• Title/Summary/Keyword: Security Service Model

Search Result 764, Processing Time 0.036 seconds

Retail Distribution Strategies for Train Tickets: The Extended UTAUT Model

  • PARK, Yoon-Joo;AHN, Sung-Sook
    • Journal of Distribution Science
    • /
    • v.19 no.9
    • /
    • pp.5-17
    • /
    • 2021
  • Purpose: As mobile devices are commonly used and contact-free services are widespread due to the COVID-19 pandemic in the recent distribution environment, this study suggests retail strategies for consumers using high-speed railways. To this end, we analyzed how consumer perception on technologies necessary for use of mobile apps is related to the attitude that drives consumers to continue using the app services. Research design, data and methodology: Based on the extended unified theory of technology acceptance and use of technology model by Venkatesh, Morris, Davis and Davis (2003), we added variables proposed by existing theories that studied the technology acceptance model from multiple perspectives and empirically analyzed the relationship between user satisfaction and use intention with structural equation modeling. Results: As expected, factors necessary for the use of app services such as performance expectancy, social influence, price value, facilitating conditions, security, and aesthetics had positive effects on user satisfaction, whereas the effect of effort expectancy on user satisfaction was rejected. And user satisfaction was found to have a significant effect on intention to use. Conclusions: The results provide implications that strategic retail management of the above factors can motivate passengers to continuously use high-speed railways.

IoT Makes Life Simpler: How to Improve the Chinese Consumer's Intention to Use of LG HomNet Smart Home

  • Xiangdong Shen;Xi Chen;Yuting Jiang;Haixin Ji
    • Journal of Korea Trade
    • /
    • v.26 no.8
    • /
    • pp.1-20
    • /
    • 2022
  • Purpose - The paper aims to develop the theory of TAM and perceived risk through a more comprehensive and rigorous understanding of the influencing factors of the consumer's adoption of LG HomNet smart home from the perspective of trade-offs. Design/methodology - Based on the TAM and perceived risk theory, combined with the individual characteristics of consumers in the context of information technology as the external factors of the technology acceptance model, this paper constructs a theoretical model of the factors affecting the use intention of the consumer. It was empirically tested by using SEM, and survey data was collected from 458 respondents. Findings - The research results show that 9 hypotheses of the research model are supported and have reliable prediction accuracy. Consumers' perceived interest, perceived connectivity and perceived controllability have a significant positive impact on their intention to use. In addition, this paper also confirmed the mediating effect of perceived usefulness and perceived ease of use. Originality/value - Consumers are very concerned about gains and losses. Low-level performance risks, security risks, and financial risks will drive the consumer to have a stronger intention to use, and financial risks have the strongest impact. This research provides a useful implication and guidance for smart home equipment manufacturers and service providers in product and service innovation and marketing and promotion strategies.

A Study on Security Reference Model in Personal Health Lifelog Services (개인 건강 라이프로그 서비스에서 보안 참조 모델에 관한 연구)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.109-115
    • /
    • 2016
  • Life log started with the simple purpose of recording or sharing mainly data regarding one's personal life, but with the introduction of advanced specialized analytic methods by many corporations, a new type of business based on the life log recently emerged, with an aim of improving the quality of people's personal lives. In spite of the indispensable advantages, however, personal health lifelog service brings critical challenges that cannot be avoided from user side if the security of the data is concerned. The problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the revitalization of personal health lifelog services. In this paper, we propose an information security reference model for the personal health lifelog services. Our proposal can contribute to increase the related industry to cultivate new market by suggesting the clear announcement of the guidelines using privacy protection reference model for user-specific healthcare services which uses personal lifelog.

A Study on Valuation of Security Property in Electronic Commerce (전자상거래에 있어서 보안성의 가치추정에 관한 연구)

  • Kim, Min-Cheol;Noh, Kyoo-Sung
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.615-620
    • /
    • 2001
  • This paper is a study on the model that measures economic values for the non-market properties of Electronic Commerce(EC). For development of this model, first of all, we reviewed the properties of EC service, and looked around the relation between customer satisfaction and/or payment value and EC properties. In addition, we checked the method to measure economic values of these properties. This measurement method is the contingent valuation method which is a method of measuring the value of the environmental product. We modified it to adapt to the EC. Finally, in this paper, we proposed an economic value model which measures the value of willingness to pay(WTP) to our objectives. However, there could be some restrictions at the time when surveying empirically. Therefore, the succeeding study should be done in order to improve these restrictions some day.

