• Title/Summary/Keyword: Security Benefit

Search Result 264, Processing Time 0.022 seconds

A Longitudinal Study on the Effect of e-Commerce Technology Characteristics and Personal Value on Purchasing Behavior by Importance of Information Protection (전자상거래 기술특성과 개인가치가 정보보호 중요성에 의한 구매행동에 미치는 영향에 대한 종단적 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.159-171
    • /
    • 2017
  • The purpose of this study is to investigate the effects of e - commerce technology characteristics and personal values on purchasing behavior by information security importance. The results of the empirical study that examined the university students in 2006 and 2016 are as follows. First, personal value is centered on personal values, such as self - esteem and self - esteem in 2006. In 2016, however, personal values such as self - fulfillment and personal relationship with others are important. Transactional ease and product service serve as the main value of the fun and pleasure of life, but the sense of accomplishment as the core value of information protection. Second, the technical characteristics of e-commerce are as follows. In terms of ease of transaction and product service, technology characteristics are simplified and directly effected over time. On the other hand, information protection works very closely with individual value, There was a strong tendency to enjoy benefits. Especially in 2006, if you want to enjoy transactional convenience through transaction information security or benefit from product service, it has been changed to recognize the importance of information security through payment in 2016.

Data Security Technology for the Desktop Virtualization Environment using the Graphic Offloading (SW 분할 실행을 이용한 데스크탑 가상화 환경에서 데이터 보안 기술)

  • Chung, Moonyoung;Choi, Won-Hyuk;Jang, Su-Min;Yang, Kyung-Ah;Kim, Won-Young;Choi, Jihoon
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.555-560
    • /
    • 2014
  • This paper proposes the data security technology for the desktop virtualization environment using the separated software execution method. In the virtual environment where allocates separate VMs to the users, there is a benefit that the programs in one guest machine are isolated from the programs running in another guest machine, whereas in the separated execution environment that supports application virtualization, the isolation is not offered and it causes the data security problem because the applications are executed by the one root privilege in the server. To solve this problem, we provides the data security method using the server storage filter, the viewer filter, and the file mapping table in this paper.

Analysis of the Importance and Priority of HRM Factors in Private Security (민간경비 인사업무의 중요도 및 우선순위에 대한 고찰)

  • Kwon, Jung-Eon
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.55-81
    • /
    • 2018
  • The purpose of this study is to find significant activities in human resource management (HRM) to solve growing-pains caused by the rapid external growth in private security business. To this end, we applied the HRM factors suggested by the National Job Capability Standard (NCS) to the private security and investigated the relative importance using the Analytic Hierarchy Process (AHP). The results were as follows. First, the importance of 4 HRM criteria in the private security was ranked in order of recruitment, operation, benefit, and retirement. Particularly, the relative importance of recruitment reached 63.8%. Second, the composite importance was calculated by dividing the 4 HRM criteria into 14 capability sub-criteria and 46 capability alternatives. As a result, personnel planning and hiring at the recruitment turned out as the areas that needed the most improvement. In addition, the operating and planning of education involved in the highest rank, 8th and 10th respectively. Based on these results, we suggested critical HRM factors for developing the private security business as well as proposed research directions and methods for further studies.

Gender Sensitive Anaylsis on National Pension of South Korea (우리나라 국민연금에 대한 성인지적 분석)

  • Yoo, Jiyoung;Seong, Moon-Ju
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.1-12
    • /
    • 2013
  • Present study examines the gender disparity in terms of its beneficiaries or benefit amount of National Pension of South Korea from the perspective of gender sensitivity. National Pension system has been manipulated and developed in order to maximize its universality. However, substantial gender differences are still found in terms of beneficiary number and benefit amount in the program. Benefit condition and benefit structure are determined assuming that male is the primary breadwinner in household and the primary regular full time worker in labor market. Women are only counted as dependents or excluded as unstable workers. As a result, women are fully or partially excluded from the program as they are excluded in other public sector such as labor market. Women's work (such as caring and housekeeping) are not taken into account in National Pension program. Policy suggestions for the National Pension of South Korea are also provided as the last part of this paper.

