• Title/Summary/Keyword: customer protection

Search Result 143, Processing Time 0.027 seconds

A Study on the Quality of Mobile Web Service for Environment Landscape Architecture - Focus on Korean Professional Portal Site, Lafent - (환경조경 이동통신용 웹의 서비스 품질 연구 - 전문포털사이트 라펜트를 중심으로 -)

  • Choi, Ja-Ho;Oh, Jeong-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • In the field of environmental landscape architecture, the internet medium is used as an effective communication tool not only in the private level but also in the policy level. Recently, the active utilization of mobile web service is emphasized as the time changes, but there is not much improvement or advance in services due to lack of relevant studies. Therefore, this study is intended to provide basic data needed for improvement and advance by researching the quality of mobile web service among multichannel services provided in environmental landscape architecture related internet media. The model for measuring service quality is SERVQUAL, which was verified in the study of Choi(2015), Choi and Koo(2016), and the final valid samples are total 230. First, the subjects were analyzed as the representative media that are possible to acquire comprehensive knowledge related to environmental landscape architecture. Second, the highest importance level in each subsection was 'protection and security maintenance of customer information' followed by 'Reliability about accurate information supply'. Regarding performance level, 'Reliability about accurate information supply' and 'professional knowledge to communicate with users' are highly evaluated. Third, regarding Importance-Performance Analysis(IPA), the first priority management should is 'Tangibles', and the next are 'Responsibility' and 'Empathy'. The ones for maintenance of the status quo are 'Reliability' and 'Assurance', and there is none for effort reduction. Meanwhile, regarding the importance of each factor and difference in the quality of PC web service and mobile web service studied before, the biggest difference is in 'Tangibles', followed by 'Assurance', 'Empathy', 'Responsibility' and 'Reliability'. It is suggested that the revitalization of Landscape information science(LB1106) presented in the National Science&Technology Standard Classification System is needed. In the future, it is necessary to research the change trend on users' response through continuous evaluation of improved mobile web service.

Application of Concurrent Engineering for Conceptual design of a Future Main Battle Tank (차세대 주력전차의 개념설계를 위한 동시공학의 적용)

  • 김진우;소한균
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.38-60
    • /
    • 1999
  • The main objective of this study is systemization of the technique of ROC quantification and optimization of baseline design by applying CE principle to the acquisition process of a weapon system. QFD and TOA techniques can be employed to a good working example of the conceptual design of a future main battle tank. In this paper, Product Planning Phase, the first phase of four QFD phases, is deployed in terms of eight steps including customer requirements and final product control characteristics. TOA is carried out considering only combat weight. In order to perform combat weight analysis and performance TOA, Preliminary Configuration Synthesis Methodology is used. Preliminary Configuration Synthesis Methodology employs the method of least squares and described linear equations of weight interrelation equation for each component of tank. As a result of QFD based upon the ROC, it was cleared that armor piercing power, main armament, type of ammunition, cruising range, combat weight, armor protection, power loading, threat detection and cost are primary factors influencing design and that combat weight is the most dominant one. The results of TOA based on the combat weight constraint show that 5100 lb reduction was required to satisfy the ROC. The baseline design of a future main battle tank is illustrated with assumption that all phases of QFD are employed to development and production process of subsystems, components, and parts of main battle tank. TOA is applied in iterative process between initial baseline design and ROC. The detailed design of each component is illustrated for a future main battle tank.

  • PDF

Analysis on Factors of Importance and Performance in terms of Securing Customers of Farm Restaurants - Based on the Case of Bibijeong in Wanju-Gun - (농가레스토랑 이용고객의 중요도-만족도 분석 - 완주군 비비정을 사례로 -)

  • Han, A-Reum;Han, Jin;Lee, In-Jae;Jang, Dong-Heon
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.2
    • /
    • pp.163-175
    • /
    • 2015
  • This study aimed to analyze factors of importance and performance picked by customers of Bibijeong, a farm restaurant operated by the local community of Wanju-gun. Major points include: Recognition paths mostly were word of mouth and mass media, types of visit were in the company of friends, family members or work colleagues, and purposes of visit included consumption of meal and identifying features of the restaurant. Secondly, factor analysis showed that level of facility, atmosphere/cleanness, diversity of menu, employees, ingredients and network. The Cronbach Alpha coefficient was +0.6. Thirdly, average of importance of factors was 3.861 while average performance was 3.429. IPA analysis showed that employee(communication, customer contact) in the first quadrant proved the need for fast improvement through training. Atmosphere/cleanness (interior atmosphere, table clean, kitchen cleanliness, clean dishes, interion design) and employee(proficiency, menu recognition), foodstuff(freshness, origin, safety) in the second quadrant showed that the marketing strategy of improvement as well as maintaining current status is needed, including regular training and hygiene inspection. The third quadrant contains facilities(disability, baby, fire protection) and food menu(food packing, various menu, creative menu, menu description), network(village economic links), which showed the need for gradual improvement. The forth quadrant contains network(sights's near contains. The results so far can be summed into the statement that overcoming the basic functionality of providing meals and linking the restaurant with local attractions and local economy would be need, as well as building up the image of unique farm restaurant with local features, so that Bibijeong can serve as the centerpiece of community and foundation of exchange with other areas.

