• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.025 seconds

The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW (스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인)

  • Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

A Study on Factors Affecting the Intention to Accept Blockchain Technology (블록체인 기술 수용의도에 영향을 미치는 요인에 관한 연구)

  • Kim, Jungsuk;Gim, Gwangyong
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.1-20
    • /
    • 2017
  • A bitcoin-based technology named blockchain is garnering attention in various industries as a cost-effective measure in strengthening security and a reliable technology medium. Blockchain technology will play a critical role in the Fourth Industrial Revolution, and IT technology is expected to bring fundamental changes. This study focuses on the characteristics of blockchain technology and the effects of the intention to accept its technology in an empirical manner. The aspects of the technology are organized by researching blockchain technology and theories of technology acceptability and previous studies were used as guidelines to create the research model and propose the hypothesis. The research model is based on UTAUT with a set-up of 5 factors for performance expectancy and effort expectancy. For empirical analysis, a survey was conducted on 283 IT workers in Korea, To examine the hypothesis structural equation modeling was used performance expectancy was influenced by security, reliability, diversity, and economic efficiency while effort expectancy was influenced by reliability and economic efficiency. Performance expectancy, social influence, facilitating conditions affect the intention to accept. Innovativeness of an organization and control effects are influenced as well. The present study aims to provide practical guidance as supplementary research in utilizing blockchain technology, and the limitations of the study and future research possibilities are discussed as well.

A Study on the Police Knowledge Management System based on the IntraNet (인트라넷기반의 경찰지식관리시스템에 관한 연구)

  • Choi, Eung-Ryul;Lim, Jae-Kang
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.273-305
    • /
    • 2000
  • The knowledge substitutes the traditional factors of production - land, labor, and capital - and has become one of the most important new resources. The Internet Knowledge Society is where the knowledge is the major source of development and competition. Now more than 350mi11ion computers are connected to internet servers and the internet users are more than 250mi11ion. The purpose of this paper is to propose some key factors for implementing the Police Knowledge Management System(PKMS) based on Intranet. With Information Technology(IT), the police administrative system will be much more efficient. Introducing the If into the system is critical for restructuring the police administrative system. This paper concludes as follows : ■ Knowledge is divided into tacit and explicit one. Knowledge process is divided into acquisition, accumulation, distribution and creation of knowledge. ■ The IntraNet is composed of Web server, FTP server, electric-mail server, and is constructed security system to safety. ■ All policemen are bound to serve as a new knowledge worker. ■ Police organization needs to operate data management system. The organization also needs to the Police Knowledge Management Center(PKMC). And the Police Chief Knowledge Officers(PCKO) needs to be appointed to manage the PKMC. ■ An information and knowledge infrastructure(various databases are the most important factor) should be established within the organization to promote the self-directed management, the interactive communication, and the learning ability of the members.

  • PDF

A Study on the Critical Success Factors of Electronic Commerce by Shopping Mall Awareness (쇼핑몰의 인지도별 전자상거래의 성공요인에 관한 연구)

  • Kim, Jung-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.273-280
    • /
    • 2006
  • The internet is not simply a new technology that businesses are adopting to reduce their costs of operations and increase revenues. This study reports a set of success factors for electronic commerce, specifically some important implications for managers of internet shopping mall area in Korea. In this study it is found that price and security are most critical to increase customer satisfaction. In addition, the result of this study shows that (1) price and security, (2) shopping mall interface and trust and (3) ease of use are very important to increase customer satisfaction. And the result of this study shows that shopping mall awareness are very important to increase customer satisfaction.

  • PDF

Factors Affecting the Behavioral Intention and Behavior of Using E-Wallets of Youth in Vietnam

  • PHAN, Trong Nhan;HO, Truc Vi;LE-HOANG, Phuong Viet
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.295-302
    • /
    • 2020
  • The study examines an empirical case that explores the key constructs of the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh, Morris, Davis & Davis, 2003) and the relationship between security and privacy of the Theory of Perceived Risk (TPR) (Bauer, 1960). This study employs survey data of 200 young Internet users aged 18 to 25. The study was conducted through two steps: preliminary research by qualitative research method to form the official research scale then formal research by quantitative research method using CFA and SEM to test the research model. The research results show that performance expectancy and social influence significantly predict behavioral intention to use e-wallets in payment. In contrast, the factors, namely, security and privacy, and effort expectancy, are statistically insignificant on behavioral intention. Nevertheless, the facilitating conditions factor still affects the behavior of using e-wallets. The study proposes a model to generalize the online payment environment through the integration of UTAUT and TPR models that are important for online payment management and researchers in the technology environment. The findings of this study suggest that social influence significantly affects the intention of young people to use e-wallets instead of security and privacy.

