• Title/Summary/Keyword: 보안태도

Search Result 72, Processing Time 0.022 seconds

A Study on Acceptance of Public Recording for SNS Post (SNS 게시물에 대한 공공기록화 수용에 관한 연구)

  • Yun, Sung-Uk;Chang, Jun-Gab;Kim, Geon
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.1-12
    • /
    • 2019
  • This study explored the factors affecting the acceptance of public recording in SNS post. Using SPSS 21.0 program and AMOS 21.0 program, major results were derived through exploratory factor analysis, confirmatory factor analysis, correlation analysis, and path analysis. The results are as follows: First, the risk of personal information leakage on SNS posting has a significant negative impact on the attitude toward SNS posting. Second, the security of the SNS posting has a significant effect on the attitude toward the SNS posting. Third, the concern about privacy of SNS posting has a significant negative impact on the attitude toward SNS posting. Fourth, the attitude toward SNS posting has a significant effect on the intention to accept the SNS posting. The above results suggest that the SNS post recording should be able to collect opinions of SNS users from a long-term viewpoint.

An Explorative Study of Consumer Response on O2O Service Types: Focusing on Delivery and Car sharing service (O2O(Online to Offline)서비스 사업 형태에 따른 소비자 반응에 관한 탐색적 연구 : 배달 서비스와 카셰어링 서비스 중심으로)

  • Sung, Jungyeon
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.129-135
    • /
    • 2020
  • This study examined the consumer response of the current O2O service between service types. Previous studies mainly focused on the quality factor of O2O service or Technology Acceptance Model or extended TAM, This study is different from the fact that there are differences in factors that consumers consider important and consumer reactions by service type. It is also significant that we compared between representative food delivery services and car sharing services that are actively used among O2O services. As O2O service is closely related to consumer's life, this study chose three factors that the issue of personal information security and trust of intermediary platform companies, and finally subjective norm based on individuals and groups who are aware of new O2O service. To test hypotheses, data were collected and analyzed for 301 samples, focusing on delivery and car sharing service, As a result, the delivery service among the O2O services was more positive to attitude toward service in the consumer group with lower personal information security, trust in platform, and subjective norm than car sharing service. Based on these results, implications and future research directions were presented.

Template matching-based Pornographic Image Detection (템플릿 매칭기반 음란 이미지 탐지)

  • Shin, Hyung-Sub;Kim, Hyun-jung;Won, Il-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1142-1145
    • /
    • 2010
  • 인터넷 공간에서 무한한 자료의 공유는 손쉽게 유용한 정보를 얻는다는 순기능도 있지만, 청소년들이 음란물을 쉽게 접할 수 있다는 역기능도 제공된다. 음란물은 신체적으로나 정신적으로 미성숙한 상태에 있는 청소년들의 정서와 태도형성, 그리고 행위까지도 영향을 미칠 수 있다[8]. 따라서 방대한 인터넷 공간에서 음란 이미지를 자동으로 감지하는 연구는 청소년들을 보호하기 위해 필요하다. 본 연구에서 음란 이미지를 판단하는 알고리즘을 제안하고, 실험으로 제안된 알고리즘의 성능을 평가했다. 음란 이미지를 판단하는 핵심 알고리즘은 템플릿 매칭 기법이며, 실험결과 대체적으로 안정된 성능을 확인할 수 있었다.

A Study on the Impact of Security Risk on the Usage of Knowledge Management System : Focus on Parameter of Trust (보안위험 수준이 지식관리시스템의 성공에 미치는 영향 : '신뢰'를 매개변인으로)

  • Ahn, Joong-Ho;Choi, Kyu-Chul;Sung, Ki-Moon;Lee, Jae-Hong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.143-163
    • /
    • 2010
  • The purpose of this study is to investigate the user's perception of security risk and examine its impact on the usage of Knowledge Management Systems(KMS). The findings of this study are three-fold. First, the overall user's perception of security risk is not high. However, there is a considerably big difference in the perception of security risk among users. This finding means that user's perception of a security risk is not based on the actual security effects but one's individual perception. Another finding is that user's perception of a security risk has a negative impact on the usage of KMS through "trust", which is a mediating variable in our study. This finding corresponds with the existing theory that security risk is oneof the critical sources of trust, and trust is a critical factor of user's acceptance of KMS. Finally, the result of this study reveals that activities devoted to security do not decrease the effectiveness and productivity of KMS. Our long-held cognition that security activity hinders the effectiveness and productivity of an information system is not particularly applied to the KMS.

Analysis of the Level of Primary School Students about Secure Apps (안전한 앱에 대한 초등학교 학생의 수준 분석)

  • Ko, Yeong Hae;Kim, Chong Woo
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.1
    • /
    • pp.143-149
    • /
    • 2014
  • We study the level on the knowledge, attitudes, and practice of primary school (grades 3-6 students ) for the safe use of smart devices, and identify student status for the safe use of smart devices, and suggests ways of appropriate data collection, analyzing of data. Through this research, for the safe use of smart devices in education showed that the effect is very insignificant and the knowledge and practice of smart devices are widely recognized. We will suggests the suitable education contents for the smart devices safe use for primary school students. These education will be made up of 'smart devices safety using' and we will expect that primary students will be able to cultivate the 'smart devices security awareness'.

