• Title/Summary/Keyword: Security Motivation

Search Result 156, Processing Time 0.026 seconds

How Vulnerability Research Motives Influence the Intention to Use the Vulnerability Market? (취약점 연구동기가 취약점마켓 이용의도에 어떠한 영향을 미치는가?)

  • Hyeong-Yeol Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.201-228
    • /
    • 2017
  • Vulnerability information, which can cause serious damage to information assets, has become a valuable commodity, thereby leading to the creation of a vulnerability market. Vulnerability information is traded on the vulnerability market from several hundred dollars to hundreds of thousands of dollars depending on its severity and importance, and the types and scope of the vulnerability markets are varying. Based on previous studies on vulnerability markets and hackers, this study empirically analyzed the effects of the security researcher's vulnerability research motivation on his/her vulnerability market use intention. The results are discussed as follows. First, vulnerability research self-efficacy had a significant effect on flow and on white and black market use intention but not on perceived benefit. Second, flow had a significant effect on perceived benefit and on black market use intention but had no effect on white market use intention. Third, perceived profit had a significant effect on white and black market use intention. Fourth, vulnerability research self-efficacy had a significant effect on perceived benefit through flow. Fifth, flow had a significant effect on white and black market use intention through perceived profit. These findings can be used to predict the behavior of security researchers who have experience in exploiting vulnerabilities.

Content Analysis of Male Hospital Nurses' Experiences (남자 임상간호사의 경험에 관한 내용분석)

  • Ahn, Kyeong-Ha;Seo, Ji-Min;Hwang, Sun-Kyung
    • Korean Journal of Adult Nursing
    • /
    • v.21 no.6
    • /
    • pp.652-665
    • /
    • 2009
  • Purpose: This study was conducted to identify job experiences of male hospital nurses. Methods: Data were collected from 20 male nurses working at general hospitals, through semi-structured in-depth interviews. The interviews were recorded and subsequently transcribed verbatim. Using content analysis, data were coded and categorized. Results: The analyzed domains were motivations for choosing nursing, occupational experiences (3 subdomains), and attitudes toward the future. A total of 85 significant statements were selected from the data and classified into 32 categories. The nurses' motivations for choosing nursing were advantages of employment, their aptitude, scarcity value of men, professionalism and job security, good promotion, stable income, and family influence. In occupational experiences, they were assigned to special fields and dissatisfied with vertical relationship, promotion system, their salary, and gaps in military service time; they had difficulties in adapting to female-dominated groups and encountered gender role stereotype and preconception; they were satisfied with their distinguished performance, but had damaged self-esteem, and were stressed and disappointed in their work. In their attitudes toward the future, they considered their career changes, but tried to make professional and personal advancement. Conclusion: These findings have implications for recruiting and retaining male nurses in clinical settings.

  • PDF

An Exploratory Study of Smartphone Fashion Application to Promote Mobile Shopping (모바일 쇼핑 활성화를 위한 스마트폰 패션 어플리케이션에 대한 탐색적 연구)

  • Sung, Heewon
    • Fashion & Textile Research Journal
    • /
    • v.14 no.6
    • /
    • pp.941-951
    • /
    • 2012
  • As smartphones permeate the consumer lifestyle, branded application and mobile shopping have also received increased attention as an important marketing channel. This study identifies the general information about the use of smartphones, attitudes toward fashion applications, and mobile shopping intentions for smartphone users. Focus group interviews were conducted and 22 interviewees participated. The age of the participants ranged from 21 to 45 years old (55% were females). When examining the motivation to adopt a smartphone, respondents presented the comparable characteristics of early adopters and late adopters according to the time of adoption. Most respondents over the age of 30 showed some troubles to use a smartphone; however, participants in their 20s tended to enjoy exploring the new technology. More than half of respondents were aware of fashion applications, but were dissatisfied with fashion apps and used them infrequently. Respondents pointed out that fashion related apps were not too practical because they were not updated regularly, provided only limited information, and focused on brand promotions. In order to increase the intention to adopt mobile shopping, the price and payment security system needs to be considered. This was an exploratory study to identify the possibility of fashion branded apps as a major distribution channel. The findings of this study provide fundamental information to formulate marketing strategies for fashion businesses that have developed fashion apps.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.

The Relationship Between the Exhibitors'Show Performance and the Service Quality of Trade Shows : As reported by participating exhibitor managers in International Trade Shows held in Korea (전시회 서비스 품질과 참가 기업의 성과와의 관계: 한국개최 국제전시회 참가기업의 전시 담당자의 인식을 중심으로)

  • Kim, Nam-Su;Lee, Eun-Sup
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.3-34
    • /
    • 2010
  • The purpose of this study is first to identify the dimensions of a trade show's service quality and the dimensions of the exhibitors' show performance, and thereafter determine the relationship between the trade show's service quality and the exhibitors' show performance. This study attempted empirical research, together with a literature review, to discover the effect of service quality upon on exhibitors' performance. A survey was conducted during an international trade show that was held in Korea where more than 100 businesses participated. The sample was selected from among the people who were in charge (e.g., managers) of their own private businesses. As a result, the study validated nine dimensions of a trade show's service quality: host and public relations, security, reputation and reliability, access, customer service, exhibition program, physical facilities, convenient facilities, and attendance cost. The study also identified five dimensions of the performance of participants: sales performance, information collection, networking, image building, and motivation. Overall, the empirical results of this study verified that there is a correlation between the performance of exhibitors and the service quality. of trade shows.

