• Title/Summary/Keyword: Perceived Information Security

Search Result 247, Processing Time 0.028 seconds

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.

An Empirical Study on the Effects of Consumer Characteristics on their Acceptance of Online Shopping in the context of Different Product or Service Types (제품유형에 따른 고객의 온라인 쇼핑몰 수용 정도에 관한 실증적 연구)

  • Paik, Chin-Hyn
    • Management & Information Systems Review
    • /
    • v.26
    • /
    • pp.153-180
    • /
    • 2008
  • Most previous electronic commerce studies have focused on a single product or similar products. The effects of different product types have been relatively neglected. and so previous studies have limited the generalization. The purpose of this study was to explore the effects of different product types. The Internet product and service classification grid proposed by Peterson et al.(1997). A survey-based approach was employed to investigate the research questions. Regression analysis demonstrated that the determinants of online shopping acceptance differ among product or service types. As a result of analysis, personal innovativeness of information technology, perceived Web security, personal privacy concerns, and product involvement can influence consumer acceptance of online shopping, but their influence varies according to product or service types.

  • PDF

The Effects of Characteristics of User and System on the Perceived Cognition and the Continuous Use Intention of Fintech (핀테크(fintech) 사용자와 시스템 특성이 지각된 인식과 지속사용의도에 미치는 영향)

  • Lee, Jun-Sang;Park, Jun-Hong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.291-301
    • /
    • 2018
  • The purpose of this study is to investigate the factors that affect the perceived awareness and the intention of continuous use by FinTech users and system characteristics. Data collection was carried out by targeting and surveying 600 people living in Gwangju, and office workers using smartphones. As a result, first, self-efficacy, innovation, and fitness for Fin-Tech services were found to influence the degree of perceptual awareness and intent to use of Fin-tech service users. Second, the system characteristics have a positive effect on perceived awareness and intention of using FinTech service. Third, the hypothesis about the dangers in the user attributes and system properties were dismissed. It seems that the priority concern was regarding the leakage of personal information and security as privacy and the increasing damage cases of financial fraud by electronic financial transactions spill. Therefore, in order to spread FinTech services, it would be effective if a Fin-Tech service strategy could eliminate inconveniences such as the risk of hindering convenience and intention to use by the marketing strategy established by the company.

An Analysis of the Public Awareness on National Policy on Protection of Personal Information: using SERVQUAL (SERVQUAL 기법을 이용한 국가 개인정보보호 정책에 대한 국민 인식의 분석)

  • Lee, Kyung-bok;Yoon, Ki-chan;Shim, Mina;Lim, Jong-in;Park, Tae Hyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1037-1055
    • /
    • 2016
  • After the enactment of the Personal Information Protection Act, policies and activities for the personal information protection have been actively promoted. However the people are showing negative attitudes about personal information, as the ongoing personal data leakages. Therefore, authors tried to empirical analysis of the effectiveness of national policy on the protection of personal information, using SERVQUAL model, focused on the people's perception, in order to identify that how the people recognized current policy. Authors find that the public has perceived the effectiveness of the policy positively, but the level of their awareness is low. And we identify that the people are highly aware of the policy's effectiveness for Immediacy, Convenience and Responsibility, while they have the lowest effectiveness for Efficiency. The policy's improvement focused on the public's low expectations/perceptions and effectiveness awareness, is required in order to develop people-oriented national privacy policy that are satisfied by the people.

Item Goodness-of-Fit of Psychological Empowerment Scale in Private Security Guards (시큐리티 요원의 심리적 임파워먼트 척도의 문항 적합도)

  • Kim, Eui-Young;Kim, Sae-Hyung;Lee, Jun-Woo
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.25-45
    • /
    • 2012
  • Based on the results of preceding researches that the uncertainty perceived by the private security guards about their roles exerts direct effects on the business performance of the security industry, it needs to preferentially examine the degree of authority that the private security guards have. The suitability of the psychological empowerment criteria for measuring this for private security guards, however, has not yet been established up to the present, so it can be said that the validity of the information has not yet been established. Accordingly, as the psychological empowerment criteria of private security guards, this research examined the suitability of items, reliability of items, the level of difficulty of items, and the item goodness of fit from the viewpoint of the appropriateness of category of responses, and it is summarized as follows. First, in the self-determinism factor of the psychological empowerment criteria, Item 11 was found to be an unsuitable item, so it is proper that Item 11 should be deleted when examining the psychological empowerment of private security guards from now on. Second, the item reliability of the psychological empowerment criteria was high, so the consistency of the results is shown even if the data are collected from the other private security guards. Third, they feel that it is hard to respond to Item 12 while they perceive that Item 1 is the easiest, and the level of items of the psychological empowerment criteria is evenly distributed. Fourth, it was established that the 5-point categories of the psychological empowerment criteria were suitable to the private security guards.

