• Title/Summary/Keyword: cyber business

Search Result 456, Processing Time 0.03 seconds

Analysis of climate change mitigations by nuclear energy using nonlinear fuzzy set theory

  • Tae Ho Woo;Kyung Bae Jang;Chang Hyun Baek;Jong Du Choi
    • Nuclear Engineering and Technology
    • /
    • v.54 no.11
    • /
    • pp.4095-4101
    • /
    • 2022
  • Following the climate-related disasters considered by several efforts, the nuclear capacity needs to double by 2050 compared to 2015. So, it is reasonable to investigate global warming incorporated with the fuzzy set theory for nuclear energy consumption in the aspect of fuzziness and nonlinearity of temperature variations. The complex modeling is proposed for the enhanced assessment of climate change where simulations indicate the degree of influence with the Boolean values between 0.0 and 1.0 in the designed variables. In the case of OIL, there are many 1.0 values between 20th and 60th months in the simulations where there are 10 times more for a 1.0 value in influence. Hence, the temperature variable can give the effective time using this study for 100 months. In the analysis, the 1.0 value in NUCLEAR means the highest influence of the modeling as the temperature increases resulting in global warming. In detail, the first influence happens near the 8th month and then there are four times more influences than effects in the early part of the temperature mitigation. Eventually, in the GLOBAL WARMING, the highest peak is around the 20th month, and then it is stabilized.

A Study on the Construction of an Ideal Internet Fashion Cyber Mall Focused on Web Design, Merchandising and Management

  • Hong, In-Sook;Ryu, Jin-Kyeung;Park, Eun-Jung;Lee, Kyung-Ah;Lee, Keum-Hee;Kim, Moon-Sook
    • The International Journal of Costume Culture
    • /
    • v.3 no.3
    • /
    • pp.201-211
    • /
    • 2000
  • The purpose of this study is to pinpoint currently arising issues concerning cyber fashion mall by analysing present status and contents of its web design, management and planning within the limits o business to customer (B2C) commerce, and to suggest a direction for building an ideal fashion mall on the internet. As for the study method, conceptual definitions were given based on previous studies. And a positive study was implemented, in which the cases of 23 chosen cyber fashion malls among 60 or so domestic and foreign malls selling fashion products were found by internet search engines and analysed. Results of the case analysis of cyber fashion malls are as follows : 1) cybermall must provide customers with an integrated service as well as e-commerce. 2) various products assortment and price differentiation must be developed, 3) the techniques of graphics, coloring and texturing, and layout design must be adopted to process and express product information, 4) the legislative system is needed to deal with the security, and 5) design and management of customer oriented interface are needed to process and express product information matter of electronic payment and customer protection. Considering the issues in internet fashion cybermalls, are suggested the important factors that are necessary or web design, planning and management to build an ideal cyber fashion mall. These results will contribute to the development of fashion e-commerce.

  • PDF

A Study on Improvement of Cyber Security Framework for Security Operations Center (보안관제 조직을 위한 사이버보안 프레임워크 개선에 관한 연구)

  • Cho, Changseob;Shin, Yongtae
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.111-120
    • /
    • 2019
  • As cyber-attacks become more intelligent and sophisticated, the importance of Security Operations Center(SOC) has increased and the number of SOC has been increasing. In order to cope with cyber threats, institutions and organizations use a variety of cyber security standards to create business procedures. However, SOC often need to be improved in accordance with the SOC environment because they collaborate with managed security service specialists rather than their own personnel. The NIST cyber security framework, information security management system, and managed security service companies were compared and analyzed. As a result, it was found that the NIST CSF is a framework that is easy to apply to managed security service, The content was judged to be insufficient. Therefore, in this study, NIST CSF was used as a reference model to derive the management items required for SOC environment, and the necessity, importance and ease of each item were confirmed through an Delphi technique and an improved cyber security framework was proposed.

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

The Distribution Industry's Social Responsibility and Ethics Management: Effects on Corporate Trust and Loyalty

  • Yoon, Nam-Soo;Kim, Young-Ei
    • Journal of Distribution Science
    • /
    • v.12 no.7
    • /
    • pp.23-35
    • /
    • 2014
  • Purpose - This study aims to explore the effects of social responsibility activities and business ethics practices on corporate trust and loyalty in the context of a large retail distribution business. Research design, data, and methodology - The data collected was analyzed using PASW Statistics 18.0. In order to verify the demographic characteristics, frequency analysis was conducted on the data. Results - The results of the study were as follows. First, social responsibility activities had a significant effect on corporate trust. Second, both corporate social responsibility activities and business ethics practices had significant effects on loyalty. Third, corporate trust had a significant effect on loyalty. Fourth, corporate social responsibility activities and consumer protection activities had a partial mediation effect, while environmental protection activities and social contribution activities had complete mediation effects. Conclusions - This study clarified and explained the factors of corporate social responsibility activities and business ethics practices that customers value, and analyzed the influence of these factors on corporate trust and loyalty.