  • PDF

Study on Remarriage of Bereaved or Divorced Old People -Emphasis on successful remarriage in Chonju Area- (사별 및 이혼한 노인의 재혼에 관한 연구 I -전주시 거주 재혼한 노인의 성공사례를 중심으로-)

  • 이정덕
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.2
    • /
    • pp.255-272
    • /
    • 1997
  • In the point of view, this study aims to examine the life of remarriaged old people after divorce and bereavement. therefore, the purpose of this study is to increase the understanding of married couple's relationship and remarriage in old age and help old people who want to be abused about their remarriage as a coping response of lire for widowhood in old aged. the subject were 14 old people who married over 53 years old bereavement and divorce residing in Chonju, Chonbuk and they had indepth interviews. 1. Most of subject would married with help of matchmaker under the consent a children and relative 2. The main motivation of remarriage was lone lies, however, for men being taken care and for women economic security were also important. 3. Premarriage experience seemed to help spouse adjustment between couples. 4. They matintained close relationship with there biological children. 5. There show a tendency to the bereavement woman remarriage life was happier than divorce woman. 6. When one of the couple had regular income, little economic conflict was there. In most case, wifes were younger than husband and economic stability after husband's death was their main concern and when the husband didn't show definite will to inherit asset to his wife, conflict got bigger.

  • PDF

The Comparative Study on Third Party Mobile Payment Between UTAUT2 and TTF

  • Wu, Run-Ze;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.15 no.11
    • /
    • pp.5-19
    • /
    • 2017
  • Purpose - According to the research findings, it proposes corresponding market promotion schemes, for Alipay, WeChat wallet and even other payment service providers and mobile internet companies to understand the factors which promote or hinder users' acceptance of mobile payment. Research design, data, and methodology - Statistic analysis of data and social science statistical software of IBM Statistics 23.0 and IBM SPSS AMOS 23.0 were adopted for all the data researched. Results - The technical features of the third party mobile payment and the task characteristics of users have positive influence on the matching degree between task and technology, and the matching degree between task and technology of the third party mobile payment has positive influence on the performance expectancy, effort expectancy and usage intention. The social influence, facilitating condition, price value and enjoyment motivation have significant and positive influence on users' intention of mobile payment adoption. The perceive security of the mobile fingerprint payment of users has positive influence on users' intention of usage. Conclusions - This research has the main contribution on the analysis on the key factors with influence on the third party mobile payment usage by utilizing the integrated model of UTAUT2 and TTF.

Design of The Cyber Shipping Exchange (사이버 해운거래소 구축 방안)

  • 최형림;박남규;김현수;박영재;황성원;박용성
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2002.03a
    • /
    • pp.39-51
    • /
    • 2002
  • Online exchange is a cost-effective approach to trade goods and information among multiple sellers and buyers. Shipping industry includes lots of global entities such as shippers, liners, ship owners and shipping agents. Marine insurance companies and ship repairers and many other groups are also supporting the industry. However, international shipping exchanges are located on few cities in the world. Its our motivation that a shipping market can be online so that market participants do the dealing while sitting where they are with more efficient manner, preferable price and larger pool of candidates of trading partners. This paper presents Korean governmental project of building a cyber shipping exchange. The exchange covers ship sale and purchase, charter, insurance, freight futures, repairs, supplying of ships oil and database service. The workflows of each business were analyzed and designed to fit for online environment. The project includes design of trading mechanism, online documents, data flow, data storage and security. Online match making and trading mechanisms such as auction, reverse auction, bid are used. The whole trading process involves multiple organizations and business processes. So, this Paper focuses on how each organization would play their roles so that users can complete transactions with integrated and transparent view. The online exchange selves also as maritime portal site that links to other sites for cooperation vertically or horizontally, and serves database and information in global perspective. This paper also issues and discusses the justification of an online shipping exchange

  • PDF

Automatic Detection System for Dangerous Abandoned Objects Based on Vision Technology (비전 기술에 기반한 위험 유기물의 자동 검출 시스템)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.69-74
    • /
    • 2009
  • Abandoned objects should be treated as possibly dangerous things for public areas until they turn out to be safe because explosive material or chemical substance is intentionally contained in them for public terrors. For large public areas such as airports or train stations, there are limits in man-power for security staffs to check all the monitors for covering the entire area under surveillance. This is the basic motivation of developing the automatic detection system for dangerous abandoned objects based on vision technology. In this research, well-known DBE is applied to stably extract background images and the HOG algorithm is adapted to discriminate between human and stuff for object classification. To show the effectiveness of the proposed system, experiments are carried out in detecting intrusion for a forbidden area and alarming for abandoned objects in a room under surveillance.

  • PDF

Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey

  • Wei, Zhe;Yu, Shuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3793-3814
    • /
    • 2021
  • Most secure solutions like cryptography are software based and they are designed to mainly deal with the outside attacks for traditional networks, but such soft security is hard to be implemented in wireless sensor networks to counter the inside attacks from internal malicious nodes. To address this issue, reputation has been introduced to tackle the inside malicious nodes. Reputation is essentially a stimulating mechanism for nodes' cooperation and is employed to detect node misbehaviors and improve the trust-worthiness between individual nodes. Among the reputation models, binomial distribution based reputation has many advantages such as light weight and ease of implementation in resource-constraint sensor nodes, and accordingly researchers have proposed many insightful related methods. However, some of them either directly use the modelling results, apply the models through simple modifications, or only use the required components while ignoring the others as an integral part of the whole model, this topic still lacks a comprehensive and systematical review. Thus the motivation of this study is to provide a thorough survey concerning each detailed functional components of binomial distribution based reputation for wireless sensor networks. In addition, based on the survey results, we also argue some open research problems and suggest the directions that are worth future efforts. We believe that this study is helpful to better understanding the reputation modeling mechanism and its components for wireless sensor networks, and can further attract more related future studies.