  • PDF

A Study on the Curriculum of Department Security Secretarial Programs in Korea University (국내 대학 경호비서학과의 교육과정 특성에 관한 연구 - 4년제 대학을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.1-21
    • /
    • 2007
  • This study aims to analysis and measure on the curriculum of security programs in Korean university as the private security system. Civil security demand social safety life by the police protection and private security system. The private security or the civil guards shows rapid growth by the social development and improve the quality of life. But the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. Then the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyze current situation of civil body and security guard training industry and to seek an educational model. For that, we examine in 'Do the professional training organizations meet social demand for the body and security guards'? And, 'What kind of training has to be provide for the body and security guards'? and 'What the qualifications of the trainers'? Then, 'What are the differences in training courses between private organizations and universities'? 'Is there differences in the job placement among the trainers of private organizations and universities'? etc.. Conclusion, the social demand common curriculum for the body and security guard will be drawn from the analysis of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. Then we have to a standard curriculum for the successful training education system to provide social security.

  • PDF

Effects of Information System Quality on the Technology Acceptance Model and User Intention (정보시스템품질이 기술수용모형과 사용자의도에 관한 연구)

  • Park, SangHyun;Lee, JeongEun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.5
    • /
    • pp.21-35
    • /
    • 2021
  • In this study, in order to find out how the quality factors of information system affected the technology acceptance model and user intention, the importance of IT security which had been recently emerged by including the security in the system, information and service is considered as the factors of information system quality. To verify how the information system quality affected the technology acceptance model and user intention, the study was conducted with expanded information system by classifying the technology acceptance model with perceived usefulness and perceived ease of use and classifying user intention with acceptance and utilization whether user had only acceptance intention or both acceptance and utilization intentions. The study results are as follows. First, the hypothesis that quality factors of information system affected the technology acceptance model significantly was partially adopted. Second, the hypothesis that the technology acceptance model affected user intention significantly was adopted.

NFC-based Smartwork Service Model Design (NFC 기반의 스마트워크 서비스 모델 설계)

  • Park, Arum;Kang, Min Su;Jun, Jungho;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.157-175
    • /
    • 2013
  • Since Korean government announced 'Smartwork promotion strategy' in 2010, Korean firms and government organizations have started to adopt smartwork. However, the smartwork has been implemented only in a few of large enterprises and government organizations rather than SMEs (small and medium enterprises). In USA, both Yahoo! and Best Buy have stopped their flexible work because of its reported low productivity and job loafing problems. In addition, according to the literature on smartwork, we could draw obstacles of smartwork adoption and categorize them into the three types: institutional, organizational, and technological. The first category of smartwork adoption obstacles, institutional, include the difficulties of smartwork performance evaluation metrics, the lack of readiness of organizational processes, limitation of smartwork types and models, lack of employee participation in smartwork adoption procedure, high cost of building smartwork system, and insufficiency of government support. The second category, organizational, includes limitation of the organization hierarchy, wrong perception of employees and employers, a difficulty in close collaboration, low productivity with remote coworkers, insufficient understanding on remote working, and lack of training about smartwork. The third category, technological, obstacles include security concern of mobile work, lack of specialized solution, and lack of adoption and operation know-how. To overcome the current problems of smartwork in reality and the reported obstacles in literature, we suggest a novel smartwork service model based on NFC(Near Field Communication). This paper suggests NFC-based Smartwork Service Model composed of NFC-based Smartworker networking service and NFC-based Smartwork space management service. NFC-based smartworker networking service is comprised of NFC-based communication/SNS service and NFC-based recruiting/job seeking service. NFC-based communication/SNS Service Model supplements the key shortcomings that existing smartwork service model has. By connecting to existing legacy system of a company through NFC tags and systems, the low productivity and the difficulty of collaboration and attendance management can be overcome since managers can get work processing information, work time information and work space information of employees and employees can do real-time communication with coworkers and get location information of coworkers. Shortly, this service model has features such as affordable system cost, provision of location-based information, and possibility of knowledge accumulation. NFC-based recruiting/job-seeking service provides new value by linking NFC tag service and sharing economy sites. This service model has features such as easiness of service attachment and removal, efficient space-based work provision, easy search of location-based recruiting/job-seeking information, and system flexibility. This service model combines advantages of sharing economy sites with the advantages of NFC. By cooperation with sharing economy sites, the model can provide recruiters with human resource who finds not only long-term works but also short-term works. Additionally, SMEs (Small Medium-sized Enterprises) can easily find job seeker by attaching NFC tags to any spaces at which human resource with qualification may be located. In short, this service model helps efficient human resource distribution by providing location of job hunters and job applicants. NFC-based smartwork space management service can promote smartwork by linking NFC tags attached to the work space and existing smartwork system. This service has features such as low cost, provision of indoor and outdoor location information, and customized service. In particular, this model can help small company adopt smartwork system because it is light-weight system and cost-effective compared to existing smartwork system. This paper proposes the scenarios of the service models, the roles and incentives of the participants, and the comparative analysis. The superiority of NFC-based smartwork service model is shown by comparing and analyzing the new service models and the existing service models. The service model can expand scope of enterprises and organizations that adopt smartwork and expand the scope of employees that take advantages of smartwork.

