• Title/Summary/Keyword: Security Target

Search Result 702, Processing Time 0.034 seconds

Formation of the Strategy of Digital Marketing of the Enterprise in the Conditions of the Competitiveness Intensification in the International Market

  • Solntsev, Sergii;Smerichevskyi, Serhii;Skyba, Halyna;Zabashtanska, Tetiana;Bazaliyska, Natalia;Kolbushkin, Yuriy
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.47-56
    • /
    • 2022
  • The article defines the principles of formation of digital marketing strategy of enterprises in the conditions of intensification of competition on the international market. The stages of development of digital marketing strategy of enterprises in the conditions of intensification of competition in the international market are substantiated, which includes: setting goals, which envisages observance of the principles of SMART-scheme; product or service analysis; monitoring of competitors; analytics of definition and segmentation of the target audience of the enterprise; selection of digital marketing tools and channels for promotion on the international market of products or services; formation of a unique, unique trade offer, selection of indicators for evaluating the effectiveness of digital marketing strategy and its tools. It is proved that according to the principle of SMART method of goal setting it is necessary that the goals have: specificity, measurability, achievability, relevance, achievement of the goal should be limited in time, have specific deadlines. To increase the effectiveness of digital marketing strategy, it is necessary to analyze the internal and external environment using the method of SWOT-analysis, the advantage of which is a comprehensive assessment of the company, competitors and the industry as a whole in the face of competition in the international market. The main indicators of evaluation of the effectiveness of digital marketing strategy in the conditions of intensification of competition on the international market are substantiated.

Differences in Users' Insights and Increase in The Acceptance Level for Using The BYOD Approach in Government, Non-Profit Organizations, and Private Sectors in Saudi Arabia

  • Alghamdi, Ahmed M.;Bahaddad, Adel A.;Almarhabi, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.332-346
    • /
    • 2022
  • Digital transformation represents one of the main obstacles facing several government, private, and non-profit sectors that help stabilize digital transformation in the Arabic region. One of the helpful ways to improve the level of freedom, productivity, and flexibility among employees to accept the BYOD approach is using their own devices to perform their work both in and outside the workplace. This study focuses to present the differences between the main three economic sectors, which represent the most important pillars of the economy in Saudi Arabia within the Kingdom's Vision 2030. BYOD also has great importance to the stakeholders for raising their awareness by expressing the implications, if the concept of BYOD is widely and correctly adopted. The study uses the diffusion of innovation (DOI) framework and quantitative analysis data to determine the main dimensions and important factors that help increase the awareness of the target audience. The number of participants in this study was 830, and the participants are mixing between the government, private, and non-profit sectors. The main findings showed a significant impact of several factors such as the importance of knowledge, ease of use, employee satisfaction, risk awareness, and attention to increase the level of acceptance in three main sectors study for using the BYOD approach widespread and professional use.

Analyzing Gifted Students' Social Behavior on Social Media at COVID-19 Quarantine

  • Khayyat, Mashael;Sulaimani, Mona;Bukhri, Hanan;Alamiri, Faisal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.7-14
    • /
    • 2022
  • COVID-19 has caused a global disturbance, increased anxiety, and panic, eliciting diverse reactions. While its cure has not been discovered, new infection cases and fatalities are being recorded daily. The focus of the present study was to analyze the reaction of gifted undergraduate students on social media during the quarantine period of the COVID-19. A special group of gifted students, who joined the program of attracting and nurturing talents at the University of Jeddah, University students as were the target sample of this study. To analyze online reactions during the pandemic; the choice of university students was arrived at as they are perceived to be gifted academically. Hence, the analysis of the impacts on their behavior on social media use is imperative. This study presented accurate and consistent data on the effects of social media using Twitter platforms on gifted students during the quarantine occasioned by the COVID-19 pandemic. The behavior of learners due to during the use of social media was extensively explored and results analyzed. The study was carried out between April and May 2020 (quarantine period in Saudi Arabia) to establish whether the online behavior of gifted students reflects positive or negative feelings. The methods used in conducting this study the research were online interviews and scraping participants' Twitter accounts (where most of the online activities and studies take place). The study employed the Activity theory to analyze the behavior of gifted students on social media. The sample size used was 60 students, and the analysis of their behavior was based on Activity theory Overall, the results showed proactive, positive behavior for coping with a challenging situation, educating society, and entertaining. Finally, this study recommends investing in gifted students due to their valuable problem-solving skills that can help handle global pandemics efficiently.

