• Title/Summary/Keyword: Security activity

Search Result 595, Processing Time 0.027 seconds

The Effects of Emotions Elicited Clothing Product on Product Satisfaction and Using in Postpurchase Processes (구매후 의류제품에 대한 감정이 제품만족과 사용에 미치는 영향)

  • Rhee, Young-Sun;Kim, Eun-Young
    • Korean Journal of Human Ecology
    • /
    • v.6 no.1
    • /
    • pp.79-88
    • /
    • 1997
  • The postpurchase process is the phase that consumers evaluate products or services while using them. And then, they may experience satisfaction/dissatisfaction and emotions elicited products or services. The satisfaction and emotions may be important concepts in consumer behavior such as brand attitude, purchase intentions and using. The purpose of this study was to examine the effects of emotions elicited clothing products on product satisfaction and using in postpurchase. The subjects in this study were selected 500 females. The data were collected by using questionnaires, and 431 data were analysed. The results were as follows: The emotions in postpurchase process were consisted of three dimensions; unpleasure, pleasure, security/activity. These three emotions had the causal effects on product satisfaction significantly, and the unpleasure influenced stronger than others on satisfaction. In addition, the emotions were related to using and the ownership of clothing products. The emotions of pleasure and the security/activity influenced on the ownership, and the security/activity and unpleasure influenced on using clothing products. Therefore, the results in this study imply that consumption emotions elicited clothing products would be multidimensional, and the emotional factors would be important indicators for explaining the satisfaction. The positive affects were related to using clothes, which is, the consumer would have fulfilled their hedonic desires by wearing clothes. Also, the positive affects would be the basis for marketing strategies of sales promotions in clothing products.

  • PDF

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

Management of Innovations and Projects in the System of Improving the Performance of Personnel as a Factor in Ensuring the Competitiveness and Investment Security of the Enterprise

  • Kopytko, Marta;Nikolchuk, Yulia;Urba, Svitlana;Darmits, Rostyslav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.201-206
    • /
    • 2022
  • The main purpose of the study is to analyze the features of innovation and project management in the system of improving the performance of personnel as a factor in ensuring competitiveness and investment security. For the successful operation of enterprises, regardless of their form of ownership and field of activity, in order to carry out effective activities, they turn to innovative methods related to the formation of the potential of the workforce, and increasing the level of education and qualifications of staff and establishing their potential ability to make independent decisions. Based on the results of the study, the key features of innovation and project management in the system of improving the performance of personnel as a factor in ensuring competitiveness and investment security are characterized.

Relation of Social Security Network Building, Civil Culture and Community Unity (사회안전망구축과 시민문화 및 지역사회결속의 관계)

  • shin, Sang-Tae;Kim, Chan-Sun
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.59-70
    • /
    • 2015
  • This study aims at exploring relation of social security network building, civil culture and community unity. To achieve the purpose, this study selected the general citizens in Seoul Region (Gangdong, Gangseo, Gangnam and Gangbuk) from Jul. 15 to Sept. 15, 2014 as population and sampled 400 people using cluster random sampling. Excluding unhonest data, the number of cases used for the final analysis is 337 people. The collected data were analyzed for the study purpose using SPSSWIN 18.0, as statistical techniques, factor analysis, reliability analysis, correlation analysis, t-test, one-way ANOVA, multiple regression analysis, path analysis etc. were used. First, social security network building has an effect on civil culture. That is, the more activated voluntary crime prevention activity, the higher order law-abiding spirit. The more activated local government security education, police public order service, the higher awareness of participation becomes. First, social security network building has an effect on civil culture. That is, the more activated voluntary crime prevention activity, the higher order law-abiding spirit. The more activated local government security education, police public order service, the higher awareness of participation becomes. The more activated voluntary crime prevention activity, street CCTV facilities, police public order service, the higher tolerance spirit becomes. On the contrary, street CCTV facilities reduce citizens' autonomy. Second, social security network building has an effect on community unity. The more activated street CCTV facilities, police public order service, crime prevention design, the higher a sense of stability becomes. The more activated local government security education, police public order service, crime prevention design, the higher awareness of community becomes. The more activated voluntary crime prevention activity, government security education, police public order service, crime prevention design, the higher community institution becomes. Third, civil culture has an effect on community unity. That is, the more activated awareness of community, tolerance spirit, the higher a sense of stability, awareness of community and community system become. Fourth, social security network building has an effect on civil culture and community unity. That is, social security network building has a low effect community institution directly, but if civil culture is enhanced through social security network building, then it has a high effect on community unity.

