• 제목/요약/키워드: information security efficacy

검색결과 75건 처리시간 0.021초

핀테크 서비스에서 개인적 특성이 혁신저항요인에 미치는 영향 (The Effect of Individual Features on the Innovative Resistance in FinTech Service)

  • 손달호
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제28권3호
    • /
    • pp.123-139
    • /
    • 2019
  • Purpose With the development of information and communication technologies. fintech industry is rapidly growing as a major financial service. Previous research literatures mainly focused on overall characteristics and technical aspects of fintech including security issues. Therefore, this study investigated the effect of individual features influencing the resistance of adopting a fintech service. Moreover, this paper included the guidelines in practical development of fintech mechanism. Design/methodology/approach For research purposes, this study developed research hypotheses in order to empirically examine the effect of the factors that might have a significant effect on the resistance of the wearable device. The empirical research was based on a survey which carried through 359 participants. Research hypotheses were evaluated via SPSS Statistics 21.0 and AMOS 19 statistical package program. Findings Results showed that self-efficacy and individual innovation had a significant effect on the technostress and switching cost. In addition, technostress, security and switching cost had a significant effect on the resistance of adopting a fintech service. However, more factors are needed to including in research model to generalize these results.

SuperDepthTransfer: Depth Extraction from Image Using Instance-Based Learning with Superpixels

  • Zhu, Yuesheng;Jiang, Yifeng;Huang, Zhuandi;Luo, Guibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권10호
    • /
    • pp.4968-4986
    • /
    • 2017
  • In this paper, we primarily address the difficulty of automatic generation of a plausible depth map from a single image in an unstructured environment. The aim is to extrapolate a depth map with a more correct, rich, and distinct depth order, which is both quantitatively accurate as well as visually pleasing. Our technique, which is fundamentally based on a preexisting DepthTransfer algorithm, transfers depth information at the level of superpixels. This occurs within a framework that replaces a pixel basis with one of instance-based learning. A vital superpixels feature enhancing matching precision is posterior incorporation of predictive semantic labels into the depth extraction procedure. Finally, a modified Cross Bilateral Filter is leveraged to augment the final depth field. For training and evaluation, experiments were conducted using the Make3D Range Image Dataset and vividly demonstrate that this depth estimation method outperforms state-of-the-art methods for the correlation coefficient metric, mean log10 error and root mean squared error, and achieves comparable performance for the average relative error metric in both efficacy and computational efficiency. This approach can be utilized to automatically convert 2D images into stereo for 3D visualization, producing anaglyph images that are visually superior in realism and simultaneously more immersive.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서 (The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors)

  • 배재권
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제26권3호
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구 (A Study on the Information Protection Intention of Digital Healthcare Service Providers)

  • 양창규
    • 벤처창업연구
    • /
    • 제17권4호
    • /
    • pp.163-172
    • /
    • 2022
  • 본 연구는 디지털 헬스케어 서비스 제공자의 보호동기를 형성하는 위험평가와 대처평가가 정보보호의도의 주요한 요인인 유도통제의도와 자기방어의도에 미치는 영향을 확인하고자 한다. 연구모형은 보호동기이론을 기반으로 기존 선행연구를 통해 심각성, 취약성, 반응효능감, 자기효능감을 독립변수로 채택하였다. 연구모형 검증을 위해 한국의 디지털 헬스케어 서비스 기업 임직원 222명을 대상으로 설문조사를 실시하였으며, 데이터는 구조방정식을 사용하여 분석하였다. 연구결과에 따르면 (1) 보안위협의 결과에 대한 명확한 인지가 디지털 헬스케어 서비스 제공자의 정보유출 사고에 대한 심각성에 대한 이해를 높여주고, 이를 통해 디지털 헬스케어 서비스 제공자의 오남용을 줄일 수 있으며, (2) 보안시스템에 대한 디지털 헬스케어 서비스 제공자의 신뢰와 만족이 스스로 정보유출에 대응할 수 있다는 자신감을 형성시킬 수 있고, (3) 디지털 헬스케어 서비스 제공자는 정보유출로 인해 돌아오는 결과를 인지하고 있지만, 실제 자신에게 발생할 수 있는 가능성은 적다고 생각하고 있음을 확인하였다. 이 연구결과는 디지털 헬스케어 서비스를 운영하는 벤처기업은 디지털 헬스케어 서비스 제공자의 정보보호의도를 높이기 위해서 디지털 헬스케어 서비스 제공자의 보안수준을 높일 수 있는 지속적인 콘텐츠 제공이 필요하고, 타 벤처기업대비 높은 수준의 보안시스템을 도입하여 디지털 헬스케어 서비스 제공자의 신뢰를 통해 정보보호 동기유발이 중요하다는 점을 시사한다.

SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인 (A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services))

  • 박태환;김수환;장재영
    • 한국전자거래학회지
    • /
    • 제20권1호
    • /
    • pp.1-22
    • /
    • 2015
  • 최근 IT 산업의 급격한 성장과 스마트폰의 출현으로 인해, 우리는 시와 장소를 가리지 않고 인터넷 환경에 접속할 수 있게 되었다. 하지만, 이로 인한 부정적인 영향도 발생하였다. 그중 하나는 피싱(Phishing), 스미싱(SMishing)과 같은 금융 범죄의 증가이다. 피싱, 스미싱과 같은 범죄로부터 이용자를 보호하기 위한 많은 연구들이 진행 중에 있지만, SNS에서의 보안 관련 지식공유를 통한 범죄 완화에 대한 연구는 현재 찾아보기 어려운 실정이다. 본 연구에서는, SNS 이용자가 보안 관련 지식공유 의도를 불러일으키는 영향 요인에는 무엇이 있는지 알아보고자 한다. 연구를 통해 다음을 알 수 있었다. 지식제공 자기효능감은 자기표현에 유의미한 영향을 미친다. 그리고 자기표현, 정보보안 의식, 소속감은 SNS 내에서 보안 관련 지식공유 의도에 유의미한 영향을 미치는 것으로 밝혀졌다. 반면에, 이타성은 SNS 내에서 보안 관련 지식공유 의도에 유의미한 영향을 미치지 않았다. 향후에는 본 연구를 토대로, SNS 뿐만 아니라 모든 형태의 온라인 공동체로 연구의 범위를 넓혀, 가설을 일반화시키려는 노력이 필요할 것으로 보인다.

Real-Time Control System

  • Gharbi, Atef
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.19-27
    • /
    • 2021
  • Tasks scheduling have been gaining attention in both industry and research. The scheduling that ensures independent task execution is critical in real-time systems. While task scheduling has gained a lot of attention in recent years, there have been few works that have been implemented into real-time architecture. The efficiency of the classical scheduling strategy in real-time systems, in particular, is still understudied. To reduce total waiting time, we apply three scheduling approaches in this paper: First In/First Out (FIFO), Shortest Execution Time (SET), and Shortest-Longest Execution Time (SLET). Experimental results have demonstrated the efficacy of the SLET in comparison with the others in most cases in a wide range of configurations.

라이프로그 이용이 기술 만족도와 잊혀질 권리 인식에 미치는 영향 (Effects of Lifelog Experience on Technology Satisfaction and Perception of Right to be Forgotten)

  • 윤일한;권순동
    • 정보보호학회논문지
    • /
    • 제26권3호
    • /
    • pp.837-852
    • /
    • 2016
  • 본 연구에서는 정보통신기술 이용의 순기능과 역기능을 연구하였고, 그 결과를 다음과 같이 요약할 수 있다. 첫째, 정보통신기술 이용 경험을 많이 할수록 정보통신기술의 유용성을 더 높게 인지하고 나아가 정보통신기술에 대한 만족도를 높게 느끼는 것으로 나타났다. 둘째, 정보통신기술 이용 경험을 많이 할수록 프라이버시 염려를 더 높게 인지하고 나아가 잊혀질 권리에 대한 필요성을 더 높게 인식하는 것으로 나타났다. 정보통신기술 이용에 따른 영향력은 순기능과 역기능 중에서 순기능이 더 높은 것으로 나타났다. 자기효능감이 높은 집단은 낮은 집단에 비하여 프라이버시 염려가 상대적으로 낮은 것으로 나타났다.

