• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.032 seconds

A Study on Acceptance Intentions to Use the Mobile Payment Service Based on Biometric Authentication: Focusing on ApplePay (생체 인증 기반 모바일 결제 서비스 수용의도 분석: 애플페이를 중심으로)

  • Kim, Kwanmo;Park, Yongsuk
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.123-133
    • /
    • 2020
  • The aim of this study is to scrutinize acceptance intentions of Korean users and influences of information security related factors on mobile payment services based on biometric authentication methods, like finger print authentication or face recognition authentication, by focusing on ApplePay. Unlike previous studies on user acceptance of mobile payment which lack considerations on information security related factors, this study employs the UTAUT with detailed information security factors to create a research model and PLS(Partial Least Squares) method to analyze the model. Based on the analysis, gaining trust on service through company's efforts on information protection, personal characteristics and trust on applied security technologies are important factors to Korean users along with social awareness and service infrastructures. The result of this study would be helpful to companies or organizations, which provide biometric-based mobile payment services, to understand needs of Korean consumers. Based on this study, further analysis is expected to find impacts of user experiences on same company's or competitors' products to acceptance intentions.

Mediating Effect of Corporate Welfare Satisfaction in the Relationship between Retirement Pension System's Income Security and Job Commitment (퇴직연금제도의 노후소득보장성과 직무몰입의 관계에서 기업복지만족도의 매개효과)

  • Kim, Soo-Jung;Choi, Yun-Jin;Lee, Gwang-Il
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.234-244
    • /
    • 2021
  • The purpose of this study is to investigate the effect of the retirement pension system on workers' retirement income security and job commitment, and to verify the mediating effect of corporate welfare satisfaction in the relationship between the retirement pension system's retirement income security and job commitment. Employees of domestic K-company, which have been implementing the retirement pension system since 2011, were surveyed, and 403 copies of the final data were analyzed using SPSS 22.0. The analysis results are as follows. First, as the sub-factors of the retirement income security, the guarantee of the retirement benefits right and the income replacement rate had a significant positive(+) effect on job commitment. Second, as sub-factors of the retirement income security, the income replacement rate and customized retirement design had a significant positive(+) effect on corporate welfare satisfaction. Third, corporate welfare satisfaction had a significant positive(+) effect on job commitment. Fourth, it was found that the relationship between the income replacement rate and job commitment, which are sub-factors of retirement income security, is mediated by diversity and the level of benefits, sub-factors of corporate welfare satisfaction. Based on the results of this study, it was confirmed that the implementation of the retirement pension system enhances the employee's job commitment and corporate welfare satisfaction, and is also important for corporate management.

A study on the Privacy threats factors of Cloud Services (클라우드 서비스의 프라이버시 침해 요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.87-95
    • /
    • 2015
  • Recently, The cloud computing technology is emerging as an important issue in the world, and In technology and services, has attracted much attention. Cloud services have evolved from simple forms to complex forms(using multiple mobile devices and communication services(Kakao talk, Facebook, etc.). In particular, as the cloud is especially facilitated the collection of user information, it can now be analyzed with the user's taste and preference. And many of the benefits of the cloud became increasingly closely with our lives. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the Hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies of attack and vulnerability to the privacy threats factors of the cloud computing services. and In the future, this is expected to be utilized as a basis for the Privacy security and Response.

Analysis of MASEM on Behavioral Intention of Information Security Based on Deterrence Theory (억제이론 기반의 정보보안 행동의도에 대한 메타분석)

  • Kim, Jongki
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.169-174
    • /
    • 2021
  • While the importance of information security policies is heightened, numerous empirical studies have been conducted to investigate the factors that influence employee's willingness to comply organizational security policies. Some of those studies, however, were not consistent and even contradictory each other. Synthesizing research outcomes has been resulted as qualitative literature reviews or quantitative analysis on individual effect sizes, which leads to meta-analyze on whole research model. This study investigated 28 empirical research based on the deterrence theory with sanction certainty, severity and celerity. The analysis with random effect model resulted in well-fitted research model as well as all of significant paths in the model. Future research can include informal deterrent factors and contextual factors as moderator variables.

The Influences of the Important Perception on Food Hygiene to Kitchen Employee's Performance in Hotel Banquet (호텔 연회 주방 종사원의 식품위생 중요도 인식이 수행도에 미치는 영향)

  • Kim, Ju-Myong;Kim, Auk-Ran;Jun, Heo
    • Culinary science and hospitality research
    • /
    • v.13 no.1 s.32
    • /
    • pp.75-86
    • /
    • 2007
  • This study was carried out to find out the effect of food hygiene awareness on kitchen employees' performance in the banquet cuisine of five-star hotels in Seoul. 279 kitchen employees were asked to fill out the questionnaire, and the collected data were analyzed by SPSS package(version 11.0). First, results of analysis on food hygiene showed that there were four factors, each respectively named as, food security regulations, food storage, period of circulation of food, and food safekeeping. Second, after analyzing each item in whole according to each of the factors, the average degree of priority on food hygiene in general was 4.52. Results according to each of the elements showed that food security regulations(4.56) and period of circulation of food(4.55) were considered as a priority. After analyzing the difference between the degree of priority and degree of performance according to each of the factors, it was found out that the latter was significantly lower than the former in all factors. Third, after analyzing the difference of food hygiene priority in accordance with general characteristics, statistically significant difference was only shown in education(F=3.308, p<0.05) and class(F=4.418, p<0.01). Fourth, after analyzing the difference of food hygiene performance in accordance with general characteristics, the only significant difference was found in food security regulation of education(F=4.418, p<0.01) and food security regulation of class(F=3.859, p<0.01). Fifth, after analyzing the effect of cook's awareness of priority on food hygiene on the degree of performance, it was found out that the awareness of priority on food hygiene had a positive effect(+) on the degree of performance. Therefore, we can conclude that as kitchen employees recognize the priority on the food hygiene better, their degree of performance was higher.