A General Acoustic Drone Detection Using Noise Reduction Preprocessing (환경 소음 제거를 통한 범용적인 드론 음향 탐지 구현)

  • Kang, Hae Young;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.881-890
    • /
    • 2022
  • As individual and group users actively use drones, the risks (Intrusion, Information leakage, and Sircraft crashes and so on) in no-fly zones are also increasing. Therefore, it is necessary to build a system that can detect drones intruding into the no-fly zone. General acoustic drone detection researches do not derive location-independent performance by directly learning drone sound including environmental noise in a deep learning model to overcome environmental noise. In this paper, we propose a drone detection system that collects sounds including environmental noise, and detects drones by removing noise from target sound. After removing environmental noise from the collected sound, the proposed system predicts the drone sound using Mel spectrogram and CNN deep learning. As a result, It is confirmed that the drone detection performance, which was weak due to unstudied environmental noises, can be improved by more than 7%.

Local Self-Government in the Conditions of Digitization: International-Legal Experience

  • Perezhniak, Boris;Vasylchuk, Larysa;Bevz, Tetiana;Pyroha, Serhii;Ulianov, Oleksiy
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.165-170
    • /
    • 2022
  • Nowadays more and more attention is paid to digital technologies, digitization, and the digitization of public services in particular. Progressive countries aim to build "digital" governance and a digital economy. In this aspect, the international experience of using digitization in the field of public administration, including in local self-government bodies, plays an important role. Therefore, it is important to analyze the international legal experience of the functioning of local self-government in the conditions of digitization. The purpose of the work is to study the international legal experience of the functioning of local self-government in the conditions of digitization. The object of the study is local self-government in the conditions of digitization through the prism of international legal experience. The subject of the study is social relations that arise, change, and cease during the implementation of digitization in local self-government in Ukraine and foreign countries. The research methodology consists of such methods as the method of philosophical hermeneutics; dialectical method; classification method; comparative method; target method; method of documentary analysis; generalization method. Research results. As a result of the conducted research, the international experience of the functioning of local self-government in conditions of digitization was analyzed. In particular, the impact of digitization processes on the course of the decentralization reform in Ukraine is summarized. Also, from the analysis of international experience, a conclusion was made about the potential possibility of reducing the existing gap in the process of communication between the central government and united territorial communities thanks to the introduction of the latest technologies in the field of administrative services, to stimulate innovative and economic development of regions, attracting the attention of businesses and potential investors, as well as the functioning of more open local authorities with electronic communication tools.

A Study on Essential Concepts, Tools, Techniques and Methods of Stock Market Trading: A Guide to Traders and Investors (주식 거래의 필수 개념, 도구, 기법 및 방법에 관한 연구: 거래자와 투자자를 위한 안내서)

  • Sukhendu Mohan Patnaik;Debahuti Mishra
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.21-38
    • /
    • 2023
  • An attempt has been made in this article to discuss the fundamentals of technical analysis of the stock market. A retail investor or trader may not have the wherewithal to source that kind of information. Technical analysis requires a candlestick chart only. Most of the brokers in India provide charting solutions as well. Studying the price action of a security or commodity or Forex generally indicates a price pattern. Prices react at certain levels and widely known as support and resistance levels. Since whatever is happening with the price of the security is considered to be a part of a pattern or cycle which has already played out sometime in the past, these studies help a keen technical analyst to identify with certain probability, the future movement of the price. Study of the candlestick patterns, price action, volumes and indicators offer the opportunities to identify a high probability trade with probable target and a stop loss. A trader or investor can take high probability trade or position and control only her losses.

