• Title/Summary/Keyword: cyber behavior

Search Result 255, Processing Time 0.028 seconds

Segmenting blog users and its implications to the e-commerce behavior (블로그 사용자의 세분화와 전자상거래에 미치는 영향에 관한 연구)

  • Shin, Min-Soo;Yum, Ji-Hwan;Lee, Woo-Yeul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4320-4330
    • /
    • 2010
  • Blogs that allow two way communications are open to the public more than 20 million sites these days. The study tries to categorize and classify blogs based on the common representative factors. As blogs are changing dynamically, the study also tries to figure out key factors either for growing or perishing dynamics. The study develops the research idea from the independent variables such as contents factors and psychological factors to the controlling factors such as trust, attitude, and purchasing intention. The research found out that opinion leading and information seeking tendency are significantly related to the attitude to the internet shopping mall.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

A Pre-processing Process Using TadGAN-based Time-series Anomaly Detection (TadGAN 기반 시계열 이상 탐지를 활용한 전처리 프로세스 연구)

  • Lee, Seung Hoon;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.3
    • /
    • pp.459-471
    • /
    • 2022
  • Purpose: The purpose of this study was to increase prediction accuracy for an anomaly interval identified using an artificial intelligence-based time series anomaly detection technique by establishing a pre-processing process. Methods: Significant variables were extracted by applying feature selection techniques, and anomalies were derived using the TadGAN time series anomaly detection algorithm. After applying machine learning and deep learning methodologies using normal section data (excluding anomaly sections), the explanatory power of the anomaly sections was demonstrated through performance comparison. Results: The results of the machine learning methodology, the performance was the best when SHAP and TadGAN were applied, and the results in the deep learning, the performance was excellent when Chi-square Test and TadGAN were applied. Comparing each performance with the papers applied with a Conventional methodology using the same data, it can be seen that the performance of the MLR was significantly improved to 15%, Random Forest to 24%, XGBoost to 30%, Lasso Regression to 73%, LSTM to 17% and GRU to 19%. Conclusion: Based on the proposed process, when detecting unsupervised learning anomalies of data that are not actually labeled in various fields such as cyber security, financial sector, behavior pattern field, SNS. It is expected to prove the accuracy and explanation of the anomaly detection section and improve the performance of the model.

Choice versus Given: Influence of Choice on Effectiveness of Retailers' Sweepstakes Promotion

  • Meeja IM
    • Journal of Distribution Science
    • /
    • v.21 no.6
    • /
    • pp.39-49
    • /
    • 2023
  • Purpose: This paper aims to investigate the influence of different methods of distributing sweepstakes (i.e., whether consumers choose to enter into the sweepstakes themselves or they are given the sweepstake ticket by default) on the effectiveness of the sweepstakes promotion (i.e., interest in the sweepstakes and intention to participate in the sweepstakes). Research design, data and methodology: The paper verifies this effect through three experimental studies: an online experiment using a sweepstakes promotion scenario at a department store, an online SNS sweepstakes promotion event, and a face-to-face card lottery game. Results: Participants belonging the group that chose sweepstakes tickets by themselves showed higher interest and intention to participate in the sweepstakes than those who were given the sweepstakes ticket by default. Furthermore, the group that chose the sweepstakes card thought it had a higher probability of winning than the group given the sweepstakes card. Conclusions: This paper shows a way to enhance the promotional effect of sweepstakes in the retail stores, without incurring additional costs, by approaching from sweepstakes design from the psychological perspective of the consumer. The study also sheds new light on the effect of sense of control manipulation using choice behavior in the promotional context.

