• Title/Summary/Keyword: Characteristics of social security

Search Result 251, Processing Time 0.026 seconds

Effects of Mobile App Service Characteristics on User Satisfaction and Continuance Usage Intention (모바일 앱 서비스 특성이 사용자 만족과 지속적 사용의도에 영향을 미치는 요인)

  • Kim, Byung Gon;Kim, Ki Won;Seo, Hong Il
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.99-120
    • /
    • 2019
  • The purpose of this study is to provide information necessary for establishing a new strategy for customer service improvement by deriving factors affecting user satisfaction and continuous use intention of mobile app service user characteristics, system characteristics, and social characteristics. The results of this study are summarized as follows. First, reliability, innovation, familiarity, convenience, and self-efficacy among the characteristics of mobile app are analyzed as factors that have the greatest influence on user's perceived usefulness. Second, convenience, mobility, and visibility are some of the characteristics of mobile app service. Third, identity, security, and expectation agreement among mobile app service characteristics are analyzed as negative factors that do not affect users' perceived usefulness. Fourth, interactivity, familiarity, and self-efficacy among the characteristics of mobile app service were analyzed as positive factors that have the greatest effect on user's perceived ease of use. Fifth, reliability, mobility, visibility, and convenience among mobile app service characteristics are analyzed as factors that have some positive effects on perceived ease of use of app users. Sixth, identity, innovation, and security among the characteristics of mobile app service are negatively influenced by mobile app users' perceived ease of use. Seventh, the perceived usefulness of mobile app users is analyzed as a factor that has a very positive effect on user satisfaction. Eighth, the perceived ease of use of mobile app users is analyzed as a factor affecting perceived usefulness positively. Ninth, the perceived ease and expectation of mobile app users are positively influenced on user satisfaction. The tenth, the perceived usefulness of the mobile app users was analyzed as a factor having a very positive influence on the persistent intention to use. For the eleventh, the perceived ease of use of mobile app users was analyzed as a factor having a positive effect on the persistent intention to use. The twelfth, mobile app user satisfaction was analyzed as a factor having a very positive effect on the persistent intention to use.

Anomie Social Environment and Juvenile Delinquency (아노미(Anomie)적 사회환경과 청소년 범죄: 소셜 미디어를 중심으로)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.37-44
    • /
    • 2015
  • There appears a variety forms of crime type and age in accordance with the change of social structure. In this paper it is described for combining the Anomie theory of Emile Durkheim. Anomie refers to the absence of dual standards or norms. In other words, while weakening the existing norms prevailing when the new rules has not been established. That situation would cause social chaos. Rules on the dissemination and utilization of SNS due to the development of information and communication technology undermine the social norms while online regulations are being a weak state not established. In the confusion of these norms it has been shown to increase in juvenile delinquency. Social media has characteristics such as openness, accessibility, relationships, and content diversity. The social media itself is not subject to the general mechanisms of consumption and production due to growing as a kind of organism. It has characteristic to make the most content by utilizing the users to voluntarily share information. Social media using as communication, contact and information in the youth, thus the possibility of crime is high. Social media is also direct and indirect influence on youth crime but no apparent systemic regulation of this situation.

The Optimal Pourer Flow Considering the Characteristics of Electric Pourer Consumers (전력소비자 특성을 고려한 최적조류계산)

  • 김문영;백영식;송경빈
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.2
    • /
    • pp.107-113
    • /
    • 2003
  • In a deregulated electric power market, a demand function to consider the characteristics of electric power consumers should be required. It is essential that the optimal power flow algorithm with object function of social welfare maximization using the demand function for a competitive electric power market is applied to resolve in a point of economic benefits as well as the security of power systems. Therefore, in this paper, we implement the optimization problem based on linear programming to consider the characteristics of electric power consumers using the demand function and analyze not only the nodal cost for generations and demands but also the variation of demands as a function of the characteristics of electric power consumers through numerical studies.

Gender Differences in Entrepreneurship: The Impact of Social Context (기업가정신의 성별 차이: 사회적 맥락의 영향)

  • Choo, Seungyoup
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.119-132
    • /
    • 2021
  • This study focused on examining the impact of the social context that causes gender differences in entrepreneurship, not the phenomenon itself. Specifically, this study verified the moderating effect of the social context on the relationship between gender and entrepreneurship using data from 20 countries in the Global Entrepreneurship Trend Report (GETR). In order to test hypotheses involving social context implications, Hofstede's cultural dimension factors such as power distance, individualism, masculinity, and uncertainty avoidance variables, and institutional factors such as gender equality and social security are used as specific variables reflecting the social context. Empirical analysis through GLM found that gender did not independently influence entrepreneurship, and gender had a significant effect by interacting with power distance, individualism, uncertainty avoidance, gender equality, and social security variables, respectively. Such empirical results show that the gender difference in entrepreneurship is not due to the unique characteristics inherent in each gender but on the level of the country's social context to which the individual belongs.

