• Title/Summary/Keyword: Social security

Search Result 1,972, Processing Time 0.021 seconds

Mobile Digital Forensic Procedure for Crime Investigation in Social Network Service (소셜 네트워크 서비스에서 사건 수사를 위한 모바일 디지털 포렌식 절차에 관한 연구)

  • Jang, Yu Jong;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.3
    • /
    • pp.325-331
    • /
    • 2013
  • Social network services(SNS) has been used as a means of communication for user or express themselves user. Therefore, SNS has a variety of information. This information is useful to help the investigation can be used as evidence. In this paper, A study of mobile digital forensic procedure for crime investigation in social network service. Analysis of database file taken from the smartphone at social network service application for mobile digital forensic procedure. Therefore, we propose a procedure for the efficient investigation of social network service mobile digital forensic.

The Introduction of Modern Technologies in Public Administration in the Context of Globalization

  • Dragomyretska, Natalia;Palagnyuk, Yuliana;Andriyash, Viktoria;Matvieienko, Iryna;Samofalov, Dmytro
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.334-340
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern technologies in the public administration system in the context of globalization. Public administration is inherent in all known models of representation of social systems, characteristic management and other sciences of social management. This allows using the methods and technologies of management, marketing, social partnership and others in public administration and administration at a modern level. One of the main directions of public management and administration is social engineering, aimed at the development and development of the country's social system, and the tool is appropriate technologies. Based on the results of the analysis, the key modern technologies of the public administration system were identified in the context of the impact of globalization.

Features and Tendencies of the Digital Marketing Use in the Activation of the International Business Activity

  • Zhygalkevych, Zhanna;Zalizniuk, Viktoriia;Smerichevskyi, Serhii;Zabashtanska, Tetiana;Zatsarynin, Serhii;Tulchynskiy, Rostislav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.77-84
    • /
    • 2022
  • The study highlights the features and trends of digital marketing for international business. To achieve these goals, the authors used a systematic approach that allows a comprehensive approach to the object of study, as well as used general and specific methods of scientific knowledge on the application of digital marketing for international business. The dynamics of the number of users of social networks in the world is analyzed, which allowed us to conclude about the steady trend of increasing the number of users of the Internet and social networks, as well as the time spent by users on social networks. The study of the dynamics of the number of users of social networks provides increased efficiency in the use of digital marketing tools to enhance international business. The most effective digital marketing tools for international business, including artificial intelligence, conversational marketing, chatbots, personalization, video marketing, live shopping, social media stories, interactive content, omnic marketing, augmented reality and technology immersion, native advertising, green marketing and mobile commerce.

The Social Media Factor: How Platforms Impact Usability of Blackboard at Umm Al Qura University

  • Ahmed R Albashiri
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.207-213
    • /
    • 2024
  • This study investigated the perceived usability of the Blackboard learning management system (LMS) amongst students at Umm Al-Qura University. A quantitative approach was employed to explore the potential relationship between Blackboard usability and social media platform usage. Additionally, the study aimed to identify other factors influencing perceived usability. Data were collected through a three-section questionnaire distributed electronically to a sample of students (n=544). The findings, based on System Usability Scale (SUS) scores, revealed that the overall perceived usability of Blackboard resided near the midpoint of the scale, indicating an "acceptable" level. A potential negative correlation emerged between social media usage time and perceived Blackboard usability. Students who reported lower social media usage exhibited higher SUS scores. Training on Blackboard usage demonstrably exerted a positive influence on perceived usability. Gender was not identified as a statistically significant factor. An analysis of student support methods revealed that seeking help from a friend was the most prevalent approach, followed by search engines, university technical support, and social media platforms. The findings suggest that implementing strategies to improve Blackboard usability at Umm Al-Qura University could be achieved through readily accessible training materials and the exploration of alternative support channels.

A Study on Security Methods Against Stalking Crime (스토킹 범죄의 현황과 대책)

  • Lee, Sang-Chol;Kim, Pyong-Soo
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.263-289
    • /
    • 2002
  • This study would focus on actual conditions of stalking, which are getting more serious, and security methods. In current society, there has been rapid change inprocess towards the information society from the industrial society. This aspect of change has brought out the wide range of social and pathological situations. Moreover, it has produced a number of new types of crime, which can not be analysed by the values of traditional ethics and morals. Currently, there have been the appearance of diverse types crime, however, the stalking can be regarded as a kind of new comer in the issue of contemporary crimes. The stalking has been focused on famous people and entertainers in the past, whereas more seriously, the range of victims has expanded to the general public in recent. In particular, the stalking is closely connected with sexual harrassment. The most of the stalking have happened between men and women. Therefore, it can be mentioned that shadowing, trespassing, threatening, watching and concealment in the first would move on harrassment and even murder. The stalking has been based on anonymity, following the information- oriented trend. Also, it shows its seriousness that the range of stalking victims has been expanded from limited people to the general public. Hence, all possible governmental and private resources need to be converged into the construction of social, legal and security methods for the protection and counterplan against the stalking.

