• Title/Summary/Keyword: security factors

Search Result 1,974, Processing Time 0.029 seconds

Factors Influencing the Adoption of mHealth Services in Saudi Arabia: A Patient-centered Study

  • Almegbel, Halah;Aloud, Monira
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.313-324
    • /
    • 2021
  • This study empirically investigates the factors influencing the intention to accept mobile technology in Saudi healthcare service delivery using the extended unified theory of acceptance and use of technology model (UTAUT) with perceived reliability and price value. Accordingly, a conceptual model combining behavioral constructs with those linked to the technology acceptance model is developed. This model aims to identify factors that predict patients' acceptance of mobile technology healthcare service delivery. The developed model is examined using responses obtained from a survey on 545 participants receiving healthcare services in Saudi Arabia. Thus, we have conceptualized the developed model and validated seven hypotheses involving key constructs. Results suggest that performance expectancy, effort expectancy, social influence, facilitating conditions, price value, and perceived reliability are direct predictors of user behavior to accept mobile technology in healthcare service delivery. The results provide empirical evidence to the literature on the effect of facilitating conditions and effort expectancy on mobile health (mHealth) adoption. The results show that the COVID-19 pandemic has significantly increased the adoption of mHealth services in Saudi Arabia.

Identifying Factors Increasing and Decreasing Economic Resilience During COVID-19 Crisis

  • Zakharov, Vladimir Yakovlevich;Ludushkina, Elena Nikolaevna;Kornilova, Elena Valerievna;Kislinskaya, Marina Vladimirovna;Brykalov, Sergei Mikhailovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.181-190
    • /
    • 2022
  • The article contains an overview of the results of recent research by think tanks in different countries, devoted to the analysis of economic resilience factors in the Covid-19 crisis and the development of recommendations for improving preparedness for the next crises. The authors consider and propose a theoretical framework for the concept of the resilience of economic systems. The impact of the COVID-19 crisis on national economies is analyzed. Factors explaining the different cability of economic systems to withstand shock in the short and long term are identified. The reactions of market participants and national governments to the crisis are assessed. It is shown how the COVID-19 crisis has affected the digital transformation of economic systems, and how digital transformation helps to increase the resilience of national economies so that the latter can emerge from the crisis even stronger.

Sharing Economy: A Study On The Factors Affecting The Participation Of Users In The Sharing Platforms

  • Waad Aldhowayan;Abdul Rauf Baig
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.21-29
    • /
    • 2023
  • Recently there has been an increase in interest and competition in sharing economy platforms. The success stories of many companies have spread in this field, such as Uber, but on the other hand, there are many other companies that have failed. We studied and analyzed the factors that affect the user's participation in the sharing economy platforms as an essential part of this system, and how to maintain the consumer's intention of use without compromising consumer satisfaction, as it has become an issue of great importance on the path to the success of the sharing platforms. Relying on the expanded valence framework and expectation confirmation theory as a basis, we constructed hypotheses that influence intention to participate in participatory platforms. Results show that system quality, trust, perceived benefits, and satisfaction are important factors that positively influence intention to continue to participate. This research is expected to help researchers move forward with research related to the future and help business managers understand user insights and integrate them with their business model to help the success, development and expansion of their business in the Kingdom of Saudi Arabia.

An Integration of TAM and D&M Model in the Ministry of Social Affairs and Labor in Kuwait

  • Faisal L F H Almutairi;Ramayah Thurasamy;Jasmine A.L. Yeap;Muhammad Khaleel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.187-199
    • /
    • 2024
  • This study based on TAM and D&M model to examine the Kuwaiti employee performance using the electronic document and records management system (EDRMS) in the Ministry of social affairs and labor. Additionally, this study has proposed the moderating effect of work cooperation on employee performance Data of 345 employees were collected from Ministry of social affairs and labor in Kuwait. Smart PLS 3.0 was used to analyze the data. Results indicated that perceived ease of use and perceived usefulness have a positive influence on employee performance. However, findings do not support the relationship between system usage and user satisfaction. Additionally, the results show that there is a significant positive moderating effect of work cooperation. This research provides strong evidence for defining the key factors affecting system usage but also in view of its limits. It should be evaluated. Not all the factors affecting the intentions of end-users to use EDRMS have been fully covered. There are major variables, for example, facilitating state and perceived compatibility are important factors that can be covered in future research. This research is an addition to the current literature and the first attempt in this area to the best of authors' knowledge.

