• 제목/요약/키워드: Security Service Model

검색결과 763건 처리시간 0.026초

패션 앱을 이용한 모바일 쇼핑 태도 및 사용의도 영향요인 연구 -성별과 연령집단별 차이 비교- (A Study on the Determinants of Attitude toward and Intention to Use Mobile Shopping through Fashion Apps -Comparisons of Gender and Age Group Differences-)

  • 성희원
    • 한국의류학회지
    • /
    • 제37권7호
    • /
    • pp.1000-1014
    • /
    • 2013
  • This study identifies the determinants that influence attitude toward and the intention to use mobile shopping services through fashion applications (apps) based on the technology acceptance model. In addition, gender and age group differences were examined. Data were collected from subjects who have used smartphone fashion related apps; subsequently, a total of 327 data were analyzed. About 46% of respondents were males, with a mean age of 34.4 years that ranged from 20 to 49 years old. Multiple regression models were developed based on the research model. Perceived usefulness, perceived ease of use, perceived enjoyment, perceived risks (security risk and quality risk), fashion involvement, and fashion app attributes (product attributes and service attributes) were employed as predictors of attitudes towards mobile shopping. Attitudes towards mobile shopping and subjective norms with the aforementioned variables measured the intention to use. Attitudes towards mobile shopping were predicted by perceived enjoyment, perceived usefulness, and service attributes. Attitudes toward mobile shopping and subjective norms were the most important predictors of the intention to use. Gender differences were found in that service attributes were significant for attitudes towards mobile shopping only in the male model. Age differences were also found and perceived usefulness was the most important predictor of attitudes toward mobile shopping among those in their 20's; however, perceived enjoyment was the most important among those in their 30's and 40's. Quality risk was only significant to explain intention to use among those in their 40's. The findings of this study are useful to understand the possibility of the adoption of mobile shopping though fashion apps and provide basic insight into market segmentation.

공유경제와 소비자의 특성과의 영향 관계 (The Influential Relations on Sharing Economy and Consumer Traits)

  • 이경축;이종호
    • 산경연구논집
    • /
    • 제8권6호
    • /
    • pp.75-86
    • /
    • 2017
  • Purpose - The purpose of this study is to grasp the concept, characteristics and application status of sharing economy, and to derive a research model based on sharing economic service, and to analyze factors and influences of consumers' intention to reuse of sharing economy. Research design, data, and methodology - The questionnaires were created to examine variables for practical and theoretical implications. After pilot survey, conducted for 24 days from March 10th to April 2st in 2017, total numbers were 377. But 330 copies were used for the analysis with IBM SPSS Statistics 23.0 and IBM SPSS AMOS 23.0. The structural equation model was applied for this. Results - First, sharing economic services remain at an early stage, but it is meaningful to identify the revenue mechanism of the business model of the sharing economic platform. Second, in this study, it is meaningful that we systematized the theoretical structure by examining existing studies on the characteristics of the sharing economic service and consumer characteristics, and by examining empirically. Third, Satisfaction and Reliability are related to the characteristics of Sharing Economic Service (Security, Convenience, Discount, Sharing, Social Interaction), Consumer Characteristics (Personal Innovation, Word-of-Mouth) It is meaningful to broaden the understanding of the factors by verifying the mediating effect. Fourth, the sharing economy business is meaningful in that it is a new consumption trend that changes the meaning of consumption to consumers. Gradually, more and more people are recalling that purchasing something is not consumption, but sharing and borrowing is also consumption. In other words, through the sharing economy, consumers can experience more products and services, have more choices, and are expected to have a positive impact on economic growth by increasing the utilization of idle resources. Conclusions - Currently, the sharing economy is growing rapidly all over the world. Therefore, in the subsequent study, it is necessary to compare Korea and China's sharing economy and study the cultural and social characteristics of Korea and China. In particular, I think that steady research is necessary for more precise and specific direction on the influence of the shared economy.