Consumer's Textile Sensibility in regard to Purchase Experience of Apparel Products in e-Business

  • Shin, Sang-Moo
    • Journal of Fashion Business
    • /
    • v.6 no.6
    • /
    • pp.105-111
    • /
    • 2002
  • E-business has been regarded as new type of marketing channels and has been growing rapidly. The purpose of this study was to investigate textile sensibility depending on consumers' purchase experience of apparel product in e-business. The analyses of 202 questionnaires were conducted by frequency, mean, and standard deviation, and t-test using SPSS 10.0. Computer setting environment was 1280$\times$1024 resolution with 96 DPI (dots per inch) for this experiment. The results of this research were as follows: Melton (flat axis), habutae (thin axis), suede (wet axis), and terry (rustic axis) showed that there were no significant differences in textile sensibility regarding purchasing experience in the cyber apparel store. But oxford (hard axis) showed that purchasing experience group perceived less modern and smooth textile sensibility than no purchasing experience group. In case of linen (dry axis), purchasing experience group showed less modern textile sensibility. In case of muslin (soft axis), purchasing experience group had more flat and less soft textile sensibility than no purchasing experience group. In case of homespun (thick axis), purchasing experience group perceived less modern textile sensibility than no purchasing experience group.

New IT Service Business Model for Silver Users (IT서비스 기반의 실버IT 비즈니스 모델 연구)

  • Kim, Tai-Gyu;Lee, Joo-Hwan
    • Journal of Information Technology Services
    • /
    • v.8 no.4
    • /
    • pp.187-199
    • /
    • 2009
  • Content services for silver users on the ubiquitous technologies are getting attention as a new business model, monitoring users in real-time on the real-world and/or cyber-world. A lot of business and service model have been developed to apply silver or elder user. This study explained a state-of-the-art silver IT service to innovative services for users, ranging from home and finance to support for healthcare and living. Due to the variation of subtle terminologies, this study was conducted to restructure an adaptive terminology including some definitions. Current silver IT service model has been evaluated from the technical, functional, and business analyst, and its suitability has also been expressed in a proposed model and service. The purpose of this study was to propose a systematic approach of new IT service business model for silver users. A proposed model was described to explain the feasibility of the silver IT industry.

Cyber Resilience Trend Analysis (사이버 복원력 동향 분석)

  • Dong Gyun Chu;Jin Kim;Jinho Yoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.203-205
    • /
    • 2023
  • 디지털 기술의 지속적인 발전으로 여러 서비스를 제공함과 동시에 갈수록 고도화된 사이버 공격으로 인해 다양한 사이버 위험에 노출될 수 있다. 이에 본 연구에서는 사이버 공격 발생 시 신속한 사이버 복원력 확보를 위해 해외 주요국 및 기관의 관련 정책과 동향을 분석해 보고자 한다.

Estimating the Determinants for Transaction Value of B2B (Business-to-Business): A Panel Data Model Approach (패널 데이터모형을 이용한 기업간전자상거래 거래액 결정요인 추정에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Dae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.225-231
    • /
    • 2010
  • Transaction value of business-to-business(B2B) is composed of various factors for groups and time series. In this paper, we use the panel data for finding various variables and using this we analyse the factors that is major influence to transaction value of business-to-business. For analysis we looked at transaction value of business-to-business of 7 groups such as manufacturing industry, electric, gas and piped water industry, construction industry, retail & wholesale trade, traffic industry, publish, image; broad-casting & telecommunication and information service industry, etc. In our analysis we looked at the transaction value of business-to-business during the period from 2005.01 to 2009.12. We examined the data in relation to the transaction value of cyber shopping mall, company bond, composite stock price index, transaction value of credit card, loaned rate of interest in deposit bank, rate of exchange looking at the factors which determine the transaction value of business-to-business, evidence was produced supporting the hypothesis that there is a significant positive relationship between the transaction value of cyber shopping mall, composite stock price index and loaned rate of interest in deposit bank, rate of exchange. The company bond is negative relationship, transaction value of credit card is positive relationship and they are not significant variables in terms of the transaction value of business-to-business.