• Title/Summary/Keyword: Smart office

Search Result 266, Processing Time 0.025 seconds

Countermeasures and Mobile Terminal Threats to harm the Financial Market Soundness(focusing on the Financial Investment Companies) (금융시장 건전성을 해치는 모바일단말 위협에 대한 대응방안(금융투자회사를 중심으로))

  • Yoo, Kil-Sang;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.119-132
    • /
    • 2011
  • Mobile devices such as smart phones have brought big changes to be called as 'mobile big bang' against which we can't go. Mobile banking service and MTS(Mobile Trading System) are freely available at any time, anywhere and we are able to activate communications between financial company staffs out of the office and take care of business works even remotely by using mobile devices. Mobile devices are approaching as 'smart mobile innovation' to improve an enterprise productivity and competitiveness, but threats which engaged in unfair trading behaviors or unwholesome business works in finance companies are increasing and the customer's information can be leaked out by using the nonpublic official information and mobile devices. Therefore, we have to analyze the potential problems and take the necessary countermeasures with preemptive steps to protect the customer's information and improve the financial trading soundness and fairness. In this paper, we would like to suggest countermeasures and threats against using the financial company's mobile devices focusing on the financial investment companies by 'Capital Market and Financial Investment Business Act'.

Research on the Effect of Perceived Characteristics of RPA on Intention of Adoption (RPA의 지각된 특성이 수용의도에 미치는 영향에 대한 연구)

  • Song, Sun Jung;Lee, Hyoung-Yong
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.283-301
    • /
    • 2021
  • RPA (Robotic Process Automation) technology has recently been spotlighted to preemptively respond to the 4th industrial revolution without spending a lot of time and money to improve various existing business and IT processes. In this study, variables affecting intention to use RPA technology were representatively identified into three positive factors and three negative factors, and the causal relationship between the effects of these variables on actual RPA acceptance intention was examined. After conducting an email survey for general office workers, structural equation analysis (SEM) was performed using SPSS 27.0 and SmartPLS 3.3.5. The second order factor of a positive perception consisting of security, accuracy, and efficiency, and the second order factor of a negative perception consisting of job security, execution error, and fear of introduction failure. The positive perception affected the intention to use RPA through perceived usefulness and perceived ease. It was confirmed that the negative perception has a mediating effect on the intention to use RPA through acceptance conflict. In addition, it was confirmed that the presence or absence of experience in using RPA interacts with perceived ease and has a moderating effect on intention to use RPA. It can be said that there is practical and theoretical implications from the point of view of knowledge management in that it allows companies to recognize and respond to which factors are important from the point of view of companies that want to use RPA.

A Study on the Effects of Perceived Risk Factors of RPA on Acceptance Conflict and Acceptance Intention: RPA Experience, Gender, and ICT Industry as Control Variables (RPA의 지각된 위험요인이 수용갈등 및 수용의도에 미치는 영향: RPA경험, 성별, ICT업종을 통제변수로)

  • Song, Sun-Jung;You, Yen-Yoo;Kim, Sang-Bong
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.137-146
    • /
    • 2022
  • The use of RPA (Robotic Process Automation) has been recently reviewed in various industries, but it seems that it is not being applied to companies faster than ever expected. In this study, three perceived risk factors affecting the acceptance conflict and acceptance intention of RPA technology were proposed and the effects of RPA on acceptance conflict and acceptance intention were investigated using RPA experienced people, gender and ICT industries as control variables. For the research, online survey was conducted targeting office workers and analyzed the results by using SPSS 22.0 and AMOS 22.0. As a result, it was found that among the three perceived risk factors, concern about introduction failure, employment insecurity, and execution errors, employment insecurity and execution errors did not affect the acceptance conflict and acceptance intention of RPA. This research shows that concerns over the introduction failure affected the acceptance conflict and acceptance intention. In addition, the acceptance conflict was judged as a factor of the mediation effect of the acceptance intention. From the perspective of companies that want to apply RPA, the theoretical and practical implications of business management are meaningful in that they can identify and respond to particularly important factors among perceived risks.

The Impact of Servicescapes of Global Coffee Franchise Store on Customer Satisfaction and Loyalty: The Case Study of 'C' Franchising Company in Mongolia (글로벌 커피 프랜차이즈 전문점의 서비스스케이프가 고객만족과 충성도에 미치는 영향 : 몽골의 'C' 기업의 사례 연구)

