• 제목/요약/키워드: Quality of Security Service

검색결과 470건 처리시간 0.025초

아이돌보미 시범사업평가 및 정책방향 (Evaluation the Childcarer(IDOLBOMI) Demonstration Service and Policy Direction)

  • 변미희;강기정;정희정
    • 가족자원경영과 정책
    • /
    • 제11권2호
    • /
    • pp.67-83
    • /
    • 2007
  • The purpose of this study was to evaluate the childcare support demonstration services and direct policy. The participants for the study were three childcare (IDOLBOMI), three parents who were provided with IDOLBOMI, two practitioners, and three professors related to IDOLBOMI. The data was collected by interview and a phone survey and analyzed qualitatively. The results and several suggestions were follows: First, IDOLBOMI loved to take care of children, felt proud of the job, and thought the work was worthy. The result can help future IDOLBOMI when they are recruited and trained; Second, IDOLBOMI wanted income security at least, which means that the basic activity fee for the IDOLBOMI should be compensated by government; Third, most of the parents who experienced the service were generally satisfied with that, but they wanted the quality of nutrition, hygiene and the quality of play to be developed for children. Therefore, the management of the center and maintenance of education are needed constantly for the IDOLBOMI system; Fourth, the parents who needed the service thought the cost of IDOLBOMI was expensive. Expenditure support should be sought for the parents; Finally, the group of professionals had difficulty in securing the quality of childcare support services. For the future, it is necessary to increase the educational budget, manpower resources, and PR budget for IDOLBOMI.

  • PDF

저가항공사의 웹 사이트 서비스 품질이 고객 충성도에 미치는 영향 연구 (The Study of the Influence of Low Cost Carriers' Web site Service Quality on Customer Loyalty)

  • 현혜원;서명선
    • 한국항공운항학회지
    • /
    • 제23권1호
    • /
    • pp.103-112
    • /
    • 2015
  • In this study, a study was carried out to see what influence low-cost carrier's e-service quality has on low-cost carrier customers' perceived value and customer satisfaction and what impact the results have on customer loyalty based on the results of previous studies related to e-SERVQUAL, an e-SERVQUAL measurement model for general e-commerce. In addition, a survey of consumers who have experienced using low-cost carrier experience through web sites was conducted. For the analysis of the data collected, SPSS 18.0 was used to conduct frequency analysis, factor analysis, reliability analysis, correlation analysis, and regression analysis and thus to test a hypothesis. Research findings showed that perceived value and customer satisfaction are closely related to customer loyalty, and it was also observed that the reliability factor on the service provided on the web site acts as an important influencing factor for customer loyalty in the perceived value and security factors such as payment by credit cards and protection of personal information serve as important one in terms of customer satisfaction. This study has its limitation in that samples of users who have experienced low-cost carrier are concentrated on specific ages and professions. In the future, it is required to conduct further studies on whether difference is made on the importance of measurement factors related to e-service quality by gender, age group, occupation, and e-service quality.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

소셜 커머스 고객 만족에 영향을 미치는 요인에 관한 연구 (On the Factors that Affect Customers' Satisfaction in Social Commerce)

  • 최성호;이상용
    • 지식경영연구
    • /
    • 제15권2호
    • /
    • pp.165-182
    • /
    • 2014
  • Social commerce is regarded as a kind of e-commerce that utilizes social media. Considering increasing complaints around social commerce market, it is important to see customers' satisfaction level and intentions to repurchase. In this study, we examine antecedents that affect customers' satisfaction and relationship between satisfaction and intention to repurchase in social commerce market. We also use social media characteristics as moderators between antecedents and customers' satisfaction. The main results are as follows. First, except site design, most of the intrinsic factors of service quality, such as information, transaction, communication and perceived security had positive effects on customers' satisfaction. Second, all the extrinsic factors of service quality, such as discount rate, constraints, and discrimination had significant impacts on customers' satisfaction. Third, the social media characteristics could not moderate the relationship between service qualities and customers' satisfaction. Fourth, customers' satisfaction had positive effect on the intention to spread through social media. Fifth, customers' satisfaction had positive effect on the intention to repurchase. Social commerce companies need to set up strategies considering the antecedents of customers' satisfaction using these research results. They also need to secure customers that have sustainable purchasing intentions.

