• Title/Summary/Keyword: School security

Search Result 3,327, Processing Time 0.035 seconds

A Study on the Determinants of Consumer Trust toward Internet-Only Banks (인터넷전문은행의 신뢰 결정요인 연구)

  • Nam, Sang-Wook
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.157-162
    • /
    • 2018
  • The purpose of this study is to evaluate the level of trust by financial consumers and attempt to investigate the determinants that influence consumer trust in internet-only banks. For this aim, I conducted an empirical study and the survey results was used to test a structural equation model that analyzed the financial consumer trust and estimated the level of trust for internet-only banks. As a result of the analysis, the three most effective determinants of trust were security, convenience and benefit. Also, the level of financial consumer trust for the internet-only banks, based on the three factors, was later extended to relationship commitment such as renewal and recommendation intentions. Therefore, Internet-only banks need to focus on promoting their trust more effectively for future sustainable growth.

A Study on the Effects of Quality Characteristics of Online Environment-Friendly Agricultural Products Shopping Malls affecting Customer Trust and Purchase Intention

  • PARK, Duk-Gun;SHIN, Choung-Seob
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.8 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • Purpose - This study is to classify quality characteristics of online environment-friendly agricultural products shopping malls into 6 categories and to empirically test their relationship with customer trust, perceived manageability, perceived utility and purchase intention. Research design, data, and methodology - This study targeted adults who have purchased ecofriendly agricultural production online malls for 4 weeks from September 3 to September 30, 2019. The survey type used was a structuralized self-report survey questionnaire made to meet the research purpose in 2019 as the time range. Out of 800 questionnaires, 500 copies are used after excluding surveys with insincere responses. Results - First, results to hypothesis 1, which was about independent variables and customer trust. Analysis showed that health, familiarity, platform reputation, reviews and product quality were found to have significant effect on customer trust; the hypothesis was adopted. On the other hand, system security did not affect customer trust significantly; it was rejected. Second, customer trust was shown to have significant effect on perceived manageability and perceived utility, so the hypothesis was adopted. Third, the hypothesis that perceived manageability moves onto perceived utility was adopted. Moreover, the hypothesis that perceived manageability moves onto purchase intention and the hypothesis that perceived utility moves onto purchase intention were adopted as well. Conclusions - Furthermore, the results of the study imply that it's imperative for online environment-friendly agricultural products shopping malls to consider their characteristics as the means to increase purchase intention of customers.

A Finite field multiplying unit using Mastrovito's arhitecture

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.925-927
    • /
    • 2005
  • The study is about a finite field multiplying unit, which performs a calculation t-times as fast as the Mastrovito's multiplier architecture, suggesting and using the 2-times faster multiplier architecture. Former studies on finite field multiplication architecture includes the serial multiplication architecture, the array multiplication architecture, and the hybrid finite field multiplication architecture. Mastrovito's serial multiplication architecture has been regarded as the basic architecture for the finite field multiplication, and in order to exploit parallelism, as much resources were expensed to get as much speed in the finite field array multipliers. The array multiplication architecture has weakness in terms of area/performance ratio. In 1999, Parr has proposed the hybrid multipcliation architecture adopting benefits from both architectures. In the hybrid multiplication architecture, the main hardware frame is based on the Mastrovito's serial multiplication architecture with smaller 2-dimensional array multipliers as processing elements, so that its calculation speed is fairly fast costing intermediate resources. However, as the order of the finite field, complex integers instead of prime integers should be used, which means it cannot be used in the high-security applications. In this paper, we propose a different approach to devise a finite field multiplication architecture using Mastrovito's concepts.

