• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.024 seconds

Effect of Health and Beauty Store App Service Quality on Customer Satisfaction

  • Kyu-dong Kim;Jeong-lae Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.456-463
    • /
    • 2023
  • We conducted this study to identify the components of H&B store app service quality and their effect on customer satisfaction. The survey was conducted through an online survey for teenagers or older with experience in using H&B store app. A total of 330 copies were distributed and a total of 282 copies were used for the final analysis. The results of this study are summarized as follows: First, eight factors such as ease of use & design, fulfillment, playfulness, responsiveness, personalization, security, contextual usefulness, interactivity were derived as service quality components of H&B store app. Second, as a result of regression analysis, the six service quality components, such as 'ease of use & design', 'fulfillment', 'playfulness', 'responsiveness', 'security', and 'interactivity' were found to have a significant positive (+) effect on customer satisfaction (p<0.05) and 'playfulness (β=.372)' had the greatest effect on customer satisfaction. Based on the results of this study, we should strive to establish effective marketing strategies in the H&B industry.

The Evolution of Drone and Air Defense Technologies: Implications for the Future Battlefield

  • Kim Seung-Hyun
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.286-298
    • /
    • 2024
  • The rapid advancement of drone technology has significantly altered the landscape of modern warfare, presenting both opportunities and challenges for military forces worldwide. As drones become increasingly sophisticated, capable of performing complex missions such as reconnaissance, surveillance, and precision strikes, the development of effective air defense systems has become a critical priority. This study examines the current state of drone and air defense technologies, analyzing their impact on military strategies, tactics, and the future battlefield environment. By exploring the patterns of technological evolution, the limitations of existing air defense systems, and the potential consequences of drone proliferation, this research highlights the need for adaptive, innovative approaches to counter emerging threats. The findings underscore the importance of investing in advanced detection and interception capabilities, developing comprehensive counter-drone doctrines, and fostering international cooperation to address the ethical and legal challenges posed by the military use of drones. As the competition between drone and air defense technologies continues to intensify, policymakers and military leaders must proactively engage in shaping the future of warfare to ensure national security and stability in an increasingly complex world.

Lung Cancer Classification and Detection Using Deep Learning Technique

  • K.Sudha Rani;A.Suma Latha;S.Sunitha Ratnam;J.Bhavani;J.Srinivasa Rao;N.Kavitha Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.81-90
    • /
    • 2024
  • Lung cancer is a complex and frightening disease that typically results in death in both men and women. Therefore, it is more crucial to thoroughly and swiftly evaluate the malignant nodules. Recent years have seen the development of numerous strategies for diagnosing lung cancer, most of which use CT imaging. These techniques include supervisory and non-supervisory procedures. This study revealed that computed tomography scans are more suitable for obtaining reliable results. Lung cancer cannot be accurately predicted using unsupervised approaches. As a result, supervisory techniques are crucial in lung cancer prediction. Convolutional neural networks (CNNs) based on deep learning techniques has been used in this paper. Convolutional neural networks (CNN)-based deep learning procedures have produced results that are more precise than those produced by traditional machine learning procedures. A number of statistical measures, including accuracy, precision, and f1, have been computed.

The Effects of Emotions Elicited Clothing Product on Product Satisfaction and Using in Postpurchase Processes (구매후 의류제품에 대한 감정이 제품만족과 사용에 미치는 영향)

  • Rhee, Young-Sun;Kim, Eun-Young
    • Korean Journal of Human Ecology
    • /
    • v.6 no.1
    • /
    • pp.79-88
    • /
    • 1997
  • The postpurchase process is the phase that consumers evaluate products or services while using them. And then, they may experience satisfaction/dissatisfaction and emotions elicited products or services. The satisfaction and emotions may be important concepts in consumer behavior such as brand attitude, purchase intentions and using. The purpose of this study was to examine the effects of emotions elicited clothing products on product satisfaction and using in postpurchase. The subjects in this study were selected 500 females. The data were collected by using questionnaires, and 431 data were analysed. The results were as follows: The emotions in postpurchase process were consisted of three dimensions; unpleasure, pleasure, security/activity. These three emotions had the causal effects on product satisfaction significantly, and the unpleasure influenced stronger than others on satisfaction. In addition, the emotions were related to using and the ownership of clothing products. The emotions of pleasure and the security/activity influenced on the ownership, and the security/activity and unpleasure influenced on using clothing products. Therefore, the results in this study imply that consumption emotions elicited clothing products would be multidimensional, and the emotional factors would be important indicators for explaining the satisfaction. The positive affects were related to using clothes, which is, the consumer would have fulfilled their hedonic desires by wearing clothes. Also, the positive affects would be the basis for marketing strategies of sales promotions in clothing products.

