• Title/Summary/Keyword: service user risk

Search Result 156, Processing Time 0.021 seconds

Trend and Analysis of Protection Level Calculation Methods for Centimeter-Level Augmentation System in Maritime

  • Jaeyoung Song;TaeHyeong Jeon;Gimin Kim;Sang Hyun Park;Sul Gee Park
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.3
    • /
    • pp.281-288
    • /
    • 2023
  • The International Maritime Organization (IMO) states that the recommended horizontal accuracy for coastal and offshore areas is 10 m, the Alert Limit (AL) is 25 m, the time to alert is 10 seconds, and the integrity risk (IR) is 10-5 per three hours. For operations requiring high accuracy, such as tugs and pushers, icebreakers, and automated docking, the IMO dictates that a high level of positioning accuracy of less than one meter and a protection level of 0.25 meters (for automated docking) to 2.5 meters should be achieved. In this paper, we analyze a method of calculating the user-side protection level of the centimeter-level precision Global Navigation Satellite System (GNSS) that is being studied to provide augmentation information for the precision Positioning, Navigation and Timing (PNT) service. In addition, we analyze standardized integrity forms based on RTCM SC-134 to propose an integrity information form and generate a centimeter-level precise PNT service plan.

A Study on the continuous Intention of MyData Service Users Based on the Innovation Resistance Model (혁신저항모형에 기반한 마이데이터 서비스 사용자의 지속사용의도에 관한 연구)

  • Haengnam Sung;Taeho Hong;Taewon Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.2
    • /
    • pp.101-117
    • /
    • 2024
  • The purpose of this study is to consider the characteristics perceived by users who utilize MyData services in the financial sector. It aims to examine how these factors influence users' understanding for sustained usage and their resistance to innovation. The research seeks to explore the relationship between users' awareness of characteristics and its impact on both enhancing comprehension for continued usage and addressing users' resistance to innovation. Utilizing a specialized survey agency, we examined the relative effects of innovation resistance factors, such as relative advantage, perceived risks, complexity, clarity and perceived ease of use on MyData service users. Furthermore, this research focuses on employing empirical analysis to validate the relationships between these factors through the survey. The findings of this study suggest that MyData service should dedicate ongoing efforts to minimize user resistance to service utilization. Specifically, it was revealed that among the innovation resistance factors, perceived ease of use, relative advantage, perceived risk, and complexity exert influence in that order.

Development of Android App to Record and Manage Travel Routes for Location Information Protection (위치정보 보호를 위한 이동 경로 기록 및 관리 서비스 앱 개발)

  • Seoyeon Kim;Ah Young Kim;Minjung Oh;Saem Oh;Sungwook Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.437-444
    • /
    • 2023
  • Location-based services play a vital role in our daily lives. While these services enhance user convenience, user's privacy is at risk because they lead to a rapid surge in collecting and utilizing location information for a user. In this paper, we design and implement an application that securely records and manages user location information. We enhance the privacy protection aspect concerning location information by providing some features. Utilizing Room DB, we store collected personal location information in the user's local database instead of the server of the location-based service provider. Furthermore, user can initiate and terminate recording at their discretion, thereby enhancing the protection of personal information related to location data. User's unease regarding their movement paths is reduced by empowering them to have control over their own location information.

A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.147-165
    • /
    • 2009
  • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.

Security Enhancement of Lightweight User Authentication Scheme Using Smartcard (스마트카드를 이용한 안전한 경량급 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.209-215
    • /
    • 2020
  • The environment of the Internet provides an efficient communication of the things which are connected. While internet and online service provide us many valuable benefits, online services offered and accessed remotely through internet also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication on client-server environment. In 2016, Ahmed et al. proposed an efficient lightweight remote user authentication protocol. However, Kang et al. show that it's scheme still unstable and inefficient. It cannot resist offline identity guessing attack and cannot provide session key confirmation property. Moreover, there is some risk of biometric information's recognition error. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since we only use hash function and XOR operation.

