• Title/Summary/Keyword: security factors

Search Result 1,957, Processing Time 0.031 seconds

Analysis of Structural Equation Model on Affecting Factors and Causality of Job Search Intention among Expectant Graduates from University (구조방정식을 이용한 대학졸업예정자들의 구직의도 영향요인 및 인과구조 분석)

  • Ryu, Il;Kim, Sora
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.198-212
    • /
    • 2013
  • The objectives of the study are: 1) to explore the affecting factors on job search intention among expectant graduates from university and 2) to analyze their causal relationships. For the objectives, the Structural Equation Modeling was run using: AMOS 18.0 program. The analysis included total of 231 senior students from three national universities located in non-central regions. The main results are follows as: first, job search network showed a significant and positive indirect effect on job search intention implying the mediating roles of job search attitudes and job search efficacy. Second, job search attitudes and job search efficacy had positive and significant effects on job search intention. Third, job search constraints had a negative effect on job search attitudes, and job search network and job search constraints were positively associated with job search efficacy. Fourth, higher job search network and higher job search efficacy increased the levels of job search clarity, respectively. These results implied that the improvement of job search efficacy, positive attitudes toward job search and the security of social network for job are meed for expectant graduates from university.

A Risk Factor Detour Multi-Path Routing Scheme in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크 환경에서 위험요소 우회 다중 경로 라우팅 기법)

  • Hwang, Donggyo;Son, In-Goog;Park, Junho;Seong, Dong-Ook;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.30-39
    • /
    • 2013
  • In recent years, with the development of devices to collect multimedia data such as small CMOS camera sensor and micro phone, studies on wireless multimedia sensor network technologies and their applications that extend the existing wireless sensor network technologies have been actively done. In such applications, various basic schemes such as the processing, storage, and transmission of multimedia data are required. Especially, a security for real world environments is essential. In this paper, in order to defend the sniffing attack in various hacking techniques, we propose a multipath routing scheme for physically avoiding the data transmission path from the risk factors. Our proposed scheme establishes the DEFCON of the sensor nodes that are geographically close to risk factors and the priorities according to the importance of the data. Our proposed scheme performs risk factor detour multipath routing through a safe path considering the DEFCON and data priority. Our experimental results show that although our proposed scheme takes the transmission delay time by about 5% over the existing scheme, it reduces the eavesdropping rate that can attack and intercept data by the risk factor by about 18%.

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

A Study for Satisfaction of Chinese Tourists in Korea (중국소비자의 한국관광 만족을 위한 탐색적 연구)

  • Koo, Hye-Gyoung;Kim, Young-Seen;Choi, Ara;Wang, Sujie
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.117-128
    • /
    • 2017
  • This study aims to propose measures to consistently induce Chinese tourists who represent the largest percentage of inbound tourism from foreign countries, utilizing raw data of 2015 Korea International Visitor Survey conducted by the Korea Culture & Tourism Institute under the Ministry of Culture, Sports and Tourism. Differences and influence factors for overall satisfaction on travel in Korea, intention to revisit Korea, and intention to recommendation were analyzed by demographic characteristics and tourism characteristics of Chinese consumers. As a result of analysis study, it came out that there are differences between overall satisfaction on travel in Korea and intention to revisit Korea by age and job of demographic characteristics. Among the tourism characteristics, there are differences in intention to revisit Korea depending on purpose of travel, intention to revisit Korea and recommendation according to route of travel information search, and there are differences in all three categories according to type of travel. The most important factor of all three category was identified as 'Food' factor and the second most influential factors were immigration procedures, security, and tourist attractiveness. It is suggested that more active research and improvement efforts are needed in the government, industry, and academia in order to attract Chinese tourists in the future.

Housing Need and Demand Assessment: Focused on Public Housing Development Projects (공공주택 사업지구의 수요평가모델 구축 연구)

