• Title/Summary/Keyword: cyber behavior

Search Result 255, Processing Time 0.024 seconds

A Study of Consumer Behavior on Online Shopping Discount Event - Cyber hot Days - in Korea (국내 온라인 쇼핑 할인 행사 '사이버 핫데이즈' 에서의 소비자 행동 연구)

  • Jun, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.107-115
    • /
    • 2018
  • US Retailers consider two major holiday shopping days as their most profitable-the Friday after Thanksgiving, Black Friday, and the Monday after Thanksgiving, CyberMonday. Online shopping discount events have boosted up the shopping markets resulting in pumping up National economy. For such reasons, Korea also has launched online shopping discount event, which is called 'Cyber hot days'. The primary purpose of this paper is to understand consumer behavior on Cyber hot days and suggest how retailers can harness those consumer behaviors and how government agency can support both retailers and consumers to boost up shopping markets. The results of empirical test shows that economic value, emotional value, and product variety were found to be significantly related to consumers' attitude on Cyber hot days, but convenience value, social value, and product uniqueness were not. Consumers' attitude was also found to be significantly related to the repurchase intention. It implicates that price, enjoyment, and product variety are important aspects to Korean consumers when they purchase during online shopping discount event.

The Effect of Motivation on Cyber Plagiarism in Using Social Media: The Focus of Subjective Norm's moderating Effect (소셜 미디어 사용에서 동기부여가 사이버 표절에 미치는 영향: 주관적 규범의 조절효과를 중심으로)

  • Kang, Sora;Han, Su Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.300-307
    • /
    • 2016
  • The development of computer-based information technology has led to the quantitative and qualitative growth of social media which have two sides; a positive one such as the generation and sharing of information and a negative one which includes cyber plagiarism and cyber bullying. This study seeks to understand which factors can lead to cyber plagiarism, which is the most prevalent form of unethical cyber behavior. We expected that the intrinsic and extrinsic motivations for using social media would have different effects on unethical cyber intention and that this relation between motivation and cyber unethical behavior would be moderated by the subjective norm. In order to obtain a better understanding of the relationships among the individual motivation, unethical cyber intention, and cyber plagiarism, information was obtained from 564 social media users. The respondents provided details of their experiences and attitudes regarding social media usage behavior and unethical cyber behavior. The results confirmed that extrinsic motivation significantly increases unethical intention and further leads to high levels of cyber plagiarism. The subjective norm plays a moderating role in the relationships between extrinsic motivation and unethical cyber intention. Based on the results, the theoretical and practical implications of the research findings are discussed, and recommendations for future research are provided.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

Detecting Anomalies, Sabotage, and Malicious Acts in a Cyber-physical System Using Fractal Dimension Based on Higuchi's Algorithm

  • Marwan Albahar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.

Service Quality measures in Cyber Shopping Mall (가상 상점(Cyber Shopping Mall)의 서비스품질 측정)

  • 박정훈;강기두;주희엽
    • Korean Management Science Review
    • /
    • v.17 no.3
    • /
    • pp.131-145
    • /
    • 2000
  • With the explosion of internet users, there are many enterprises and organizations that regard the internet as the great marketing superhighway. Although fascination and speculation surrounds the impact of the cyber shopping mall on consumer shopping behavior, there is little empirical evidence underlying all this speculation. This article reports on the critical issues that consumers found salient as they browsed through cyber shopping malls. We gathered consumers’reactions via open-ended survey. We relate the reactions to the factors of tangibility, assurance, responsibility, empathy, and reliability which we had identified from the existing literature on service quality. Two additional questionnaires were administered to translate these factors to the cyber shopping mall context and to explore their relative salience. We also evaluated SERVQUAL and SERVPERF as service quality measures for cyber shopping malls. The results show that SERVPERF seems more promising than SERVQUAL. The results also suggest that cyber shopping mall merchants need to think more about how they perform on the issues known to affect customers’decision making for purchasing. We offer advice for enhancing the design of cyber shopping mall.