The Impact of Employee's Attributes on Corporate Pension Insurance Products Preference (기업연금보험상품 선호도에 대한 종업원 속성의 영향)

  • Joo, Heon
    • The Korean Journal of Franchise Management
    • /
    • v.7 no.2
    • /
    • pp.27-35
    • /
    • 2016
  • Purpose - The primary objective of this study is to investigate the impact of employee characteristics on employees' preference towards corporate pension products. This study can provide a guidance for maximization of benefits for employees and their affiliated corporation. Employee characteristics include average length of labour, wage system of annual salary, age, types of interest rates and size of corporation. Existing research generally concentrate on vitalizations of corporate pension product raising an imperfection, improvements, tax benefit analysis and legal consideration. Thus, this study intensively analyses the effect of employee attributes on firms' decision for corporate pension products, such as DB(defined benefit) and DC(defined contribution) type. Research design, data, and methodology - The data were collected using self-administrated questionnaire survey on corporate pension products from CEOs or HR directors 250 foreign-invested companies', purchasing pension plans in practice with domestic financial trustees (insurance companies, banks and security companies). Hypotheses testing was conducted using Logistic Regression analysis with SPSS/PC+ 21.0. Results - The findings of the study are as follows. Employees with the long length of labour are more likely to have DB plan; more likely to prefer DC plan with the dividend distribution product regarding the types of interest rate. SMEs(less than 100 employees) are more likely to select DC plan whereas high fluctuation in wage with annual salary has no impacts. In addition, the ages has no significant effect on the preference. Conclusions - This study has examined with the empirical testing that employees' variable attributes and qualities are one of the vital factors for corporation pension plan selection. Currently, majority employees are highly likely to join DB plan and Defined interest types. Corporation with less than 10 employees prefer IRP scheme while most of corporation are intended to join DC plan. In a very near future, corporation more than 300 employees will be required to purchase mandatory plan under national regulation. For maximization of employees' contentment to corporation pension insurance and for complementing the flaws of existing plans, the future studies shall also research in a perspective of employee benefit.

Logical Configuration of Livelihood Benefit Standard for the Institutionalized Recipients under the Standard Median Income Scheme and the Level of Benefit by the Adjusted Equivalence Scale of the Institution (기준중위소득 방식을 반영한 보장시설생계급여 지급기준 논리 구성과 시설균등화지수 합리화에 따른 급여수준)

  • Jo, Joon-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.660-670
    • /
    • 2019
  • The purpose of this study is to elaborate the logical configuration of livelihood benefits for the institutionalized recipients under the renewed custom-tailored benefit system of National Basic Livelihood Security System(NBLSS) and to present appropriate level of benefits in terms of coherency of the system. In July 2015, the NBLSS was reformed to adopt a relative level of benefit standard for the general recipients according to certain amount of ratio of standard median income. However, the benefit for the institutionalized recipients was still based on the cost of necessities of absolute poverty level. It is at this juncture that this study suggests livelihood benefits for the institutionalized recipients reflect standard median income to comply with the reform of the NBLSS. To this end, this study firstly derives basic living items for the institutionalized recipients based on the literature review and FGI. Secondly, it calculates the reflection ratio of livelihood benefits utilizing Household Trend Survey's consumption data under 40%. Finally, it applies equivalence scale of households to adjust the under-represented scale for large size institutions. To continue the reflection ratio method, it is necessary to review the consumption trends and the stability of the reflection ratio periodically.

Analysis of Medical Expenses Structure for Patients on Percutaneous Coronary Intervention by Medical Security Type (의료보장형태에 따른 관상동맥중재술 환자의 진료비 구조분석)

  • Son, Mi-Kyung;Lee, Sok-Goo
    • Journal of agricultural medicine and community health
    • /
    • v.44 no.4
    • /
    • pp.195-208
    • /
    • 2019
  • Objectives: The purpose of this study was to analyze whether there are differences in medical expenses according to medical security type in the use of medical services with high disease burden such as coronary intervention. Methods: Chi-square test and covariance analysis(ANCOVA) were conducted to identify the differences in the characteristics and costs according to medical security type of 1,904 patients who underwent coronary intervention in a university hospital from 2011 to 2012. Hierarchical regression analysis was conducted to determine whether the cost affects medical expenses. Results: In the medical aid group, the proportion of women, those without a job, those without a spouse, and those who received hemodialysis was high, length of stay was high, patients using the emergency room and those who died was high. The medical aid patients were significantly higher in the non-benefit medical expenses, optional medical expenses, physician and admission, meals, medications and injections. National health insurance patients were significantly higher in procedure. The medical security type was found to be significant as a variable affecting the medical expenses. Conclusions: Provision of medical expenses should be managed in advance by providing prevention and education services for the vulnerable, and care services in the region should be provided to suppress the occurrence of medical expenses due to the increase in the number of days spent. In addition, it is necessary to support medical expenses to prevent unsatisfactory medical services from occurring for non-benefit and optional care.

