• Title/Summary/Keyword: information security efficacy

Search Result 76, Processing Time 0.029 seconds

Effects of Mobile App Service Characteristics on User Satisfaction and Continuance Usage Intention (모바일 앱 서비스 특성이 사용자 만족과 지속적 사용의도에 영향을 미치는 요인)

  • Kim, Byung Gon;Kim, Ki Won;Seo, Hong Il
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.99-120
    • /
    • 2019
  • The purpose of this study is to provide information necessary for establishing a new strategy for customer service improvement by deriving factors affecting user satisfaction and continuous use intention of mobile app service user characteristics, system characteristics, and social characteristics. The results of this study are summarized as follows. First, reliability, innovation, familiarity, convenience, and self-efficacy among the characteristics of mobile app are analyzed as factors that have the greatest influence on user's perceived usefulness. Second, convenience, mobility, and visibility are some of the characteristics of mobile app service. Third, identity, security, and expectation agreement among mobile app service characteristics are analyzed as negative factors that do not affect users' perceived usefulness. Fourth, interactivity, familiarity, and self-efficacy among the characteristics of mobile app service were analyzed as positive factors that have the greatest effect on user's perceived ease of use. Fifth, reliability, mobility, visibility, and convenience among mobile app service characteristics are analyzed as factors that have some positive effects on perceived ease of use of app users. Sixth, identity, innovation, and security among the characteristics of mobile app service are negatively influenced by mobile app users' perceived ease of use. Seventh, the perceived usefulness of mobile app users is analyzed as a factor that has a very positive effect on user satisfaction. Eighth, the perceived ease of use of mobile app users is analyzed as a factor affecting perceived usefulness positively. Ninth, the perceived ease and expectation of mobile app users are positively influenced on user satisfaction. The tenth, the perceived usefulness of the mobile app users was analyzed as a factor having a very positive influence on the persistent intention to use. For the eleventh, the perceived ease of use of mobile app users was analyzed as a factor having a positive effect on the persistent intention to use. The twelfth, mobile app user satisfaction was analyzed as a factor having a very positive effect on the persistent intention to use.

Malwares Attack Detection Using Ensemble Deep Restricted Boltzmann Machine

  • K. Janani;R. Gunasundari
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.64-72
    • /
    • 2024
  • In recent times cyber attackers can use Artificial Intelligence (AI) to boost the sophistication and scope of attacks. On the defense side, AI is used to enhance defense plans, to boost the robustness, flexibility, and efficiency of defense systems, which means adapting to environmental changes to reduce impacts. With increased developments in the field of information and communication technologies, various exploits occur as a danger sign to cyber security and these exploitations are changing rapidly. Cyber criminals use new, sophisticated tactics to boost their attack speed and size. Consequently, there is a need for more flexible, adaptable and strong cyber defense systems that can identify a wide range of threats in real-time. In recent years, the adoption of AI approaches has increased and maintained a vital role in the detection and prevention of cyber threats. In this paper, an Ensemble Deep Restricted Boltzmann Machine (EDRBM) is developed for the classification of cybersecurity threats in case of a large-scale network environment. The EDRBM acts as a classification model that enables the classification of malicious flowsets from the largescale network. The simulation is conducted to test the efficacy of the proposed EDRBM under various malware attacks. The simulation results show that the proposed method achieves higher classification rate in classifying the malware in the flowsets i.e., malicious flowsets than other methods.

An Analysis of the Factors Influencing the Satisfaction and Intention of Job Information Websites (취업정보 웹사이트의 만족도와 이용의도에 미치는 영향요인 분석)

  • Chang, Rosa;Kim, Seonghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.2
    • /
    • pp.127-148
    • /
    • 2018
  • This study defined the influence of the quality of job information websites and of user characteristic factors on the user satisfaction and on the intention of the use thereof based on the technical acceptance model to activate research on job information or job information websites in the category of Library and Information Science, amid studies on the Fourth Industrial Revolution in various disciplines emerging. 230 users experienced in job information websites were surveyed. The surveyed data were analyzed by applying the structural equation model. The results are as follows. Accuracy, security, self-efficacy, the perceived easiness of use had a positive effect on the perceived usefulness. Up-to-dateness, self-efficacy, individual innovation had a significant effect on the perceived easiness of use. The perceived usefulness and the perceived easiness of use had a positive effect on user satisfaction, and the user satisfaction had a significant effect on the intention of use.

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.

