• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.025 seconds

A Study on the architectural planning through the analysis between the Behavior character of Dementia patient (채매환자의 행태특성 분석을 통한 건축계획에 관한 연구 -시.도립 치매 전문병원 사례를 중심으로-)

  • Kim, Jong-Whan;Kim, Myoung-Keun
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.6 no.2
    • /
    • pp.55-63
    • /
    • 2006
  • The purpose of this study is to analyze the problems in assumption of the distinguished behaviors of hospitalized dementia patients- which can be easily emerged and recognized in senile dementia patients and their distinctive behavior characters in different physical environment per person. Furthermore, it is to suggest a fundamental data to improve physical environment of the different facilities and the design guidelines for reconstruction in terms of the new and therapeutic function of the dementia specialized department. For planning on the dementia specialized hospital, considerablely, security and safety, comfortableness, personal identification of the facility, emotional stability and the proper stimulation for the patients are emphasized according to the research on the frequent and major issues of the patients from their own dwelling place.

  • PDF

An Investigation on Consumer's Internet Shopping Behavior Explained By the Technology Acceptance Model (혁신기술수용모델(TAM)을 응용한 인터넷쇼핑행동 고찰)

  • Koo, Dong-Mo
    • Asia pacific journal of information systems
    • /
    • v.13 no.1
    • /
    • pp.141-170
    • /
    • 2003
  • This study investigates internet shopping behavior of consumers. The rapid growth of the internet shopping markets is solely dependent on the voluntary adoption of internet shopping medium by the personal users. But the studies on this topic are very limited. Based on these facts, this study, recognizing the internet shopping medium as an innovation, studies how consumers understand and use innovative internet shopping medium by applying and extending the technology acceptance model proposed by Davis et. al.(1989). The results of the survey on 947 consumer panel reveal that compatibility, system quality have positive impact on the formation of perceived ease of use. And it is also shown that the perceived ease of use, system quality, and compatibility have positive influence on perceived usefulness, but computer-efficacy has no effect on perceived usefulness. Meanwhile, it is confirmed that perceived usefulness and compatibility have positive effect on attitude toward internet shopping behavior, but perceived ease of use has no effect. In addition, perceived security and social norm, as opposed to the hypotheses, are shown to have no effect on internet shopping behavior. Lastly, applications and related limitations are discussed.

Effects of Training Contents on the Work Effectiveness of Learning Workers in the Software field

  • Yoo, Hang-Suk;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.29-35
    • /
    • 2019
  • In this paper, the effects of educational contents on job behavior, the effects of job behavior on job effectiveness and the effects of educational contents on job effectiveness were studied when working in the Software field. For this purpose, a questionnaire survey was conducted on the learning workers who conducted the training in the IT field, and 302 valid questionnaires were used for the analysis. The research model was set up to test exploratory factor and confirmatory factor analysis and hypothesis, and the research hypothesis was tested by applying structural equation. The effects of job behavior on job effectiveness were positively related to job satisfaction, customer orientation, and organizational commitment.

SCA Advice System: Ontology Framework for a Computer Curricula Advice System Based on Student Behavior

  • Phrimphrai Wongchomphu;Chutima Beokhaimook
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.306-315
    • /
    • 2023
  • This study proposed an SCA advice system. It is an ontology-based recommender that provides advice on appropriate computer curricula based on the behavior of high school students. The three computer curricula at Chiang Mai Rajabhat University include computer science (CS), information technology (IT), and web programming and security (WEB). This study aims to design the ontology framework for an SCA advice system. The system considers three core ontologies: student, computer-curriculum, and advice. After analyzing student behaviors, the behavior types of CS, IT, and WEB were determined to be SB-2, SB-1, and SB-5, respectively. All subjects in these three curricula were analyzed and grouped into seven groups. Their curricula were synthesized in terms of basic skills, basic knowledge, and characteristics. Finally, advice results can be obtained by consolidating the curriculum nature of the CS, IT, and WEB curricula.

Global Changing of Consumer Behavior to Retail Distribution due to Pandemic of COVID-19: A Systematic Review

  • TIMOTIUS, Elkana;OCTAVIUS, Gilbert Sterling
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.69-80
    • /
    • 2021
  • Purpose: Consumers have unique behaviors that are classified based on their interests and considerations before buying. They are predicted will change due to the pandemic of COVID-19. This study provides insights for retailers about the dynamic of consumer behavior before and during the pandemic, including future predictions. Research design, data and methodology: The Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA) statement was applied in this study. Seven studies that were selected from five databases meet the criteria for cohort and cross-sectional analyses of gender, age, store types, and environmental concerns. Results: Consumer's gender and age contribute to consumer behavior change. Both offline and online stores can be integrated as omnichannel rather than substitute each other. Product distribution and consumer budget need to be reevaluated by retailers, while internet security is the most essential factor when developing their online transactions. Conclusions: COVID-19 pandemic has a significant impact on changing consumer behavior in most countries. Retailers are encouraged to adapt to the changes by modifying their business model with technology. However, it is still speculated and cannot be generalized due to different cultural and contextual factors. Future studies are always needed to synchronize along with the transition of consumers' behavior.