Corporate Financial Fraud and Countermeasures in the Internet Era (인터넷 시대 기업의 재무부정과 대책)

  • Huang, Weidong;Jin, Shanyue
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.35-40
    • /
    • 2022
  • With the advent of the internet age and the outbreak of COVID-19, many companies have embraced online trade. However, due to the way the cyber economy works, the number of companies engaged in financial fraud by falsifying their transaction amounts and customer numbers has been gradually increasing. The purpose of this study is to analyze financial fraud of companies in the Internet era and to present solutions. Therefore, this study analyzed the financial fraud behavior of Luckin Coffee in China as an example and studied the causes and countermeasures of financial fraud. As a result, it was found that the cause of financial fraud lies in the opacity of cash flows from online transactions. The recommendations proposed by this study is to improve internal control systems in companies, develop risk management system, and establish comprehensive external supervision system

Effects of Traditional Market Service Quality Factors on Customer Value, Relational Quality, and Behavioral Intention (전통시장의 서비스품질요인이 고객가치, 관계품질, 행동의도에 미치는 영향)

  • Choo, Myeong-Jo;Jung, Yeon-Sung
    • Journal of Distribution Science
    • /
    • v.13 no.11
    • /
    • pp.79-92
    • /
    • 2015
  • Purpose - The aim of this study is to develop an empirical model of the effects of traditional market service quality factors on customer value, relationship quality, and behavior. The specific objectives of the study are as follows: 1) to classify study objects into cultural tourism markets and non-cultural tourism markets as well as to verify the differences in service quality among the two markets and, 2) to present practical service marketing methods that fit with the characteristics of the traditional markets by amending the five quality evaluation items of SERVQUAL (a multiple-item scale for measuring service quality)to suit the characteristics of the traditional markets and establish the relationship among customer value, relationship quality, and behavior intention. Research design, data, and methodology - The study methods of empirical investigation are as follows. First, this study selected for a study object the Suwon Paldalmun Gate Market to represent the cultural tourism market, and general traditional markets to represent the non-cultural tourism market. This study also conducted personal interviews in order to increase the response rate and collected a total of 418 responses between March 18, 2014 and April 05, 2014. The total of 418 responses used for this study excluded 14 responses that had either misleading information or missing values. Results - This study verified the perceived differences of service quality based on traditional market specialization through an independent sample t-test. It appeared that the perceived service quality of the cultural tourism market was generally higher than that of the non-cultural tourism market. This study executed a path analysis in order to examine the effects of service quality factors on customer value, relationship quality, and behavior intention. This study also comprehensively analyzed the specialized market and non-specialized market separately. Although there were some differences among the results, the overall results were uniform. It appeared that convenience, reliability, and empathy, among the service quality factors, exerted meaningful effects on customer value. On the other hand, convenience, reliability, responsiveness, and empathy, excluding the tangibles, exerted meaningful effects on the relationship quality. In addition, it appeared that all service quality factors exerted meaningful effects on the customer value, relationship quality, and behavior intention. Therefore, the study verified that all of the hypotheses formulated in the study were generally adopted. Conclusions - The implication of this study may be classified into academic and practical implication as follows. With respect to the academic implication, it seems that this study is among the early studies to verify the differences between the cultural tourism market and the non-cultural tourism market. The practical implication of this study is that the perceived service quality, such as convenience, reliability, responsiveness, and tangibles, excluding empathy, was higher in the cultural tourism market than in the non-cultural tourism market. This means that customer satisfaction is enhanced by governmental aid such as hardware, software, and information and communications technology.

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

A Study on the Multiculturalism Phenomena Expressed in Contemporary Fashion of the End twentieth century (20세기말 현대패션에 나타난 다문화주의(Multiculturalism) 현상에 관한 연구)