  • PDF

A Study on Hotel CRM(Customer Relationship Management) using Big Data and Security (빅 데이터를 이용한 호텔기업 CRM 및 보안에 관한 연구)

  • Kong, Hyo-Soon;Song, Eun-Jee
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.69-75
    • /
    • 2013
  • Customer is the base factor of income for some corporations, so that effective CRM (Customer Relationship Management) is very important to develop the business. In order to use CRM efficiently, we should figure out customers' demands and provide services or products that the customers want. However, it is getting difficult to comprehend customers' demands because they have complicated form and getting more diverse. Recently, social media like Twitter and Facebook let customers to express their demands, and using big data is a very effective method for efficient CRM. This research suggests how to utilize big data for hotel CRM, which considers customer itself as asset of business. In addition, we discuss security problems of big data service and propose the solution for that.

Evaluating the Efficacy of Income Security System of Korea (한국 소득보장제도군의 효과성 평가)

  • Kang, Shin-Wook
    • 한국사회정책
    • /
    • v.24 no.1
    • /
    • pp.213-237
    • /
    • 2017
  • It is essential in social policy evaluation to examine how effectively they protect people from social risks. The aim of this study is to evaluate the effectiveness of five income security programs of Korea in coping with poverty, using KoWEPs data. We analyse the coverage and adequacy of these programs, joint as well as individual, for each sub-groups. As a result, it was found that 35% of the poor get none of the benefits. The coverage and adequacy for the aged is rather high. However, for the working age people, the unemployed in particular, are very poorly covered and average benefits levels are very low. These findings imply that there are much room and demand for improvement of Korean income security program, especially for working age population.

Factors affecting social commerce acceptance - Perceived risks and social networking sites (SNS) use -

  • Park, Hansil;Babicheva, Eva;Lee, Kyu-Hye
    • The Research Journal of the Costume Culture
    • /
    • v.26 no.4
    • /
    • pp.547-562
    • /
    • 2018
  • As social media penetrates more deeply into people's everyday lives, social commerce (a type of commerce that combines SNS features and possibility for commercial transactions) has enjoyed unprecedented growth. Shopping on Facebook is a representative example of social commerce platform that allows consumers to interact with other users, exchange information and purchase products without leaving a Facebook page. Social commerce presents great opportunities for marketers in terms of leveraging social aspects of shopping experience. It also offers a large potential for Korean companies to reach various target markets, as well as establish their presence abroad. Yet, acceptance of social commerce as a legitimate shopping channel has been slow, and consumers are still hesitant to shop via Facebook. This study draws on uses and gratification theory and the concept of perceived risk to examine how different motives for SNS use and the associated types of perceived risks can affect the purchase intention on the platform. Empirical data from 288 young users of Facebook were analyzed. Findings identified two main motives for SNS use: information-related motive and communication-related motive. Information-related motive significantly affected the intention to shop on Facebook, whereas communication-related motive did not have any significant influence. Risks associated with shopping via Facebook included delivery risk, security risk, social risk and economic risk. Overall, consumers perceived a higher level of security and social risk associated with shopping on Facebook. However, only social risk had a significant negative influence on the purchase intention. Awareness and previous experience of buying via social commerce platform positively affected consumers' purchase intention.

A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems (지능형교통시스템의 보안취약점 개선방안에 관한 연구)

  • Jo, Pyoung Hyun;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.531-543
    • /
    • 2013
  • The destruction and prejudice of major infrastructure such as energy, broadcast, communication and transportation could result in a threat to individual rights and liberties, as well as social and economic losses. If a traffic signal control facilities have been violated, the lives of the citizens discomfort as well as causing social disruption such as traffic accident. Because the control system is operating as a closed network and you think it is safe, the information protection system has not been built or security patches and anti-virus updates do not work properly. So, cyber attacks by security vulnerabilities are exposed. Therefore, there is a need to identify the characteristics of the system, and develop appropriate countermeasures in order to prevent cyber attacks and prejudices incidents. This paper examines the vulnerabilities of Intelligent Transport Systems and proposes the improvement of security vulnerabilities.

A Study on Smart City Risk Factors and Resistance (스마트시티 위험요인과 저항에 관한 연구)

  • Park, Hyunae;Yoo, Youngcheon;Lee, Hwansoo
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.15-28
    • /
    • 2020
  • Smart City is highly anticipated to solve the problems of existing cities and create new added value, but there is also increasing concern about security risks. The negative view of smart city according to security risk awareness is a problem that needs to be improved in order to activate the fourth industrial revolution technology and develop smart city. This study examined risk factors in smart cities based on perceived risk and user resistance theory, and empirically analyzed the relationship with resistance attitudes. According to the empirical analysis with 288 research samples, security, social, and physical risk factors directly affect smart city resistance, while financial, performance, and privacy risk have no significant effect. In addition, it was verified that the security risk can is an antecedent factor for other risk factors, and it was confirmed that it is required to separately discuss the security and privacy risk in the smart city environment. This study shows that it is necessary to prepare policy supports for social interactions as well as security and physical safety issues in order to activate smart city by discussing the risk factors that negatively affect smart city perception from the public's point of view.