• Title/Summary/Keyword: service user risk

Search Result 158, Processing Time 0.024 seconds

Determinants of Intention to Use Electronic Channel of Automobile Insurance: Applying the UTAUT Model (자동차 보험 거래에 있어서 전자적 채널 이용 의도의 영향 요인: UTAUT 모델의 응용)

  • Lee, Min-Hwa
    • The Journal of Information Systems
    • /
    • v.22 no.1
    • /
    • pp.181-200
    • /
    • 2013
  • Electronic channel of automobile insurance has emerged as an attractive way of lowering costs and saving time to do the transaction for customers. Electronic channel refers to using web sites to find useful information on insurance products, buy automobile insurance, and ask for services related to the insurance. This study suggests a modified model of the UTAUT and examines the factors influencing intention to use electronic channel in the transaction of automobile insurance. Based on 203 responses from potential automobile insurance buyers, the results showed that performance expectancy, effort expectancy, social influence, service expectancy, and security risk are significantly related to intention to use electronic channel. The results also showed that age as a moderator influences the effects of performance expectancy and effort expectancy on intention to use electronic channel. The study results would improve the understanding of the factors to which managers of insurance companies should pay attention in order to increase their sales through electronic channel.

Development of Compliance Collaboration Index for Trade Supply Chain (무역공급망 법규준수 협력지수 개발)

  • Kim, Hee-Soo;Ma, Sun-Duck
    • Journal of Korean Society for Quality Management
    • /
    • v.38 no.1
    • /
    • pp.34-41
    • /
    • 2010
  • This paper proposes the compliance collaboration index(CCI) which can be useful to measure the level of supply chain's compliance collaboration quantitatively. It can be shown that the proposed index is quite flexible when applied in real situations at the request of the index user. For instance, even if only one company of many companies in trade supply chain to be tested through the AEO certification test is not satisfied the required specification. the index is designed in such a way that the score can't be higher than a certain predetermined value. The proposed CCI can be used as the guidance for a trade company's collaboration process control strategy to increase the efficiency of compliance improvement activity. In this paper, we use the Analysis Hierarchy Process(AHP) which is one of the methods recommended by ISO/ICE as a measurement of weight to be assigned to the relevant parameters considered in the CCI.

Design of Cloud-based Context-aware System Based on Falling Type

  • Kwon, TaeWoo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.44-50
    • /
    • 2017
  • To understand whether Falling, which is one of the causes of injuries, occurs, various behavior recognition research is proceeding. However, in most research recognize only the fact that Falling has occurred and provide the service. As well as the occurrence of the Falling, the risk varies greatly based on the type of Falling and the situation before and after the Falling. Therefore, when Falling occurs, it is necessary to infer the user's current situation and provide appropriate services. In this paper, we propose to base on Fog Computing and Cloud Computing to design Context-aware System using analysis of behavior data and process sensor data in real-time. This system solved the problem of increase latency and server overload due to large capacity sensor data.

Analysis of Facility Standard for Elderly Welfare Facility by Universal Design Principle and Guideline: Focusing on Legal Regulations (유니버설 디자인의 원리와 지침에 의한 노인복지시설 기준 분석: 법률 규정을 중심으로)

  • Kim, Soo-Jung
    • Journal of Industrial Convergence
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2017
  • The purpose of this study is to analyze the facility standards of the elderly welfare facilities applying the seven principles of the universal design. The facility standards of the elderly welfare facilities were limited to the provisions of the "Enforcement Regulation of the Elderly Welfare Act". There are few legal regulations applying the universal design in the construction of the elderly welfare facilities. The facility standards are set only with the minimum requirements such as securing the safety of the user, securing the space area, functional convenience, and risk prevention. However, the contents of the regulations are limited to the minimum standards for functional convenience and safety required for living. In conclusion, in the elderly welfare facilities, the notion of universal design, which considers not only the elderly, but also service providers, employees, and general visitors, should be considered.

