• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.03 seconds

AHP 기법을 이용한 안티바이러스 소프트웨어 평가 요인 분석

  • Kim, Jong-Ki;Hwang, Suk-Yeon;Lee, Dong-Ho
    • The Journal of Information Systems
    • /
    • v.14 no.1
    • /
    • pp.19-40
    • /
    • 2005
  • The history of computer virus comes along with that of computer. Computer virus han surfaced as a serious problem in information age. The advent of open network and widespread use of Internet made the problem even more urgent. As a method of defense for computer virus most companies use anti-virus software. Selecting appropriate anti-virus software involves various criteria and thus it is a multiple-attribute decision making problem. The purpose of this study is to prioritize anti-virus software evaluation factors. To do that, first of all, important evaluation factors are selected based on previous research on anti-virus software as well as general software evaluation models. Then, a questionnaire survey was conducted on end-users, system administrators and anti-virus software developers. The survey result was analyzed with ExpertChoice 2000 which is based on Analytic hierarchy Process technique. This study found that there are clear differences among three survey groups regarding the relative importance of overall evaluation factors. End-user group ranked "cost" first, but it was the least important factor to developer group. Developers pointed out "operational support" ad the most important factor. There were also obvious differences in the relative importance of detail evaluation items. Both end-users and system administrators shared 7 common items among top 10 most important items. Moreover, neither of the two groups ranked any of the items in the "operational support" factor in top 10, whereas all 4 items in the factor were included in top 10 by developer group.

  • PDF

Does Earnings Quality Affect Companies' Performance? New Evidence from the Jordanian Market

  • SALEH, Isam;ABU AFIFA, Malik;ALSUFY, Fares
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.33-43
    • /
    • 2020
  • This study aims to investigate the importance of earnings quality as a determinant of companies' performance. It provides some empirical evidences from an emerging market, specifically from the Jordanian market. This study developed an econometric model for the effect of earnings quality on the companies' performance using empirical evidence. The study employs a panel data analysis method by using a sample of all Jordanian industrial public shareholding companies listed on Amman Stock Exchange (ASE) during 2010-2018. The results reveal that Return on Assets (ROA), Return on Equity (ROE), and Earnings Per Share (EPS) as proxies of company's performance are affected by the earnings quality. This provides the importance of positive earnings quality that eventually influences the companies' performance. The results of this study suggest that the higher control level on the managers' behavior and its outcome will have an effect on earnings quality, and thus the company's performance increases. As well as, high relevance of accounting information will improve earnings quality, and thus earnings quality with the interaction factors of the company's environment work on improving performance. As a conclusion, this study can work as a reference to assist standard setters, security analysts, regulators and other accounting-information users in appraising relation between the earnings quality and companies' performance.

The Building for Standard Specification DB of Urban Transit System Infrastructure used by Computer Design Tool (전산지원도구를 이용한 도시철도시설 표준사양 DB 구축 연구)

  • Lee, Woo-Dong;Park, Kee-Jun;Chung, Jong-Duk
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.791-795
    • /
    • 2006
  • Urban transit is one of the most effective ways for efficient operation and construction of an urban transit by composition system which is liked originally such as rolling-stock, power, signal and infrastructure. Urban rail transit system is running in domestic, imports major equipments from advanced countries and setup for maintenance. But it takes long time because it does each organizations and lines. Also, signal, power and track system apply different standard by each construction organizations it causes an increasing construction of cost accordingly it desperately needs a systematic countermeasure. Therefore standard specification of urban transit have been establishing and operatingfor efficient operation of urban transit and base technology security that is populace ride to become a base of state economy. After track, power and signal system will be announced. Standard specification become more, the importance of administrationof standards is emphasized more. Specification administrator’s the importance which use a computing support tool recently in railroad part in embossed and is predicted to be more such forward. Therefore we propose the effective method of management with track, power signal system by constructed data-base system.