  • PDF

NGN에서의 개방형 IPTV 서비스 (Open IPTV Services over NGN)

  • 박효진;배영인;최준균
    • 대한임베디드공학회논문지
    • /
    • 제3권4호
    • /
    • pp.198-206
    • /
    • 2008
  • Internet protocol television (IPTV), one of the most emerging services, offers multimedia streaming services with security, reliability, and relevant quality of service (QoS)/quality of experience (QoE). It provides added values to all the involving players and also brings technical and business challenges to them. For IPTV services, we expect to adopt the next generation network (NGN) environment for high quality and the Web technologies for personalization to meet the customer's necessity. Web can provide an open, flexible, and agile platform. Therefore, in this paper, we propose personalized IPTV services based on Web-based open platform in NGN environment and present functional architecture for Web-based personalized IPTV services. Technical issues for deploying the proposed IPTV services using Web are also provided. The objective of this paper is to analyze the critical architectural issues for developing viable and feasible networking platform models for personalized IPTV services.

  • PDF

RFID/USN 정보보호 기술

  • 김광조
    • TTA 저널
    • /
    • 통권95호
    • /
    • pp.70-77
    • /
    • 2004
  • 자동화되고 손쉽게 정보를 얻을 수 있는 RFID/USN 환경에서는 보안에 심각한 위협을 가져오며, 반대로 RFID 등의 제약된 자원에 의해 기존 정보보호 기법을 그대로 사용하기 어렵게 된다. 따라서 새로운 경량화 정보보호 기법이 연구되고 있으며, 또한 QoSS(Quality of Security Service)를 통해 제약된 자원의 활용도를 최대화 시키고자 하는 연구가 진행 중이다. 본고에서는 이러한 연구 동향에 대해 소개한다.

  • PDF

웹 서비스 품질에 기반한 e-비즈니스 운영 모델 (An e-Business Operational Model Based on Web Services Quality)

  • 조광문
    • 한국산학기술학회논문지
    • /
    • 제10권10호
    • /
    • pp.2728-2732
    • /
    • 2009
  • 최근 기업간 비즈니스 로직의 구현에 웹 서비스를 이용하고 응용 간 통신 및 상호 응용의 사례가 많아지고 있다. 이를 위한 기업 내의 기반 시스템 구축에도 웹 서비스의 이용이 활발해지고 있다. 이에 따라 효율적인 비즈니스의 운영 모델에 대한 요구가 많아지고 있다. 또한 다양해지는 웹 서비스 중에서 적정 수준의 서비스 품질을 보장해 주는 서비스의 사용이 요구되고 있다. 본 논문에서는 이를 위하여 웹 서비스에 관련된 내용을 분석하고, 기업의 특성상 요구되는 보안 및 서비스 품질에 대한 분석을 통하여 기업 비즈니스 환경에 적용할 수 있는 e-비즈니스 운영 아키텍처를 제안하였다.

전자상거래에서의 인증 알고리즘에 관한 연구 (A Study of Authentication Algorithm in Electronic Commerce)

  • 김영선
    • 경영과정보연구
    • /
    • 제6권
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

Joint Beamforming and Jamming for Physical Layer Security

  • Myung, Jungho;Heo, Hwanjo;Park, Jongdae
    • ETRI Journal
    • /
    • 제37권5호
    • /
    • pp.898-905
    • /
    • 2015
  • In this paper, we consider a joint beamforming and jamming design to enhance physical layer security against potential multiple eavesdroppers in a multiple-input and single-output cellular broadcast channel. With perfect channel state information at the base station, we propose various design approaches to improve the secrecy of the target user. Among the proposed approaches, the combined beamforming of maximum ratio transmission and zero-forcing transmission with a combination of maximum ratio jamming and zero-forcing jamming (MRT + ZFT with MRJ + ZFJ) shows the best security performance because it utilizes the full transmit antenna dimensions for beamforming and jamming with an efficient power allocation. The simulation results show that the secrecy rate of this particular proposed approach is better than the rates of the considered conventional approaches with quality-of-service and outage probability constraints.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.