• 제목/요약/키워드: personal cause

검색결과 429건 처리시간 0.026초

레스토랑에 대한 소비자의 개인적 관여도와 만족, 신뢰, 전환비용, 충성도의 인과관계 연구 (A Study on Interaction of Cause and Effect among Personal Involvement, Satisfaction, Trust, Switching Cost and Loyalty Regarding Casual Dining Restaurant)

  • 조우제
    • 한국식생활문화학회지
    • /
    • 제24권5호
    • /
    • pp.496-505
    • /
    • 2009
  • This study was conducted to provide basic data and insight into behaviors that result in increased continuous sales and competitiveness. This was done by examining the effect of personal involvement on customer satisfaction and trust, the effect of customer satisfaction on switching cost and loyalty, the effect of trust on switching cost and loyalty and by analyzing the indirect effect of trust and loyalty to personal involvement on switching cost and loyalty of the patrons of casual dining restaurants. In order to achieve the goals of the study, a hypothesis and structural equation were proposed based on preceding research and the proposed model was analyzed using LISREL 8.30 to prove the hypothesis and better understand the interactions between the cause and effect. The results were as follows: Six proposed hypothesis were chosen and the indirect effect was verified. In other words, customers' personal involvement was shown to have an effect on trust and devotion and satisfaction influenced switching cost and loyalty. Trust had an effect on switching cost and loyalty and by analyzing the indirect effect the customers' personal involvement was shown to affect the switching cost and loyalty through satisfaction and trust. The result of this analysis provides clues to better understand the eating-out behavior of customers and proves that personal involvement, satisfaction, trust, switching cost and loyalty are directly and indirectly related.

개인 및 사고원인 특성이 재난안전인식에 미치는 영향분석 (Analysis of the Effect of Individual and Accident Cause Characteristics on Disaster Safety Perception)

  • 오후;임동균
    • 한국안전학회지
    • /
    • 제36권2호
    • /
    • pp.80-86
    • /
    • 2021
  • The purpose of this study is to diagnose the level of disaster safety perception (disaster safety importance, accident possibility, personal safety, and regional safety) of local residents, and to analyze the impact of individual and accident cause characteristics. The analysis method used multiple regression analysis, and the main analysis results are as follows. First, disaster safety importance and accident possibility were higher as residents who had experience in safety education and were willing to visit the safety experience center in the province. Second, disaster safety importance was higher as the cause of the accident was the lack of response 119 and police. And accident possibility was higher as the cause of the accident was the lack of prior treatment by the state and local governments. Third, personal safety and regional safety were higher for men, and especially personal safety was lower as residents with children. The results of this study can be used as basic data for establishing regional customized disaster safety policies based on the perception of local residents, who are policy consumers.

금융사 개인정보 유출 방지 방안에 관한 연구 (A Study on Measures for Preventing Personal Information Leakage in Financial Corporations)

  • 정기석
    • 융합보안논문지
    • /
    • 제14권4호
    • /
    • pp.109-116
    • /
    • 2014
  • 올 들어 카드3사를 비롯한 개인금융정보 유출 사건이 끊임없이 발생되고 있다. 이는 개인정보의 암호화 미비와 인적 보안의 태만 등 원칙을 지키지 않은데 그 원인이 있다. 또 유출된 불법정보를 활용해 영업을 하는 모집인들이 수요처로 작용하는 것도 유출 원인중 하나로 분석되고 있다. 정보 유출은 개인에게는 정신적 피해와 함께 2차 피해를 줄 수 있으며 해당 금융사에는 영업 손실을 가져올 뿐만이 아니라 신뢰성을 악화시키고 나아가 지금까지 쌓아온 신용사회의 근간을 무너뜨릴 수 있다는 점에서 철저한 재발방지가 요구된다. 이에 정부에서는 사후제재강화와 개인정보 수집 보유 제공 제한을 골자로 하는 금융분야 정보유출 방지 종합대책을 발표하기에 이르렀고 국회에서는 관련법 개정안 심의가 진행되고 있다. 본 논문에서는 개인정보유출의 원인을 분석하고 정부 대책의 실효성에 대해 따져보고 정보유출방지를 위한 개선방안을 모색해 본다.

기업의 특성이 개인정보 유출 사고에 미치는 영향 (Impact of Corporate Characteristics on Personal Information Breach Accident)

  • 김택영;김태성;전효정
    • 한국IT서비스학회지
    • /
    • 제19권4호
    • /
    • pp.13-30
    • /
    • 2020
  • Not only does it cause damage to individuals and businesses due to the occurrence of large-scale personal information leakage accidents, but it also causes many problems socially. Companies are embodying efforts to deal with the threat of personal information leakage. However, it is difficult to obtain detailed information related to personal information leakage accidents, so there are limitations to research activities related to leakage accidents. This study collects information on personal information leakage incidents reported through the media for 15 years from 2005 to 2019, and analyzes how the personal information leakage incidents occurring to companies are related to the characteristics of the company. Through the research results, it is possible to grasp the general characteristics of personal information leakage accidents, and it may be helpful in decision making for prevention and response to personal information leakage accidents.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