A Study on Improvement Plans for Application of the Personal Information Protection Act(Based on the Subject to Duty of Safeguards) (개인정보보호법 적용 대상에 대한 개선 방안 연구(안전성 확보조치 기준 의무 대상 중심으로))

  • Jang Sang Soo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.35-43
    • /
    • 2023
  • Since the Personal Information Protection Act was enacted in 2011, it has played a role in safely protecting people's personal information and protecting their rights. Personal information controller must comply with the duty of safeguards for safe personal information management. Even though administrative regulation is an accompanying issue, it is not clear to whom, when and how it applies. According to the imposition of duties, the scope, standards, safety measures, procedures, etc. for the target person should be clearly and specifically specified, but the current legal system is insufficient .In this study, problems and reasonable improvement plans were presented for the classification criteria for applicable subjects, the criteria for the criteria for determining the targets, and the criteria for measures to ensure safety. Through this, we intend to contribute to enhancing the effectiveness of the system by presenting reasonable measures by clarifying and specifying the scope and standards of application.

The Study on the Factors Affecting Discontinuance Intention of FinTech Payment Service: Focusing on Y University Students (핀테크 지급결제 서비스 사용중단의도 영향요인 연구: Y대학 재학생을 중심으로)

  • Chang, Eun-Jin;Hwang, Sin-Hae;Kim, Jeoung-Kun
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.117-129
    • /
    • 2022
  • In the perspective of value-based adoption mode, this study empirically examined the factors that affect the intention of users of Fintech payment services to stop using them. A survey of college students who are familiar with digital devices, have no objection to payment and settlement services, and have high service access. A total of 148 questionnaires were analyzed using SPSS and SmartPLS. The study results show that perceived benefits, complexity, and security concerns are significant factors influencing the discontinue intention of Fintech payment services. Among them, the perceived benefit showed the most significant influence. Based on the results of this study, Fintech providers will be able to build a service environment to provide continuous benefits for maintaining long-term relationships with users, improve systems to secure various uses, and reduce users' negative perceptions of security. Recently, the use of services by the elderly has increased, so it is necessary to expand the scope of this study to target various age groups in future research.

Design Method of Things Malware Detection System(TMDS) (소규모 네트워크의 IoT 보안을 위한 저비용 악성코드 탐지 시스템 설계 방안 연구)

  • Sangyoon Shin;Dahee Lee;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.459-469
    • /
    • 2023
  • The number of IoT devices is explosively increasing due to the development of embedded equipment and computer networks. As a result, cyber threats to IoT are increasing, and currently, malicious codes are being distributed and infected to IoT devices and exploited for DDoS. Currently, IoT devices that are the target of such an attack have various installation environments and have limited resources. In addition, IoT devices have a characteristic that once set up, the owner does not care about management. Because of this, IoT devices are becoming a blind spot for management that is easily infected with malicious codes. Because of these difficulties, the threat of malicious codes always exists in IoT devices, and when they are infected, responses are not properly made. In this paper, we will design an malware detection system for IoT in consideration of the characteristics of the IoT environment and present detection rules suitable for use in the system. Using this system, it will be possible to construct an IoT malware detection system inexpensively and efficiently without changing the structure of IoT devices that are already installed and exposed to cyber threats.

A Study on Object Recognition Technique based on Artificial Intelligence (인공지능 기반 객체인식 기법에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, in order to build a cyber physical system(CPS) that is a technology related to the 4th industry, the construction of the virtual control system for physical model and control circuit simulation is increasingly required in various industries. It takes a lot of time and money to convert documents that are not electronically documented through direct input. For this, it is very important to digitize a large number of drawings that have already been printed through object recognition using artificial intelligence. In this paper, in order to accurately recognize objects in drawings and to utilize them in various applications, a recognition technique using artificial intelligence by analyzing the characteristics of objects in drawing was proposed. In order to improve the performance of object recognition, each object was recognized and then an intermediate file storing the information was created. And the recognition rate of the next recognition target was improved by deleting the recognition result from the drawing. In addition, the recognition result was stored as a standardized format document so that it could be utilized in various fields of the control system. The excellent performance of the technique proposed in this paper was confirmed through the experiments.