• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.031 seconds

The Impact of Multi-dimensional Trust for Customer Satisfaction

  • Choi, Jae-Won;Sohn, Chang-Soo;Lee, Hong-Joo
    • Management Science and Financial Engineering
    • /
    • v.16 no.2
    • /
    • pp.81-97
    • /
    • 2010
  • Trust is one of the most important aspects of the relationship between retailers and consumers in e-commerce. Users may have concerns about transaction security or personal information leakage when they engage in transactions over the Internet. It can be difficult to attract customers if the retailers or service providers cannot establish trust with their customers. There have been many studies of trust-building mechanisms between customers and e-storefronts. However, little work has been done on identifying the relationships between customer satisfaction, purchase intention, and trust. In addition, trust building occurs in the pre- and post-purchase phases of an e-commerce transaction, as well as gradually over repeated transactions. Thus we distinguish between cue-based trust and experience-based trust. The objective of this study was to explain the impact of trust on customer satisfaction and purchase intention in relation to e-commerce sites from the perspective of a multi-dimensional concept of trust. We surveyed 350 undergraduate students and obtained 331 responses for analysis. The result of our analysis showed that cue-based trust has a positive relationship with trust based on experience. Although the two concepts of trust have positive relationships with satisfaction, the path coefficient of trust based on experience was higher than that of cue-based trust. In addition, the purchase intention mediates the relationship between cue-based trust and experience-based trust.

A Case Study on Uniform Design Development -Focused on F Distribution Enterprise- (기업의 유니폼 디자인 개발 연구 -F 유통업체 사례를 중심으로-)

  • Kim Zang-Mi;Park Hye-Won
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.5 s.104
    • /
    • pp.75-88
    • /
    • 2006
  • The conception of uniform is changing from function and economical efficiency of the past to symbolism and aesthetic sense So, in such a management strategical point of view as enterprises' PR, scouting talent, organization revitalization etc, this is required to settle uniform culture which is proper to each enterprise and design development. The purpose of this thesis is, first, to study to help distribution enterprises' CI or PR by examining the present condition of uniform design in domestic fashion distribution enterprise and planning uniform design on the base of real case and finally making a real thing in person. Second is to suggest to fashion enterprise security of competitive ability of uniform-producing enterprise by developing article design of worth. Third is to present academic area with how to do design education in a wide range not based on trend article development. Following is how and what to study to carry out these purposes. Details about necessity and how and what to study are in an introduction, the conception of uniform in theory through precedential records examination in chapter 2, the present condition of uniform design based on Changwon city in chapter 3, planning uniform design and making a real thing suitable for F enterprise in chapter 4, and the conclusion is in chapter 5. Through this study, I became to know that uniform in distribution enterprise who treats visitors face to face is very important. I supply material and information concluded from this study to uniform industry and hope this will be helpful in developing uniform. It is significant in that this study as being related with enlarged uniform and enterprise, beyond such a uniform area as school uniform and hospital one, expanded the study range of clothing. I already tell you that this study is based on visual expression of uniform and wearer's feeling in clothes is not included.

Exploring Spatial Distribution of Empty Houses and Vacant Land Due to Population Decrease in Mokpo (인구 감소 현상에 따른 목포시 빈집 및 공지의 공간적 분포 전망)

  • Jo, Young-Woo;Choi, You-Bin;Park, Chan
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.33-47
    • /
    • 2020
  • With population losses and stagnant or depressed economies, the local governments embrace shrinkage and accept having a significantly smaller population. Both the initial and ongoing causes of shrinkage hold dramatic effects on the city and its remaining residents. In this context, vacant land increases as an overabundance of unused infrastructure is demolished and municipalities become burdened with increasing maintenance costs of this land. The result is that vacant land often experiences minimal management relative to social norms and have chance to provide a setting for ecological processes with urban rightsizing strategy. Therefore, urban ecosystems undergo major shifts in structure and function. We need to better understand the possibilities of where and how much of houses and land will be abandoned to assist land planners and policymakers to mitigate conflict between optimal ecological and sociological outcomes. This article, therefore, aims to identify distributional characteristics of vacant houses and lands with case study of Mokpo. The study found and verified affecting factors of vacant houses and lands by type through the use of a Maxent model and spatial data that explained housing choice and preference theory. We can predict the vacancies with the spatial variables such as land price, the population ratio over 65, and the distance from security facility. Based on the analysis, the ways of managing housing and land vacancy for sustainable development and ecological restoration method are discussed.

Attribute-based authentication scheme in IPTV broadcasting system (IPTV 방송 시스템에서의 속성기반 사용자 인증 기법)

  • Lee, Ji-Seon;Kim, Hyo-Dong
    • Journal of Broadcast Engineering
    • /
    • v.14 no.3
    • /
    • pp.280-287
    • /
    • 2009
  • An IPTV (Internet Protocol Television) technology is the new convergence technology of the telecommunication and broadcasting which provides various bidirectional TV services. To provide these services only to legal subscribers, mutual authentication between set-top box connected with TV set and the smart card owned by a subscriber is needed. In this paper, we propose an attribute-based mutual authentication scheme that only someone who is satisfied with some attributes, such as titles or departments, can access the contents provided by the IPTV service in an organization. We also show that the proposed scheme is secure. Our proposed scheme has a virtue that user can access various services, provided by an organization where he/she belongs to, according to their attributes with only one time registration. As far as we know, this is the first attribute-based authentication scheme which can be applied to any organizations in IPTV environments.