  • Samdan, Davaasuren;Han, Young-Wee;An, Dae-Sun
    • The Korean Journal of Franchise Management
    • /
    • v.9 no.3
    • /
    • pp.19-29
    • /
    • 2018
  • Purpose - Due to the increase in coffee consumption and competition, domestic coffee franchise companies are currently entering the overseas market. Therefore, coffee franchise companies are pursuing a variety of marketing strategies to meet customer needs and gain competitive advantage in overseas markets. From this perspective, overseas franchise companies need to ensure that their servicescapes meet the needs of their overseas customers. For these purposes, the study is to identify the impact servicescapes on customer satisfaction and customer loyalty focused on Global Coffee Franchise Company "C", which extended its business worldwide in Mongolia. Research design, data, and methodology - The data were collected from customers who had visited the stores of 'C' company in Ulaanbaatar, Mongolia. 435 valid questionnaires collected through online survey coded and analyzed using frequency, confirmatory factor analysis, correlations analysis, and structural equation modeling with SPSS 24 and SmartPLS 3.0. Result - Firstly, seating comfort, facility aesthetics, and cleanliness, ambient conditions among servicescapes influenced customer satisfaction. Secondly, servicescapes didn't affect the loyalty directly. Third, customer satisfaction had positive effect on loyalty. Fourthly, cleanliness which was ranked lower in Korea had a great effect on customer satisfaction in Mongolia. Fifthly, IPMA(Importance-performance map analysis) shows that the importance of servicescapes is higher for women than for men, and facility aesthetics for female and cleanliness is the most important for male. Conclusions - The results of this study show that there is a positive (+) effect on customer satisfaction in order of cleanliness, ambient conditions, aesthetics, and seating comfort. Therefore, franchise companies considering or advancing into Mongolia should consider importance in order of cleanliness, ambient conditions and aesthetics when entering Mongolia market. For example, franchise managers should select Monday as a "clean day," and all merchants should spend all of their open hours and keep their stores clean in accordance with the head office manual. In addition, franchise managers need to hire a VMD (visual merchandising) experts to build up a physical environment that will effectively highlight the space-specific display of the store so that Mongolian local customers can have a satisfactory climate and aesthetics. And, the IMPA analysis between servicescapes and customer satisfaction shows that women are more susceptible to servicescapes than men. Especially, in the case of women, the importance of esthetics is high, but the performance is low. Thus, if the aesthetics are actively improved, customer satisfaction can be effectively increased.

Analysis of Keywords in national river occupancy permits by region using text mining and network theory (텍스트 마이닝과 네트워크 이론을 활용한 권역별 국가하천 점용허가 키워드 분석)

  • Seong Yun Jeong
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.185-197
    • /
    • 2023
  • This study was conducted using text mining and network theory to extract useful information for application for occupancy and performance of permit tasks contained in the permit contents from the permit register, which is used only for the simple purpose of recording occupancy permit information. Based on text mining, we analyzed and compared the frequency of vocabulary occurrence and topic modeling in five regions, including Seoul, Gyeonggi, Gyeongsang, Jeolla, Chungcheong, and Gangwon, as well as normalization processes such as stopword removal and morpheme analysis. By applying four types of centrality algorithms, including stage, proximity, mediation, and eigenvector, which are widely used in network theory, we looked at keywords that are in a central position or act as an intermediary in the network. Through a comprehensive analysis of vocabulary appearance frequency, topic modeling, and network centrality, it was found that the 'installation' keyword was the most influential in all regions. This is believed to be the result of the Ministry of Environment's permit management office issuing many permits for constructing facilities or installing structures. In addition, it was found that keywords related to road facilities, flood control facilities, underground facilities, power/communication facilities, sports/park facilities, etc. were at a central position or played a role as an intermediary in topic modeling and networks. Most of the keywords appeared to have a Zipf's law statistical distribution with low frequency of occurrence and low distribution ratio.

Energy harvesting techniques for remote corrosion monitoring systems

  • Kim, Sehwan;Na, Ungjin
    • Smart Structures and Systems
    • /
    • v.11 no.5
    • /
    • pp.555-567
    • /
    • 2013
  • An Remote Corrosion Monitoring (RCM) system consists of an anode with low potential, the metallic structures against corrosion, an electrode to provide reference potential, and a data-acquisition system to ensure the potential difference for anticorrosion. In more detail, the data-acquisition (DAQ) system monitors the potential difference between the metallic structures and a reference electrode to identify the correct potential level against the corrosion of the infrastructures. Then, the measured data are transmitted to a central office to remotely keep track of the status of the corrosion monitoring (CM) system. To date, the RCM system is designed to achieve low power consumption, so that it can be simply powered by batteries. However, due to memory effect and the limited number of recharge cycles, it can entail the maintenance fee or sometimes cause failure to protect the metallic structures. To address this issue, the low-overhead energy harvesting circuitry for the RCM systems has designed to replenish energy storage elements (ESEs) along with redeeming the leakage of supercapacitors. Our developed energy harvester can scavenge the ambient energy from the corrosion monitoring environments and store it as useful electrical energy for powering local data-acquisition systems. In particular, this paper considers the energy harvesting from potential difference due to galvanic corrosion between a metallic infrastructure and a permanent copper/copper sulfate reference electrode. In addition, supercapacitors are adopted as an ESE to compensate for or overcome the limitations of batteries. Experimental results show that our proposed harvesting schemes significantly reduce the overhead of the charging circuitry, which enable fully charging up to a 350-F supercapacitor under the low corrosion power of 3 mW (i.e., 1 V/3 mA).