  • PDF

The Status and Features of the DMZ Forested Wetlands Fauna - Focusing on the Kyongui Line in Paju - (DMZ 산림습지의 식생 현황과 특성에 관한 연구 - 파주 경의선 지역을 중심으로 -)

  • Park, Mi-Young;Cho, Dong-Gil;Kim, Kwi-Gon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.8 no.5
    • /
    • pp.28-38
    • /
    • 2005
  • The De-militarized Zone(DMZ) on the Korean Peninsula is ecologically conserved and naturally developed as access to the area has been controlled in the past five decades. As a result, biodiversity and wetlands are developed very well, but they have not been sufficiently surveyed due to land mines and security reasons. Focusing on the Kyongui Line area in Paju DMZ, this study aims at examining the status of forested wetlands in detail through an on-site survey and understanding the features of forested wetlands in DMZ. The forested wetlands of Paju Kyongui Line area are inhabited by naturally grown Salix koreensis Andress. and Acer ginnale Maxim. and affected by Sacheon Basin region extensively. As the topography of this region is created of inundated area and gentle ground, it is easily affected by hydrology and irrigation and has ideal conditions as forested wetlands. In addition, forest wetlands in this area were used as agricultural land in the past but now transformed into palustrine forested wetlands after being deserted for long time. However, as construction of roads and railways increasingly blocks water paths, the coverage of Robinia pseudoacacia L. and Amorpha fruticosa L. is on the rise, which indicates that forestedwetlands are gradually becoming inland over time.

Tangible Tele-Meeting in Tangible Space Initiative

  • Lee, Joong-Jae;Lee, Hyun-Jin;Jeong, Mun-Ho;Jeong, SeongWon;You, Bum-Jae
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.762-770
    • /
    • 2014
  • Tangible Space Initiative (TSI) is a new framework that can provide a more natural and intuitive Human Computer Interface for users. This is composed of three cooperative components: a Tangible Interface, Responsive Cyber Space, and Tangible Agent. In this paper we present a Tangible Tele-Meeting system in TSI, which allows people to communicate with each other without any spatial limitation. In addition, we introduce a method for registering a Tangible Avatar with a Tangible Agent. The suggested method is based on relative pose estimation between the user and the Tangible Agent. Experimental results show that the user can experience an interaction environment that is more natural and intelligent than that provided by conventional tele-meeting systems.

Stereo 3 mm Millimeter Wave Imaging for Distance Estimation to Concealed Objects (스테레오 3mm 밀리미터파 영상을 이용한 은닉물체의 거리추정에 관한 연구)

  • Yeom, Seokwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.1
    • /
    • pp.21-24
    • /
    • 2017
  • Passive millimeter wave (MMW) imaging penetrates clothing to detect concealed objects. The distances extraction to the concealed objects is critical for the security and defense. In this paper, we address a passive stereo 3 mm MMW imaging system to extract the longitudinal distance to the concealed object. The concealed object area is segmented and extracted by the k-means clustering algorithm with splitting initialization. The distance to the concealed object is estimated by the corresponding centers of the segmented objects. In the experimental two pairs (each pair for horizontal and vertical polarization) of stereo MMW images are obtained to estimate distances to concealed objects.

  • PDF

Node.js Module Vulnerability Analysis: Based on AST and CFG (AST 와 CFG 에 기반한 Node.js 모듈 취약점 분석)

  • Kim, Hee Yeon;Oh, Ho Kyun;Kim, Ji Hoon;You, Jaewook;Shin, Jeong Hoon;Kim, Kyounggon
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.475-478
    • /
    • 2019
  • 웹어플리케이션의 발전에 따라 자바스크립트 런타임 플랫폼인 Node.js 의 사용도 증가하고 있다. 개발자들은 Node.js 의 다양한 모듈을 활용하여 프로그래밍을 하게 되는데, Node.js 모듈 보안의 중요성에 비하여 모듈 취약점 분석은 충분히 이루어지지 않고 있다. 본 논문에서는 소스코드의 구조를 트리 형태로 표현하는 Abstract Syntax Tree 와 소스코드의 실행 흐름 및 변수의 흐름을 그래프로 나타내는 Control Flow Graph/Data Flow Graph 가 Node.js 모듈 취약점 분석에 효율적으로 활용될 수 있음을 서술하고자 한다. Node.js 모듈은 여러 스크립트 파일로 나누어져 있다는 점과 사용자의 입력이 분명하다는 특징이 있다. 또한 자바스크립트 언어를 사용하므로 선언된 변수들의 타입에 따라 적용되는 범위인 scope 가 다르게 적용된다는 특징이 있다. 본 논문에서는 이러한 Node.js 모듈의 특징을 고려하여 Abstract Syntax Tree 및 Control Flow Graph/Data Flow Graph 을 어떻게 생성하고 취약점 분석에 활용할 것인지에 대한 방법론을 제안하고, 실제 분석에 활용할 수 있는 코드 구현을 통하여 구체화시키고자 한다.