An Integrated Framework for Modeling the Influential Factors Affecting the Use of Voice-Enabled IoT Devices: A Case Study of Amazon Echo

  • Temidayo Oluwapelumi Shofolahan;Juyoung Kang
    • Asia pacific journal of information systems
    • /
    • v.28 no.4
    • /
    • pp.320-349
    • /
    • 2018
  • Purpose: The application of IoT is finding continuous acceptance in our daily lives, particularly, smart speakers are making life easier and convenient for consumers. This research aims to develop and test an integrated model of factors influencing consumer's adoption of voice-enabled IoT devices. Design/methodology/approach: Based on the VAM, an integrated voice-enabled IoT device adoption model is proposed. Gender differences on five constructs relating with perceived value (perceived usefulness, perceived enjoyment, perceived security risk, perceived technicality and perceived cost) was also examined through PLS-MGA technique. The usage experience of consumers was also controlled in the integrated VAM. Findings: Result shows that Perceived-Usefulness, Perceived-Enjoyment and Perceived-Cost have a strong effect on Perceived-Value. However, Perceived-Technicality and Perceived-Security-Risk are non-influential and have no significant effect on PV. Additionally, Perceived-Value and Social-Influence plays a significant role in predicting adoption intention. Gender differences also exist in consumers perception of usefulness, enjoyment and cost. In comparison to the basic value-based adoption model, the integrated model provides more insight on consumers adoption of voice-enabled IoT devices. Originality/value: Using an integrated model, this study is one of the first scholarly attempt at modelling the influential factors for adopting smart speakers i.e., voice-enabled IoT devices, with implications for improved adoption.

A Legislative Device for the University's Safety Management System in Terms of Crisis Management Perspective (위기관리관점에서 대학의 안전관리 법제 방안)

  • Bae, Dae-Shik
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.183-196
    • /
    • 2008
  • This research will mainly focus on security issues in a university campus and delve into the risk factors and its characteristics due to the extreme polarization growth, and ultimately conduct research on legislative issues regarding safety & security management. A university campus is a miniature of the society, concentrated with human resources, material resources and knowledge information resources. It is also a region in which various underlying risk factors threaten these resources. However, due to the insensibility of danger and carefree indolence, these risk factors have been ignoring, leaving university campus amidst a "dead zone." Currently, a systematic and synthetic measures not only for safety inside the laboratory but also for the new type of crimes such as cyber crimes and motiveless crime due to extreme polarization, stress, uneasiness about the future, increase of mental illnesses, and drug abuse are urgently required. Therefore, I would like to introduce a legislative program in a crisis management perspective that can prevent universities from danger and protect the resources which would ultimately create a new security system.

A Study on Performance Evaluation Factors of Permissioned Blockchain Consensus Algorithm (허가형 블록체인 합의알고리즘의 성능평가항목 연구)

  • Min, Youn A
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.3-8
    • /
    • 2020
  • Blockchain can enhance data transparency and security through decentralized data management that is out of the centralized system. permissioned blockchain of the blockchain platform, only trust-based authorized nodes can participate in the distributed network. Considering the characteristics of the permissioned blockchain, it is necessary to consider the network communication speed, transaction finality agreement, and stability as a condition for selecting the consensus algorithm. The consensus algorithms of the permissioned blockchain environment are diverse such as PoA, PBFT, Raft, etc., but there are no various evaluation factors for selecting consensus algorithms. In this paper, various performance evaluation factors are proposed to analyze the characteristics of each consensus algorithm of the permissioned blockchain and to select an efficient consensus algorithm considering the characteristics of the user environment that composes the network. The proposed performance evaluation factor can consider the network speed, stability, and consensus of the finality agreement between nodes under the premise of trust. Through this, a more efficient blockchain network environment can be constructed.