컴퓨터 부하의 직렬 동조 필터 적용에 의한 고조파 및 순간전압강하 영향에 관한 연구 (A Study on the Harmonics and Voltage Sags Effect by the Series Resonant Filter Application for Personal Computer Loads)

  • 서범관;김경철;이근준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 제37회 하계학술대회 논문집 A
    • /
    • pp.460-461
    • /
    • 2006
  • Computer Loads can be found in all of modern society. The switching mode power supplies used in personal computers are major sources of harmonic currents. Harmonic currents can cause lots of harmonic problems such as disruption in computer performance. A series resonant filter is very effective in harmonic reduction for personal computer loads. Voltage sags are short duration reductions in rms voltage. The main causes of voltage sags are faults, motor starting, and transformer energizing. Personal computers are another example of devices sensitive to voltage sags. A serious voltage sag at the terminals way lead mis-operation of the equipment. This paper presents an in depth analysis to evaluate the effect of harmonics reduction based on the IEC 61000-3-2 and the effect of voltage sag using ITI curve by applying a series resonant filter for personal computer loads.

  • PDF

네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법 (Detection of Personal Information Leakage using the Network Traffic Characteristics)

  • 박정민;김은경;정유경;채기준;나중찬
    • 정보처리학회논문지C
    • /
    • 제14C권3호
    • /
    • pp.199-208
    • /
    • 2007
  • 유비쿼터스 네트워크 환경에서 개인정보의 유출은 다양한 사이버 범죄를 야기하며 개인정보의 상품화로 프라이버시의 침해가 증가하므로 개인정보의 유출을 탐지하는 것은 매우 중요하다. 본 논문은 네트워크의 트래픽 특성을 기반으로 한 개인정보 유출 탐지 기법을 제안하고자 한다. 실제 대학망에서 정상 상태의 트래픽을 수집하여 트래픽의 특성을 분석함으로써 네트워크 트래픽이 자기유사성을 지님을 확인하였다. 개인정보의 유출을 시도하는 악성코드의 사전정보수집단계를 모사한 비정상적인 트래픽에 대하여 정상 트래픽에서의 자기유사성과의 변화를 살펴봄으로써 이상을 조기 감지할 수 있었다.

아이핀 기반 본인확인서비스의 안전성 강화 방안 (Safety Improvement Methods of Personal Identification Services using the i-Pin)

  • 김종배
    • 한국IT서비스학회지
    • /
    • 제16권2호
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

개인정보유출 2차 피해로 인한 스마트폰 Smishing 해킹과 Forensic 연구 (A Study on SmartPhone Hacking and Forensic of Secondary Damage caused by Leakage of Personal Information)

  • 박인우;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.273-276
    • /
    • 2014
  • 2014년 카드3사의 개인정보유출로 약 1건의 고객정보가 유출되었다. 카드사는 개인정보유출로 인한 2차 피해는 없다고 단정지었지만, 실제로 개인정보유출 2차 피해가 발생하고 있다. 특히 스마트폰에서 Smishing은 유출된 개인정보를 이용하여 지인을 가장한 송금과 소치올림픽 김모양 소송, 차량단속대상적발 등 개인정보 유출로 인한 2차피해가 스마트폰에서 Smishing사고가 발생하고 있다. 본 논문에서는 스마트폰 Smishing사고에 대한 개인정보유출에 대한 Forensic 하고 스미싱 사고로 인한 금융피해에 대한 Forensic을 분석 하고자 한다.

  • PDF

A Study on the Perception of Personal Mobility Vehicle for the Improvement of Pedestrian Environment for the Disabled

  • Lee, Joohyung;Lee, Kyooil
    • Physical Therapy Rehabilitation Science
    • /
    • 제10권2호
    • /
    • pp.124-133
    • /
    • 2021
  • Objective: In order to secure the right to walk for the weak, such as the disabled, this study aims to suggest ways to improve the pedestrian environment by identifying factors that cause obstacles to walking. Design: Data Analysis and Perception Survey. Methods: The questionnaire was conducted separately between users of personal mobility vehicle and non-users. A total of 207 effective questionnaires were collected, and the analysis analyzed the perception of personal mobility vehicle by conducting frequency analysis using SAS 9.4. The survey focused on basic information on respondents, walking conditions, understanding of personal mobility vehicle, awareness of pedestrian space passage and parking, and awareness of the possibility of securing pedestrian rights due to new regulations. Results: First, when moving a pedestrian path by personal mobility vehicle, it shall be limited to less than the walking speed of pedestrians. Second, the parking location of the personal mobility vehicle is located at the boundary of the pedestrian road and the lane. Third, pay a fair price to park in a pedestrian space. Conclusions: It is necessary to improve the system to strengthen the contents of education to take into account the safety of pedestrians in education on how to use personal mobility vehicle.