• Title/Summary/Keyword: Information Assurance

Search Result 657, Processing Time 0.025 seconds

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

Design of Improved Strong Password Authentication Scheme to Secure on Replay Attack (재전송 공격에 안전한 개선된 강력한 패스워드 인증 프로토콜 설계)

  • Kim, Jun-Sub;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.133-140
    • /
    • 2011
  • Password-based authentication is the protocol that two entities share a password in advance and use the password as the basic of authentication. Password authentication schemes are divided into weak-password and strong-password authentication scheme. SPAS protocol, one of the strong-password authentication scheme, was proposed for secure against DoS attack. However it has vulnerability of the replay attack. In this paper, we analyze the vulnerability to the replay attack in SPAS protocol. Then we also propose an Improved-Strong Password Authentication Scheme (I-SPAS) with secure against the replay attack.

A Quality Assurance Process Model on Fault Management

  • Kim, Hyo-Soo;Baek, Cheong-Ho
    • Journal of Information Processing Systems
    • /
    • v.2 no.3 s.4
    • /
    • pp.163-169
    • /
    • 2006
  • So far, little research has been conducted into developing a QAPM (Quality Assurance Process Model) for telecommunications applications on the basis of TMN. This is the first trial of the design of TMN-based QAPM on fault management with UML. A key attribute of the QAPM is that it can easily identify current deficiencies in a legacy system on the basis of TMN architecture. Using an empirical comparison with the legacy systems of a common carrier validates the QAPM as the framework for a future mode of the operation process. The results indicate that this paper can be used to build ERP(Enterprise Resource Planning) for a telecommunications fault management solution that is one of the network management application building blocks. The future work of this paper will involve applying the QAPM to build ERP for RTE (Real Time Enterprise) fault management solution and more research on ERP design will be necessary to accomplish software reuse.

Comparative Study on the Measures of Similarity for the Location Template Matching(LTM) Method (Location Template Matching(LTM) 방법에 사용되는 유사성 척도들의 비교 연구)

  • Shin, Kihong
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.24 no.4
    • /
    • pp.310-316
    • /
    • 2014
  • The location template matching(LTM) method is a technique of identifying an impact location on a structure, and requires a certain measure of similarity between two time signals. In general, the correlation coefficient is widely used as the measure of similarity, while the group delay based method is recently proposed to improve the accuracy of the impact localization. Another possible measure is the frequency response assurance criterion(FRAC), though this has not been applied yet. In this paper, these three different measures of similarity are examined comparatively by using experimental data in order to understand the properties of these measures of similarity. The comparative study shows that the correlation coefficient and the FRAC give almost the same information while the group delay based method gives the shape oriented information that is best suitable for the location template matching method.

Comparative Study on the Measures of Similarity for the Location Template Matching (LTM) Method (Location Template Matching(LTM) 방법에 사용되는 유사성 척도들의 비교 연구)

  • Shin, Kihong
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.04a
    • /
    • pp.506-511
    • /
    • 2014
  • The location template matching (LTM) method is a technique of identifying an impact location on a structure, and requires a certain measure of similarity between two time signals. In general, the correlation coefficient is widely used as the measure of similarity, while the group delay based method is recently proposed to improve the accuracy of the impact localization. Another possible measure is the frequency response assurance criterion (FRAC), though this has not been applied yet. In this paper, these three different measures of similarity are examined comparatively by using experimental data in order to understand the properties of these measures of similarity. The comparative study shows that the correlation coefficient and the FRAC give almost the same information while the group delay based method gives the shape oriented information that is best suitable for the location template matching method.

  • PDF

A Study on a Queue Management Scheme for Alleviating the Impact of Packet Size on the Throughput (패킷 크기에 따른 처리율 영향을 완화하는 큐 관리 기법 연구)

  • 이성근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.552-558
    • /
    • 2002
  • Differentiated services (DiffServ) architecture defines a new framework for the support of quality of service (QoS) in IP-based networks. RIO has received the most attention among all the active queue management mechanisms proposed for assured service in DiffServ environment. The paper proposed the enhanced RIO which could alleviate the impact of flow's packet sire on the realized throughput. The simulation results indicate that this mechanism, when combined with TSW as traffic conditioner, provide better throughput assurance and fair distribution of excess bandwidth independent of packet size of flows in case of well-provisioned network environment.