An APT Attack Scoring Method Using MITRE ATT&CK (MITRE ATT&CK을 이용한 APT 공격 스코어링 방법 연구)

  • Cho, Sungyoung;Park, Yongwoo;Lee, Kunho;Choi, Changhee;Shin, Chanho;Lee, Kyeongsik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.673-689
    • /
    • 2022
  • We propose an APT attack scoring method as a part of the process for detecting and responding to APT attacks. First, unlike previous work that considered inconsistent and subjective factors determined by cyber security experts in the process of scoring cyber attacks, we identify quantifiable factors from components of MITRE ATT&CK techniques and propose a method of quantifying each identified factor. Then, we propose a method of calculating the score of the unit attack technique from the quantified factors, and the score of the entire APT attack composed of one or more multiple attack techniques. We present the possibility of quantification to determine the threat level and urgency of cyber attacks by applying the proposed scoring method to the APT attack reports, which contains the hundreds of APT attack cases occurred worldwide. Using our work, it will be possible to determine whether actual cyber attacks have occurred in the process of detecting APT attacks, and respond to more urgent and important cyber attacks by estimating the priority of APT attacks.

A Study on the Security Vulnerability Factors of Smart Phones ('스마트 폰'의 보안 취약요인에 관한 연구)

  • Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.43-50
    • /
    • 2022
  • It is no exaggeration to say that mobile devices have already become an essential tool in our daily life. Among these mobile devices, a representative smart phone is overheating the market by introducing new functions and services whenever a new product is released. However, most users do not know that there are various vulnerabilities depending on the manufacturer, service, or function, and damage is occurring due to attacks that exploit the vulnerabilities.Research on this has already been conducted, but it is very difficult to predict because there are various differences depending on new devices, operating systems, services, and functions. For this reason, it is necessary to continuously monitor and study new vulnerable factors. Therefore, through this study, research so far, vulnerabilities, attack technology, and response technology were considered. In addition, it is expected that it can be used as basic data for the development of systems and response technologies in the future by proposing countermeasures.

Effects of Design Factors of the Instrument Cluster Panel on Consumers' Affection Applying Robust Design (강건 설계기법을 이용한 자동차 게이지 클러스터의 디자인 요소와 고객 감성에 관한 연구)

  • Jung, Ga-Hun;Park, Sung-Joon;Kim, Seong-M.;Jung, Eui-S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.1
    • /
    • pp.25-31
    • /
    • 2010
  • It is known from consumer surveys that the interior design of cars greatly influences on consumers' affection. Most notably, the instrument panel which occupies the driver's attention while driving would be one of the main components that affect consumer's affection, but the designer does not often put due importance to this design component. The purpose of this study is to define consumers' affection on the instrument cluster panel in terms of its design factors: color of panel lighting and layout of meters as independent factors. Semantic differentials or affective adjectives that are related to the instrument panel were first derived from surveys, existing studies and the available literature. Then, representative affective factors were drawn using factor analysis and multi-dimensional scaling (MDS). Evaluation of the instrument panel was performed and analyzed by Taguchi's robust design to provide more robust results under various noise factors which are color and material of car interior. Experiment revealed that consumers had five affective factors on the instrument panel and luxurious, charming, and visible affections are grouped into a factor and unique and dynamic affections in another factor. Evaluation of the instrument panel by Taguchi's robust design found that the white color of panel lighting and the panel with four meters was the most preferred design in terms of both the affection of luxury and uniqueness.