The Influence of E-commerce Logistics Service Quality on Customer Engagement Behavior

  • Dongxu ZHANG;Zhuoqi TENG;Mufeng LI;Renhong WU
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.2
    • /
    • pp.1-11
    • /
    • 2023
  • Purpose: With the rapid development of e-commerce, logistics services, as an important part of e-commerce shopping, have gradually attracted people's attention. Customer engagement behavior is a new topic in marketing, and its connotation is still being explored. The purpose of this paper is to study the relationship between logistics service quality and customer engagement behavior. Research design, data and methodology: This study employed the method of online questionnaire survey, with Chinese e-commerce platform users as the survey objects, 248 valid survey sample data were collected, and the method of factor analysis and structural equation model analysis was used to verify the research hypothesis model constructed in this paper. Results: The four dimensions of e-commerce logistics service quality have different influences on customer satisfaction, and the influence of availability on customer satisfaction is not significant. Convenience, assurance, and security have a significant positive impact on customer satisfaction; Customer satisfaction has a significant positive impact on the three dimensions of customer engagement behavior: customer repeat purchase behavior, online word-of-mouth, and customer referrals. Conclusion: The results of this study will provide useful reference for the managers of e-commerce companies to improve customer engagement behavior by improving the logistics service quality.

The Detection System for Hosts infected Malware through Behavior information of NAC post-connect (NAC 의 post-connect에서 행위정보를 사용한 악성코드 감염 호스트 탐지 시스템)

  • Han, Myung-Mook;Sun, Jong-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.91-98
    • /
    • 2010
  • NAC(Network Access Control) has been developed as a solution for the security of end-point user, to be a target computer of worm attack which does not use security patch of OS and install Anti-Virus, which spreads the viruses in the Intra-net. Currently the NAC products in market have a sufficient technology of pre-connect, but insufficient one of post-connect which detects the threats after the connect through regular authentication. Therefore NAC users have been suffered from Zero-day attacks and malware infection. In this paper, to solve the problems in the post-connect step we generate the normal behavior profiles using the traffic information of each host, host information through agent, information of open port and network configuration modification through network scanner addition to authentication of host and inspection of policy violation used before. Based on these we propose the system to detect the hosts infected malware.

  • PDF

Examining Driver Compliance Behaviour at Signalised Intersection for Developing Conceptual Model of Driving Simulation

  • Osman, Aznoora;Wahab, Nadia Abdul;Fauzi, Haryati Ahmad;Ibrahim, Norfiza;Ilyas, Siti Sarah Md;Seman, Azmi Abu
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.163-171
    • /
    • 2022
  • A conceptual model represents an understanding of a system that is going to be developed, which in this research, a driving simulation software to study driver behavior at signalised intersections. Therefore, video observation was conducted to examine driver compliance behaviour within the dilemma zone at signalised intersection, pertaining to driver's distance from the stop line during yellow light interval. The video was analysed using Thematic Analysis and the data extracted from it was analysed using Chi-Square Independent Test. The Thematic Analysis revealed two major themes which were traffic situation and driver compliance behaviour. Traffic situation is defined as traffic surrounding the driver, such as no car in front and behind, car in front, and car behind. Meanwhile, the Chi-Square Test result indicates that within the dilemma zone, there was a significant relationship between driver compliance behaviour and driver's distance from the stop line during yellow light interval. The closer the drivers were to the stop line, the more likely they were going to comply. In contrast, drivers showed higher noncompliant behavior when further away from stop line. This finding could help us in the development of conceptual model of driving simulation with purpose of studying driver behavior.

Multi-Behavior Analysis Based on Google Archiving Data (구글 아카이빙 데이터 기반 멀티 행위 분석)

  • Yeeun Kim;Sara Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.737-751
    • /
    • 2023
  • The importance of digital forensics in the cloud environment is increasing as businesses and individuals move their data from On-premise to the cloud. Cloud data can be stored on various devices, including mobile devices and desktops, and encompasses a variety of user behavior artifacts, such as information generated from linked accounts and cloud services. However, there are limitations in securing and analyzing digital evidence due to environmental constraints of the cloud, such as distributed storage of data and lack of artifact linkage. One solution to address this is archiving services, and Google's Takeout is prime example. In this paper, user behavior data is analyzed for cloud forensics based on archiving data and necessary items are selected from an investigation perspective. Additionally, we propose the process of analyzing selectively collected data based on time information and utilizing web-based visualization to meaningfully assess artifact associations and multi-behaviors. Through this, we aim to demonstrate the value of utilizing archiving data in response to the increasing significance of evidence collection for cloud data.

The Influence of Information Security Techno-stress and Organizational Justice on Compliance Intention: Focusing on the Theory of Planned Behavior (정보보안 기술 스트레스와 조직 공정성이 준수 의도에 미치는 영향: 계획된 행동이론을 중심으로)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.4
    • /
    • pp.741-752
    • /
    • 2024
  • Organizations amplify their information security (IS) technical investments as the demand for IS escalates. This research suggests conditions for enhancing insider compliance with IS, focusing on the potential for behavior modification through techno-stress and organizational justice, based on the theory of planned behavior. To test the proposed hypothesis, this study utilized a survey methodology on 383 employees from companies with implemented IS. The test results showed that IS techno-stress (overload and uncertainty) caused by reduced attitudes of employees, and organizational justice increased subjective norms, influencing IS compliance intentions along with self-efficacy. Additionally, organizational justice has been found to alleviate the adverse effects of IS overload and uncertainty on attitudes. The findings are expected to help clarify measures for achieving IS performance within the organization by proposing organizational justice conditions to improve the negative IS environment of the organization.