  • PDF

A Study on Selection Factors of Personal Cloud Storage Service Using AHP (AHP를 활용한 개인 클라우드 스토리지 서비스 선택 요인에 관한 연구)

  • Jo, Hyeon;Cho, Hyegyeong;Kim, Younghee;Kim, Hayan;Jeon, Hyeon-Jeong;Lee, Jae Kwang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.197-215
    • /
    • 2015
  • Recently, many internet users are using cloud computing. Users can manage, store and share their data and information by using personal cloud storage. In this paper, we aim to figure out influencing factors on personal cloud storage selection. The causal relationship between factors were identified through a importance analysis by using AHP(Analytic Hierarchy Process). AHP is a structured technique for organizing and analyzing complex decisions, based on mathematics and psychology. Research model consists of upper factorsincluding system factor, service factor and user factor. 12 lower factors and 6 alternatives were also analyzed. Asa result, system factor of 3 upper factors was found as the most important factor. Purpose-coincidence, security andaccessibility were top 3 factors among lower factors. N drive showed top importance value. We also conducted ANOVAby classifying 4 groups according to gender, age, currently used cloud and cloud to use. The results of this researchcan be useful guidelines for cloud computing industry.

Linking Omnichannel Integration Quality and Customer Loyalty in Vietnamese Banks

  • Thu Trang PHAM
    • Journal of Distribution Science
    • /
    • v.22 no.6
    • /
    • pp.95-106
    • /
    • 2024
  • Purpose: This study investigates the complex dynamics of consumer behavior in Vietnamese banking omnichannel environments, focusing on the roles of service consistency, service transparency, flow, perceived privacy risk, and loyalty intention. Research design, data and methodology: Using a sample of 422 Vietnamese bank customers, data analysis revealed significant relationships among the variables under investigation. Results: Firstly, service consistency was found to positively influence flow experiences and negatively impact perceived privacy risk, highlighting the importance of uniform service quality across channels in enhancing consumer engagement while mitigating privacy concerns. Similarly, service transparency was positively associated with flow experiences and negatively associated with perceived privacy risk, underscoring the importance of transparent information dissemination in fostering immersive consumer experiences while alleviating privacy apprehensions. Furthermore, both flow experiences and perceived privacy risk significantly influenced loyalty intentions, indicating the pivotal roles of engaging experiences and data security in driving consumer loyalty. Additionally, mediated relationships were observed, demonstrating the interplay between service consistency, service transparency, flow, perceived privacy risk, and loyalty intention in shaping consumer behavior in omnichannel contexts. Conclusions: These findings provide valuable insights for retailers and marketers seeking to optimize consumer experiences and cultivate loyalty in omnichannel environments by prioritizing consistency, transparency, and data privacy protection.

Establish Manufacturing Firms' Response Strategy to the Serious Accident Punishment Act Using IPA (IPA를 활용한 제조기업의 중대재해처벌법 대응방안 수립)

  • Seo, JunHyeok;SungMin Bae
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.4
    • /
    • pp.607-618
    • /
    • 2023
  • Purpose: In this study, we proposed a plan to establish and implement a safety and health management system by utilizing corporate resources so that manufacturing companies can effectively respond to the Serious Accident Punishment Act. Methods: We identified critical factors and response strategies necessary for manufacturing companies to respond to the Severe Accident Punishment Act effectively and surveyed employees working at the company regarding their importance and performance. Results: In this study, we presented a method of strategically constructing the response strategies (20) shown in previous studies by matching them with the company's resources (leadership, organization, budget, education, and awareness). In particular, leadership refers to the ability of managers who can prevent serious accidents by carrying out safety and health security obligations to avoid safety and health hazards or risks to employees in the business or workplace that is controlled, operated, and managed. Conclusion: Based on the manager's firm leadership, the system's purpose and direction must be accurately set and sufficiently communicated to members. In addition, for companies to identify and improve risk factors on their own, a Process approach must be established to improve execution by referring to legal standards together with field managers and supervisors.