E-Biz Strategy Based on the Types of Internet Shopping-Mall and User group (인터넷쇼핑몰 및 사용자 유형에 적합한 e-Biz 전략)

  • Rah Joong Doug;Kim Kap Sik;Kim Seung Ho
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.151-163
    • /
    • 2003
  • This research studied E-Biz strategy based on the types of internet shopping-mall and user group. This study classified types of internet user into suffer group, searcher group, and confusion group according to navigation characteristics. The types of internet shopping-mall were divided into total directed mall, total mediated mall, special directed mall, and special mediated mall. The empirical study revealed that the intention of purchase has positive relationship with the assurance of e-SERVQUAL. Mediated type shopping-mall had higher market share than directed type in the use of internet shopping-mall. Suffer group was the target market of total mediated shopping-mall. Users of this group considered importantly the trust of e-SERVQUAL. Searcher group targeted special mediated shopping-mall. They had significant consideration to the responsiveness of e-SERVQUAL. Confusion group targeted direct shopping-mall. These groups had important consideration to the assurance of e-SERVQUAL.

  • PDF

A Study on Automatic Security Diagnostic Evaluation System for Security Assurance (보안 안전성을 위한 자동화 보안진단평가 시스템에 관한 연구)

  • Eom, Jung Ho;Park, Seon Ho;Chung, Tai M.
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.109-116
    • /
    • 2009
  • In the paper, we designed an automatic security diagnostic evaluation System(SeDES) based on a security diagnostic evaluation model(SeDEM) for an organization's security assurance. The SeDEM evaluates a security level of an organization quantitatively by a security evaluation formula which is composed of security variables and security index as applying the statistical CAEL model for evaluate risk level of banks. The SeDES has a good expandability as changing security variables according to an organization scale, characteristics and so on. And it also has a excellent usage because it inputs only numeric data got from statistical technique to security index. We can understand more a security level correctly than the existent risk assessment system because it is possible to assess quantitatively with an security grade as well as score. analysis.

Classroom lecture monitoring case study

  • Baik, Jai-Wook;Yang, Geun-Dae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.4
    • /
    • pp.1191-1200
    • /
    • 2008
  • Recently classroom monitoring is becoming important since the lecture is being held in the classroom and academic institutions are interested in the quality assurance. Some institutions have adopted ISO 9000 systems and constructed monitoring system through measurement, analysis and improvement. In this study quality assurance problems in academic institutions and the requirements of ISO 9001:2000 will be briefly discussed. Next we will investigate how to monitor the lecture in the classroom(in-class) using statistical process control techniques such as control charts. Then case study will be given to illustrate the technique to use appropriate statistics. Finally how to monitor the learning process during in-class and after-class will be proposed.

  • PDF

Calculating a Sigma Level for Quality Measurement of 3D CAD Models from Their Error Occurrence Characteristics (3D CAD 모델의 품질 측정을 위한 오류 발생 특징 별 시그마 수준 분석)

  • You, Hyo-Sun;Yang, Jeong-Sam;Park, Jae-Il
    • IE interfaces
    • /
    • v.24 no.1
    • /
    • pp.58-70
    • /
    • 2011
  • As more individuals and organizations participate in the complex design process of manufacturing industry, collaborative product development and management of the global supply chain have become more popular. Although the product quality concerns once focused on the manufacturing process, they are now directed at earlier stages of the design cycle where the engineering product is created as a 3D CAD model. In this paper, we describe the current state of product data quality activities in the manufacturing industry and the yardstick to measure 3D CAD data quality. Moreover we introduce a quality assurance method through the result of statistical analysis of 3D CAD models and suggest a six sigma level of CAD data quality by analyzing 76 samples provided from three Korean automotive companies.