Residential Environment Satisfaction of One-person Households : Focused on Young (19-39) Women in Korea

  • KIM, Sun-Ju
    • The Journal of Economics, Marketing and Management
    • /
    • v.9 no.6
    • /
    • pp.15-24
    • /
    • 2021
  • Purpose: The purpose of this study is to analyze the residential environment satisfaction of young women's one-person households and the characteristics of young one-person households, and to present policy implications for their housing problems. Research design, data, and methodology: This study used 11th Korea Financial Panel Data. Analysis methods in this study include basic statistical analysis, frequency analysis, multiple regression analysis, and artificial neural network analysis. Results: As a result of the analysis of this study, 1) young one-person households showed that women had higher ratios of non-regular workers, real estate debt than men, and lower average income. The percentage of young people owning their own homes was very low at about 5%. 2) For young women, the higher the education level and monthly consumption, the lower the housing satisfaction. 3) Young women living in rental housing had lower housing satisfaction than their own. Conclusions: Women are paying more for housing security than men in young one-person households. In addition, the proportion of their own houses is very low. Therefore, there is a need for a policy on the housing safety issue of young women's one-person households. And policies to support young one-person households to own their own homes are required.

Factors Affecting Job Satisfaction of Cybersecurity Workforce: Focused on the Recent College Graduates (정보보호인력의 직무만족에 관한 연구 : 대졸 초기경력자를 중심으로)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.20 no.4
    • /
    • pp.53-68
    • /
    • 2021
  • Many organizations try to hire and retain a well-trained workforce to get their security level of IT assets and networks. However, most academic studies have focused on only how many workforces are needed to keep the secure function. We have to transit to other aspects of cybersecurity HRM studies because well-training workforces are not the problem of numbers but the quality. This study proves how the person-job fit and the work values impact job satisfaction of the cybersecurity workforce in early careers who graduated school recently and have a high turnover intention. The results of this study provide a lot of practical implications regarding job satisfaction of the cybersecurity workforce in an early career as follows. First, the major-job fit of the cybersecurity workforce doesn't influence job satisfaction, unlike other studies. Second, what graduates learned in college is little helpful in hands-on work, so retraining the cybersecurity workforce in an early career is very important. Third, the cybersecurity HRM plans have to center on realizing the self-realization of workforces to improve job satisfaction.

UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments

  • Tao, Dehao;Yang, Zhen;Qin, Xuanmei;Li, Qi;Huang, Yongfeng;Luo, Yubo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2849-2864
    • /
    • 2021
  • The emerging of cloud data sharing can create great values, especially in multi-cloud environments. However, "data island" between different cloud service providers (CSPs) has drawn trust problem in data sharing, causing contradictions with the increasing sharing need of cloud data users. And how to ensure the data value for both data owner and data user before sharing, is another challenge limiting massive data sharing in the multi-cloud environments. To solve the problems above, we propose a Uniform Encoding and Parsing Framework (UEPF) with blockchain to support trustworthy and valuable data sharing. We design namespace-based unique identifier pair to support data description corresponding with data in multi-cloud, and build a blockchain-based data encoding protocol to manage the metadata with identifier pair in the blockchain ledger. To share data in multi-cloud, we build a data parsing protocol with smart contract to query and get the sharing cloud data efficiently. We also build identifier updating protocol to satisfy the dynamicity of data, and data check protocol to ensure the validity of data. Theoretical analysis and experiment results show that UEPF is pretty efficient.