• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.03 seconds

Blockchain Framework for Occupant-centered Indoor Environment Control Using IoT Sensors

  • Jeoung, Jaewon;Hong, Taehoon;Jung, Seunghoon;Kang, Hyuna;Kim, Hakpyeong;Kong, Minjin;Choi, Jinwoo
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.385-392
    • /
    • 2022
  • As energy-saving techniques based on human behavior patterns have recently become an issue, the occupant-centered control system is adopted for estimating personal preference of indoor environment and optimizing environmental comfort and energy consumption. Accordingly, IoT devices have been used to collect indoor environmental quality (IEQ) data and personal data. However, the need to safely collect and manage data has been emerged due to cybersecurity issues. Therefore, this paper aims to present a framework that can safely transmit occupant-centered data collected from IoT to a private blockchain server using Hyperledger fabric. In the case study, the minimum value product of the mobile application and smartwatch application was developed to evaluate the usability of the proposed blockchain-based occupant-centered data collection framework. The results showed that the proposed framework could collect data safely and hassle-free in the daily life of occupants. In addition, the performance of the blockchain server was evaluated in terms of latency and throughput when ten people in a single office participated in the proposed data collection framework. Future works will further apply the proposed data collection framework to the building management system to automatically collect occupant data and be used in the HVAC system to reduce building energy consumption without security issues.

  • PDF

Why Consumers Use Mobile Commerce? - International Comparative Study of M-Commerce Model

  • Han, Sang-Lin;Nguyen, T.P. Thao;Nguyen, V. Anh
    • Asia Marketing Journal
    • /
    • v.18 no.3
    • /
    • pp.65-88
    • /
    • 2016
  • Development of information and communication technology is changing commerce environment and consumer purchasing behavior has also been changed. Globalization is becoming increasingly prevalent in the world today and many factors such as culture, politics, and economics may influence the applicability of management theories. Concurrently, corporate managers are faced with the challenge of offering usable and useful applications to the local users. Besides, many scholars strongly support that the criteria for M-Commerce adoption in developing countries are different from that of developed countries, due to cultural, security, social, political, economic, and technological aspects. This research tried to investigate the differences on the adoption of mobile commerce between developed and developing countries. In this study, the motivation for studying advanced mobile phone services adoption in the South Korea and Viet Nam is presented. Second, M-Commerce adoption model is introduced as a starting point for the research model. We then integrate price, personal innovativeness, quality dimension and perceived of playfulness into our model. Next, we describe our method and report the results of our analysis. The paper concludes with a discussion of the results from both the South Korea and Viet Nam with implications.

A Study on Cross-Border Supply Regulation Policy of Telecommunications Service - Focused on Korea, USA, Japan - (통신서비스의 국경간 공급 규제정책 연구 - 한국, 미국, 일본을 중심으로 -)

  • Kang, Shin-Won;Bae, Hong-Kyun
    • International Area Studies Review
    • /
    • v.13 no.1
    • /
    • pp.445-464
    • /
    • 2009
  • Many countries in the world have regulated cross-border supply in basic telecommunications services based on GATS exception rule for telecommunications because of anti-competition behavior control, domestic consumer protection, tax levy, national security, etc. Korea partially regulates cross-border supply in telecommunications service through the WTO and the domestic law and regulation. However, WTO and FTA negotiations, cross-border supply regulation are strongly demanded to deregulation. Therefore, it is required to review the effectiveness of cross-border supply regulation to prepare the counter plan for that regulation. Thus, the major countries of the telecommunication services regulation regarding the cross-border supply are reviewed. In addition, it is retrieved some implications for Korean regulation policy by reviewing the actual regulation of many countries cases.

Impact of Service Quality on Behavioural Intention to Use Fin Tech Payment Services: An Extension of SERVEQUAL Model

  • Vikas Sharma;Sanjay Taneja;Munish Gupta;KshitizJangir;Ercan Ozen
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.1093-1117
    • /
    • 2023
  • The study aims to determine the impact of quality outcomes on behavior intentions in Financial Technology (FinTech) payment services. The study is focused on the development and testing of the impact of the SERVQUAL model on the TAM, i.e., Technology Acceptance Model for the measurement of the behavioral intention of users to use fintech payment services. The sample entails 578 specific survey responses from northern India from October to December 2022. The respondents were users of FinTech. The PLS-SEM technique was employed to explain the implementation process. Consequently, it discovered a significant relationship between the SERVQUAL models and the impact on behavioral intentions identified by TAM. The study will provide insight into the factors that impact the quality outcomes and adoption of Fintech payment services to the providers. The paper demystifies FinTech payment services in the range of perception of service quality outcomes and provides essential theories. The TAM model reflects the customer's sense of satisfaction, usefulness, and attitude. In contrast, the SERVQUAL model demonstrates the user's assessment of service quality outcomes such as quality, trust, security, and service quality positively affects behavioral intention in FinTech payment services.

Underwater Optical Image Data Transmission in the Presence of Turbulence and Attenuation

  • Ramavath Prasad Naik;Maaz Salman;Wan-Young Chung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • Underwater images carry information that is useful in the fields of aquaculture, underwater military security, navigation, transportation, and so on. In this research, we transmitted an underwater image through various underwater mediums in the presence of underwater turbulence and beam attenuation effects using a high-speed visible optical carrier signal. The optical beam undergoes scintillation because of the turbulence and attenuation effects; therefore, distorted images were observed at the receiver end. To understand the behavior of the communication media, we obtained the bit error rate (BER) performance of the system with respect to the average signal-to-noise ratio (SNR). Also, the structural similarity index (SSI) and peak SNR (PSNR) metrics of the received image were evaluated. Based on the received images, we employed suitable nonlinear filters to recover the distorted images and enhance them further. The BER, SSI, and PSNR metrics of the specific nonlinear filters were also evaluated and compared with the unfiltered metrics. These metrics were evaluated using the on-off keying and binary phase-shift keying modulation techniques for the 50-m and 100-m links for beam attenuation resulting from pure seawater, clear ocean water, and coastal ocean water mediums.

