• Title/Summary/Keyword: personal cause

Search Result 429, Processing Time 0.023 seconds

A Study on Interaction of Cause and Effect among Personal Involvement, Satisfaction, Trust, Switching Cost and Loyalty Regarding Casual Dining Restaurant (레스토랑에 대한 소비자의 개인적 관여도와 만족, 신뢰, 전환비용, 충성도의 인과관계 연구)

  • Cho, Woo-Je
    • Journal of the Korean Society of Food Culture
    • /
    • v.24 no.5
    • /
    • pp.496-505
    • /
    • 2009
  • This study was conducted to provide basic data and insight into behaviors that result in increased continuous sales and competitiveness. This was done by examining the effect of personal involvement on customer satisfaction and trust, the effect of customer satisfaction on switching cost and loyalty, the effect of trust on switching cost and loyalty and by analyzing the indirect effect of trust and loyalty to personal involvement on switching cost and loyalty of the patrons of casual dining restaurants. In order to achieve the goals of the study, a hypothesis and structural equation were proposed based on preceding research and the proposed model was analyzed using LISREL 8.30 to prove the hypothesis and better understand the interactions between the cause and effect. The results were as follows: Six proposed hypothesis were chosen and the indirect effect was verified. In other words, customers' personal involvement was shown to have an effect on trust and devotion and satisfaction influenced switching cost and loyalty. Trust had an effect on switching cost and loyalty and by analyzing the indirect effect the customers' personal involvement was shown to affect the switching cost and loyalty through satisfaction and trust. The result of this analysis provides clues to better understand the eating-out behavior of customers and proves that personal involvement, satisfaction, trust, switching cost and loyalty are directly and indirectly related.

Analysis of the Effect of Individual and Accident Cause Characteristics on Disaster Safety Perception (개인 및 사고원인 특성이 재난안전인식에 미치는 영향분석)

  • Oh, Hoo;Yim, Dong-Kyun
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.80-86
    • /
    • 2021
  • The purpose of this study is to diagnose the level of disaster safety perception (disaster safety importance, accident possibility, personal safety, and regional safety) of local residents, and to analyze the impact of individual and accident cause characteristics. The analysis method used multiple regression analysis, and the main analysis results are as follows. First, disaster safety importance and accident possibility were higher as residents who had experience in safety education and were willing to visit the safety experience center in the province. Second, disaster safety importance was higher as the cause of the accident was the lack of response 119 and police. And accident possibility was higher as the cause of the accident was the lack of prior treatment by the state and local governments. Third, personal safety and regional safety were higher for men, and especially personal safety was lower as residents with children. The results of this study can be used as basic data for establishing regional customized disaster safety policies based on the perception of local residents, who are policy consumers.

A Study on Measures for Preventing Personal Information Leakage in Financial Corporations (금융사 개인정보 유출 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.109-116
    • /
    • 2014
  • Personal information leakage in financial corporations including three card corporations has occurred constantly this year. It is due to incomplete encryption system and negligent personal security. Solicitors are known as a cause of information leakage because they operate with leaked information. Information leakage can cause secondary damage with mental demage to person and result in a drop in reliability as well as an operating loss in financial corporations. Also because it can destroy a base of credit society, prevention of recurrence is badly needed. The government finally announced 'general measures for prevention of information leakage in the field of finance' with sanctions reinforcement and restriction to collect, possess, provide personal information as the main agenda. And a related law revision is going in the National Assembly. In this paper, effectiveness of government measures is weighed with the cause analysis of information leakage and countermeasure for prevention of information leakage is found.

Impact of Corporate Characteristics on Personal Information Breach Accident (기업의 특성이 개인정보 유출 사고에 미치는 영향)

  • Kim, Taek-Young;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.13-30
    • /
    • 2020
  • Not only does it cause damage to individuals and businesses due to the occurrence of large-scale personal information leakage accidents, but it also causes many problems socially. Companies are embodying efforts to deal with the threat of personal information leakage. However, it is difficult to obtain detailed information related to personal information leakage accidents, so there are limitations to research activities related to leakage accidents. This study collects information on personal information leakage incidents reported through the media for 15 years from 2005 to 2019, and analyzes how the personal information leakage incidents occurring to companies are related to the characteristics of the company. Through the research results, it is possible to grasp the general characteristics of personal information leakage accidents, and it may be helpful in decision making for prevention and response to personal information leakage accidents.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