  • PDF

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.

Beyond Speed : Nine Dimensions of Computer Network Quality Perceived by Its Users

  • Sangjin Yoo;Lee, Choong-Kwon;Sean B.Eom
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.3 no.1
    • /
    • pp.49-65
    • /
    • 1998
  • The trend toward globalization and competitive advantage is increasing the importance of international data communication . The more companies attempt to be globalized and competitive, the more critical the problems of the computer networks are. To improve computer networks in the business world, it is believed that the network shoud be approached from the viewpoint of service quality : we need to understand what network quality means to network users, those who use the network. The purpose of this study is to develop a dimension that captures the aspects of network quality that are important to network users. Many articles show that speed is very important factor in network systems. But the more important thing is that speed is just one of the factors contributing to network quality. It is suggested that a quality network meet nine dimensions : (1) speed (2) accessibility (3) connectivity (4) security (5) compatibility, (6) government restrictions (7) complexity (8) sustainability and (9) sharability.

Analysis of Risk Factors for Patient Safety Management (환자안전 관리를 위한 위험요인 분석)

  • Ahn, Sung-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.12 no.3
    • /
    • pp.373-384
    • /
    • 2006
  • Purpose: This is a pilot study to identify patient safety risk factors and strategies for patient safety management perceived by nurses. Methods: Data were collected and analyzed with an open questionnaire from April to May 2005, targeted on 100 nurses working in two hospitals. The issues were 'what are risk factors for patients, nurses, and other medical practitioners? How do they prevent with the aftermath of risk factors, causes of incidents?' For data analysis, types and frequency of risk factors were worked out, using the Australian Incident Monitoring System Taxonomy. Results: The types of patient safety risk factor perceived by nurses were as follows ; therapeutic devices or equipment, infrastructure and services (29.5%), nosocomial infections (16.3%), clinical processes or procedures (15.4%), behavior, human performance, violence, aggression, security and safety (12.2%), therapeutic agents (9.7%), injuries and pressure ulcers (8.7%), logistics, organization, documentation, and infrastructure technology (5.6%). Strategies for patient safety included training of prevention of infection, education about safety management for patients and medical professionals, establishment of reporting system, culture of care, pre-elimination of risk factors, cooperative system among employees, and sharing information. Conclusion: These results will be used to provide evidences for patient safety management and educational program.

  • PDF

An Empirical Study on the Determinants of Trust in Internet Shopping Mall : A Comparison of Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 실증연구 : 한국.중국 이용자 비교 분석)

  • Jung, Chul-Ho;Chung, Young-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.2
    • /
    • pp.71-96
    • /
    • 2007
  • The objectives of this study are to investigate factors influencing trust on internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on the literature reviews, this study employs six factors in two groups of influencing factors, web-site characteristics and individual characteristics as key determinants of trust in internet shopping mall. Analysis of 470 responses(Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following: In terms of the relationship between web-site characteristics factors and the trust, the results showed significant differences between Korean and Chinese samples. For the Korean samples, transaction security and interactivity were the only significant influencing factors. For the Chinese samples, perceived reputation and perceived size were the only significant factors. In terms of individual characteristics factors, the influencing factors were found identical for the samples. Both propensity to trust and familarity were significant factors in both Korean and Chinese samples. Based on the findings, managerial implications are discussed in building user trust in internet shopping mall in Korean and Chinese market.

  • PDF

A Study on the Perceived characteristics of the mobile payment service using the technology acceptance model (기술수용모델을 활용한 모바일 소액결제 시스템의 인지적 특성 분석)

  • 이석기;김성희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.103-109
    • /
    • 2004
  • Mobile payment service is a new innovating technology in the micro payment industry. Although it emerged only one or two years a9o in Korea, it is now highly used and prospered by many online companies. Traditional studies concerning the electronic payment system are usually about the payment process itself, so they stressed the security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article describes the phenomenon of technology adoption with a particular focus on telephone Payment service. The article identifies which characteristic of the telephone payment service affects to the user status (user, non-users). To do this, this article mainly used Roger's Technology Acceptance Model and some characteristics are added to the model. The most important perceptual characteristic that affects to the user status was not security, but ease of use-the telephone payment service had to enhance continuously for the competitive advantage over the other payment service. Observability and convenience are also noted as important.

  • PDF