Study on DEVS Based Development that GPS Location Tracking System (DEVS 기반의 GPS 위치추적 시스템 개발에 관한 연구)

  • Seo, Hee Suk;Ju, Seung Hwan;Lee, Eun Jung;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.1-8
    • /
    • 2010
  • Recently, the missing due to the heinous crimes occurred in succession has been the focus of attention, so measures for these are urgently needed. So, it is necessary that we need to check and take care the weak like children, women, the elderly with dementia and insane person to prevent these social problems. This study is location-based service that suggests the tracking system and way to guard a family and property from the various risk factors which are possible in our life. To acquire the location of the user who is in motion, a communications network technologies were integrated and the system will be able to be monitoring in real time through the website. So, it is convenient and safe because it is possible to use anywhere. Concretely, it was described around location-based service, GPS system, tracking system, process of the service solution and composition for the system. Also, the way to activate the system will be suggested. The final suggested system was verified the possibility through the placement. With this, i will offer effective measures which is more convenient to use and reliable.

PHealth Service Deployment Methodology: A Case Study

  • Paggetti, Cristiano;Rugnone, Alberto;Tamburini, Elena;Nugent, Chris
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2012
  • It has been proved that information and communication technology (ICT) solutions for personalized health (PHealth) and ambient assisted living (AAL) can support people in their daily life activities. Several solutions have been demonstrated to empower different levels of services through seamless data acquisition and specific users' interaction modalities. Usually services usability and accessibility are handled in the design process and are validated with small users' groups. Moreover, while service design and systems development have been extensively described in literature, service deployment methodologies are not properly addressed and documented. Proper reference guidelines are also missing. The most common methodologies like unified process (UP) or ICONX can cover only the design and the development of PHealth services without a clear description on the following phases such as deployment, service provision and maintenance. These phases present several risks to be taken into account right from the beginning of the implementation of PHealth or AAL services. This paper focuses on the description of a structured methodology to deploy PHealth services and how this process can be supported by integrated software routines and adapting the UP framework in particular the "Transition phase."

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

A Study on Consumer Purchase Intention Using a Flow (Flow를 이용한 소비자 구매의도에 관한 연구)

  • Park, Jong-Won;Yoon, Sung-Jun;Choi, Dong-Choon
    • Journal of Global Scholars of Marketing Science
    • /
    • v.12
    • /
    • pp.59-75
    • /
    • 2003
  • In order for electronic commerce to be successful, it must have a theoretical framework that considers the characteristics of the internet user who are consumers in the cyber space and impacts their purchase intentions. We were able to obtain participation of 350 people from across the country using 316 responses(34 responses removed), we derived statistics by means of SPSS/PC version 10.0 and AMOS 4.0 statistics package. We found that, the higher the degree of skill and the sense of challenge, the level of involvement and perceived service quality increased. And the degree of skill has a negative influence on awareness of perceived risk than the sense of challenge. Perceived service quality, perceived risk and involvement has a influence on purchase intentions.

  • PDF

Analysis of Loan Comparison Platform User's Default Risk (대출중개 플랫폼별 고객의 채무불이행 리스크 비교)

  • SeongWoo Lee;Yeonkook J. Kim
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.2
    • /
    • pp.119-131
    • /
    • 2024
  • In recent years, there has been a significant growth in loan comparson services offered by fintech platforms in South Korea. However, it has been reported that loan comparison platform users tend to have a higher risk of default compared to non-users. This paper investigates the difference in platform-specific credit risk factors using survival analysis models - Kaplan-Meier curves and Accelerated Failure Time (AFT) model. Our findings show that, relative to non-users, users of loan comparison platforms are characterized by elevated default rates, a greater propensity for home ownership, lower credit scores, and shorter loan durations. Furthermore, our AFT models elucidate the variance in default risk among the various loan comparison service platforms, highlighting the imperative for customized strategies that address the unique risk profiles of customers on each platform.