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

A Study on Wireless Data Quality Measurement Method for u-Healthcare Service in WiBro Environment (WiBro 환경에서의 u-Healthcare 서비스를 위한 무선데이터 품질 측정 방안 연구)

  • Shim, Jae-Sung;Yun, Sung-Yeol;Park, Seok-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.834-841
    • /
    • 2012
  • In order to the mobile service uses the wireless terminal including the development of the wire wireless network and Smart phone, and etc. use including mobile office, which and etc. increases. Because in order that the u-Healthcare service using this appeared before the footlights and the existing quality measurement reference considered the speed, error rate, and etc. just, guarantees the stability of the u-Healthcare, the quality control by service are necessary. In this paper, the quality measurement reference by mobile service considering the radio environment as the method for satisfying the quality guarantee of the u-Healthcare mobile service user and user needs was presented. The WiBro u-Healthcare wireless data service quality based system in the end user perspective was established through the main performance index and entrepreneur case presented in the international standardization institute including 3GPP, WiMAX forum, GSMA, and etc. through the related research and the validity of the quality index establishment was presented according to each service.

Analysis of trends on patents for unmanned technology used in agriculture

  • Lee, Choong-Han;Kim, Wan-Soo;Choi, Chang-Hyun;Noh, Hyun-Seok;Hong, Soon-Jung
    • Korean Journal of Agricultural Science
    • /
    • v.45 no.1
    • /
    • pp.114-119
    • /
    • 2018
  • This study analyzed the trends of patents for unmanned technology used in agriculture. The target countries for this survey of patent data were Korea, the USA and Japan as well as the countries in Europe. The indices used in this study to analyze the patents were the CPP (Cites Per Patent), PII (Patent Impact Index), and PFS (Patent Family Size). The total effective patents for unmanned technology used in agriculture were 1,080 cases. The number of patents in the USA, Japan, Europe, and Korea were 541, 326, 128 and 85 cases, respectively. Among the total effective patents, the evaluation scores for selected important patents were calculated by applying commonly used weights to each index, and the top 10 patents were selected as important patents. The results showed that all the top ten patents are owned by the United States and that the United States is an advanced country in the field of unmanned technology used in agriculture. The evaluation score of the important patents using the existing method was biased toward the PII index among the three patent evaluation standards, and the effects of the number of claims and the PFS were relatively small. Therefore, a reliable patent analysis in the field of unmanned technology used in agriculture needs to reflect the overall evaluation factors taking into consideration the scope of the evaluation factors.

On the Effect of Perceived Security, Perceived Privacy, Perceived Enjoyment, Perceived Interactivity on Continual Usage Intention through Perceived Usefulness in Mobile Instant Messenger for business (업무용도로 이용되는 모바일 인스턴트 메신저에서 인지된 보안성, 인지된 프라이버시, 인지된 즐거움, 인지된 상호작용성이 지속이용의도에 미치는 영향에 관한 연구)

  • Lee, Jieun;Hwang, Changyu;Kwon, Dosoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.159-177
    • /
    • 2015
  • As smart phones become more common nowadays, mobile instant messengers such as kakao talk and line are used as essential communication tools exchanging information between individuals. Also, the mobile instant messengers extend their use to business area beyond communication between individuals. This study is on how factors of mobile instant messenger such as perceived security, perceived privacy, perceived enjoyment and perceived interactivity affect business continual usage intention through perceived usefulness. The proposed model is based on Expectation-Confirmation Theory of Oliver and Technology Acceptance Mode of Bhattacherjee. For an analysis, 159 survey responses were collected from the office workers in Seoul and nearby cities, having experiences of mobile instant messengers. To validate the proposed research model, PLS analysis is performed with the valid 154 questionnaires. The path analysis results are as follows. First, perceived security has a positive effect on expectation-confirmation. Second, perceived enjoyment has a positive effect on perceived usefulness. Third, perceived interactivity has a positive effect on both perceived usefulness and expectation-confirmation. Fourth, perceived usefulness has a positive usefulness on satisfaction and continual usage intention of mobile instant messenger. Last, expectation-confirmation has a positive effect on perceived usefulness, and satisfaction has a positive effect on continual usage intention of mobile instant messenger. Since the mobile instant messenger may bring a pressure of work and a violation of privacy, it is necessary that the company provide a guideline for use of the mobile instant messenger and establish the in-house mobile instant messenger system.