The Impact of Perceived Security Control on the Acceptance of Internet Banking (인지된 보안통제가 고객의 인터넷 뱅킹 수용에 미치는 영향)

  • Suh, Bo-Mil
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.1
    • /
    • pp.25-52
    • /
    • 2006
  • This study focuses on customer perception of security control under Internet banking environment Internet banking customers' understanding of security control is insufficient. They are not fully aware of security technologies for Internet banking. Moreover, they cannot know which control is implemented and maintained on an Internet banking site when visiting the site. This study, therefore, attempts to find the impact of customer perception of security control on Internet banking acceptance. The research model is based on the TAM (Technology Acceptance Model), and introduces trust as an additional belief. Trust has been investigated in the marketing area, and begins to be focused in e-business area. A Web survey of Internet banking users collected 845 cases. Statistical analyses, using SEM (Structural Equation Modeling), partially supported the hypotheses that perceived strength of security control has an impact on three beliefs: trust, perceived usefulness, and perceived ease of use. We also verified the impact of these beliefs on attitude toward using, on behavioral intention to use, and on actual use. It is, therefore, verified that perceived strength of security control is a determinant of Internet banking acceptance.

  • PDF

NCS proposal for industrial security (산업보안 분야에 대한 NCS 제안)

  • Park, Jong-Chan;Ahn, Jung-Hyun;Choi, Young-Pyul;Lee, Seung-Hoon;Baik, Nam-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.358-360
    • /
    • 2022
  • Modern society is developing rapidly and technologies that provide convenience in living are developing day by day. On the other hand, the development of cyber attacks that threaten cybersecurity is developing faster, and it still adversely affects the industrial environment, and industrial damage is steadily occurring every year. Industrial security is an activity that safely protects major assets or technologies of companies and organizations from these attacks. Therefore, it is a situation that requires professional manpower for security. Currently, the manpower situation for security is staffed, but knowledge of the understanding and concept of industrial security jobs is insufficient. In other words, there is a lack of professional manpower for industrial security. It is the NCS that came out to solve this problem. NCS is the state standardized ability (knowledge, attitude, skills, etc.) necessary to perform duties in the industrial field. NCS can systematically design the curriculum using NCS as well as help in hiring personnel, and NCS can be applied to the national qualification system. However, in the field of industrial security, NCS has not yet been developed and is still having difficulties in hiring personnel and curriculum. Although the NCS system in the field of industrial security has not been developed, this paper proposes the industrial security NCS to solve the problem of hiring professionals later and to help the field of industrial security NCS to be established later.

  • PDF

Evaluation and Suggestions of the Army-College Joint Training System for Non-commissioned Officers (육군 부사관 협약제도의 효과성 평가와 개선 방안)

  • RHIM, Seong-Bin;LEE, Shi-Chul
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.3-16
    • /
    • 2015
  • Ten years have passed since an arm-college joint education system with the goal of efficiently acquiring future non-commissioned officers (NCOs), and approximately 4,000 annual graduates of the programs have already actively been in position in Korean Army. We evaluated the effectiveness of the system based on an empirical survey for 100 respondents, all sergeants-first-class and above. The analysis shows that the graduates' general performance and attitude as NCOs appear to be superior to those who were recruited from the general public, while there were no statistically significant difference in some other areas. NCOs from the departments of the program showed higher capacity to conduct his duty of expertise, better accountability, and more positive attitude toward the routine tasks. Several policy messages are also drawn. We suggest that the Army and the relevant schools take appropriate measures like more active institutional support for upgrading the system. Additionally, their initial selection process for prospective NCOs, high school graduates, should also be improved.

A Design of a Data Service providing Additional Information of ID Advertising (ID 광고의 부가정보를 제공하는 데이터서비스 설계)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2018
  • As the digital broadcasting era settled in, the TV, which was only used to watch broadcast programs, developed as a medium for operating various data services. This means that an environment, in which the viewers' TV usage behavior can be changed from a passive attitude to an attitude of actively consuming the media, has been established. Since the advertising market is an industry that is heavily influenced by changes in the media, these changes causes changes in the form of advertising and the advertising consumption behavior of viewers. In this environment, the broadcasting industry needs to think about the new growth strategy that links the possibility of data service with the advertisement market. In this study, we designed a data service that provides supplementary information of an ID advertisement, which has the weakness of short exposure time and shortage of information expression space. Specifically, we have designed the usage scenario and user interface of the data service and developed a method, based on the international digital broadcasting standard DV B, that provides the supplementary information defined by the type of ID advertisement to the data service.

  • PDF

A Study on Awareness of Information Security Influencing Trustness (정보보안 인식이 신뢰 형성에 미치는 연구)

  • Jeong, Jaehun;Choi, Myeonggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1225-1233
    • /
    • 2015
  • This study investigates the effects of information security awareness arising from E-Commerce in terms of the Elaboration Likelihood Model(ELM) and analyzes the moderating effect of the trust's involvement and experience. Consumers are using E-Commerce Web sites, depending on the level of involvement and experience in E-Commerce. This study is based on the ELM, the information security awareness of consumer confidence in E-Commerce form, according to the degree of experience and involvement suggested a theoretical model to describe the effect that the scaling and, through empirical studies validation of model. Consumer confidence is formed the attitude of the E-Commerce company through different paths, depending on the type of awareness in the E-Commerce web site, this moderate has the effect of consumer involvement and experience. Studying the information security awareness of consumer in the on E-Commerce is considered to present a new perspective on trust.