An Empirical Study on the Influencing Factors of Intention to Adoption of Mobile Government Service (모바일 전자정부 서비스 수용의도의 영향요인에 관한 연구)

  • Han, Kihun;Kim, Jinsoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.77-104
    • /
    • 2013
  • Mobile technology is accelerating innovative changes across all fields of our society as well as business environments. Especially, demands on mobile government (M-government) services have been increased gradually since e-government has improved national administration services dramatically. However, high-quality services which are acceptable to may users are not actually supplied because technical issues such as security on mobile e-government services have not solved and governance policy was not established yet. Previous studies show that most researches are devoted to technical ones or limited to theoretical exploratory study. As a result, developing useful guidelines which are practically and theoretically proved is one of the very important research issues. This study reviews the previous research works such as concept of mobile, e-government, M-government, technical trends of mobile, market situations, present status, and various case studies. And then we develop a research model with five factors, twenty four variables and seventy six measurement for measuring the influencing factors to adoption of M-government services. The model is composed of total 16 hypotheses, 22 variables, and 76 measurements. The model is analyzed by using statistical package SPSS (18.0) and AMOS (18.0) together with structural equation method based on 294 samples. The results show that the model is valid and there are statistically significant influence between ease of use and usefulness, ease of use and user's satisfactions, usefulness and intent of re-use, and user's satisfactions and intent of re-use, excepting usefulness and user's satisfaction, ease of use and intent of re-use did not affect significant influences. Especially, service quality, system quality, and relationship quality are identified as influencing factors to adaption of M-government service. The results are expected to provide a theoretical research framework which generate new research issues in M-government service area. It also can provide an useful guidelines to practical experts in successfully implementing M-government services. Further research directions are as follows. User's intents have to be studied in details by classifying users by individual, enterprise, and government as well as developing a new hypothetical model. Since M-government service is at the initial stage, longitudinal studies have to be conducted to trace the peoples' need in order to develop new high-quality mobile services.

The Legal Structure of Guard & Security Contract and the Prevention & Resolution Method of Security Disputes (경호경비계약의 법적 구조 및 분쟁의 예방과 해결 방안)

  • Ahn, Sung-Cho
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.129-157
    • /
    • 2006
  • With rapid social change, by culminating the social hazards and the safety problems about it are on the increase too. According to the needs for the safety the demand of the private guard & security provided the safety and security service against danger is also increasing. As the need for the safety is increasing, so recently the private guard & security industry is extended. Therefore the purpose of this study is to grasp and carry out researches into the legal structure on the Security contract, is to analyze the formation of contract and find out the ensuing problem in order to prevent or settle the dispute which is apt to occur between the specific client and the security companies. In order to minimize the dispute going with security relationship in particular, it is necessary that one should write down the agreed contents as the document explicitly to make a security contract with the parties. Hereupon in the plan which standardizes the security contract with each parties autonomously, it is suggested that this study should present the model of Dispute Resolution Clause Especially it is the best means that it is amicable consultation or negotiation as the effective way of settlement methods of private dispute arising from the concerned parties. In inevitable case it recommends the method which solves the dispute by means of an arbitration than litigation at administration of justice(in terms of jurisdiction). If the parties wish to settle the disputes by arbitration, they must come to an arbitration agreement in the form of a arbitration clause in the security contract. After the test and evaluation through application utilizing it in actual security field, the security standard contract regulates about it and this terms should widely apply a individual case to whole industry.

  • PDF

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF