• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.028 seconds

A Study on Factors Influencing Internet Service Satisfaction in the High-Speed Information and Communication Network (초고속정보통신망하에서 인터넷서비스만족도에 영향을 주는 요인에 관한 연구)

  • 조성빈;유한주;유왕진
    • Journal of Korean Society for Quality Management
    • /
    • v.30 no.3
    • /
    • pp.168-185
    • /
    • 2002
  • A few recent international surveys reported that Korea ranks the top with respect to the high-speed information and communication network subscription per 100 people in the world. Such infrastructure has been bringing about broad changes in Internet service for both business and individual users. By conducting a questionnaire survey on a moderate size of sample proportional to the population of each region across country, we try to analyze what factors might explain the level of Internet service satisfaction with respect to security, searching, and convenience dimensions. According to the test results, several factors such as sex, age, kind of network lines, usage frequency, e-mail usage, e-shopping, online problem experience might explain the different levels of Internet service satisfaction in the high-speed Internet network. This study might shed a guidance to scholars conducting Internet-related studies and practitioners who plan information policies and business strategies.

Dynamic Dependability Level Switching Strategies by Utilizing Threat Predictions

  • Lim, Sung-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • A System can be more Dependable from some types of Threats if the Dependability Level Against the Threat on the System is Increased. However, The Dependability-performance Tradeoff should be Considered because the Increased Dependability may Degrade the Performance of the System. Therefore, it is Efficient to Temporally Increase the Dependability Level to High only when an Threat is Predicted on the System in a Short time while Maintaining the Level in Low or mid in Normal Situations. In this Paper, we Present a Threat Prevention Strategy for a Networked Node by Dynamically Changing the Dependability Level According to the Threat Situation on its Logically/physically Neighboring Nodes. As case Studies, we Employ our Strategy to an Internet Server Against TCP SYN Flood Attacks and to a Checkpoint and Rollback System Against Transient Faults. Our Performance Analysis Shows that our Strategy can Effectively Relieve the Damage of the Failure without Serious Performance Degradation.

The Trends of Domestic SI Industry and Promotion Strategies for the CALS Model Projects (국내 SI업체의 동향 및 CALS 시범사업 추진전략)

  • 정기원;임춘성;정동길
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.131-151
    • /
    • 1997
  • The CALS/EC is the world-wide accepted concept and its application domain is being expanded continuously throughout the private and public sectors. One of the essential points for realization of CALS/EC is to promote the domestic system integration(SI) industry. This paper describes the present status of the domestic SI companies and the clues to solve their facing problems. In order to evaluate the status of the current SI technology, the MBNQA(Malcom Baldridge National Quality Award) is adopted. The surveyed results show that the average levels of 14 SI companies over 7 evaluation criteria turn out to be 30% through 40% point. The major projects' activities of the SI companies on the information systems over the areas of trade, science and technology, industrial manpower, health and welfare, national security, etc are explained. Also, the competitive power of the SI companies is also discussed. As a target sample, the Korea Telecom(KT) CALS model project is described in terms of its Progresses and Problems. Furthermore, the strategic plans and detailed research items are proposed to resolve on-going issues.

  • PDF

Consumer's Response for Health Friendly Planning Features of Smart Home (건강친화 지능형주택 계획요소에 대한 소비자 반응 연구)

  • Lee, Sunmin;Lee, Yeunsook;Ahn, Changhoun
    • KIEAE Journal
    • /
    • v.9 no.2
    • /
    • pp.27-36
    • /
    • 2009
  • Due to rapid advances in science and technology and peoples life value, multi-dimensional functionality of the house has been possible and demanded. Among them, intellectual function and health support function appeared prominent and the former can support the later. The purpose of this study was to delineate health support planning features for smart home. Thirty six planning elements were extracted for initial pool for survey to find out what consumers demanded. Two hundred and nine data were collected through the web-survey. Important planning features were identified in relation to three different health dimensions that is physical/physiological, psychological, and social health. Generally consumers' responses were positive for all features. Major health friendly features highly demanded by consumers were found gas detect system, security system, and a call alarm system. The result of this study is expected to be used as a basic reference to develop strategies for smart home and to grasp current housing culture.

Survey on IEEE 802.11 DCF Game Theoretic Approaches (IEEE 802.11 DCF에서의 게임 이론적 접근방법 소개)

  • Choi, Byeong-Cheol;Kim, Jung-Nyeo;Ryu, Jae-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.240-242
    • /
    • 2007
  • The game theoretic analysis in wireless networks can be classified into the jamming game of the physical layer, the multiple access game of the medium access layer, the forwarder's dilemma and joint packet forwarding game of the network layer, and etc. In this paper, the game theoretic analysis about the multiple access game that selfish nodes exist in the IEEE 802.11 DCF(Distributed Coordination Function) wireless networks is addressed. In this' wireless networks, the modeling of the CSMA/CA protocol based DCF, the utility or payoff function calculation of the game, the system optimization (using optimization theory or convex optimization), and selection of Pareto-optimality and Nash Equilibrium in game strategies are the important elements for analyzing how nodes are operated in the steady state of system. Finally, the main issues about the game theory in the wireless network are introduced.

