• Title/Summary/Keyword: 표적 서비스

Search Result 82, Processing Time 0.029 seconds

A Market Development Strategy for WiBro Service (와이브로 서비스(WiBro service) 상용화를 위한 시장개발전략)

  • Kim, Youngchan;Jee, Kyoung-Yong;Kim, Moon-Koo;Kim, Jiyeon
    • Asia Marketing Journal
    • /
    • v.7 no.2
    • /
    • pp.71-92
    • /
    • 2005
  • Given the rapid changes in consumer tastes, technology, and competition, companies must develop a steady stream of new products and services. To be a successful product or service and explore the available market, the target market consumers need to be fully acknowledged a new product or service's value or benefit. And at the same time, the presented benefit should satisfy the customer's needs and wants. Therefore, a firm must investigate the target consumers' needs and wants before launching the new product or service. In this paper, we suggest the marketing strategy for newly developed WiBro service in telecommunication industry. We focus on consumer-oriented marketing strategy as well as the technology development process. To explore the customer's value scheme, we employ a self-explicated approach for estimating the customer's part-worth of the different target market in the process of market development stage. And we present the marketing strategy for each market development stages as well.

  • PDF

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

The Factors That Cause Customer Satisfaction in Private Security Service: Comparison between Corporate Clients and Individual Clients (민간경비 서비스의 고객 만족도에 영향을 미치는 요인: 사업자고객과 개인고객의 비교)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.161-184
    • /
    • 2013
  • The purpose of this research is to achieve qualitative growth for private security industry as a sector of service industry to attract clients and promote the growth of the private security industry by analyzing the factors which influence the customer's service satisfaction in using the private security services. A regression analysis was conducted to determine the factors which influences the satisfaction of private security service to ultimately achieve the research purpose. In the regression analysis, the difference between corporate clients and individual clients were analyzed for the sake of providing better security services and marketing applications. As a result, the factors that influences the satisfaction of the categorized groups were very clearly signified. Both individual and corporate clients showed increase in satisfaction rate when the fear of crime decreased. This result implies that the private security firms must possess segmented strategies as well as strategies to lower the fear factors of clients. There were no differences in all satisfaction-influencing factors when the fear reduction variable was exempted among both corporate and individual clients in usage satisfaction. This result shows that clients demand varies according to the client and the security firms must react to these demands by the clients. Although private security industry possess very clear publicity, it is a profit generating industry sector therefore, like other service industry, the private security services must implement strategies to keep up with the paradigm. If the satisfaction determinants from the research results are grafted into strategies such relationship marketing and target market selection, higher service satisfaction can be achieved from the clients.

  • PDF

A Conceptual Framework for the Personalization of Public Administration Services (공공행정서비스의 맞춤화 구현방안 연구)

  • Kim, Sang-Wook
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.57-67
    • /
    • 2016
  • As the Internet is becoming more socialized, Korean government, publishing a slogan, Government 3.0, has recently began to find a way to deliver its administration services to the public in more personalized manner. Policy directions to implement this advanced idea, are however still at large, primarily because of the vague nature of 'personalized'. This study, therefore, explores the possibility of getting public administrative services closer to personalization. To achieve this objective, this study attempts to develop a integrative framework of classifying the administration services to the public, based on two dimensions - the degree of citizen-oriented and the degree of government-driven, both of which are perhaps key determinants of personaliztion of services. For each quadrant of the framework, key features, characteristics, and conditions to be met are explained and followed by exemplary cases and policy implications.

Improvement of Service Encounter in Duty free shop using Service Blueprinting (서비스 청사진을 이용한 면세점에서의 서비스접점 개선 연구)

  • Choi, Eun A;Lee, Sang Shik;Lee, DonHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.4
    • /
    • pp.95-110
    • /
    • 2016
  • The purpose of this study is to design a service encounter of a duty free shop using a blueprinting method. This case study analyzed differences between city-based and airport-based duty free shop and proposed a flow chart based on administration blueprinting of the duty free shop in South Korea. The paper presented process criteria based on administrative procedures of customers in city-based and airport-based duty free shop. The results of the study provided the cause of failure with waiting point of customer and customer service and suggested management plan to solve failure. Also, the study addressed more customer-oriented service delivery processes to improve service quality and customer satisfaction through waiting and failure points.