A Study on the Attitude of CEO in Private Security Company (시큐리티기업 CEO의 민간경비에 대한 의식조사 연구)

  • Ahn, Hwang-Kwon
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.119-135
    • /
    • 2008
  • This study is concerned on how much effect to activate private security officers from the attitude of CEO in private security companies. Of course the philosophy of CEO at the work is much important element on the company activity. And in small-medium size private security company the effect of CEO is tremendous because most of decision making comes from CEO and company is operated. The result of the analysis of the survey on the CEO in private security business is as belows. a) Most of them are not satisfied and negative from current situation of private security industry because too many companies are scattered and the expected social understanding is too low even though the company was established by their own decision due to it was fit to their aptitude. b) The job position is estimated not high by socio-economical perspective, which would be improved to get higher because this industry is very future business. c) Most of members of the korea security association are in negative on the policy of the korea security association but to enhance of the activity all the members should be in union. d) Must make and settle down a channel to communicate and cooperate each other between public and private sector of security business.

  • PDF

ON THE DETERMINANTS OF ENTREPRENEURSHIP IN MIDDLE EAST AND NORTH AFRICA

  • Zmami, Mourad;Salha, Ousama Ben
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.181-187
    • /
    • 2021
  • The purpose of this study is to examine empirically the short- and long-run determinants of entrepreneurial activity in a sample of 15 the Middle East and North African economies between 2006 and 2018. More specifically, four groups of determinants are considered in the analysis, namely economic, demographic, business environment, and institutional. Given the autoregressive feature of the entrepreneurial activity process, a dynamic panel data model is estimated using the system GMM estimator. Findings reveal that unemployment, trade openness, population density, and economic freedom are the main drivers of new business creation in the short-run, while the cost and number of procedures to start a new business negatively affect entrepreneurship. In the long-run, the same findings hold true. Moreover, education and political stability and the absence of violence/terrorism positively affect entrepreneurial activity. Policy recommendations are accordingly designed.

Activity Led Learning as Pedagogy for Digital Forensics

  • Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.134-138
    • /
    • 2023
  • The field of digital forensics requires good theoretical and practical knowledge, so practitioners should have an in-depth understanding and knowledge of both theory and practical as they need to take decisions which impacts human lives. With the demand and advancements in the realm of digital forensics, many universities around the globe are offering digital forensics programs, but there is a huge gap between the skills acquired by the student's and the market needs. This research work explores the problems faced by digital forensics programs, and provides solution to overcome the gap between the skills acquired by the student's and the market needs using Activity led learning pedagogy for digital forensics programs.

Information Security Activities of The Analysis Phase (분석단계의 정보보호 활동)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.743-744
    • /
    • 2016
  • Information Security is a management problem, not just a technical issue. Information security management is an ongoing activity rather than consisting of a solitary business. Analysis step has to be done with the start information is also protected by the steps of preparing the activity information system development. At this stage, the risk assessment should be carried out together with the expected information technology systems analysis and user requirements are derived.

  • PDF

A Study on Preparation Plan against National Industrial Technology Outflow (국가 산업기술유출 대비 방안 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.55-62
    • /
    • 2009
  • Industrial Security is a management activity protecting industrial asset of enterprise by application of security elements(physical, IP, conversion security tools) and can be understood as a comprehensive term including software aspect(establishment of policy and strategy, maintenance operation, post- response act, etc.) as well as the operation of hardware elements. In this paper, after recognizing the definition and relative concept of industrial security, the role and its relative laws of the industrial security organizations, the management system and the reality, I will find some problems and submit a reform measure. Furthermore I would like to propose the policy direction to enhance the national competitiveness and to become one of the advanced nations in 21st industrial security through the effective industrial security activities of our enterprises.

  • PDF

Enhancing utilization and ensuring security: Insights to compromise contradicting conditions in new research reactors

  • Alrammah, Ibrahim
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1479-1482
    • /
    • 2021
  • Research reactors are typically well-suited for outreach activities at different levels. However, unplanned seeking to increase the utilization of a research reactor may result in weakening the nuclear security of this facility. Research reactor staff might be in shortage of a functional nuclear security culture; specifically, there might be a conviction that the necessities of research can be given the priority over consistence with security procedural requirements. Research reactors are usually parts of bigger institutes or research labs of different activities. Moreover, the employments of research reactors are usually with the purpose that easy entry to the reactor premises is fundamental. So, they could be co-situated in places with different sorts of activities, mostly under similar security arrangements. The co-area of research reactor offices among different kinds of research labs introduces explicit security issues, the effects of which should be viewed as when building up a nuclear security framework. Notwithstanding potential security vulnerabilities presented in the design, research reactors frequently have devices kept promptly accessible to encourage research and education. The accessibility of these sorts of hardware could be used by an authorized person to commit an unapproved activity or cause harm. This paper aims to present insights to compromise contradicting conditions in new research reactors in which both enhancing utilization and ensuring security are satisfied.