A Study on Influencing Factors of Elderly Consumers' Self-Efficacy in Internet Banking Usage: Exploring Moderating Effect of 60s and 70s (고령 소비자의 인터넷 뱅킹 사용 자기효능감의 영향요인에 관한 연구: 60대와 70대의 비교)

  • Ku, Yoonhye;Yang, Su Jin
    • Journal of Korean Home Economics Education Association
    • /
    • v.34 no.4
    • /
    • pp.77-92
    • /
    • 2022
  • Recently, digital transformation in the financial industry has been accelerated, and it has become an important task to improve the level of utilization of Internet banking by elderly consumers, who are vulnerable to Internet use. Accordingly, this study analyzed 3,101 respondents in their 60s or older from the 11th year of the Media Panel Survey to identify demographic, experiential, and psychological factors that affect the self-efficacy of elderly consumers' usage of Internet banking. The main research findings are as follows. First, gender, education, occupation, and income were identified as demographic variables. Second, the Internet shopping experience was identified as an experiential factor. Also, concerns about information security, digital literacy, and high will for problem-solving were identified as psychological factors. Third, as a result of the moderating effect analysis on whether the experiential and psychological factors have different influences according to the group divided into the 60s and 70s, the effect on self-efficacy in the usage of the Internet was classified by age. The results of this study will be able to enrich the discussions related to the intention to utilize technology among elderly consumers by empirically revealing that there are characteristics that cause differences in financial behavior even within one group called the elderly.

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

An Investigation on Consumer's Internet Shopping Behavior Explained By the Technology Acceptance Model (혁신기술수용모델(TAM)을 응용한 인터넷쇼핑행동 고찰)

  • Koo, Dong-Mo
    • Asia pacific journal of information systems
    • /
    • v.13 no.1
    • /
    • pp.141-170
    • /
    • 2003
  • This study investigates internet shopping behavior of consumers. The rapid growth of the internet shopping markets is solely dependent on the voluntary adoption of internet shopping medium by the personal users. But the studies on this topic are very limited. Based on these facts, this study, recognizing the internet shopping medium as an innovation, studies how consumers understand and use innovative internet shopping medium by applying and extending the technology acceptance model proposed by Davis et. al.(1989). The results of the survey on 947 consumer panel reveal that compatibility, system quality have positive impact on the formation of perceived ease of use. And it is also shown that the perceived ease of use, system quality, and compatibility have positive influence on perceived usefulness, but computer-efficacy has no effect on perceived usefulness. Meanwhile, it is confirmed that perceived usefulness and compatibility have positive effect on attitude toward internet shopping behavior, but perceived ease of use has no effect. In addition, perceived security and social norm, as opposed to the hypotheses, are shown to have no effect on internet shopping behavior. Lastly, applications and related limitations are discussed.

A Study on the Development of ICT Curriculum for Private Security Workers (민간경비 종사자의 ICT직무교육과정 개발에 관한 연구)

  • Sim, Hyun;Kwon, Gyeong-Ae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.397-404
    • /
    • 2019
  • This study developed the ICT curriculum focusing on apartment security guards and analyzed the actual application results. We developed the educational contents and it designed ICT job courseware for elder education by considering and that designed in consideration of the computer attitudes and physical and cognitive characteristics of the elderly. The educational program was applied to the experimental group and the satisfaction and the educational effect were analyzed through the pre and post test results. As a result of the analysis, the satisfaction level of the education program was higher than the average of 4.00 points. The elderly informal education program was examined by using the qualitative assessment test tool before and after the application of the education program. Internet self-efficacy of experiment group, improvement of internet utilization ability, usage of internet use, personal information willingness, life correction, elimination of conflict among generations, self-confidence, and internet stress increased statistically significantly. These results suggest that the "Private Expense ICT Job Training" program developed in this study can be effective for elderly informatization and can be applied to other elderly education programs and contribute to promotion.

A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm (버퍼 오버플로우 웜 고속 필터링을 위한 네트워크 프로세서의 Bloom Filter 활용)

  • Kim Ik-Kyun;Oh Jin-Tae;Jang Jong-Soo;Sohn Sung-Won;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.93-103
    • /
    • 2006
  • Network solutions for protecting against worm attacks that complement partial end system patch deployment is a pressing problem. In the content-based worm filtering, the challenges focus on the detection accuracy and its performance enhancement problem. We present a worm filter architecture using the bloom filter for deployment at high-speed transit points on the Internet, including firewalls and gateways. Content-based packet filtering at multi-gigabit line rates, in general, is a challenging problem due to the signature explosion problem that curtails performance. We show that for worm malware, in particular, buffer overflow worms which comprise a large segment of recent outbreaks, scalable -- accurate, cut-through, and extensible -- filtering performance is feasible. We demonstrate the efficacy of the design by implementing it on an Intel IXP network processor platform with gigabit interfaces. We benchmark the worm filter network appliance on a suite of current/past worms, showing multi-gigabit line speed filtering prowess with minimal footprint on end-to-end network performance.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.