, convenient facilities, and nearby touristattractions, which give high expectations and satisfaction to users, needed to remain. And it was required to make common efforts to accomplish the goal (income creation) of rural tourism village and improve booking system for visitors and performance of local special products sales opportunity. In addition, the essential factors to induce users' leisure destination selection were found to be maintenance of the use fee system of recreational forest, diversity of rural tourism village program, and retention of locality.