• Title/Summary/Keyword: Permission System

Search Result 277, Processing Time 0.022 seconds

A Study on the Opt-in Marketing

  • OH, Won-Kyo;LEE, Won-Jun
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.49-59
    • /
    • 2020
  • Purpose: Online and social media and mobile shopping are increasing and companies are required to provide personal information in order to supplement the non-invasive characteristics of the channels. With the increased provision of personal information, consumers' personal and social concerns about the prevention of personal information infringement are also increasing, and in response, personal or opt-in marketing has emerged to compensate for reckless information abuse. Despite the background of this emergence, the existing prior studies are limited to ignoring the negative feelings of consumers in the real world, including only the net function and positive effect of the opt-in mail. Research design, data and methodology: The research framework was intended to utilize the impact of human marketing activities on consumer attitudes combined with positive and negative factors. Factors that positively affect attitudes toward permation marketing were presented, such as informality, and perceived risks were presented as negative impact factors. Also, based on previous prior research, the prior factors of opt-in marketing were to present the effect on purchase intent through the medium of attitude toward opt-in marketing. Results: In this study, we used the framework of a two factor theory to address positive and negative factors as a leading factor in the customer attitude toward opt-in mail advertising, and as a result, functionality and personalization have a positive effect on customer attitude and perceived risk have a negative impact on customer attitude. In addition, it was confirmed that the customer attitude formed this way affects the intention to purchase again. Conclusions: This study suggests that we have demonstrated that marketing, an opt-in marketing that has been recognized as part of marketing that is deployed after obtaining customer consent, has been applied without any other marketing methodology. E-mail advertising at this point also provides practical implications that the system safeguards are in place under an opt-in protocol or system, and that even if an e-mail advertisement is carried out, customers will need to look at the level of awareness about the risks, and suggests that they need to consider the customer's journey that could lead to purchase at the content level.

Freedom of Broadcasting and on the Structure Restricting of Broadcasting in the Constitution (헌법상의 방송의 자유와 방송규제의 법리)

  • Cha, Su-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.164-172
    • /
    • 2008
  • For a long time, the basis of Korea Broadcasting law and regulation system has been center around television, This is not much different from other countries. This study is based on research of Korea Broadcasting law and regulation system. It precludes all doubts that freedom of broadcasting is one of those fundamental human rights that constitute the comer stones of democracy, just as is the case with the press. The objective of this study is to explore the practical meaning and the structure of regulations on the freedom of broadcasting under the Constitutional of the Republic of Korea, From the viewpoint of freedom of expression. For these purposes, this study inqures into the meaning and legal characters of freedom of Korean Constitutional Law, and the structure restricting freedom of broadcasting on the ground of functions and role of broadcasting in our contemporary society, comparing with those of the Unites states of America and the Federal Republic of Germany.

A study on the current status and encouragement of tourist farms around Taegu area (관광농원의 실태 및 활성화에 관한 조사연구 - 대구인근지역 관광농원을 대상으로 -)

  • Lee, Kee-Cheol;Kim, Jae-Kwang
    • Journal of Korean Society of Rural Planning
    • /
    • v.8 no.2 s.16
    • /
    • pp.27-41
    • /
    • 2002
  • This research is written for offering an approach to activate the stagnated industry of the tourist farm through analysis of the current operational problems and situation on some existing tourist farm nominated as such by the authority. There will be some considerations from three different categories : local autonomous groups, tourist farm associations and farm owners. On the other hand, it is assumed that this research can also be utilized as a basic material for activating the tourist farms in the suburban area of Taegu City. The operational problems in the suburban area of Taegu City are as follows : lack of a specialized Product development, the farm operation fund, lack of operational or management ability, lack of public information, etc. There are other Problems regarding law, institution and supporting : complexity of the current system involving all kinds of permission, shortage of financial and taxation supporting, lack of training an expert manpower, lack of ability and cooperation of a deskclerk in charge, etc. Here are some suggestions taking into consideration a respective sector of local autonomous group, tourist farm associations and farm owners for activating the tourist farms in the suburban area of Taegu City. First, a mental turnabout toward a tourist farm is needed from local autonomous groups. The law and institutional base should be arranged while the financial and taxation support is materialized. Second, tourist farm associations should amend or reinforce the existing institution to refresh the current recognition toward the tourist farm through many publicity activities. On the other hand, they should develop the overall tourist farm industry into a better service industry of the rural community by keeping an active system of cooperation with other related groups. Finally, It is advised that they should conceive farms and facilities which can symbolize the tourist farm from the stage of the first construction. In addition to a four-season souvenir development, an effective publicity activity and rational investment management. Above all, they should train themselves in terms of a service spirit before they see the prosperity of the tourist farm community.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Influences of the Residential Environment on the Apartment Remodeling: Involving the Expansion of Households and Dwelling Area