Design of a file access control module to enhance Linux system security (리눅스 시스템 보호를 위한 파일 접근 제어 모듈의 설계)

  • 박성제;김형식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.844-846
    • /
    • 2003
  • 웹서비스 등 다양한 응용분야에서 리눅스 서버의 사용이 일반화되면서 침입으로 인한 정보 유출 문제 및 다른 시스템으로의 침입 등의 문제를 발생시키고 있다. 한번 침입을 받은 시스템의 경우 시스템 설정이 변경되거나 백도어가 설치되어 쉽게 재침입의 표적이 될 수 있다는 점에서 침입으로 인한 부작용을 최소화하는 것이 필요하다. 본 논문에서는 시스템 침입이 있더라도 시스템 설정을 변경하거나 백도어 설치를 할 수 없도록 제어하기 위한 파일 접근 제어 모듈을 제안한다.

  • PDF

Internal Network Response Plan through Cyber Threat Trend Analysis (사이버위협 동향 분석을 통한 내부망 대응 방안)

  • Byun, Ye-Eun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.258-259
    • /
    • 2020
  • 한국인터넷진흥원에서는 2020년 사이버 공격에 대한 7대 전망을 일상 속 보안 취약점, 공공기관·기업 대상 랜섬웨어, 가상동화 거래소를 통한 해킹 사고, 문자 메시지·이메일을 통한 악성코드 감염, 지능형 표적 공격, 소프트웨어 공급망 공격, 융합 서비스 보안 위협으로 제시하였다. 이에 본 논문에서는 신규 사이버위협에 대한 동향 분석을 통하여 기관의 정보보안을 위해 대응할 수 있는 방안에 대해 살펴보고자 한다.

Case Studies and Interviews to Review Public Library Services for People with Intellectual Disability (사례와 면접을 통해 본 국내 공공도서관의 지적장애인서비스)

  • Song, Kyeong-Jin;Lee, Juengeun;Son, Ji-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.1
    • /
    • pp.197-219
    • /
    • 2013
  • This study focused on current status of Korean public library services for people with intellectual disabilities, as well as problems associated with managing the services, in order to suggest future directions for implementation. To analyze the current status, the researcher conducted a case study of current Korean public library services for people with intellectual disabilities. This research also conducted a focus group interview with librarians experienced in providing such services. The results show that the services are provided with the support of a community welfare center, in the form of a program over short periods of time. The librarians agreed on the appropriateness of the services but emphasized various difficulties associated with service management. Based on the results, we suggest possible points of consideration, including support for increased funding, more qualified personnel, adequate policies, and development of a model service for people with intellectual disabilities.

The Role of Technology and Organization in Building Trust in Mobile Content Services (모바일 콘텐츠 서비스의 신뢰구축을 위한 기술과 조직의 역할)

  • Cho, Nam-Jae;Joun, Hyo-Jae
    • Journal of Digital Convergence
    • /
    • v.8 no.1
    • /
    • pp.11-26
    • /
    • 2010
  • The purpose of this paper is to study building and maintaining consumer trust in mobile contents for tourism and travel in perspective of public sector. Mobile contents services are increasing rapidly. Tourism contents in mobile services are non profit business model in an early and immature stage toward the ubiquitous era. Non-profit organization plays a role as service provider through Internet and wireless telecommunication in an information-intensive and network-oriented environment. This article is proposed nonprofit organizations as tourism contents service provider to identify a conceptual framework that can build continuous trusted mobile contents under ubiquitous environment according to developing and maintaining stage. The results based on the focus group interview methodology highlights a conceptual foundation for service providers in nonprofit domain.

  • PDF

An Encrypted Service Data Model for Using Illegal Applications of the Government Civil Affairs Service under Big Data Environments (빅데이터 환경에서 정부민원서비스센터 어플리케이션 불법 이용에 대한 서비스 자료 암호화 모델)

  • Kim, Myeong Hee;Baek, Hyun Chul;Hong, Suk Won;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.31-38
    • /
    • 2015
  • Recently the government civil affairs administration system has been advanced to a cloud computing environment from a simple network environment. The electronic civil affairs processing environment in recent years means cloud computing environment based bid data services. Therefore, there exist lots of problems in processing big data for the government civil affairs service compared to the conventional information acquisition environment. That is, it processes new information through collecting required information from different information systems much further than the information service in conventional network environments. According to such an environment, applications of providing administration information for processing the big data have been becoming a major target of illegal attackers. The objectives of this study are to prevent illegal uses of the electronic civil affairs service based on IPs nationally located in civil affairs centers and to protect leaks of the important data retained in these centers. For achieving it, the safety, usability, and security of services are to be ensured by using different authentication processes and encryption methods based on these processes.