M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델 (Hybrid Trust Computational Model for M2M Application Services)

  • 김유경
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제16권2호
    • /
    • pp.53-62
    • /
    • 2020
  • IoT 환경의 최종 사용자 도메인에서 점점 더 많은 수의 지능형 M2M(Machine-to-Machine Communication) 장치가 애플리케이션 서비스를 생성하고 공유하기 위한 자원을 제공한다. 따라서 기존의 중앙집중식 서비스 제공자의 역할을 P2P 환경의 최종 사용자에게 이전하여 신뢰를 관리하는 것은 매우 유용할 수 있다. 그러나 최종 사용자가 독립적으로 서비스를 제공하거나 소비하는 비중앙집중식 M2M 컴퓨팅 환경에서는 상호간의 신뢰 구축이 가장 중요한 요인이 된다. 오작동하는 서비스를 구축하려는 악의적인 사용자들이 IoT와 같은 M2M 컴퓨팅 환경에서 보안문제를 야기할 수 있기 때문이다. 본 논문에서는 M2M 애플리케이션 서비스의 신뢰 평가를 위한 통합적인 분석과 접근방식을 제공하고, M2M 커뮤니티의 사용자들 사이의 신뢰도를 보장할 수 있는 최적화된 신뢰 평가 모델을 제시한다.

Association Between Persistent Treatment of Alzheimer's Dementia and Osteoporosis Using a Common Data Model

  • Seonhwa Hwang;Yong Gwon Soung;Seong Uk Kang;Donghan Yu;Haeran Baek;Jae-Won Jang
    • 대한치매학회지
    • /
    • 제22권4호
    • /
    • pp.121-129
    • /
    • 2023
  • Background and Purpose: As it becomes an aging society, interest in senile diseases is increasing. Alzheimer's dementia (AD) and osteoporosis are representative senile diseases. Various studies have reported that AD and osteoporosis share many risk factors that affect each other's incidence. This aimed to determine if active medication treatment of AD could affect the development of osteoporosis. Methods: The Health Insurance Review and Assessment Service provided data consisting of diagnosis, demographics, prescription drug, procedures, medical materials, and healthcare resources. In this study, data of all AD patients in South Korea who were registered under the national health insurance system were obtained. The cohort underwent conversion to an Observational Medical Outcomes Partnership-Common Data Model version 5 format. Results: This study included 11,355 individuals in the good persistent group and an equal number of 11,355 individuals in the poor persistent group from the National Health Claims database for AD drug treatment. In primary analysis, the risk of osteoporosis was significantly higher in the poor persistence group than in the good persistence group (hazard ratio, 1.20 [95% confidence interval, 1.09-1.32]; p<0.001). Conclusions: We found that the good persistence group treated with anti-dementia drugs for AD was associated with a significant lower risk of osteoporosis in this nationwide study. Further studies are needed to clarify the pathophysiological link in patients with two chronic diseases.

원전 사이버보안을 위한 접근제어 요건분석 및 구현방안 (Implementation Plan and Requirements Analysis of Access Control for Cyber Security of Nuclear Power Plants)

  • 김도연
    • 한국전자통신학회논문지
    • /
    • 제11권1호
    • /
    • pp.1-8
    • /
    • 2016
  • 원자력발전소는 주요 국가기반시설로 보호되고 있으며, 계측제어계통은 보호, 제어 및 감시등의 기능을 수행하는 원전을 구성하는 핵심 설비로서, 과거의 아날로그 장비에서 컴퓨터와 네트워크에 기반 한 디지털 기술로 진화하고 있다. 또한, 계측제어계통에서는 대부분 원전용 제어기를 사용하지만, 일반적인 IT 자원의 사용도 증가하고 있는 실정이다. 스턱스넷으로 인한 원자력 시설의 제어기 침해 사고 및 여타 원전의 사이버 사고로 인해 원자력발전소에 대한 사이버보안 문제가 대두되고 있다. 본 논문에서는 원전 사이버 보안을 위해 규제지침의 접근제어 요건분석을 통하여 원전 계측제어계통에 적용 가능한 혼합형 접근제어 모델을 제시하였다. 제안하는 혼합형 접근제어 모델은 가동 중인 국내 원전 및 건설 중인 신규 원전에 구현하여, 원전의 안전성을 효율적으로 증대 시킬 수 있을 것으로 판단된다.