A Study on the Harmonics and Voltage Sags Effect by the Series Resonant Filter Application for Personal Computer Loads (컴퓨터 부하의 직렬 동조 필터 적용에 의한 고조파 및 순간전압강하 영향에 관한 연구)

  • Seo, Beom-Gwan;Kim, Kyoung-Chul;Lee, Geun-Joon
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.460-461
    • /
    • 2006
  • Computer Loads can be found in all of modern society. The switching mode power supplies used in personal computers are major sources of harmonic currents. Harmonic currents can cause lots of harmonic problems such as disruption in computer performance. A series resonant filter is very effective in harmonic reduction for personal computer loads. Voltage sags are short duration reductions in rms voltage. The main causes of voltage sags are faults, motor starting, and transformer energizing. Personal computers are another example of devices sensitive to voltage sags. A serious voltage sag at the terminals way lead mis-operation of the equipment. This paper presents an in depth analysis to evaluate the effect of harmonics reduction based on the IEC 61000-3-2 and the effect of voltage sag using ITI curve by applying a series resonant filter for personal computer loads.

  • PDF

Detection of Personal Information Leakage using the Network Traffic Characteristics (네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법)

  • Park, Jung-Min;Kim, Eun-Kyung;Jung, Yu-Kyung;Chae, Ki-Joon;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.199-208
    • /
    • 2007
  • In a ubiquitous network environment, detecting the leakage of personal information is very important. The leakage of personal information might cause severe problem such as impersonation, cyber criminal and personal privacy violation. In this paper, we have proposed a detection method of personal information leakage based on network traffic characteristics. The experimental results indicate that the traffic character of a real campus network shows the self-similarity and Proposed method can detect the anomaly of leakage of personal information by malicious code.

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

A Study on SmartPhone Hacking and Forensic of Secondary Damage caused by Leakage of Personal Information (개인정보유출 2차 피해로 인한 스마트폰 Smishing 해킹과 Forensic 연구)

  • Park, In-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.273-276
    • /
    • 2014
  • In 2014, the leakage of personal information from 3 credit card companies resulted in divulging approximately 10,000 customers' personal information. Although the credit card companies concluded that there was no secondary loss due to the leakage of personal information, secondary financial losses resulting from the leakage of personal information currently occur. In particular, hackers who employ smishing masquerade acquaintances by using the divulged personal information to ask payment for Ms. Kim's Sochi Olympics legal processing or exposed traffic violations. The hackers cause secondary financial losses through smartphones. This study aims to conduct a forensic analysis of smishing incidents in smartphones through the leakage of personal information, and to make a forensic analysis of financial losses due to the smishing incidents.

  • PDF

A Study on the Perception of Personal Mobility Vehicle for the Improvement of Pedestrian Environment for the Disabled

  • Lee, Joohyung;Lee, Kyooil
    • Physical Therapy Rehabilitation Science
    • /
    • v.10 no.2
    • /
    • pp.124-133
    • /
    • 2021
  • Objective: In order to secure the right to walk for the weak, such as the disabled, this study aims to suggest ways to improve the pedestrian environment by identifying factors that cause obstacles to walking. Design: Data Analysis and Perception Survey. Methods: The questionnaire was conducted separately between users of personal mobility vehicle and non-users. A total of 207 effective questionnaires were collected, and the analysis analyzed the perception of personal mobility vehicle by conducting frequency analysis using SAS 9.4. The survey focused on basic information on respondents, walking conditions, understanding of personal mobility vehicle, awareness of pedestrian space passage and parking, and awareness of the possibility of securing pedestrian rights due to new regulations. Results: First, when moving a pedestrian path by personal mobility vehicle, it shall be limited to less than the walking speed of pedestrians. Second, the parking location of the personal mobility vehicle is located at the boundary of the pedestrian road and the lane. Third, pay a fair price to park in a pedestrian space. Conclusions: It is necessary to improve the system to strengthen the contents of education to take into account the safety of pedestrians in education on how to use personal mobility vehicle.