• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.033 seconds

The Relationship between Work Values and Entrepreneurial Attitudes: Implications for the Distribution Industry

  • Wang, Haikun;Moon, Jaeseung
    • Journal of Distribution Science
    • /
    • v.17 no.3
    • /
    • pp.57-67
    • /
    • 2019
  • Purpose - This study aims to examine the impact of work values on entrepreneurial attitudes, and test the moderating effect of entrepreneurial opportunity identification on the above mentioned relationship as well. Research design, data, and methodology - A questionnaire survey was conducted to 258 employees who comes from 8 different types of the enterprises in northwestern of China, and the corresponding research model was verified. Results - The results show that "comfort and security" (one dimension of work values) has a significant negative impact on entrepreneurial attitudes. Another two dimensions of work values, such as "competence and growth" and "status and independence" have a significant positive impact on entrepreneurial attitudes. In addition, entrepreneurial opportunity identification has a significant moderating effect on the relations between work values and entrepreneurial attitudes. Specifically, only the entrepreneurship opportunity identification positively moderates the relationship between status & independence and entrepreneurial attitudes. Conclusions - This research further enriches the relevant theories of organizational behavior and entrepreneurships. This study also has guiding significance and value for management practice, especially for this research results implies, that is, individual's ability to entrepreneurial opportunity identification (e.g., identify feasible distribution channel for potential new venture) is important in entrepreneurship.

Design and Implementation of a Connected Car Platform Architecture for New ICT Convergence Services

  • Kook, Joongjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.47-54
    • /
    • 2017
  • In this paper, we propose a connected car platform architecture called Mobile Second for developing of verity convergence services. A Mobile Second platform architecture is designed to provide more powerful and diverse convergence services for vehicles and drivers by applying technologies of Connected Car and ICT Convergence in various ways. The Mobile Second platform is implemented by applying Tizen IVI and Android to hardware platforms for IVI, Nexcom's VTC1010 and Freescale's i.MX6q/dl respectively. The Mobile Second platform provides the driver with the vehicle's information via IVI devices, mobile devices and PCs, etc., and provides Vehicle Selective Gateway(VSG) and Vehicle Control Framework for the driver to control his/her vehicle, and also provides a web framework to enable the use of VSG's APIs for the monitoring and controlling the vehicle information in various mobile environments as well as IVI devices. Since the Mobile Second platform aims to create new variety of services for Connected Car, it includes service frameworks for Smart Care / Self diagonostics, Mood & Entertainment services, and Runtime, libraries and APIs needed for the development of related applications. The libraries given by the Mobile Second Platform provides both a native library for native application support and a Java Script-based library for web application support, minimizing the dependency on the platform and contributing the convenience of developers at the same time.

Improving performance of soil stabilizer by scientific combining of industrial wastes

  • Yu, Hao;Huang, Xin;Ning, Jianguo;Li, Zhanguo;Zhao, Yongsheng
    • Geomechanics and Engineering
    • /
    • v.10 no.2
    • /
    • pp.247-256
    • /
    • 2016
  • In this paper, based on understanding the design theories on soil stabilization, a series of soil stabilizers were prepared with different kinds of industrial wastes such as calcined coal gangue (CCG), blast furnace slag (SS), steel slag (SL), carbide slag (CS), waste alkali liquor (JY), and phosphogypsum (PG). The results indicated that when the Portland cement (PC) proportion was lower than 20% in the stabilizer, for the soil sample selected from Wuhan (WT) and Beijing (BT), the unconfined compress strength (UCS) of the stabilized soil specimens could increase 4.8 times and 5.4 times respectively than that of the specimens stabilized only by PC; compared with the UCS of the specimen stabilized only by PC, the UCS of the specimen which was made from soil sample WT and stabilized by the stabilizer composed only by CCG, CS, and PG increased 1.5 times, and UCS of the specimen which was made from soil sample BT and stabilized by the stabilizer composed only by SS, JY, and PG increased 4.5 times.

Performance Assessment System using Fuzzy Reasoning Rule (펴지 추론 규칙을 이용한 수행 평가 시스템)

  • Kim Kwang Baek;Cho Jae Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.209-216
    • /
    • 2005
  • Performance assessment has Problems about possibilities of assessment fault by appraisal, fairness, reliability, and validity of grading, ambiguity of grading standard, difficulty about objectivity security etc. This study proposes fuzzy Performance assessment system to solve problem of the conventional performance assessment. This Paper presented an objective and reliable performance assessment method through fuzzy reasoning, design fuzzy membership function and define fuzzy rule analyzing factor that influence in each sacred ground of performance assessment to account principle subject. Also, performance assessment item divides by formation estimation and subject estimation and designed membership function in proposed performance assessment method. Performance assessment result that is worked through fuzzy Performance assessment system can pare down burden about appraisal's fault and provide fair and reliable assessment result through grading that have correct standard and consistency to students.