  • 최혜정;임영자
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.2
    • /
    • pp.149-167
    • /
    • 2001
  • Today, every culture has taken on the compromise form by means of the cultural difference, variety, and pluralism according to the internationalization and the advance so that it has been developed toward the half-blooded and multilayered the aspect. In accordance with this current of the times, this thesis observed the feminism found in the multiculturism of the end of the 20th century, the third world, and technology with the side of the tendency of modern fashion, considered the hybride phenomenon which is pulling down the wall between culture and genre due to the social diversification. and predicted the fashion trend do 21st century serf on it. Multiculturism is the movement that began to arise in the academic world of America and the literary world form the close of 1980's in accepting the variety of culture and regarding the culture with the more balanced and wide view and just as it is, it means the attitude of accepting one or more cultures of variely and the position of taking interest in the culture of minority race not the culture of a governing race. It is the fashion of feminism adapts dualism like unisex, androgynous look, etc of bisexual lendency in the 1980's, it shows new style with crossover of liberal sense because there is not the difference of sex in fashion. The eco-feminism pursues the natural sexuality not being instrumental and dismantling and expressed it in the Gender expression of an integrated human being. The trend of ethnic fashion in the close of 20th century is that the element of hippie is working so strongly. By adding embroidery of Oriental style, accessories of Indian style, feathers, beads, a hempen hood to the ethnic costumes of Asia and Latin, is shows the figure of ethnic hippie. As the cycler fashion is the future clothes through technology of computer, it uses a cool glass material bringing up the image of a spacesuit in order to expresses cyber image through artificial color combination of sheen colors, Though this techno-color fashion has established the fresh stimulation and the innovative aspect with ultramodern materials and image of futurism, it transmits a hope of estranged people and the natural elements. Hybride means a cross and mixture of animal and plant in Korean and is also called fusion. The phenomenon of hybrid predicts to comes the period of a cross and variation because something completely new comes into the world by contamination, mixture and compromise through meeting something different each other and it has on advantage of developing something existing to one more stage. It is prospected that in the society of 21st century, the borderline of traditional gender will be disappeared, variety and individuality will determine the individual behavior, and the masculine value will be substituted by feminine value. In the society giving priority to feminine value, a fashion stuck closely to women is what must reflect lives of woman under the proposition of woman's beauty, being on original function. So, it is considered that a fashion with added convenience and practicality having the function which is easy to put on, comfortable to act, able to express solves so much, and able to show various appearances according to T.P.O will get into the spotlight.

  • PDF

A Mathematics Tutoring Model That Supports Interactive Learning of Problem Solving Based on Domain Principles (공식원리에 기반한 대화식 문제해결 학습을 지원하는 수학교수 모형)

  • Kook, Hyung-Joon
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.429-440
    • /
    • 2001
  • To achieve a computer tutor framework with high learning effects as well as practicality, the goal of this research has been set to developing an intelligent tutor for problem-solving in mathematics domain. The maine feature of the CyberTutor, a computer tutor developed in this research, is the facilitation of a learning environment interacting in accordance with the learners differing inferential capabilities and needs. The pedagogical information, the driving force of such an interactive learning, comprises of tutoring strategies used commonly in various domains such as phvsics and mathematics, in which the main contents of learning is the comprehension and the application of principles. These tutoring strategies are those of testing learners hypotheses test, providing hints, and generating explanations. We illustrate the feasibility and the behavior of our propose framework with a sample problem-solving learning in geometry. The proposed tutorial framework is an advancement from previous works in several aspects. Firstly, it is more practical since it supports handing of a wide range of problem types, including not only proof types but also finding-unkown tpes. Secondly, it is aimed at facilitating a personal tutor environment by adapting to learners of varying capabilities. Finally, learning effects are maximized by its tutorial dialogues which are derived from real-time problem-solving inference instead of from built-in procedures.

  • PDF

The effect of job stress of system maintenance staff on emotion exhaustion: Focusing on the moderating effect of professional identity (정보시스템 운영인력의 직무 스트레스가 정서적 소진에 미치는 영향: 전문직 정체성의 조절효과를 중심으로)

  • Lee, Ji-Eun;Lim, Hee-Jeong
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.97-105
    • /
    • 2018
  • The fourth industrial revolution is expected to bring about great changes in information technology sector and create a variety of jobs. However, the psychological anxiety of IT staff is increasing due to stress and uncertainty created by the new technologies. Accordingly, researchers examined how professional identity moderate the effect of job stress of system maintenance staff on emotion exhaustion. For empirical studies, data was collected from 160 employees responsible for managing and supporting IS, and the hypothesis was verified using SPSS 21. The analysis results showed that role conflicts, role ambiguity, and qualitative work overload, which are components of job stress, have affected the emotion exhaustion. Professional identity had a moderating effect the relationship between qualitative work overload and emotion exhaustion. On the other hand, professional identity did not moderate the relationship between role conflict and emotion exhaustion, role ambiguity and emotion exhaustion. As professional identity lessen the psychological burden and emotion exhaustion of introducing new technologies, organizations need to provide support to enhance professional identity for system maintenance staff.