The Effective Security Management Scheme against the loss in Hypermarket (대형 할인매장의 안전관리 방안에 관한 고찰)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.327-350
    • /
    • 2002
  • We, in Korea, have over two hundred hypermarkets and the number is continuously increasing. We drop into a hypermarket for merchandise, which is an integral part of our life style. So, we should consider safety for employees as well as customers because hundreds of thousands of people use the hypermarket every day. In addition to this consideration, the government should also be a political support relating to accidents that occur in the hypermarket because security and safety matters are important to all of us. But even now, Our security conditions do not match our ideal goal and we take countermeasures after accident or loss. This is a result of not having a security management expert coupled with a chief executive officer that has no idea about security awareness and loss prevention. In addition, we do not have specific laws to address these matters. We also lack reasonable ideas to prevent accident and loss. Now is the right time to revamp the laws and ordinances to improve the quality of civilian life. Prevention of accidents is a needed investment for all security personnel. The best solution for businesses is prevention of accidents. This will increase profits and cost-effectiveness as well as increase customer satisfaction. The company should form a security management department for comprehensive protection of assets. The goal of security management employees should be productive and effective security management. Every employee should have responsibility in mind to prevent accidents in his or her work. In addition, The company should have a systematic organization in place and regular training sessions. The most effective security management comes from cooperation of all members. In the 21st century, we pursue a high standard of living which is a result of our cooperation against any accident and loss. Sennewald says The value of security is better measure by what does not happen rather than what does.

  • PDF

A Study on Dispute Resolution and Policy Problem in the Drone Logistics Industry (드론 물류산업의 분쟁해결과 정책적 과제)

  • Park, Jong-Sam
    • Journal of Arbitration Studies
    • /
    • v.26 no.4
    • /
    • pp.151-179
    • /
    • 2016
  • Emerging as a strategic domain of the service industry, the drone logistics industry is evolving into a zero effort industry, which realizes smart device service ranging from corporate services to daily customer services. The role of the drone industry is becoming increasingly important in strengthening national competitiveness, as well as corporate competitiveness, beyond the strengthening of product competitiveness. Although drones have various strengths and weaknesses for industries, there are plenty of possibilities for diverse disputes and conflicts due to lack of related laws, regulations, and institutional norms, as well as unsolved problems related to technologies and operations; that is, there are still policy tasks and problems to be solved such as unauthorized seizure of drones, hacking, protection of personal privacy, safety concerns, regulation and limitation of flying areas, damage relief, and dispute settlements. Thus, in order to vitalize the drone industry as a future growth engine while responding to the changes in the environment of the drone industry in Korea and overseas and to strengthen national and corporate competitiveness by harmonizing with advanced management innovations, it is necessary to conduct in-depth discussions and review policy issues related to the vitalization of the drone industry. Therefore, the purpose of this study is to review the domestic and overseas realities and statuses of the drone logistics industry and application cases, analyze policies regarding the drone logistics industry of each country, review general theories on the solution of disputes arising out of the transactions in the drone logistics industry, and, as a conclusion, suggest desirable policy issues for the vitalization of the drone logistics industry in Korea.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Analysis on Information Use of Smartphone in the context of Tourists (관광객 대상 스마트폰 사용의 정보이용 분석)

  • Jee, Geun-Sung;Kim, Min-cheol;Ha, Tai-Hyun
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1543-1550
    • /
    • 2017
  • Previous research on smartphone has been focused on personal performance, accessibility, and information gaps in information system quality. In order to analyze the relationship between the use of smartphone information and personal characteristics, this study conducted a survey of 300 tourists at Jeju Airport, by using three variables of self-efficacy, 'impulsiveness and demographic variables (age, sex, education level, etc.) of smartphone use with personal characteristics. In conclusion, self-efficacy and impulsiveness seem to be positively related to the use of smartphone because it seems to be a living environment in which the desired information can be acquired within a desired time. In addition, there seems to be a difference between a mobile native environment in which online and offline boundaries are always connected and an environment in which 40 to 50 digital literacies are connected. This can be interpreted as a result of additional analysis.

