• Title/Summary/Keyword: communication based-on trust

Search Result 267, Processing Time 0.026 seconds

Career Identity of High School Students: Exploring Differences by Negative Emotions of Consumer Typology (고등학생의 진로 정체감에 영향을 미치는 요인: 부정적 정서에 따른 소비자 유형화 분석)

  • Kim, Hyo-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.2
    • /
    • pp.476-489
    • /
    • 2018
  • This study examined the factors affecting the career identity of high school students. We adopted the ecological systems theory by Bronfenbrenner. The consumer typology approach was applied based on their negative emotions, and they were categorized into two distinct groups: unstable emotion group(n=903) and stable emotion group(n=1,107). We used the panel data of Korean Children & Youth Panel Survey. Data of a total of 2,010 participants were analyzed. The results of this study are as follows. In the unstable emotion group, parental supervision, parental excessive expectation, peer communication, peer trust, and teacher attachment significantly influenced career identity. In the stable emotion group, parental supervision, parental abuse, peer communication, and teacher attachment significantly influenced career identity.

A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector (금융권 PC보안 위협 분석 및 대응방안에 관한 연구)

  • Han, Kyung-Hee;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.283-290
    • /
    • 2015
  • As society has evolved to the knowledge and information society, the importance of internal information of the company has increased gradually. Especially in financial institutions which must maintain the trust of customers, the disclosure of inside information is a big problem beyond the a company's business information disclosure level to break down sales-based businesses because it contains personal or financial transaction information. Recently, since massive outflow of internal information are occurring in several enterprises, many companies including financial companies have been working a lot in order to prevent the leakage of customer information. This paper describes the internal information leakage incidents occurred in the finance companies, the PC security vulnerabilities exists despite the main security system and internal information leakage prevention and suggests countermeasures against increasing cyber infringement threats.

A study on the application of blockchain technology to prevent duplicate supply and demand of similar welfare services (복지서비스 유사사업의 중복수급 방지를 위한 블록체인 기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.151-156
    • /
    • 2020
  • Various institutions provide various welfare-related services, and accordingly, the quantity and quality of welfare-related services are improved. Along with the improvement of welfare services, the rate of fraudulent and redundant supply and demand due to inappropriate applicants is also increasing. In particular, in the case of similarly promoted projects by various institutions, confirmation of duplicate applications may be insufficient due to system inconsistency between institutions and delays in qualification verification, which may result in duplicate supply and demand. In this paper, in order to prevent the redundant supply and demand related to welfare service similar projects in various institutions, the problem of data management and sharing between institutions was reviewed and a method of applying blockchain technology was proposed step by step. Through the proposal of this paper, transparent data management of recipients is possible, and through this, trust-based welfare benefit management will be possible.

The Defense Strategies against Consumer Unethical Behaviors (소비자의 비윤리적 행동에 대한 방어전략)

  • Lee, Un-Kon;Park, Jong Pil;Choi, Young Eun;Oh, Yonghui
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.17-37
    • /
    • 2012
  • The evolution of the IT facilitated the social actions of the consumers by supporting social communication of the online users. At the same time it help for the consumer to post malicious comments on the Internet or to spread the unproven news for distorting the public opinion in the SNSs. Although the number of the consumer unethical behaviors and the estimated damage of the innocent companies have been increased, a few studies had investigate on this issue. Based on the Literature on the consumer unethical behaviors and the institution based trust, we had developed the defense strategies against the consumer unethical behaviors. This study would introduce the new perspective that the consumer could always not be innocent. Also, the defense strategy developed in this study could contribute to make the guideline for consumer service manual.