A Study on the Oriental Medical Insurance and the Industrial Accident Compensation in the Social Security System (사회보장제도(社會保障制度)로서의 한방의료보험(韓方醫療保險)과 산재보상(産災補償))

  • Yoon Young-Soo
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.1 no.1
    • /
    • pp.137-148
    • /
    • 1997
  • The Serial Securities and the Social Welfare, as the national policy aimed at securing generals' lives, are the policies or systems for the stabilization in lift; especially of law-incomers and workers, for which the povernment has to establish the Social Security System. No wonder the Social Insurance System is a part of the Social Security System and the most important. The Social Insurance System, along with Public Assistance, is underlying the Social Security System. Social Security System includes medical insurance, industrial accident Compensation insurance, national pention insurance and employment insurance. The study is on 'The Oriental Medical Insurance and the Industrial Accident Compensation in the Social Security System' . The rate of industrial accident in Korea marks the highest rank in the world. for laborer, industrial accident do not merely mean the loss of health but the question of the right to live in terms of their loss of opportunity of life. The industrial accident compensation system should be established as the es post facto remedy system to guarantee the injured worker and his/her family's life. The oriental medical insurance system which began to operate in 1987 in Korea is based on unionism and divided into 3 parts; one part for the worker, a second part for the community inhabitants, and a third part for the public service personnel and private school personnel. Today the medical problem must be the most important social assignment to be considered. The medical system of contemporary industrial society has began greatly stood out in relief as a part of social welfare not emphasized on gainings of physicians. Accordingly systematization of the oriental medical insurance was strongly Pursued and it was developed to to the extent of entire nation insurance. Though the history of it is very short, most of the people are getting benefit from the insurance system by the social security system method. This study develops the Oriental Medical Insurance, the Workmen's Accident Compensation Insurance, the Pension System in relation to the industrial accident compensation of Employees, along with the ideas and principles of social insurance.

  • PDF

App Store security policy trends (앱스토어 보안정책 동향)

  • Bae, Jung-Min;Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rea-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.587-590
    • /
    • 2014
  • Spread of smart devices increases, the App Store market is formed so huge, even at this point, every day the scale is increasing now. As a result, for the benefit of companies and private individuals, malicious apps that threaten the security of smart devices, have appeared occasionally in the App Store. Security of the terminal, has issued various solutions through research at many universities and companies, and country. However, solutions for research and policy approaches that are blocking the procedure to register the application malicious app, so that it is not registered in the App Store, Only company that operates the app store is doing it. And the reference is also insufficient, various problems have occurred. In this study, after analyzing the problem of the security policy of the current App Store, presenting the breaking point.

  • PDF

Efficient Non-Cryptographic Protocols for Public key Authentication in Wireless Sensor Network (WSN에서의 협력적인 공개키 인증 프로토콜)

  • Mohaisen, Abedelaziz;Maeng, Young-Jae;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.101-108
    • /
    • 2007
  • We follow the promising recent results of deploying the public key cryptography in sensor networks. Recent results have shown that the public key algorithms are computationally feasible on the typical sensor nodes. However, once the public key cryptography is brought to the sensor network, security services such like key authentication will be critically required. In this paper we investigate the public key authentication problem in the sensor network and provide several authentication protocols. Our protocols are mainly based on the non-solvable overhearing in the wireless environment and a distributed voting mechanism. To show the value of our protocols, we provide an extensive analysis of the used resources and the resulting security level. As well, we compare our work with other existing works. For further benefit of our protocols, we list several additional applications in the sensor network where our protocols provide a sufficient authentication under the constrained resources.