• Title/Summary/Keyword: Information Security Economics

Search Result 142, Processing Time 0.022 seconds

Digital Management System in a Business Environment

  • Veresklia, Mariana;Mykhalitska, Nataliia;Trut, Olha;Honchar, Svitlana;Larin, Stanislav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.217-223
    • /
    • 2022
  • In modern business conditions, the improvement of business processes cannot do without digitalization. Digital technologies allow businesses to conquer markets, quickly introduce new technologies not only into production processes, but also at all levels of economic activity. The rapid pace of development of information, communication and economic spheres determine the relevance of the research topic and the goals that digital management solves. Today, the use of digital equipment and platforms makes it possible to form the basis for the formation of competitive business advantages, minimize costs, and most importantly, respond in time to changes in both the internal and external environment..Thus, the main task of the study is to analyze the digital management system in a business environment. As a result of the study, current trends and prerequisites for digital management system in a business environment were investigated.

A Case Study Exploring the Roles of Mawhiba in Supporting and Saudi Verbal Gifted in the English Language

  • Alharthi, Noha Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.304-322
    • /
    • 2022
  • This study investigated a case of a gifted Saudi student, X, who was early detected through Mawhiba (The Saudi Institution of Gifted) when he was eight years old. Then, the journey continued until he became a Tamayuz member and received a scholarship in 2022 to pursue his bachelor's at one of the prestige, high-ranking universities in the USA to study Mathematics and Economics. Lack of information about the status of Saudi verbal gifted maked X case a model to explore the roles of Mawhiba's programs in supporting Saudi verbal giftedness in general and particularly in learning the English language, plus seeking the opportunities Mawhiba provided for Saudi verbal gifted to enrich their giftedness in the English language through providing extended social networking and finally stating the sample's perspective about the opportunities and services Mawhiba provided him. The three core instruments to accumulate elaboration and interpret qualitative and quantitative data were academic records, writing samples, family observation, and a written interview.

Family Life Issues of Poor Female Earners After Korean Economic Crisis (경제위기 이후의 빈곤 여성가장의 생활실태 조사)

  • 옥선화;성미애;허정원
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.2
    • /
    • pp.1-13
    • /
    • 2001
  • The purpose of this study is to examine the effects of poor female-headed families' family life events on their well-being under economic crisis in Korea and to investigate how they overcome their alienation. Specific research questions were as follows : (1) How are poor female earner's life satisfaction level and alienation level after economic crisis\ulcorner (2) How are poor female earner's demands for social security\ulcorner For this empirical analysis, the data was collected from 359 poor female-earners whose first child was of school age in the Seoul metropolitan area from the 14th Feb. to the 18th Mar. 2000. The questionnaire for the survey dealt with demographic information, alienation, life satisfaction and family life event. The major findings of the research project were as fellows: First, poor female-earners'alienation level was not higher than the average level. However among sub areas of alienation, powerlessness was higher than the average level. Second, poor female-easer made a strong claim for social welfare. Especially, they desired so much to be granted the national economic assistance.

  • PDF

Why Consumers Use Mobile Commerce? - International Comparative Study of M-Commerce Model

  • Han, Sang-Lin;Nguyen, T.P. Thao;Nguyen, V. Anh
    • Asia Marketing Journal
    • /
    • v.18 no.3
    • /
    • pp.65-88
    • /
    • 2016
  • Development of information and communication technology is changing commerce environment and consumer purchasing behavior has also been changed. Globalization is becoming increasingly prevalent in the world today and many factors such as culture, politics, and economics may influence the applicability of management theories. Concurrently, corporate managers are faced with the challenge of offering usable and useful applications to the local users. Besides, many scholars strongly support that the criteria for M-Commerce adoption in developing countries are different from that of developed countries, due to cultural, security, social, political, economic, and technological aspects. This research tried to investigate the differences on the adoption of mobile commerce between developed and developing countries. In this study, the motivation for studying advanced mobile phone services adoption in the South Korea and Viet Nam is presented. Second, M-Commerce adoption model is introduced as a starting point for the research model. We then integrate price, personal innovativeness, quality dimension and perceived of playfulness into our model. Next, we describe our method and report the results of our analysis. The paper concludes with a discussion of the results from both the South Korea and Viet Nam with implications.