  • Lee, Ji-Eun;Yoon, Young-Ho
    • Land and Housing Review
    • /
    • v.2 no.3
    • /
    • pp.259-268
    • /
    • 2011
  • Space extension and the increase of the number of households are helpful to raise business value of the remodeling through the renovation of apartment houses that is required by residents of new cities and large-scaled apartment. However, in the case of accepting this demand, it could have a bad influence on the landscape of a complex in terms of the structure of apartment houses and the safety of construction and urban planning, and a problem occurs in the aspect of fairness for reconstruction. For the study, the current status related to the remodeling system through laws, related articles since 2000 and research data was analyzed. In addition, the individual quantitative analysis was conducted in the four aspects to judge whether households expansion for remodeling is plausible:1) Statistical data to comprehend the changes of population and social structure 2) Survey data of floor space index and the building-to-land ratio of new cities at the intial stage for the review of the effect of architectural planning and urban environment 3) Surveys of experts on structural safety in order to judge whether the demand of expansion is accepted or not. 4) Quantitative analysis of each item to compare fairness with reconstruction. Therefore, this study is intended to understand problems of the remodeling system that is currently operated. Moreover, it will be further reviewed that the expansion of households is feasible through the permission of expansion and it will be discussed that the revitalization of the apartment remodeling has a positive impact on the residential environment.

A Study on the Necessary Spaces and Area Standards of Integration Facility for Early Childhood Education and Care (영유아 교육·보육 통합시설의 필요 공간과 면적기준에 관한 연구)

  • Cho, Jin Il;Choi, Hyeong Ju
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.17 no.2
    • /
    • pp.22-37
    • /
    • 2018
  • This study suggests desirable disaster safety education curriculum through analyzing the operational status of the school disaster safety management training course and demand survey of school staff. First, the problem of the disaster safety training course of the school is not connected with the lack of law and system and the school disaster safety job. Second, improvement of law and system and variety of training should be made to acquire professional knowledge. Third, it is necessary to divide curriculum into the following four categories, according to educational needs of public officials ; Educational administration officers course focused on facility safety, maintenance and disaster countermeasure. Educational officials in technical post course addressing approval and permission of school facility projects, seismic reinforcement of school building, etc. Educational supervisors course covering roles and responsibilities of the school safety supervisors in the event of disaster. Teaching staffs course focused on safety instructions for students. Fourth, it is found that lectures and experiential learning methods are the most desirable methods of teaching and learning, and the major ranks are earthquake disaster, fire, gas, typhoon, school road, and electrical safety.

