• Title/Summary/Keyword: asset protection and management

Search Result 53, Processing Time 0.02 seconds

Purchase Intention on Online Financial Products among Chinese Consumer (중국인 소비자의 온라인 금융 상품에 대한 구매의도 분석)

  • LI, Zhipeng;Chong, Hyi-Thaek;Lee, Sang-Joon;Lee, Kyeong-Rak
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.89-102
    • /
    • 2018
  • With the development of mobile technology, asset management on the Internet have also developed a lot. Drawing on Technology Acceptance Model, this study examines YUEBAO deployment to model consumers' purchase intention to use financial products offered online. In this study, we hypothesized that the characteristics of online asset management product will affect the purchase intention through perceived usefulness and conduct empirical analysis on Chinese consumers. In the study model, the independent variables were considered to include individual involvement, experience, product protection, corporate credibility, convenience, mobility, and familiarity. In addition, the parameters constitute the usefulness, and the dependent variable is the purchase. The results are as follows. First, YUEBAO's complementarity, corporate credibility, convenience, and familiarity have a significant influence on YUEBAO's usefulness. Second, The YUEBAO's usefulness has a noticeable effect on the purchase intention. To perceive the high usefulness, the practicality strategy of enhancing the protection property, corporate reliability, convenience and familiarity of the online asset management product is needed. The study of consumer purchase behavior and consumer purchase intention of online wealth management products is very valuable for academic and practical work.

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.

Fire due to an important national cultural protection measures research (화재로 인한 국가 중요 문화재 보호대책 연구)

  • Lee, Jeong-Il
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2013.04a
    • /
    • pp.485-500
    • /
    • 2013
  • Cultural assets of the country's history and cherish the living conditions of the people, conscious and cohesive crystals, and the pride of the hearts of the people as a haven. In the country worth preserving national treasure, bomulgeup, local cultural heritage as a major cultural property protection are. Cultural properties, etc. Most are wooden, is vulnerable to fire, and, moreover battling to far away from the city and due to the geographical conditions are very challenging aspects. The national cultural assets, such as the many temples, vows to fire one if the loss of a centuries-old cultural property is a big loss of national posterity to great shame is not. Still cultural assets and a large number of visitors have flocked temples. All of us to keep the look and feel of the cultural assets pleasure to conserve cultural assets preserved to ensure that fire prevention is always unmistakably bear in mind that sees.

  • PDF

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Factors Affecting Technological Innovation in Manufacturing Companies in Korea-The Role of Intellectual Property Management (IP관리가 기술혁신활동에 미치는 요인분석)

  • Kim, Eung-Do;Bae, Khee-Su
    • Korean Management Science Review
    • /
    • v.31 no.4
    • /
    • pp.29-42
    • /
    • 2014
  • As society proceeds rapidly toward a knowledge-oriented stage, knowledge as an intangible asset has gained increasing importance. Companies increase their competitiveness and generate extra value through continuous investments in the management of intellectual property (IP). Thus, the prime concerns of companies have been protection of their technological innovation output through filing for IP rights, and maximization of their interests through utilization of intangible assets. Despite the importance of technological innovation in the management of a company, few studies have analyzed the key factors in the management of IP and activities for technological innovation. This study aims to derive policy implications for managing IP and effective capacity building for technological innovation. For this purpose, the author has employed empirical tests to identify the major factors influencing the direction of technological innovations in a company.

Factors Influencing the Introduction of Mobile Security Technology (기업 모바일 보안기술 도입에 영향을 미치는 특성요인)

  • Choi, Woong-Gyu;Lee, Young-Jai
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.215-240
    • /
    • 2013
  • This research has reviewed the major composition concepts and the positive research results in the selected studies which were theoretically based on IDT (Innovation Diffusion Theory), IRM (Model of Innovation Resistance), TAM(Technology Acceptance Model), and IAPA(Information Asset Protection Activity) in order to improve the theoretical explanation of major characterized factors influencing on the introduction of MST (Mobile Security Technology). The characterized factors for the adaptation of MST and 17 hypotheses on the MST study models in order to test the effects on the intention to use are empirically verified by utilizing the analysis method of structure equation model. As a result of a study, First, the most influential characterized factors of IRM are shown as compatibility, complexity, relative advantage, information asset protection in order. Second, the characterized factors affecting intention to use are shown as relative advantage, compatibility, innovation resistance, performance expectancy. The results of this study are relevantly significant to establish the theoretical foundation of the study on the adaptation of MST and The verification of the characterized factors provide strategic implication for the introduction of MST and policy direction which alleviates informational gap between new MST and previous Security Technology to diffusion agency.