  • PDF

An Empirical Study on Critical Success Factors in Internet Shopping Mall (인터넷쇼핑몰 성공요인에 관한 실증적 연구)

  • Kim, Chi-Ho;Eom, Kwang-Yeol
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.3-18
    • /
    • 2005
  • The purpose of this study is to investigate the determinants of critical success and to analyze the main factors which are affecting the successful implementation of Internet shopping mall. The major findings of empirical analysis are as follows : 1) The degree of searching easuness in the internet shopping mall is statistical significance. 2) The degree of customer response is the important success factor. 3) The speed of connection exert a beneficial influence upon the performance of shopping mall. 4) The standard of security system is be in direct proportion to the performance of shopping mall The result of this study will be useful for the chief executive officers to make more rational decision making for e-Business strategies is related to the Internet shopping mall. The paper also strives to provoke debate in this area with to encouraging further research on the topic.

  • PDF

Wiretapping Strategies for Artificial Noise Assisted Communication in MU-MIMO wiretap channel

  • Wang, Shu;Da, Xinyu;Chu, Zhenyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2166-2180
    • /
    • 2016
  • We investigate the opposite of artificial noise (AN)-assisted communication in multiple-input-multiple-output (MIMO) wiretap channels for the multiuser case by taking the side of the eavesdropper. We first define a framework for an AN-assisted multiuser multiple-input-multiple-output (MU-MIMO) system, for which eavesdropping methods are proposed with and without knowledge of legitimate users' channel state information (CSI). The proposed method without CSI is based on a modified joint approximate diagonalization of eigen-matrices algorithm, which eliminates permutation indetermination and phase ambiguity, as well as the minimum description length algorithm, which blindly estimates the number of secret data sources. Simulation results show that both proposed methods can intercept information effectively. In addition, the proposed method without legitimate users' CSI performs well in terms of robustness and computational complexity.

Effects of mobile fashion shopping characteristics on perceived usefulness, perceived ease of use, purchase attitude, and purchase intention of mobile fashion shopping mall - Focusing on smartphone users - (모바일 패션 쇼핑 특성이 지각된 유용성과 지각된 용이성, 구매태도 및 구매의도에 미치는 영향 - 스마트폰 사용자를 중심으로 -)

  • Kim, Minjung;Shin, Suyun
    • The Research Journal of the Costume Culture
    • /
    • v.22 no.2
    • /
    • pp.240-257
    • /
    • 2014
  • In this study, we identified the characteristics of mobile fashion shopping and verified the path model of effects of these characteristics on mobile fashion shopping purchase intention through perceived usefulness and perceived ease of use. We conducted the survey targeting smartphone users in their 20s~30s and analyzed the structural equation model using AMOS 16.0. The results were as follows: Mobile fashion shopping characteristics (enjoyment, credibility, instant connectivity, security, and personalization) had positive effects on perceived usefulness and perceived usefulness influenced attitude toward purchase and purchase intention positively. Attitude toward purchase affected purchase intention in a positive way and perceived usefulness had indirect effect on purchase intention through attitude toward purchase. In conclusion, we proposed the marketing strategies of the mobile fashion shopping businesses.

The Relationship among Web Design, e-Satisfaction, e-Loyalty, and Customer Defection (웹디자인, e-만족, e-충성도, 고객이탈 간의 관계에 관한 연구)

  • Kim, Keum Soo;Chung, Ki Han
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.213-229
    • /
    • 2009
  • The purpose of this paper is to identify the relationship among five factors of web design, e-satisfaction, e-loyalty, and customer defection and provide the implications of marketing strategies in online shopping. The research findings are as follows: first, ease of use of web design affects positively e-satisfaction more than the other factors except financial security. Second, e-satisfaction affects positively e-loyalty. Third, e-satisfaction does not affect customer defection. Fourth, informativeness, styling, ease of use, and trust of web design affect indirectly e-loyalty by mediating e-satisfaction. Therefore, because there is a good circular relationship among web design, e-satisfaction, and e-loyalty, it is very important to enhance web design for customers. When customers satisfy highly with the factors of web design, e-loyalty is higher and customer defection is lower. Further, in a curriculum of web design it is needed to reflect the findings of this paper.

Global Trade Management Strategies for Export Companies from the Supply Chain Management Perspective (공급사슬관점에서 수출기업의 글로벌 무역관리 전략)

  • Yang, Jung-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.35
    • /
    • pp.179-219
    • /
    • 2007
  • Cross-border supply chains undergone complexity in the global trade process, unpredictability and continually evolving regulations and information requirements. Under these circumstances, longer lead time inhibiting quick response to market demands, unanticipated supply chain costs eroding product cost savings, compliance and documentation errors causing delays and fines are challenging global trade companies when they execute global business. These problems are mainly caused by unautomated, unintegrated process which lead to longer and more unpredictable lead times, slower cash flow, cost overruns, and ultimately lower profits and less satisfied customers. Complex and unpredictable global trade environment requires global trade companies of global trade management functions to automate and control this complex environment for driving out cost, time and risk from their business. Global trade management allows cost savings, supply chain efficiencies and improved compliance through improving global supply chain visibility, facilitating cash flow by supply chain financing, enhancing supply chain security and risk management.

  • PDF