A Study on development of privacy indicators in the context of cloud service level agreement (클라우드 개인정보보호를 위한 SLA 지표 개발)

  • Kim, Jungduk;Park, Dae-Ha;Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2015
  • As the cloud services, the underlying technology of the digital convergence environment, have been widely adopted in the business, personal information protection has been recognized as one of the major issues to resolve. When cloud services are used to process the personal information, the personal information protection law speculates the establishment of a contract or service level agreement(SLA). This research presents 7 privacy indicators and 13 metrics which can be included in cloud SLA, based on the analysis of related regulation and standards and the SMART(Specific, Measurable, Action-oriented, Relevant and Timely) model. The proposed indicators are examined using the Focus Group Interview method in terms of materiality and feasibility. The results show that all the proposed indicators are meaningful and useful.

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

An Educational Needs Analysis of Home Economics Teachers for Food Literacy Education in Secondary School Home Economics (중등 가정과 푸드리터러시 함양 식생활교육에 대한 가정과 교사의 교육 요구도 분석)

  • Song, Yunmi;Lee, Kyung Won
    • Journal of Korean Home Economics Education Association
    • /
    • v.35 no.2
    • /
    • pp.41-59
    • /
    • 2023
  • This study aimed at analyzing the educational needs of home economics teachers for food literacy cultivation education in secondary school home economics. A total of 192 home economics teachers were surveyed about their perceptions of importance and performance of food literacy education content categories and elements, and their priorities were identified. Among the 38 content elements presented, home economics teachers recognized that the current performance level was significantly lower than that of the importance over 34 content elements. Based on the Borich educational needs assessment and the Locus for Focus Model, we identified five content elements with 'very high' educational needs ('food security/food sovereignty', 'reducing food-related waste', 'food waste management and recycling', 'food-related waste recycling', and 'country of origin information'), and four content elements with 'high' educational needs ('genetically modified food', 'ethical food consumption', 'food additives', and 'eco-friendly agricultural products'). These results indicate that dietary education in secondary school home economics should emphasize both the production and disposal of food. The findings of this study suggest implications for the needs for a new dietary education in secondary school home economics that allows students to learn all stages of food system. These results can also be used as a basis for dietary education for cultivating food literacy in secondary school home economics education.

A Scenario Development on the Personal Information Breach in Telemedicine Service (원격의료 서비스의 개인정보 침해 시나리오 개발)

  • Choi, Hyun-Wook;Kim, Taek-Young;Kim, Tae-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.301-304
    • /
    • 2021
  • 4차 산업혁명 시대가 도래함에 따라 사물인터넷(IoT)이 다양한 산업의 영역에서 활용되고 있다. 특히 IoT 기술 및 서비스를 활용하는 분야 중 하나인 스마트 의료 분야는 최근 소프트웨어 및 네트워크의 연결성이 강화되면서 사이버보안 사고가 급증하고 있다. 따라서 스마트 의료 기기·서비스 개발단계부터 보안을 고려하여 안전하게 개발하는 것이 필요하며, 서비스 제공시에도 보안을 고려하여 안전하게 관리 및 서비스를 제공하는 것이 필요하다. 이에 본 연구에서는 IoT 서비스 활용 분야 중 스마트 의료 분야에서 원격의료 서비스의 개인정보 침해 요인을 도출하고 이를 토대로 어택트리 기반의 시나리오 분석을 수행하고자 한다.

A Polynomial-based Study on the Protection of Consumer Privacy (소비자 프라이버시 보호에 관한 다항식 기반 연구)

  • Piao, Yanji;Kim, Minji
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.145-158
    • /
    • 2020
  • With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.

Using The Anthology Of Learning Foreign Languages In Ukraine In Symbiosis With Modern Information Technologies Of Teaching

  • Fabian, Myroslava;Bartosh, Olena;Shandor, Fedir;Volynets, Viktoriia;Kochmar, Diana;Negrivoda, Olena;Stoika, Olesia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.241-248
    • /
    • 2021
  • The article reviews the social media as an Internet phenomenon, determines their place and level of popularity in the society, as a result of which the social networks are a resource with perspective pedagogical potential. The analysis of social media from the point of view of studying a foreign language and the possibility of their usage as a learning medium has been carried out. The most widespread and popular platforms have been considered and, based on their capabilities in teaching all types of speech activities, the "Instagram", "Twitter", and "Facebook" Internet resources have been selected as the subject of the research. The system of tasks of teaching all types of speech activities and showing the advantages of the "Instagram", "Twitter", and "Facebook" platforms has been proposed and briefly reviewed.