A Study on Legal Prospects of Digital Collections' Fair Use: Focused on the Article 31 of Copyright Act (도서관 디지털 장서의 공정이용에 관한 법제도적 고찰 - 「저작권법」 제31조를 중심으로 -)

  • Kim, Su-jin;Kim, You-seung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.3
    • /
    • pp.151-175
    • /
    • 2015
  • The study aims to discuss on legal prospects of digital collections' fair use through an analysis of treaties and legislations domestic and international. Based on analysis of leading researches and literature, it discusses legal principles of fair use and defines digital collections' concept and types. For understanding the actual legal system on fair use, limitations and exceptions of copyrights which are presented in treaties, such as 'Berne Convention for the Protection of Literary and Artistic Works' and'Copyright Convention', each nation's laws, and judicial precedents. Especially, a legal dispute between 'Technische $Universit{\ddot{a}}t$ Darmstadt' and Eugen Ulmer KG, which debates on library's rights for digitizing their collections without the rightholder's permission, is analyzed. As a result, this study analyzes its implications for the improvement of the existing copyright system in Korea.

Reducing Process Time for RFID Tag Identification on the Grid Environment (그리드 환경에서 RFID 태그 판별 시간 절감을 위한 태그 판별 처리)

  • Shin, Myeong-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1049-1056
    • /
    • 2010
  • Recently RFID system has been adopted in various fields rapidly. However, we should solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system. To solve these problems, There is the Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of creasing numbers of Tag. Therefore We, suggest SP-Division algorithm satisfied with all necessary security of Privacy Protection Scheme and decreased in Tag Identification Time in this paper. And this paper implemented it in time standard finding the first key among the data devided into each nodes. The length of Hash-Chain holds 1000, and the total number of SPs increases 1000, 2000, 3000, and 4000. Comparing tag identification time by the total number of SPs and the number of Nodes with single node, extending the number of nodes to 1, 2, 3 and 4, when the number of nodes is 2, 40% of Performance, when the number of nodes is 3, 56%, and when the number of nodes is 4, 71% is improved.

The Adult Guardianship and Medical Issue According to the Amendments of Civil Code (성년후견과 의료 -개정 민법 제947조의 2를 중심으로-)

  • Park, Ho-Kyun
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.125-153
    • /
    • 2012
  • The adult guardianship system has been introduced through amendments of Korean Civil Code for the first time in the March 2011(Act No. 10429, 7. 1. 2013. enforcement). The adult guardianship system has the main purposes to provide a lot of help vulnerable adults and elderly, and protect them on the welfare related with property act, treatment, care, etc. There could be a controversy about whether the protection Legal Guardian's consent(formerly known as the Mental Health Act) or permission of the Family Court(revised Civil Code) are required to, or the Mental Health Act should be revised, when mental patient will be hospitalized forcibly. The author proposes that mental patient with Adult guardians should be determined by Legal Guardian's consent and approval of the Family Court, but mental patient without Adult guardians could be determined by Legal Guardian's consent. The issue of Withdrawing of life-sustaining treatment could be occurred due to the aging society and the development of modern medicine, and this has provided difficult, various problems to mankind in Legal, ethical, and social welfare aspects. The need of Death with dignity law or Natural death law has been reduced for a revision of the Civil Code. Therefore, on the issue of Withdrawing of life-sustaining treatment, in the future, intervention of the court is necessary in accordance with the revised Civil Code Section, and Organ Transplantation Act and the brain death criteria may serve as an important criterion.

  • PDF

A Study for Task Detection Acquiring Abnormal Permission in Linux (리눅스의 비정상 권한 획득 태스크의 탐지방법 연구)

  • Kim, Won-Il;Yoo, Sang-Hyun;Kwak, Ju-Hyun;Lee, Chang-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.427-432
    • /
    • 2014
  • The Purpose of local system attacks is to acquire administrator's(root) privilege shell through the execution of the malicious program or change the flow of the program. This acquiring shell through attack is still valid approach method and it is difficult to cope with improving each of vulnerability because the attacker can select various forms of attack. Linux allocate a set of credentials when login, in order to manage user permissions. Credentials were issued and managed by the kernel directly, and also the kernel ensures that any change cannot be occurred outside of kernel. But, user's credentials that acquired root privilege through system attacks occurs a phenomenon that does not remain consistent. In this paper we propose a security module to detect a security threats that may cause to users and tasks by analysis user task execution and inconsistency credentials.