The Study of Attachment Styles and Personal Relations' Variation through the Sociodrama (사회극을 통한 애착유형 및 대인관계의 변화에 관한연구)

  • 이정숙
    • Journal of Families and Better Life
    • /
    • v.15 no.2
    • /
    • pp.111-126
    • /
    • 1997
  • This study was intended to measure variations in attachment styles and personal relations through the Sociodrama, There were three purposes in this study. The first was to verify the contiuance of attachment between parents and adolescents. The second was to find the difference of personal relations and self-esteem according to the different attachment styles. finally the third was to prove the therapeutic effects of sociodrama. The results were as follows: 1. In terms of attachment style 19% of the subjects were insecurity style 9.5% avoidance style and 74.1% security style. 2. The contents of Sociodrama were the daily happenings between parents and adolescent children and among siblings and friends. Every subject said that the Sociodrama helped him to shape his internal self to understand others and to realize the importance of parental roles. 3. The avoidance group became insecure after the Sociodrama because of their distinctive traits. The secure feelings of security grou also decreased due to their developmental character-individuation. 4. The comparison of the two post-tests revealed that the attachment style of the avoidance group has parents was observed as well. 5. The Sociodrama is assumed to be effective in the changes of adolescents' abnormal and insecure attachment and personal relations into a normal and secure state., In conclusion results of the study verified this assumption of the effectiveness of the sociodrama and it's longterm effects.

  • PDF

On the study of war history education - On the focus of noncommissioned officer's department - (전쟁사 교육방안 연구 - 부사관 학과를 중심으로 -)

  • Kim, Gyu-Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.55-63
    • /
    • 2014
  • The history of mankind has been at war with the war now going on in this moment. To prepare for this war, war history has been studied and its importance can be summarized in three main points. First, to understand the predictions of war and, second, to develop doctrines to fit changing circumstances, and to hone tactics through indirect war experiences. The curriculum of war history education for noncommissioned officer's department(two-year program) must include war lessons and skills to prepare the war. By indirect experiences through training they will have the ability to perform their duties in the field. This paper focuses to review the contents and methods of war history education which is being taught and to propose the new model for war history education for the students who are commissioned as officers after graduation.

The Diagnosis and Prescription for Cybersecurity in Korea: Focusing on Policy and System

  • Park, Sangdon;Kim, Il Hwan;Kim, Jaehyoun;Lee, Kyung Lyul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.843-859
    • /
    • 2018
  • Cybersecurity has emerged as a serious problem in Korea and there have been relevant movements to improve domestic cybersecurity policy and system. However, discussions have yet to result in actual progress and the legislation for improvement of cybersecurity policy and system have been stagnant until now. As evidenced by the introduction of primary government legislation bill for national cybersecurity in 2017, the preparations for improvements to the policy and system are still in progress. However, we cannot be positive about the possibility of implementing these improvements during the process. Recognition of the importance of cybersecutiry has gradually risen and is more prevalent than in years past, however, in-depth discussions are not being made. In principle, misunderstandings about cybersecurity itself and insufficient understandings of the relevant legislation seem to cause such problems. Therefore, it is necessary to review key issues related to the improvement of cybersecurity policy and system and reconsider tasks for the future. Such issues include the relationship between cybersecurity and fundamental rights, establishing responsibility and capability of each of entities for cybersecurity, and the role of the military in cybersecurity. This type of in-depth discussion will be helpful for finding ways to improve upon cybersecurity policy and system. Moreover, this study aims to key issues with questionnaire survey and political and normative inquiry.

Implementation of Key Generation Algorithm for User Authentication and Encryption (사용자 인증과 암호화를 위한 키 생성 알고리즘 구현)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.93-98
    • /
    • 2007
  • The importance of information security is increasing by the rapid development of the communication network. So, cryptosystems are used to solve these problems and securities of cryptosystems are dependent on keys. In this paper, we propose a key generation method which is based on cryptographically secure MD5 hash function. The basic structure of the MD5 hash function features is a repetitive structure which is processed in a block unit of 512 bits from inputs of limited length and generates a fixed output of 128 bits. The security of proposed method is based on the hash function and the proposed method can be also utilized for authentication algorithm or data encryption algorithm.

  • PDF