아이핀 보증 등급에 기반한 보증 모델 (A proposal of assurance model based on i-PIN assurance level)

  • 염흥열
    • 디지털융복합연구
    • /
    • 제14권9호
    • /
    • pp.287-299
    • /
    • 2016
  • 최근 인터넷을 이용한 전자거래나 전자정부서비스가 활발히 이용되고 있다. 온라인 서비스를 이용하는 동안 다른 사람의 신원을 도용하는 문제가 빈번히 발생하고 있다. 따라서 이에 대응하기 위해서는 온라인 서비스를 이용할 때에도 높은 수준의 신원확인이 수행되어야 한다. 2006년에 국내에 도입되어 운영되고 있는 아이핀 (i-PIN, Internet-Personal Identification Number)은 인터넷 상의 신원확인번호이다[1]. 아이핀은 온라인상의 본인확인 기능을 제공하며, 아이핀 정보(연계정보, 중복가입정보)를 정보통신서비스제공자에게 제공한다. 이런 이유로 아이핀은 온라인에서 주민등록번호를 대체하는 수단으로 활용되고 있다. 본 논문에서는 국내 본인확인 수단인 아이핀의 기본 능력을 분석하고, 아이핀의 활용 및 안전성을 제고하기 위한 보증 모델의 기준을 제안한다. 그리고 제안된 아이핀 보증 모델의 안전성과 특성을 분석한다.

MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구 (MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node)

  • 이대영;송상훈;배상현
    • 한국정보통신학회논문지
    • /
    • 제11권1호
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc 네트워크 기술이 미래의 이동 인터넷 기술로서 이동통신망(Mobile Network) 뿐만 아니라 공중무선랜망(WPAN) 그리고 유비쿼터스 망 등에 광범위하게 활용되기 위해서는 개선 및 보완되어야 할 기술적인 문제들이 많다. 특히, 최근 네트워크 보안의 허점을 이용한 보안상 공격이 급증하고 있는 상황에 반하여 Ad-Hoc 라우팅 프로토콜 연구 대부분은 보안 위협 요소를 배제하고 안전한 환경을 가정한 채 수행되고 있다. 또한 Ad-Hoc 네트워크가 무선 매체 특성상 더욱 많은 보안상 위협에 노출되기 쉽고 유선에서 사용되던 보안 메커니즘을 그대로 적용되는 것이 부적합함을 고려할 때 Ad-Hoc 보안에 관한 연구는 더욱 활발히 이루어져야 할 것이다. 따라서 본 논문에서는 Ad-Hoc 네트워크의 특성을 고려하여 중앙 집중적인 인증기관이나 키 분배센터에 의존하지 않고 클러스터를 구성하고 있는 멤버 노드들 간의 협력적이고, 분산된 인증서를 이용한 인증 서비스를 제공할 수 있는 모델을 제안한다. 아울러 시뮬레이션을 통해 제안한 모델의 확장성과, 견고성을 평가해 본다.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 (Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process )

  • 고광수;조인준
    • 한국콘텐츠학회논문지
    • /
    • 제21권10호
    • /
    • pp.59-66
    • /
    • 2021
  • 본 논문에서는 통합보안관제에 인공지능 기술을 적용하고, 기존 보안관제와 인공지능 보안관제의 대응절차를 일원화한, 개선된 통합보안관제 절차를 새롭게 제안하였다. 현재의 사이버보안관제는 사람의 능력 수준에 의존도가 매우 높다. 그래서 사람에 의해 여러 이기종 장비에서 발생하는 다양한 로그를 분석하고, 급증하는 보안이벤트를 모두 분석·처리한다는 것은 사실상 무리가 있다. 그리고 문자열과 패턴 일치로 탐지하는 시그니처 기반의 보안장비는 APT(Advanced Persistent Threat)와 같은 고도화·지능화된 사이버공격을 정확히 탐지하기에 기능상 부족한 면이 있다. 이러한 문제들을 해결하기 위한 방안으로 인공지능 지도·비지도학습 기술을 사이버공격 탐지 및 분석에 적용하고, 이를 통해 수 없이 많이 발생하는 로그와 이벤트의 분석을 자동화하여, 고도화된 사이버공격의 지속적인 발생을 예측·차단할 수 있도록 하여 전반적인 측면에서 대응수준을 높였다. 그리고 보안관제에 인공지능 기술을 적용한 후 AI와 SIEM의 중복 탐지 등의 문제점을 일원화 된 침해대응 프로세스(절차)로 통합·해결함으로써 개선된 통합보안관제 서비스 모델을 새롭게 제안하였다.