  • PDF

A study on the socio-economic study on the characteristics and oral health of national basic livelihood security (우리나라 국민기초생활수급자의 사회경제적인 특성과 구강건강에 관한 연구)

  • Kim, Chang-Suk
    • Journal of Korean society of Dental Hygiene
    • /
    • v.13 no.6
    • /
    • pp.995-1004
    • /
    • 2013
  • Objectives : The purpose of the study is to provide basic data for oral health promotion in national basic livelihood security. Methods : The data were extracted from the 4th National Health and Nutrition Survey (2007-2009) in Korea. The data were analyzed using SPSS 18.0. to $x^2$-test and CSGLM. Results : 1. The subjects were not able to receive dental treatment because of the financial difficulty. 2. The infuencing factors of DMFT include gender (p<0.05), type of health insurance (p<0.05), membership for private health insurance (p<0.05), frequency of toothbrushing (p<0.05), use of oral hygiene products (p<0.01), smoking (p<0.05), drinking (p<0.05). The influencing factors of CPI include gender (p<0.01) and smoking (p<0.05). The influencing factors of fixed bridge include age (p<0.05), income (p<0.05) and use of accessory oral hygiene products (p<0.05). The influencing factors of fixed bridge include age (p<0.001), income (p<0.01), education (p<0.001), type of health insurance (p<0.001), membership for private health insurance (p<0.001), frequency of toothbrushing (p<0.01), use of oral hygiene products (p<0.01), and drinking (p<0.05). Conclusions : It is necessary to provide oral health care and health promotion to the recipients of National basic livelihood security. The government must give them better quality of dental health care in the near future.

An Empirical Study on the Obstacle Factors of ISMS Certification Using Exploratory Factor Analysis (탐색적 요인 분석을 이용한 기업의 ISMS 인증 시 장애요인에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.951-959
    • /
    • 2014
  • In the past few years, data leakage of information assets has become a prominent issue. According to the National Intelligence Service in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment and operation of ISMS (Information Security Management System) even for private enterprises. But to be ISMS certified, there are many exposed or unexposed barriers, moreover, sufficient amount of studies has not been conducted on the barriers of ISMS Certification. In this study, we analyse empirically through exploratory factor analysis (EFA) to find the obstacle factors of ISMS Certification. The result shows that there are six obstacle factors in ISMS Certification; Auditing difficulty and period, Consulting firm related, Certification precedence case and consulting qualification, Internal factor, CA reliability and auditing cost, Certification benefit.

Behavioral Factors Affecting Tourists' Smartphone Usage: Focus on Mobile Banking Service (관광객의 스마트폰 이용 행위 요인: 모바일 뱅킹 서비스 중심)

  • Qu, Xiaoqian;Kim, Mincheol
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.127-134
    • /
    • 2019
  • The purpose of this study was to investigate the factors affecting the behavior intention of smartphone mobile banking service among tourists. Currently, due to the development of mobile Internet technology and the spread of smartphone all over the world, interest and spread of smart phone based mobile banking is popularized. Thus, we analyzed the relationship among performance expectancy, social influence, facilitating conditions, perceived financial cost, perceived habit, perceived security level, and user's behavioral intention as a dependent variable. In this study, 203 respondents were interviewed about Chinese tourists at Jeju International Airport, and the influence of independent variables was determined by Smartpls 3.0. The results showed that the perceived security level and habit had a positive effect on the behavior intention. Especially, perceived security is a major issue of smartphone-based mobile banking in recent years. This study is meaningful in that it is an analysis of behavior factors of smartphone-based mobile banking service for tourists.

A Study on the Information Security Related Organizational Citizenship Behavior: From Prospect Theory and Goal Orientation Theory Perspective (정보보안 관련 조직시민행동에 대한 연구: 개인 전망, 조직 목표지향성 관점을 중심으로)

  • Hwang, In-ho;Hu, Sung-ho
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.89-97
    • /
    • 2021
  • The purpose of this study is to verify the influence of the cognitive process related to the organizational citizenship behavior. The research method consisted of the cross-design of the prospect dimension and goal orientation dimension, and information security factors consisted of distributive justice, response efficacy, self efficacy, and organizational citizenship behavior. As a result of the study, the dimension of prospect had a significant effect on response efficacy and self efficacy, and it was found that the influence of the gain condition was greater than that of the loss condition. The goal orientation dimension had a significant effect on response efficacy and self efficacy, and it was found that the influence of the growth condition was greater than that of the validation condition. The research model that explained the relationship between information security factors appeared as a partial mediating model between distributive justice, response efficacy, and organizational citizenship behavior. The implications of this study suggest that it is necessary to establish an information security strategy in combination with individual decision-making factors and organizational culture factors.

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.