An Empirical Study on the Factors that Affect the Continuous Use Intention of i-PIN (아이핀(i-PIN)의 지속적 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Im, Hyuk;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.159-179
    • /
    • 2015
  • In 2005, Korean government created the Internet Personal Identification Number (i-PIN) for a new online personal identification system to protect citizens' personal information against criminal abuse. However, i-PINs have not been widely in use over a decade. Although many people joined the i-PIN service, its actual use rate has been low. This study intends to identify the factors necessary to boost the continuous use of i-PINs. It was shown that government support and perceived security had a positive effect on the perceived ease of use and perceived usefulness of the i-PIN, respectively. Perceived security also directly affected the continuous use intention of the i-PIN. The perceived ease of use significantly affected the perceived usefulness, but it did not affect the intention to continuously use the i-PIN. The factor that had the most significant influence on the continuous use intention of the i-PIN was perceived usefulness. To increase the i-PIN use rate, Korean government must reduce users' anxiety through strict security functions, and must attempt to help people use the i-PIN easily.

Security Improvement on Biometric-based Three Factors User Authentication Scheme for Multi-Server Environments (멀티서버 환경을 위한 생체정보 기반 삼중 요소 사용자 인증 기법의 안전성 개선)

  • Moon, Jongho;Won, Dongho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2167-2176
    • /
    • 2016
  • In the multi-server environment, remote user authentication has a very critical issue because it provides the authorization that enables users to access their resource or services. For this reason, numerous remote user authentication schemes have been proposed over recent years. Recently, Lin et al. have shown that the weaknesses of Baruah et al.'s three factors user authentication scheme for multi-server environment, and proposed an enhanced biometric-based remote user authentication scheme. They claimed that their scheme has many security features and can resist various well-known attacks; however, we found that Lin et al.'s scheme is still insecure. In this paper, we demonstrate that Lin et al.'s scheme is vulnerable against the outsider attack and user impersonation attack, and propose a new biometric-based scheme for authentication and key agreement that can be used in the multi-server environment. Lastly, we show that the proposed scheme is more secure and can support the security properties.

A Study on the Cosponsorship Network in the National Basic Livelihood Security Legislative Revision : Focusing on the ERGM Analysis on the structrual Factors (국민기초생활보장개정법률안 공동발의에 대한 연구 : 구조적 요인에 대한 ERGM 분석을 중심으로)

  • Jung, Yuiryong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.313-320
    • /
    • 2020
  • The aim of this study is to analyze the structural factors of cosponsorship network in the National Basic Livelihiid Security Legislative Revision. This study use ERGM method and Korea Congress Data. The result of the analysis shows outlet effect and transilative effect is negative. It suggests that inactivaion of the congress on the public welfare.

Determinants of Improving the Financial Security of Retired Women in Malaysia

  • ZAINUDDIN, Halimatul Nadia;MOHAMAD, Nor Edi Azhar;RAJADURAI, R. Jegatheesan V.;SAPUAN, Noraina Mazuin;SANUSI, Nur Azura
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.6
    • /
    • pp.11-21
    • /
    • 2022
  • The perspectives on aging women's financial security during their retirement years are based on their behavior, planning, and decision-making processes during their working years. Elderly women are considered vulnerable and have a longer life expectancy, lower-income, and limited financial understanding compared to males; therefore, drastic steps need to be taken to improve their financial stability and quality of life. The current study sought to determine the most important contributors to retired women's financial health by measuring the value of four factors/variables: capability, opportunity, willingness, and biopsychosocial. This study used a mixed model approach, with qualitative analysis in the first phase involving a focus group discussion session, a pilot analysis, and quantitative analysis for phase two involving the distribution and collection of questionnaires completed by retired women. The surveys were distributed across Malaysia in five distinct zones and yielded 339 usable replies to support the theory. The outcomes of the Multiple Regression Analysis in Malaysia revealed that capability, opportunity, and biopsychosocial factors are significant predictors of retired women's financial security, whereas the willingness indicator lacked statistical significance.