  • PDF

Quantitative Analysis of Food and Nutrition Informations on the Internet (인터넷 사이트 식품영양정보의 양적 평가)

  • Kim, Byeong-Suk;Jeong, Mi-Ran;Lee, Yeong-Eun
    • Journal of the Korean Dietetic Association
    • /
    • v.12 no.2
    • /
    • pp.185-199
    • /
    • 2006
  • The purpose of this study was to estimate the sites providing accurate and useful informations to the public by monitoring food and nutrition informations distributed through the internet quantitatively about 13 items of 7 necessary requisites. Total of 457 internet sites on the searching engines of Yahoo, Empas, Nate, Naver and Daum were monitored by 10 panels from May, 2004 to October. Thirty eight % of the sites got 7 & 8 total of 14 points and total sites showed a normal distribution. From the estimation of meta data, individual sites(5.19) were operated insufficiently compared with the commercial sites(6.10) and institutional sites(6.60) (p<0.000). According to administrators, sites were evaluated in the order of research institute> government organization> academic association> pharmaceutical company, club, food company, university> hospital> individual (p<0.000). While low-ranked sites were lack of authority because they didn't show the information provider and source, high-ranked ones lack of sustainable management(updating informations) and security. From this study, we suggest that 1) theme, contents and design have to prepared with variety to suit the need of target clients instead of that of site operator; 2) source and origin of information have to be provided; 3) informations have to be updated often and site to be managed sustainably.

  • PDF

Design and Implementation of Digital Door Lock by IoT (사물인터넷을 이용한 디지털 도어락, DDiT의 설계 및 구현)

  • Seo, Dae Gyu;Ko, Han Shin;Noh, Yong Deok
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.215-222
    • /
    • 2015
  • In this paper, the Digital DoorLock by Internet of Things (DDiT) is introduced. In order to implement DDiT, an integrated micro-controller platform, Arduino is used to control an existing digital doorlock and an android type smart phone is adopted as a mobile platform. One of the advantages of DDiT is that it can be added to an existing digital doorlock and a smart phone application is used as a digital key. Owing to the smart phone application, several other types of applications could also be made. Therefore, DDiT could be used effectively and conveniently in ordinary homes as well as in high security applications such as in hotels, institutes, and companies.

Design and Implementation of a Copyright Protection System base on the Program on-line Registration System (프로그램 온라인 등록 시스템기반의 저작권 보호시스템 설계 및 구현)

  • Jang Jae-Hyeok;Lee Jong-Sup;Choi Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.275-283
    • /
    • 2006
  • Writers enroll their outcome to Program Deliberation & Mediation Committee and get the copyright preserved for the protection of IPR. The program registration is conducted through off-line and on-line methods, and especially on-line registration provides program registrants convenience along with the safety of property from external copyright invaders. However, it is a shortcoming that the integrity and confidentiality of the enrolled program cannot be guaranteed in case of internal factors such as system errors, administrator's illegal access and revision. This paper proposes the reliable system, ensuring programs and offering convenience of Digital signature management from the system errors and intruding factors by internal administrator, using the security of confidentiality, integrity and Multi-Signature Scheme for program.

  • PDF

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.

Influence on the Use Intention of Alipay Payment Service by Chinese Tourists Visiting Korea

  • HE, Ming-Guang;KIM, Hwa-Kyung;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.11
    • /
    • pp.7-13
    • /
    • 2019
  • Purpose: In the past, the South Korean government made various efforts to attract Chinese tourists, resulting in gradually more inbound tourists. In 2016, the number of Chinese tourists to South Korea peaked at 8.06 million and became the top source market. Nevertheless, increasing numbers of consumers choose to adopt the mobile payment tool instead of cash and credit cards in modern times with developed IT services. Research design, data, and methodology: IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used to analyze the data, which was collected from hotel employees in China from March 25 to May 10. Results: First, Interactivity, security, convenience, local information supply and user interface had positive effects on satisfaction and reliability. Second, it was believed that the convenience of Alipay played a positive role in increasing reliability and satisfaction through verification. Third, the role of use rate was found to be important in the development of Alipay functions. Conclusions: Based on the result, an analysis on the development of the Alipay market and the use of Alipay in South Korea is warranted. Furthermore, this paper will serve as a basis for flexible strategic plans for the development of Alipay and SMEs in South Korea.

Design and Implementation of a 13.56 MHz RFID System (13.56 MHz RFID 시스템 설계 및 구현)

  • Lee, Sang-Hoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.46-53
    • /
    • 2008
  • This paper presents a 13.56 MHz RFID reader that can be used as a door-lock system for smart home security. The RFID reader consists of a transmitter, a receiver, and a data processing block. To verify the operation of the developed RFID reader, we present both a PSPICE simulation for transmitter/receiver and a digital simulation for data processing block. In particular, a CRC block for error detection of received data and a Manchester decoding block for position detection of collided data are designed using VHDL. In addition, we applied a binary search algorithm for multi-tag anti-collision. The anti-collision procedure is carried out by PIC microcontroller on software. The experimental results show that the developed reader can provide the right multi-tag recognition.

  • PDF