Factor Analysis of the Defense Industry Environment affecting Defense Industry Company's Business Performance (방위산업체의 경영성과에 미치는 방위산업 환경의 영향요인분석)

  • Lee, Janghyong;Kim, Dong-Hwi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.9
    • /
    • pp.5534-5542
    • /
    • 2014
  • The defense industry plays a larger role than merely maintaining national security; it also has ripple effects in society, such as employment growth through increased domestic demand and advancement of industrial structures. In this study, the factors affecting the defense industry were divided into military support and government support. Previous research dealing with the correlation of management of the defense industry and each of these important factors was then investigated and analyzed. These results are believed to contribute to growth of the defense industry through building an environment that positively affects the defense industry's growth, profitability and productivity, and achieves higher business performance.

An Efficient MAC Unit for High-Security RSA Cryptoprocessors (고비도 RSA 프로세서에 적용 가능한 효율적인 누적곱셈 연산기)

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.778-781
    • /
    • 2007
  • RSA crypto-processors equipped with more than 1024 bits of key space handle the entire key stream in units of blocks. The RSA processor which will be the target design in this paper defines the length of the basic word as 128 bits, and uses an 256-bits register as the accumulator. For efficient execution of 128-bit multiplication, 32b*32b multiplier was designed and adopted and the results are stored in 8 separate 128-bit registers according to the status flag. In this paper, an efficient method to execute 128-bit MAC (multiplication and accumulation) operation is proposed. The suggested method pre-analyze the all possible cases so that the MAC unit can remove unnecessary calculations to speed up the execution. The proposed architecture protype of the MAC unit was automatically synthesized, and successfully operated at 20MHz, which will be the operation frequency in the target RSA processor.

  • PDF

Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable (해커들의 심리변인에 기반한 탈선적 해킹활동 및 해킹타입 예측 모델)

  • Park, Chan Hyun;Song, In Uk;Kim, Min Ji;Chang, Eun Hee;Heo, Jun;Kim, Hyun Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.489-498
    • /
    • 2016
  • Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.

Data Volume based Trust Metric for Blockchain Networks (블록체인 망을 위한 데이터 볼륨 기반 신뢰 메트릭)

  • Jeon, Seung Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.65-70
    • /
    • 2020
  • With the appearance of Bitcoin that builds peer-to-peer networks for transaction of digital content and issuance of cryptocurrency, lots of blockchain networks have been developed to improve transaction performance. Recently, Joseph Lubin discussed Decentralization Transaction per Second (DTPS) against alleviating the value of biased TPS. However, this Lubin's trust model did not enough consider a security issue in scalability trilemma. Accordingly, we proposed a trust metric based on blockchain size, stale block rate, and average block size, using a sigmoid function and convex optimization. Via numerical analysis, we presented the optimal blockchain size of popular blockchain networks and then compared the proposed trust metric with the Lubin's trust model. Besides, Bitcoin based blockchain networks such as Litecoin were superior to Ethereum for trust satisfaction and data volume.

A Study on the Information System Operation Plan for the Mobile Environments Construction (모바일 환경 구축을 위한 정보시스템 운영방안에 대한 연구)

  • Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.4 no.2
    • /
    • pp.21-35
    • /
    • 2014
  • The mobile environment which is based on the Internet is expanding the area of the web information systems. The mobile Internet is expanding mobile content and services due to the development of wireless network technology, the proliferation of smart terminal devices, and the emergence of a variety of mobile services platforms. A mobile web is to access to the Internet service using a mobile network or other wireless network using a smart phone or a mobile device. Recently, it is to increase the smart phone usage rapidly in the country, and many companies is entering the mobile market. There are increasing need for this operation plan of a mobile web information system. In this paper, we compared the COBIT, ITIL, the SLA, which are the International Information Systems operation standards, and the information system operation standards of Korea Information Security Agency. We analyzed the suitability of the mobile environment and information system operating instructions, and we compared mobile web, operating environments and the ITIL V3.

  • PDF

A Study on the Web Service Quality and User Satisfaction at Open Market (오픈마켓의 웹서비스 품질과 사용자 만족)

  • Son, Yong-Shim;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.113-127
    • /
    • 2013
  • The open market are expanding service quality which was used as rating scale in the field of marketing. In accordance with open market, they convert it to e-service quality and use it. Udo et al.[6] suggested web service quality combining e-SEVQUAL[2] and extended Information Success Model[7]. This study suggests four influence factors of e-service quality in the open market; website privacy and security, web site contents, web site convenience, and images of the open market companies. The study conducted survey on 301 college students and life long education center students in Busan. The study found that all four influence factors have positive effects on the web service quality and ultimately web service quality has beneficial effects on the satisfaction in open market users' information system.