Analysis on the Impact of Knowledge of Personal Information Protection on Their Behaviors in Elementary School (초등학생의 개인정보보호에 관한 지식이 행동에 미치는 영향 분석)

  • Lee, Kyungchan;Kim, Jamee;Lee, Wongyu
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.3
    • /
    • pp.299-310
    • /
    • 2015
  • This study was conducted with the goal to identify the degree to which elementary school students' knowledge about personal information protection practices impacted their actual behavior with regard to privacy protection. To fulfill this goal, knowledge about personal information protection was set as (1) knowledge about concepts of personal information, (2) knowledge of the rights of information holders, (3) knowledge about the code of conduct for information protection, and (4) awareness of the value of personal information. As for students' behaviors to ensure their personal information protection those were set as their habits to comply with the personal in-formation protection code of conduct and their efforts to respond and recover from any personal information violation. This study was conducted targeting 510 elementary students. The degree of the students' knowledge and their behaviors was measured by first distributing a self-report survey to the students and then analyzing their responses. The results of the analysis revealed the following: First, it was found that there are no differences among the four factors of knowledge and behavior according to the status of their education. Second, the two factors that primarily affected their personal information protection behavior were found to be their awareness of the information protection code of conduct and awareness of the value of personal information. This study holds significance in that it makes suggestions as to how personal protection practices should be taught to public school students.

Design of Deep Learning-based Tourism Recommendation System Based on Perceived Value and Behavior in Intelligent Cloud Environment (지능형 클라우드 환경에서 지각된 가치 및 행동의도를 적용한 딥러닝 기반의 관광추천시스템 설계)

  • Moon, Seok-Jae;Yoo, Kyoung-Mi
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.3
    • /
    • pp.473-483
    • /
    • 2020
  • This paper proposes a tourism recommendation system in intelligent cloud environment using information of tourist behavior applied with perceived value. This proposed system applied tourist information and empirical analysis information that reflected the perceptual value of tourists in their behavior to the tourism recommendation system using wide and deep learning technology. This proposal system was applied to the tourism recommendation system by collecting and analyzing various tourist information that can be collected and analyzing the values that tourists were usually aware of and the intentions of people's behavior. It provides empirical information by analyzing and mapping the association of tourism information, perceived value and behavior to tourism platforms in various fields that have been used. In addition, the tourism recommendation system using wide and deep learning technology, which can achieve both memorization and generalization in one model by learning linear model components and neural only components together, and the method of pipeline operation was presented. As a result of applying wide and deep learning model, the recommendation system presented in this paper showed that the app subscription rate on the visiting page of the tourism-related app store increased by 3.9% compared to the control group, and the other 1% group applied a model using only the same variables and only the deep side of the neural network structure, resulting in a 1% increase in subscription rate compared to the model using only the deep side. In addition, by measuring the area (AUC) below the receiver operating characteristic curve for the dataset, offline AUC was also derived that the wide-and-deep learning model was somewhat higher, but more influential in online traffic.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

A Comparative Study of the Security Prevention Strategies on Arson: Focused on the Behavioral Characteristics between Serial Arsonists and Simple Arsonists (방화범죄의 경비예방 전략에 관한 비교연구 - 연쇄방화범과 단순방화범의 행위적 특성을 중심으로 -)

  • You, Wan-Seok;Hwang, Sung-Hyun
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.139-162
    • /
    • 2011
  • The purpose of this study is to compare with the general and behavioral characteristics between simple and serial arsonists using the data derived from Scientific Crime Analysis System, Criminal Filing Search System, and Crime Information Management System. The analysis and findings reported here are derived from data extracted from 160 arsonists arrested by police officer. The independent variables included such socio-economic characteristic as arsonists' gender, age, occupation, education level, and previous criminal records of arsonists, and finally the general characteristics of the scene of fire settings. The dependent variable is whether or not serial fire setter. To achieve the purpose, the analysis of frequencies and cross-tab were conducted. According to frequence and cross-tab analysis, there are great differences of the general and behavior characteristics between two groups. In the comparison of simple and serial arsonists, serial arsonists are more likely to have previous criminal records, low socio-economic status, unmarried and no cohabitants than simple arsonists. furthermore, serial arsonists are more likely to use garbage papers for fire setting in the scene of the crime, to have mental or psychological problems, and to get involved in fire setting for the psychological pleasure than simple arsonists do. The present research has some obvious limitations. First, the analysis is based only on arsonists arrested by police officers. These may be considerable differences in arsonists arrested by police officers and fire setters not arrested by them. Additional research is needed to assess the extent to which these findings would apply to fire setters not arrested by police officer in Korea. Secondly, the data in this study are cross-sectional and simple cross-tab analysis are used. Potential limitation of cross-sectional data concerns the inability to specify the changes in measures as arsonists behavioral characteristics. Therefore, further studies need to use longitudinal data and more complicate statistical techniques such as correlation analysis, multiple regression analysis, or LISREL models to specify the casual relationships between dependent and independent variables for fire settings. Even if this study has some limitations, it is meaningful in which it first investigated the comparison of simple and serial arsonists focusing on the general and behavioral characteristics between two groups in Korea.

  • PDF