Reliable blockchain-based ring signature protocol for online financial transactions

  • Jinqi Su;Lin He;Runtao Ren;Qilei Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2083-2100
    • /
    • 2023
  • The rise of Industry 5.0 has led to a smarter and more digital way of doing business, but with it comes the issue of user privacy and security. Only when privacy and security issues are addressed, will users be able to transact online with greater peace of mind. Thus, to address the security and privacy problems associated with industry blockchain technology, we propose a privacy protection scheme for online financial transactions based on verifiable ring signatures and blockchain by comparing and combining the unconditional anonymity provided by ring signatures with the high integrity provided by blockchain technology. Firstly, we present an algorithm for verifying ring signature based on distributed key generation, which can ensure the integrity of transaction data. Secondly, by using the block chain technique, we choose the proxy node to send the plaintext message into the block chain, and guarantee the security of the asset transaction. On this basis, the designed scheme is subjected to a security analysis to verify that it is completely anonymous, verifiable and unerasable. The protection of user privacy can be achieved while enabling online transactions. Finally, it is shown that the proposed method is more effective and practical than other similar solutions in performance assessment and simulation. It is proved that the scheme is a safe and efficient online financial transaction ring signature scheme.

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors (핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

An Exploratory Study on the Core Technology of the Fourth Industrial Revolution and Information Security Organization: Focusing on Firm Performance (4차산업혁명 핵심기술 도입 및 정보보호조직에 관한 탐색적 연구: 성과측면에서의 비교분석)

  • Kim, Kihyun;Cho, Hyejin;Lim, Sohee
    • Knowledge Management Research
    • /
    • v.21 no.1
    • /
    • pp.41-59
    • /
    • 2020
  • This explorative study examines the difference in firm performance according to the adoption of the core technology of the Fourth industrial revolution, including artificial intelligence(AI), internet of things (IoT), cloud computing, and big data technology. Additionally, we investigate the importance of internal organizational structure exclusively responsible for information security. We analyze unique microdata offered by the Korea Information Society Development Institute to examine the impact of the adoption of the new technologies and the existence of organizational structure for information protection on firm performance, i.e., firm sales. By considering the core information technology as powerful knowledge assets, we argue that the adoption of such technology leads firms to have comparative advantage comparing to the competitors. Also, we emphasize the need to consider the organizational structure suitable for information security, which can become a structural asset of a firm.

A Comparative Study on the Natural Monument Management Policies of South and North Korea (남.북한의 천연기념물 관리제도 비교)

  • Na, Moung-Ha;Hong, Youn-Soon;Kim, Hak-Beom
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.35 no.2 s.121
    • /
    • pp.71-80
    • /
    • 2007
  • Korea began preserving and managing natural monuments in 1933 under Japanese Colonization, but North Korea and South Korea were forced to establish separate natural monument management policies because of the division after the Korean Independence. The purpose of this study is to compare and analyze the natural monument management policies of both south and North Korea between 1933 and 2005 to introduce new policies for Korea unification. The following are the results: First, South Korea manages every type of cultural asset, including natural monuments, through the 'Cultural Heritage Protection Act,' whereas North Korea managing its cultural assets through the 'Cultural Relics Protection Act' and the 'Landmark/Natural Monument Protection Act.' Second, South Korea preserves and utilizes natural monuments for the purpose of promoting the cultural experience of Korean people and contributing to the development of world culture, whereas North Korea uses its natural monuments to promote the superiority of socialism and protect its ruling power. Third, North and South Korea have similar classification systems for animals, plants, and geology, but North Korea classifies geography as one of its natural monuments. Unlike South Korea, North Korea also designates imported animals and plants not only for the preservation and research of genetic resources, but also for their value as economic resources. Fourth, North Korea authorizes the Cabinet to designate and cancel natural monuments, whereas South Korea designates and cancels natural monuments by the Cultural Heritage Administration through the deliberation of a Cultural Heritage Committee. Both Koreas' central administrations establish policies and their local governments carry them out, while their management systems are quite different. In conclusion, it is important to establish specified laws for the conservation of natural heritages and clarified standards of designation in order to improve the preservation and management system and to sustain the diversity of natural preservation. Moreover it is also necessary to discover resources in various fields, designate protection zones, and preserve imported trees. By doing so, we shall improve South Korea's natural monument management policies and ultimately enhance national homogeneity in preparation for the reunification of the Koreas in the future.