• Title/Summary/Keyword: Electronic Commerce

Search Result 1,840, Processing Time 0.029 seconds

A Framework Exploring the Pivotal Role of Preannounced Information Attributes in the Chinese Market: Moderating Effects of Product Knowledge and Product Innovativeness (중국 시장의 신제품 사전예고 정보 속성의 중요성에 관한 연구: 제품 지식과 제품 혁신성의 조절역할을 중심으로)

  • Duan, Xiaowei;Lu, Yeqing;Huang, Mengjie
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.386-403
    • /
    • 2021
  • Preannouncing a new product to its target audiences has been more and more prevalent in a wealth of industries, particularly industries that attach great importance to the speed of entry. Grounded in market signaling theory, the current research advances a theoretical model that takes full cognizance of the relation between preannounced information about an upcoming product and individual customers' behavioral intentions as well as significant moderating effects of prior product knowledge and new product innovativeness. In response, a web-based survey is conducted for data collection and the structural equation model is utilized for data analysis. Results of this study demonstrate that preannounced new product information attributes (i.e., quantity, clarity) may positively influence consumers' attitudes, in turn, lead to a favorable purchase intention. Moreover, the moderating effects of product knowledge and product innovativeness are also confirmed. Specifically, product knowledge moderates the quantity-attitude relation positively and moderates the clarity-attitude relation negatively, whereas product innovativeness does opposite. Both implications and limitations are also described.

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

Topic and Survey Methodological Trends in 'The Journal of Information Systems' ('정보시스템연구'의 연구주제와 서베이 방법론 동향분석)

  • Ryoo, Sung-Yul;Park, Sang-Cheol
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.1-33
    • /
    • 2018
  • Purpose The purpose of this study is to review topic and survey methodological trends in 'The Journal of Information Systems' in order to present the practical guidelines for the future IS research. By attempting to conduct a meta-analysis on both topic and survey methodological trends, this study could provide researchers wishing to pursue this line of work further with what can be done to improve IS disciplines. Design/methodology/approach In this study, we have reviewed 185 papers that were published in 'The Journal of Information Systems' from 2010 to 2018 and classified them based on topics studied and survey methodologies used. The classification guidelines, which was developed by Palvia et al.(2015), has been used to capture the topic trends. We have also employed Struab et al.(2004)s' guidelines for securing rigor of validation issues. By using two guidelines, this study could also present topic and rigor trends in 'The Journal of Information Systems' and compare them to those trends in International Journals. Findings Our findings have identified dominant research topics in 'The Journal of Information Systems'; 1) social media and social computing, 2) IS usage and adoption, 3) mobile computing, 4) electronic commerce/business, 5) security and privacy, 6) supply chain management, 7) innovation, 8) knowledge management, and 9) IS management and planning. This study also could offer researchers who pursue this line of work further practical guidelines on mandatory (convergent and discriminant validity, reliability, and statistical conclusion validity), highly recommended (common method bias testing), and optional validations (measurement invariance testing for subgroup analysis, bootstrapping methods for testing mediating effects).

A Comparative Study on Selecting a Plant Location: Focusing on Korean and Chinese Corporation (기업의 생산입지선정에 관한 비교연구: 한국과 중국 기업사례를 중심으로)

  • Zhang, Dong-Zhe;Yonn, Min-Suk;Kim, Jong Soon
    • International Area Studies Review
    • /
    • v.14 no.2
    • /
    • pp.205-227
    • /
    • 2010
  • Where should a plant or service facility be located? The decision is crucial since the capital investment in land, factory construction, and facility is enormous. Once a firm has sunk a large sum of money into a factory, it lives with the decision for a long time. In this age of global markets and global production, this is a key decision problem for contemporary manufacturing and/or service. Using data from Korean and Chinese managers and the AHP (Analytic Hierarchy Process), this paper did study on the actual condition for identifying the differences of opinion between the two group's(Shanghai and Shenyang managers) in how to make decisions on the location problems. Since this study was carried out during recent global economy recession, and the limitation of the collected questionnaires, it is hard to avoid the possibility for those managers to show different view from their ordinary times. Nevertheless, this paper will provide managers with useful informations on successful facility location in China.

Selection of Detection Measures for Malicious Codes using Naive Estimator (단순 추정량을 이용한 악성코드의 탐지척도 선정)

  • Mun, Gil-Jong;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • The various mutations of the malicious codes are fast generated on the network. Also the behaviors of them become intelligent and the damage becomes larger step by step. In this paper, we suggest the method to select the useful measures for the detection of the codes. The method has the advantage of shortening the detection time by using header data without payloads and uses connection data that are composed of TCP/IP packets, and much information of each connection makes use of the measures. A naive estimator is applied to the probability distribution that are calculated by the histogram estimator to select the specific measures among 80 measures for the useful detection. The useful measures are then selected by using relative entropy. This method solves the problem that is to misclassify the measure values. We present the usefulness of the proposed method through the result of the detection experiment using the detection patterns based on the selected measures.

Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication (NTRU기반의 이동 통신에서의 인증 및 키 합의 프로토콜)

  • 박현미;강상승;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.49-59
    • /
    • 2002
  • As the electronic commerce increases rapidly in the mobile communication, security issues become more important. A suitable authentication and key agreement for the mobile communication environment is a essential condition. Some protocols based on the public key cryptosystem such as Diffie-Hellman, EIGamal etc. were adapted in the mobile communication. But these protocols that are based on the difficult mathematical problem in the algebra, are so slow and have long key-length. Therefore, these have many limitation to apply to the mobile communication. In this paper, we propose an authentication and key agreement protocol based on NTRU to overcome the restriction of the mobile communication environment such as limited sources. low computational fewer, and narrow bandwidth. The proposed protocol is faster than other protocols based on ECC, because of addition and shift operation with small numbers in the truncated polynomial ring. And it is as secure as other existent mathematical problem because it is based on finding the Shortest or Closest Vector Problem(SVP/CVP).

Abnormal Detection for Industrial Control Systems Using Ensemble Recurrent Neural Networks Model (산업제어시스템에서 앙상블 순환신경망 모델을 이용한 비정상 탐지)

  • Kim, HyoSeok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.401-410
    • /
    • 2021
  • Recently, as cyber attacks targeting industrial control systems increase, various studies are being conducted on the detection of abnormalities in industrial processes. Considering that the industrial process is deterministic and regular, It is appropriate to determine abnormality by comparing the predicted value of the detection model from which normal data is trained and the actual value. In this paper, HAI Datasets 20.07 and 21.03 are used. In addition, an ensemble model is created by combining models that have applied different time steps to Gated Recurrent Units. Then, the detection performance of the single model and the ensemble recurrent neural networks model were compared through various performance evaluation analysis, and It was confirmed that the proposed model is more suitable for abnormal detection in industrial control systems.

A Reconstruction of Classification for Iris Species Using Euclidean Distance Based on a Machine Learning (머신러닝 기반 유클리드 거리를 이용한 붓꽃 품종 분류 재구성)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.225-230
    • /
    • 2020
  • Machine learning is an algorithm which learns a computer based on the data so that the computer can identify the trend of the data and predict the output of new input data. Machine learning can be classified into supervised learning, unsupervised learning, and reinforcement learning. Supervised learning is a way of learning a machine with given label of data. In other words, a method of inferring a function of the system through a pair of data and a label is used to predict a result using a function inferred about new input data. If the predicted value is continuous, regression analysis is used. If the predicted value is discrete, it is used as a classification. A result of analysis, no. 8 (5, 3.4, setosa), 27 (5, 3.4, setosa), 41 (5, 3.5, setosa), 44 (5, 3.5, setosa) and 40 (5.1, 3.4, setosa) in Table 3 were classified as the most similar Iris flower. Therefore, theoretical practical are suggested.

Research on Efficient Smart Factory Promotion System in IoT Environment (사물인터넷 환경에서의 효율적인 스마트 공장 추진 체계 연구)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.59-64
    • /
    • 2020
  • Recently, many difficulties have been faced in all parts of the world due to the impact of COVID-19. Personally, household income is decreasing sharply as many jobs disappear, and economically, many SMEs are increasingly going bankrupt. It is known that this phenomenon is highly likely to continue for the time being. In such a situation, the smart factory support project provides opportunities for difficult SMEs to improve productivity and change the corporate structure. In this study, the current status of smart factory promotion was examined, and problems occurring in the process of promoting smart factory support projects were identified. The improvement plans were derived so that more efficient projects could be promoted in the future.

Analysis of the Effect of The Internet Activation on Students in IoT Environment (사물인터넷 환경에서 인터넷 활성화가 학생에 미치는 영향 분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • The world is changing rapidly as the Internet spreads and various smart devices appear. High-performance PCs and high-speed communication networks are rapidly spreading in every home, and all kinds of the internet sites are emerging. In particular, the high education enthusiasm of Korean parents adds to this, and the ratio of the internet users among teenagers is exploding every day. In the case of adolescents, most of them use the Internet for online games, indicating that online games are the main cause of the internet addiction. This study was conducted using a questionnaire for male and female high school students using the Internet, and demographic and sociological characteristics were used only as basic data. In this study, as much as parents, students and teachers think, the results of the internet addiction type analysis according to academic achievement in humanities high school students are to be investigated to determine whether internet use has an effect on academic achievement.