Video Fingerprinting System through Zero-based Code Modulation Technique (제로기반 코드 변조 기법을 통한 비디오 핑거프린팅 시스템)

  • Choi Sun Young;Lee Hae-Yeoun;Kang In Koo;Lee Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.443-450
    • /
    • 2005
  • Digital fingerprinting is a contents-protection technique, where customer information is inserted into digital contents. Fingerprinted contents undergo various attacks. Especially, attackers can remove easily the inserted fingerprint by collusion attacks, because digital fingerprinting inserts slightly different codes according to the customers. Among collusion attacks, averaging attack is a simple, fast, and efficient attack. In this paper, we propose a video fingerprinting system that is robust to the averaging attack. In order to achieve code efficiency and robustness against the averaging attack, we adopt anti-collusion code (fingerprint code) from GD-PBIBD theory. When the number of users is increased, the size of fingerprint code also grows. Thus, this paper addresses a zero-based code modulation technique to embed and detect this fingerprint code efficiently. We implemented a blind video fingerprinting system based on our proposed technique and performed experiments on various colluding cases. Based on the results, we could detect most of colluders. In the worst case, our scheme could trace at least one colluder successfully.

Research on the marketability of eyeglasses and contact lenses (안경과 콘택트렌즈의 시장성 조사)

  • Kim, Bong-Hwan;Han, Sun-Hee;Park, Jae-Man;Lee, Jeong-Soo;Jeong, Ji-Hwan;Yoon, Nam-Kyung;Kim, Hyung-Soo
    • Journal of Korean Clinical Health Science
    • /
    • v.9 no.2
    • /
    • pp.1535-1542
    • /
    • 2021
  • Purpose. This study categorizes vision correction subjects by age and gender, and aims to find out which glasses or contact lenses the subjects of each age group show preference based on the answers of the questionnaires answered by the subjects. Methods. A study was conducted in the form of a questionnaire through SNS on the types of correction tools used for the purpose of correcting ametropia for the general public from their teens to their 50s. Results. As for the most preferred method for correcting asymmetry, in the case of teenagers, glasses were the most common at 50%, glasses and contact lenses the most at 43.8% each, and glasses in their 30s at 50%. Those in their 40s had the most glasses at 75%, and those in their 50s wore glasses and sunglasses at 50%. Conclusions. Since the demand for vision correction and eye protection methods varies according to age and gender, it is necessary to identify and design the flow of these demands in the existing market. Therefore, it is necessary to make a judgment that can contribute to the development of eye health targeting the main customer base and the provision of appropriate services to consumers.

Safeguarding Korean Export Trade through Social Media-Driven Risk Identification and Characterization

  • Sithipolvanichgul, Juthamon;Abrahams, Alan S.;Goldberg, David M.;Zaman, Nohel;Baghersad, Milad;Nasri, Leila;Ractham, Peter
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.39-62
    • /
    • 2020
  • Purpose - Korean exports account for a vast proportion of Korean GDP, and large volumes of Korean products are sold in the United States. Identifying and characterizing actual and potential product hazards related to Korean products is critical to safeguard Korean export trade, as severe quality issues can impair Korea's reputation and reduce global consumer confidence in Korean products. In this study, we develop country-of-origin-based product risk analysis methods for social media with a specific focus on Korean-labeled products, for the purpose of safeguarding Korean export trade. Design/methodology - We employed two social media datasets containing consumer-generated product reviews. Sentiment analysis is a popular text mining technique used to quantify the type and amount of emotion that is expressed in the text. It is a useful tool for gathering customer opinions regarding products. Findings - We document and discuss the specific potential risks found in Korean-labeled products and explain their implications for safeguarding Korean export trade. Finally, we analyze the false positive matches that arise from the established dictionaries that were used for risk discovery and utilize these classification errors to suggest opportunities for the future refinement of the associated automated text analytic methods. Originality/value - Various studies have used online feedback from social media to analyze product defects. However, none of them links their findings to trade promotion and the protection of a specific country's exports. Therefore, it is important to fill this research gap, which could help to safeguard export trade in Korea.