The Method of Production of Security Educational Content Considering the Characteristics of MZ Generation (MZ세대 특성을 고려한 보안 교육용 컨텐츠 제작 방안)

  • Jo Hae Min;Ryu Jung Ryol;Sim Chung Sik;Hong Suk Woo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.157-164
    • /
    • 2023
  • As the MZ generation, which has recently become a hot topic, enters a major generation that plays various social roles, the need for research on efficient educational methods and content production tailored to the level of the MZ generation continues to be raised. In this reality, this paper was described to discuss the direction of development and raising the level of security educational content. To this end, the effectiveness of security educational content currently being used socially was analyzed, the content of a gametoon that combines the concept of gamification with a webtoon as a development plan was explained, and the educational effect was verified through the Likert scale. Furthermore, it was proposed to effectively utilize it by presenting the direction of development applicable to security educational contents.

A Deep Learning Model for Extracting Consumer Sentiments using Recurrent Neural Network Techniques

  • Ranjan, Roop;Daniel, AK
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.238-246
    • /
    • 2021
  • The rapid rise of the Internet and social media has resulted in a large number of text-based reviews being placed on sites such as social media. In the age of social media, utilizing machine learning technologies to analyze the emotional context of comments aids in the understanding of QoS for any product or service. The classification and analysis of user reviews aids in the improvement of QoS. (Quality of Services). Machine Learning algorithms have evolved into a powerful tool for analyzing user sentiment. Unlike traditional categorization models, which are based on a set of rules. In sentiment categorization, Bidirectional Long Short-Term Memory (BiLSTM) has shown significant results, and Convolution Neural Network (CNN) has shown promising results. Using convolutions and pooling layers, CNN can successfully extract local information. BiLSTM uses dual LSTM orientations to increase the amount of background knowledge available to deep learning models. The suggested hybrid model combines the benefits of these two deep learning-based algorithms. The data source for analysis and classification was user reviews of Indian Railway Services on Twitter. The suggested hybrid model uses the Keras Embedding technique as an input source. The suggested model takes in data and generates lower-dimensional characteristics that result in a categorization result. The suggested hybrid model's performance was compared using Keras and Word2Vec, and the proposed model showed a significant improvement in response with an accuracy of 95.19 percent.

On the administrative security approaches against spear phishing attacks (스피어 피싱 대응을 위한 관리적 보안대책에 의한 접근)

  • Sohn, Yu-Seung;Nam, Kil-Hyun;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2753-2762
    • /
    • 2013
  • Recently the paradigm of cyber attacks is changing due to the information security technology improvement. The cyber attack that uses the social engineering and targets the end users has been increasing as the organization's systems and networks security controls have been tightened. The 91% of APT(Advanced Persistent Threat) which targets an enterprise or a government agency to get the important data and disable the critical service starts with the spear phishing email. In this paper, we analysed the security threats and characteristics of the spear phishing in detail and explained why the technical solutions are not enough to prevent spear phishing attacks. Therefore, we proposed the administrative prevention methods for the spear phishing attack.

System and Prospects of Social Welfare Law (사회복지법의 규범체계와 과제)

  • Cheon, Kwang-Seok
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.7-42
    • /
    • 2011
  • The social welfare law concerning the children, the elderly and the disabled has been sufficiently in the center of the discussion in the academic as well as practical arena. One can find however rarely academic proposals about the way of understanding, spheres affiliated with this legal system, and systematic characteristics. So these problems stay now vague. This article aims to approach to these points of issue. First, it tries to reveal the physical, psychological and psychic characteristics of these group of people. These situation are not to be effectively protected by norms and measures provided by other instruments of social security, i.e. social insurances and social assistances. Second, based upon these functional limits inherent to these instruments of social security the own system of the social welfare law is explored in this article. The discussing points are as follows; 1. the concept of social welfare law, 2. as core principles; realization of the personality and freedom based upon self-determination right, universalism and equality. 3. rearrangements of the legal provisions to bring harmony with the legal purpose and function of social welfare law. Finally, it is pointed that the evaluation of the relevant legislation is essential, since in this area the difference between the norm purpose and the reality could be immense.

Why Do Some People Become Poor? The Characteristics and Determinants of Poverty Entry (누가 왜 빈곤에 빠지는가? 빈곤진입자의 특성 및 요인)

  • Kim, Hwanjoon
    • Korean Journal of Social Welfare Studies
    • /
    • v.42 no.4
    • /
    • pp.365-388
    • /
    • 2011
  • By analyzing 1998~2008 Korean Labor and Income Panel Study(KLIPS), this study examines socio-economic characteristics of people who become poor. The study also explores the reason why they are in the state of poverty. To find determinants affecting poverty entrance, discrete-time hazard models are applied. Major findings are as follows. The socio-economic characteristics driving people into poverty are in the middle way of the long-term poor and the non-poor, combining the characteristics of both groups. This implies that many cases of the newly poor tend to enter and exit from poverty repeatedly. Poverty entry rate was at a high level right after the economic crises, then was a downturn and remained fairly stable since 2000. However, the young, the high-educated, and even the professional are on the rise as a new poverty group. The major reason people become poor is temporary job loss. This factor is confirmed again by multi-variate analyses. In building anti-poverty policies, it is important to distinguish the long-term poor from the short-term poor. For the long-term poor, virtually the only affective policy will be income support. On the other hand, a labor-market strategy for jos security will be more effective for the short-term poor. The characteristics and determinants of poverty entry may affect poverty duration and exit in the future. Future research will be needed to investigate the relationship among these factors.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.