A Study on Application for e-learning Based on Ontology (온톨로지 기반 e-Learning 적용에 관한 연구)

  • Shin, Chang-Ha;Park, Jong-Hoon;Kim, Chul-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.389-394
    • /
    • 2011
  • The object of this paper is to make learners have study environment to study adaptively, anywhere, anyone, anytime and, just in time, not disturbed by time and place. So, it helps learners find solutions to questions and problems which they can face in the process of learning. This paper desires to find possibility of ontology which can solve problems after considering semantic web and theory of ontology by studying existing reference books. As ontology has the structure that can guess the data which is not showed clearly, so it can make the result more accurate and be the knowledge every learner sympathize and trust. I established the ontology frame about the electronic circuit which learners can solve their questions everywhere, anytime, and reconfirm what they studied, so I studied on application for e-learning based on ontology.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Determinants of Hotel Customers' Use of the Contactless Service: Mixed-Method Approach (호텔 고객의 비대면 서비스 이용의도의 영향요인에 대한 연구)

  • Chung, Hee Chung;Koo, Chulmo;Chung, Namho
    • Knowledge Management Research
    • /
    • v.22 no.3
    • /
    • pp.235-252
    • /
    • 2021
  • The development of information and communication technology and COVID-19 have caused an unusual change in the hotel industry, and the demand for the contactless services such as service robots from hotel customers has surged. Therefore, this study investigates the perception of hotel customers on contactless services by applying a mixed-method analysis. Specifically, this study identified the causal correlations between variables through the structural equation model, and further applied the fuzzy set qualitative comparison analysis to derive patterns of variables that form the intention to use the non-face-to-face services. As a result of the analysis, it was shown that service experience co-creation, palyfulness, personalization, and trust had a significant effect on intention to use through the contactless service use desire. On the other hand, in the results of fuzzy-set qualitative comparison analysis, playfulness was derived as a core factor in all patterns. Based on these analysis results, this study provides academic basis for in-depth understanding of hotel customers' perception of contactless service and specific guidelines for hotel managers on the contactless service strategies in the era of COVID-19 pandemic.

Analysis of Influence Factors of Satisfaction by Marketing Strategic Based on the Type of Real Estate (부동산 유형별 마케팅 전략이 만족도에 미치는 영향요인 분석)

  • Kim, Gu-Hoi;Lee, Kil-Jae;Won, You-Ho
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.1
    • /
    • pp.195-212
    • /
    • 2014
  • This study was performed in order to contributing the influence factors in the real estate marketing strategy which largely affects the success of a real estate sale and development projects. Articles have to be concluded with the Influence factors of Satisfaction based on the type of Real Estate through PLS Regression Analysis. Building data was conducted by the target population specializing in the real estate sale and development business. Classification of real estate business classified by the way of the residential and non-residential parted. In the case of Housing type in the analysis result, the main factors were made by calculating the each factor such as brand trust, Strengthening the alliance and partnership, Traffic environment, Relaxing the requirements for a Real estate sales, Business presentation, Unsold benefits and Relaxing the requirements for payment. Otherwise, In the case of non-residential in the analysis result, the factors such as Relaxing the requirements for payment, Customer Orientation, living environment, Unsold benefits, Strengthening the alliance and partnership and communication terms made an influence to satisfaction.

Privacy-preserving Customized Order Service Protocol based on Smart Contract in Smart Factory (프라이버시를 제공하는 스마트 컨트랙트 기반의 스마트 팩토리 주문제작 프로토콜)

  • Lee, YongJoo;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.215-222
    • /
    • 2019
  • Advances in technologies about 3D (three-dimensional) printing and smart factory related issues will have the effect of reducing the cost of building a smart factory and making various types of service available. Manufacturers and service providers of small assets work with outside experts to provide small amounts of customized ordering services. If customers have to disclose their private information to subscribe to a new service, they may be reluctant to use it and the availability of developed technology may cause slow progress. We propose a new protocol for customized order service for smart factory. The proposed approach is designed to meet requirements of security and based on smart contract in IoT convergence network. We analyzed the requirements of the proposed approach which provided anonymity, privacy, fairness, and non-repudiation. We compared it with closely related studies to show originality and differences.