  • PDF

A Comparative Study on the Factors Affecting the Loyalty to Cyber Communities: Focusing on Korea and India (가상공간에서의 사회적 교류가 가상공동체 몰입에 미치는 영향에 관한 연구: 한국과 인도를 비교하여)

  • Kim, Bong-Jun;Jeong, Chang-Mi;Cho, Nam-Jae
    • Asia pacific journal of information systems
    • /
    • v.14 no.2
    • /
    • pp.21-36
    • /
    • 2004
  • Since IT industry has changed very rapidly in technology, market environments, the cyber communities raise new social space. In spite of such growth of cyber communities, academic discussion is relatively limited. This Paper suggested several factors that affect the level of participator's loyalty on cyber communities. Participator's loyalty was classified into two categories, the psychological loyalty, which measure the psychological responses, and the behavior loyalty, which measure the absorption of time, the volume and frequency of visit to cyber communities. Consequently, this research has showed social awareness about cyber community culture and suggested the strategy directions for customer-oriented cyber Community Company.

Relationship of Ethics Consciousness in Internet and Moral Behavior : Analysis of The Relation among Moral Judgement, Information Ethics Judgement and Internet Ethics Consciousness of Undergraduate Students (인터넷 상에서의 윤리적 인지와 도덕적 행동 관련성 : 대학생의 도덕 판단력과 정보윤리 판단력, 인터넷윤리의식 간의 관계를 바탕으로)

  • Jang, SoonSun;Lee, OkHwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.2
    • /
    • pp.11-19
    • /
    • 2014
  • Presently the instructional model for internet ethics education is modeled after the integrated morality. The model is based on the assumption that ethical awareness will lead to ethical activities which is based on the theory that cognition is correlated to the behavioral domains. But the side effects of the information society in the cyber space increased even when the education for the awareness of ethics in the cyber space has been taught more aggressively than before. In this study, the relation of the cognition for information ethics and the ethical behavior in the cyber space was analyzed in order to find out the implications for the effective internet ethics education model. The tools used are the 'DIT (Defining Issues Test)' to measure the behavioral ability in the physical world, the Information Ethics Judgment to measure the behavioral ability in the cyber space, and the self diagnostic tool of 'Internet ethics awareness' to measure the level of cognitive knowledge for internet ethics. The correlation of three measures was analyzed. The results were college students' levels of ethics from three tools from are considerably low. Moral judgement and information ethics judgement were not correlated which means that the behavior in the physical world was not necessarily correlated to the behavior in the cyber space. The three measurements were not statistically significantly correlated. Therefore the cognitive awareness for the information ethics were not necessarily correlated to the ethical behavior in the cyber space. Ethical cognition and the moral behavior need to be taught with equal emphasis as they do not have strong correlation.

  • PDF

Cyber Shopping Mall Customer Segmentation

  • Koh, Bong-Sung;Kim, Yeon-Hyong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.13 no.1
    • /
    • pp.121-127
    • /
    • 2002
  • The volume of electronic commerce based on Internet and network traffic is increasing rapidly. The objective of this study is to examine the current status of the exponentially multiplying cyber-shopping mall phenomenon. To this end, data obtained from a single cyber-shopping mall exemplified customer purchasing behavior and provided decision tree and correspondence analysis derived customer segmentation and merchandise.

  • PDF

Fish Schooling Simulator Using Crowd Behavior Patterns (군중 행동 패턴을 이용한 Fish 군중 시뮬레이터)

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.106-112
    • /
    • 2007
  • Recently the crowd environment in the department of the animation is necessary to the digital industry. The goal of researching a proper crowd animation is to design character animation that is defined by the reality of scenes, performance of system and interaction with users to show the crowd vividly and effectively in cyber underwater. It is important to set up the crowd behavior patterns to represent for moving crowd naturally in cyber space. In the paper, we expressed the behavior patterns for flocks of fish in cyber underwater, and compared with the number of mesh, the number of fish, the number of frame, elapsed time, and resolution and analyzed them with the fish behavior simulating system.

  • PDF

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.