Prediction Model for Gastric Cancer via Class Balancing Techniques

  • Danish, Jamil ;Sellappan, Palaniappan;Sanjoy Kumar, Debnath;Muhammad, Naseem;Susama, Bagchi ;Asiah, Lokman
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.53-63
    • /
    • 2023
  • Many researchers are trying hard to minimize the incidence of cancers, mainly Gastric Cancer (GC). For GC, the five-year survival rate is generally 5-25%, but for Early Gastric Cancer (EGC), it is almost 90%. Predicting the onset of stomach cancer based on risk factors will allow for an early diagnosis and more effective treatment. Although there are several models for predicting stomach cancer, most of these models are based on unbalanced datasets, which favours the majority class. However, it is imperative to correctly identify cancer patients who are in the minority class. This research aims to apply three class-balancing approaches to the NHS dataset before developing supervised learning strategies: Oversampling (Synthetic Minority Oversampling Technique or SMOTE), Undersampling (SpreadSubsample), and Hybrid System (SMOTE + SpreadSubsample). This study uses Naive Bayes, Bayesian Network, Random Forest, and Decision Tree (C4.5) methods. We measured these classifiers' efficacy using their Receiver Operating Characteristics (ROC) curves, sensitivity, and specificity. The validation data was used to test several ways of balancing the classifiers. The final prediction model was built on the one that did the best overall.

모바일 앱 서비스 특성이 사용자 만족과 지속적 사용의도에 영향을 미치는 요인 (Effects of Mobile App Service Characteristics on User Satisfaction and Continuance Usage Intention)

  • 김병곤;김기원;서홍일
    • Journal of Information Technology Applications and Management
    • /
    • 제26권3호
    • /
    • pp.99-120
    • /
    • 2019
  • The purpose of this study is to provide information necessary for establishing a new strategy for customer service improvement by deriving factors affecting user satisfaction and continuous use intention of mobile app service user characteristics, system characteristics, and social characteristics. The results of this study are summarized as follows. First, reliability, innovation, familiarity, convenience, and self-efficacy among the characteristics of mobile app are analyzed as factors that have the greatest influence on user's perceived usefulness. Second, convenience, mobility, and visibility are some of the characteristics of mobile app service. Third, identity, security, and expectation agreement among mobile app service characteristics are analyzed as negative factors that do not affect users' perceived usefulness. Fourth, interactivity, familiarity, and self-efficacy among the characteristics of mobile app service were analyzed as positive factors that have the greatest effect on user's perceived ease of use. Fifth, reliability, mobility, visibility, and convenience among mobile app service characteristics are analyzed as factors that have some positive effects on perceived ease of use of app users. Sixth, identity, innovation, and security among the characteristics of mobile app service are negatively influenced by mobile app users' perceived ease of use. Seventh, the perceived usefulness of mobile app users is analyzed as a factor that has a very positive effect on user satisfaction. Eighth, the perceived ease of use of mobile app users is analyzed as a factor affecting perceived usefulness positively. Ninth, the perceived ease and expectation of mobile app users are positively influenced on user satisfaction. The tenth, the perceived usefulness of the mobile app users was analyzed as a factor having a very positive influence on the persistent intention to use. For the eleventh, the perceived ease of use of mobile app users was analyzed as a factor having a positive effect on the persistent intention to use. The twelfth, mobile app user satisfaction was analyzed as a factor having a very positive effect on the persistent intention to use.