  • Ji, Kyu-Hyun;Lee, So-Young;Kim, Yong-Soon
    • Land and Housing Review
    • /
    • v.5 no.4
    • /
    • pp.247-257
    • /
    • 2014
  • This study proposes a new housing need and demand assessment model centering on small-scale housing development projects and happy house development projects that reflected the recent changes in rental and small sized apartment centered public housing policies and development paradigms. The housing need and demand assessment model of public housing development projects consists of quantitative evaluation factors such as potential need indicator and demand pressure indicator and qualitative evaluation factors such as local condition indicator. The potential need indicators of small sized housing development projects are calculated by subtracting the stock of already-supplied constructed rental and purchased rental housings from the potential quantity of need drawn from the small regions such as -eup, -myeon, and -dong. In the potential need indicators of happy house development projects, the potential need is calculated from those who are expected to receive a happy house in the unit of -si, -gun, and -gu. In small-sized housing development projects, demand pressure indictors are the number and the proportion of those who opened a subscription deposit, the number of those who received basic livelihood security and the number of those who were patriots and veterans. The demand pressure indicators of the happy house development projects are stock ratio of small-sized houses, rate of rise in housing rent price, level of housing rent price, and rate of monthly rent house.

Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service (준 정부기관 클라우드 컴퓨팅 서비스 결정에 대한 민감도 분석)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.91-100
    • /
    • 2015
  • Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.

A Study on the Actuality of School Safety and the Development of Safety Manual (학교안전교육의 실태분석과 안전교육매뉴얼 개발에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.5 no.3 s.18
    • /
    • pp.83-88
    • /
    • 2005
  • It is necessary to hold the school safety manual because recently, the safety-related accidents occur frequently in schools. Accidents can occur inside of schools as well as out of schools, and they can be classified with human accidents, traffic accidents, fire accidents, and explosion accidents. Safety-related accidents occurring in the school are dangerous because nobody can predict them. Illegally infringing violence, targeting unspecified and a lot of people, informs the parents and persons concerned to education of danger. School safety manual, never precedented before, describes epoch-making educational methods for students' safety. It describes safety security such as refuging ways at an emergency, the way to recognize danger for elevated safety based on prevention education, the use and practice of checklist for related facilities, and the implements and facilities for school personnels and students. So, the school safety manual is an important guidance for safety education at the level of prevention from various accidents which occur inside the school as well as out of the school. It presents a variety of prompt response after an accident. At the same time, it checks facilities and dangerous factors in schools and facilities for safety, and analyzes special factors based on them. So it will present the status of safety management of existing facilities and implements, the installment of new facilities and implements, and the way to secure safety for use.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

Factors of the Life Satisfaction of Adults with Brain Lesions Disabilities: A Comparison of One-Person and Multi-Person Households (성인 뇌병변장애인 생활만족도 영향 요인: 1인 가구와 다인가구 비교)

  • Park, Ju-Young
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.696-703
    • /
    • 2021
  • The purpose of this study was to analyze determinant factors of the life satisfaction of adults with brain lesions disabilities so as to provide suggestion for improving the quality of life. I used the data on second wave 4th Panel Survey of Employment for the Disabled. The total number of respondents was 281, 54 respondents of one-person households and 227 respondents of multi-person households. The data was analyzed using SPSS Win 25.0 program and utilizing χ2 test, ANOVA, logistic regression analysis. Results of study were : First, The one-person households group showed middle aged and the elderly, lower income, basis living security recipient, lower help for daily life, lower participation in social activities than multi-person group. Second, level of disability, health status, participation in social activities, experience of discrimination were found to have a significant effect on the life satisfaction of multi-person households. And gender, age, health status, employment, experience of discrimination were found to have a significant effect on the life satisfaction of one-person households. Base on the results of this study, suggested for improving the quality of life in adults with brain lesions disabilities by households type.

The Effect of IT Governance Factors on Local Festival Performance (IT 거버넌스 요인이 지역축제 성과에 미치는 영향)

  • Kim, Young-Dai;Lee, Sun-Young;Lee, Hwansoo
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.1-10
    • /
    • 2018
  • For local festivals to be successful, it is important to cooperate with various entities and effectively utilize festival-related resources. Recently, many efforts have been made to improve the operation and management performance of local festivals in Korea, but systematic management and IT support have been insufficient. In this study, the factors affecting the IT governance of local festivals were derived through a literature review and the relationship to the festival performance was analyzed empirically. A survey was conducted with local festival organizers and stake holders, and the research model was verified using the regression analysis with total 109 samples. According to the results of the analysis, it was confirmed that marketing, processes and service management have a significant effect on festival performance within IT governance. The effect of festival performance on resource management was not statistically significant. This study demonstrates that the systematic operation and management of local festivals using IT governance is necessary for local festivals. It will be more meaningful if further study discuss the IT utilization guidelines and success cases through the innovative use of IT for local festivals.