  • PDF

The Effect of Essential Online Elements on Consumer Purchase Intention: Insights from a Taobao Perspective

  • Feng, Zhou;Lee, Un-Kon
    • Journal of Distribution Science
    • /
    • v.13 no.5
    • /
    • pp.15-22
    • /
    • 2015
  • Purpose - Transparency, seller reputation, and website security are considered to be important factors that influence online customer purchasing decisions in China. This paper empirically examines the relative influence of Taobao.com on customers' online purchasing decisions. Research design, data, and methodology - We perform structural equation analysis, with a sample of 306 observations. The data comes from consumers' real transaction experiences from a specific website. This gives the results of our study more generalizability than studies using subjects who are not asked to engage in real transactions. Results - The results of this study reveal that perceived security and perceived reputation are critical factors affecting consumer trust and perceived transparency is most closely associated with purchase intention. Conclusions - The findings suggest that perceived transparency plays a significant role in increasing online consumer's purchase intention. The knowledge of the relative impacts of these factors and their roles in the customer transaction experience will be useful in developing customized sales strategies. The results of this study reveal that perceived transparency exerts a stronger effect than perceived reputation on consumer purchase intentions.

Multi-Vector Defense System using Reverse Proxy Group and PMS(Patch Management System) Construction (Reverse Proxy Group과 PMS를 이용한 멀티벡터(Multi-Vector) DDoS 공격 방어시스템 구축 방안)

  • Kim, Min-Su;Shin, Sang-Il;Kim, JongMin;Choi, KyongHo;Lee, Daesung;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.79-86
    • /
    • 2013
  • The objective of DDoS Attacks is to simply disturb the services. In recent years, the DDoS attacks have been evolved into Multi-Vector Attacks which use diversified and mixed attacking techniques. Multi-Vector Attacks start from DDoS Attack and Malware Infection, obtain inside information, and make zombie PC to reuse for the next DDoS attacks. These forms of Multi-Vector Attacks are unable to be prevented by the existing security strategies for DDoS Attacks and Malware Infection. This paper presents an approach to effectively defend against diversified Multi-Vector attacks by using Reverse Proxy Group and PMS(Patch Management Server).

Dynamism Competent LEACH Replication Deliberate for Wireless Sensor Network

  • KONDA HARI KRISHNA;TAPSI NAGPAL;Y. SURESH BABU
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.7-12
    • /
    • 2023
  • Remote sensor systems are utilized in a few applications, including military, restorative, ecological and family unit. In every one of these applications, vitality use is the deciding component in the execution of wireless sensor systems. Thusly, strategies for information steering and exchanging to the base station are critical in light of the fact that the sensor hubs keep running on battery control and the vitality accessible for sensors is constrained. There are two explanations for the various leveled directing Low Energy Adaptive Clustering Hierarchy convention be in investigated. One, the sensor systems are thick and a considerable measure of excess is engaged with correspondence. Second, with a specific end goal to build the versatility of the sensor arrange remembering the security parts of correspondence. In this exploration paper usage of LEACH steering convention utilizing NS2 test system lastly upgraded vitality productive EE-LEACH directing convention guarantees that the chose cluster heads will be consistently conveyed over the system with a specific end goal to enhance the execution of the LEACH convention. EE-LEACH enhances vitality utilization by around 43%.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

The Important Factors in Security for Introducing the Cloud Services (클라우드 서비스 도입을 위한 보안 중요도 인식에 대한 연구)

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.33-40
    • /
    • 2012
  • The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.

The Relationship between Gymnasium Selection and Training Adherence of Security Martial Arts Trainees (경호무도 수련생의 도장선택과 수련지속의 관계)

  • Song, Gyu-Geun;Lee, Ki-Se;Min, Jae-Ki
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.107-128
    • /
    • 2011
  • The purpose of this study was to determine the relationship between gymnasium selection and training adherence of security martial arts trainees. To this aim, this study selected 8 gymnasiums in Gyounggi and Incheon province and sampled 220 people above the fourth grade in elementary school. Out of these, 14 cases were dropped due to insufficient answers or incomplete answers, and 206 qualified cases were finally adopted for this study. Data were analyzed using exploratory factor analysis, reliability analysis and frequency analysis, MANOVA, correlation analysis and multiple regression analysis with SPSS 18.0. The results of this study were as follows. First, there were significant differences in gymnasium selection factors(instructor background, training program, public relations) depending upon the trainee's sex. Second, there were significant differences in gymnasium selection factors(training program, main others, public relations) depending upon the trainee's school grade. Third, there were no significant differences in training adherence factors depending upon the trainee's sex and school grade. Fourth, there were positive correlations between instructor background, training program and public relations-factors among gymnasium selection and management program, external and social relations-factors among training adherence. Fifth, the partial sub-factors of gymnasium selection have influenced training adherence. Consequently, security martial arts managers and instructors need to establish marketing strategies suitable for sex and school grade to recruit new security martial arts trainees. It may be considered that security martial arts instructors should construct the differentiated management system for trainees and the specialized training program for lasting training of new or existing security martial arts trainees.

  • PDF