  • PDF

Cloud Messaging Service for Preventing Smishing Attack (스미싱 공격 방지를 위한 클라우드 메시징 서비스)

  • Park, Hyo-Min;Kim, Wan-Seok;Kang, So-Jeong;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.285-293
    • /
    • 2017
  • They are rapidly evolving malicious attacks on smart devices, and to timely protect the smart devices from these attacks has become a very important issue. In particular, smishing attack has emerged as one of the most important threats on the smartphone. In this paper, we propose the cloud service that can fundamentally protect the user from the risk of smishing attack. The proposed scheme provides cloud messaging service that can filter text messages including URLs in the user's smart device, view and manage them through a virtual machine provided by a cloud server. The existing techniques for preventing smshing attacks protect only malicious code of a known pattern and there is the possibility of error such as FP(False Positive) or FN(False Negative). However, since the proposed method automatically filters all text messages including URLs, storing, viewing, and managing them in their own storage space on the cloud server, it can completely block the installation of malwares(malicious codes) on the user's smart device through smishing attacks.

Design of Vehicle Security Authentication System Using Bluetooth 4.0 Technology (블루투스 4.0 기술을 이용한 차량용 보안인증 시스템 설계)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.325-330
    • /
    • 2017
  • Bluetooth 4.0 is a technology suitable for the Internet of things that is used for communication between various devices. This technology is suitable for developing a service by combining with automobiles. In this study, a security authentication system was designed by linking Bluetooth 4.0 technology and a vehicle system as an implementation example of an object internet service. A procedure was designed for security authentication and an authentication method is proposed using a data server. When the security authentication function is provided, various additional services can be developed using the information collection function of the risk notification and user action history. In addition, BLE (Bluetooth Low Energy) technology, which is a wireless communication technology that enables low-power communication and low-power communication in the process of the standardization and development of Bluetooth technology and technology, improves the battery life through the use of RFID or NFC This study expanded the range possible. The security service can be extended by expanding the scope of authentication by the contactless type. Using the proposed system, a customized service can be provided while overcoming the problems of an existing radio frequency (RF)-based system, portability, and battery usage problem.

LBS/GPS based Bicycle Safety Application with Arduino (아두이노를 이용한 위치정보 기반 안전한 자전거 애플리케이션)

  • Kim, Dong-Gun;Lee, Ho-Se;Kim, So-Young;Kim, Tae-Woo;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.7-15
    • /
    • 2016
  • Bicycle users were surpassed a million recently as bicycle riding will be a key element of daily life. As users increase, we can expect that the user is more exposed to the risk of an unexpected accident. Therefore, we need to establish several preventive measures for a safe riding environment. In this paper, we developed mobile application by using the acquired GPS-based location information that provide safety services for the bike riding as a LBS service. In detail, we have been able to provide a bicycle safety navigation service by using the bluetooth transmission and reception method between Android and Arduino-based devices. As a future work, the safety could be improved if we expand various forms of Arduino sensors. As a result, a service developed in this study will be able to converge ahead to connect into several personalized mobile IoT services.

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

The Extention and Implementation of User-defined AIS AtoN for Marine Safety Information Service (해양안전정보서비스를 위한 사용자정의 AIS AtoN확장 및 실험)

  • Park, In-Hwan;Hwang, Seung-Wook;Lee, Seo-Jeong
    • Journal of Navigation and Port Research
    • /
    • v.33 no.6
    • /
    • pp.423-428
    • /
    • 2009
  • Recently, the marine traffics have been increased along with enlargement of overseas commerce. Increasing the marine traffic may make higher the risk of marine accidents. Especially, the rate of accidents on costal area are more frequently. As if the marine safety information can be afforded to vessel and shore, the accident rate would be down. AIS AtoN is the navigational safety support device which is subject to functional requirements of IALA and technical standards of ITU. In this paper, we extend and implement the user-defined specification of AIS AtoN with message 21 for AIS basic information, messsage 6 for status report and message 12/14 for safety management.

Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers (사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로)

  • Bae, Jinseok;Jung, Yoonhyuk;Cho, Wooje
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.23-40
    • /
    • 2015
  • Despite much interest and investment in the Internet of Things (IoT) which expand the Internet to a ubiquitous network including objects in the physical world, there is growing concerns of privacy protections. Because the risk of privacy invasion is higher in IoT environments than ever before, privacy need to be a key issue in the diffusion of IoT. Considering that the privacy concern is a critical barrier for user to adopt information technologies, it is important to investigate users' privacy concerns related to IoT applications. From the triad perspective (i.e., risk on technology, risk on service provider, and trust on legislation), this study aims to examine users' privacy concerns in the context of activity trackers.