• Title/Summary/Keyword: cyber business

Search Result 457, Processing Time 0.029 seconds

Gender Difference on Trust in Internet-Only Banks Using the Multi-Group Path Analysis (다집단 경로 분석을 통한 남녀 간 인터넷전문은행의 신뢰 차이)

  • Nam, Sang-Wook;Hong, Eun-Joo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.99-105
    • /
    • 2018
  • The purpose to this study is to analyze the difference of trust toward Internet-only bank into two groups according to the gender. We specially examined whether there is any gap in the determinant of trust. For this, we attempted to analyze the significance of the difference in the path coefficients between the gender through latent mean and path analysis. As a results, the difference of the determinant of trust between the male and the female group occurred in the factor of benefit and security. Moreover, it reconfirmed that trust are later strongly extended to relationship commitment. These findings suggest that it's very important to establish a trust with customers.

Impact of Korea's Image on Attitudes, Norms, and Purchase Intentions of Halal Foods: A Comparison Between Indonesia and Malaysia

  • Yang, Jae-Jang;Kim, Dong-Hwan;Lee, Hee-Yul
    • Journal of Korea Trade
    • /
    • v.25 no.5
    • /
    • pp.1-18
    • /
    • 2021
  • Purpose - Although Korean food export has been increasing, they will stagnate without markets. This study considers Korean halal food exports to Indonesia and Malaysia, which are two of the largest halal food markets. Given the context, this study aims to predict Indonesian and Malaysian consumers' purchase intention toward Korean halal food through their acceptance of and feeling toward Korea's image. Design/methodology - This study surveyed Indonesian and Malaysian consumers who purchased Korean halal food in the past year. The survey data were analyzed using the statistical package for the social sciences 21.0 and the analysis of moment structures 21.0. Findings - The analysis reveals that the feeling toward Korea's image and its food image significantly impacted attitudes and subjective norms, while the acceptance of Korea's image significantly impacted only subjective norms. Attitude showed no significant effect on purchase intention, whereas subjective norms exhibited a significant effect on purchase intention. The image feeling had a greater impact on attitudes in Indonesia than those in Malaysia, whereas image acceptance showed a greater influence on subjective norms in Malaysia than those in Indonesia. Originality/value - This study considers the difference between Indonesian and Malaysian consumers in relation to their acceptance of and feeling toward Korea's image and its halal food image. These findings on Korea's image can play a key role in establishing Korea's food export strategy and have strategic implications on Korean companies aiming to enter the halal food market or increase their market share.

Increasing Profitability of the Halal Cosmetics Industry using Configuration Modelling based on Indonesian and Malaysian Markets

  • Dalir, Sara;Olya, Hossein GT;Al-Ansi, Amr;Rahim, Alina Abdul;Lee, Hee-Yul
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.81-100
    • /
    • 2020
  • Purpose - Based on complexity theory, this study develops a configurational model to predict the profitability of Halal cosmetics firms in the Indonesian and Malaysian markets. The proposed research model involves two level configurations-industry context and selling strategies-to predict high and low scores of a firm's profitability. The industry context configuration model comprises industry stability, product homogeneity, price sensitivity, and switching cost. Selling strategies include customer-focused, competitor-focused, and margin-focused approaches. Design/methodology - This is the first empirical study that calculates causal models using a combination of industry context and selling strategy factors to predict profitability. Data obtained from the marketing managers of cosmetics firms are used to test the proposed configurational model using fuzzy-set qualitative comparative analysis (fsQCA). It contributes to the current knowledge of business marketing by identifying the factors necessary to achieve profitability using analysis of condition (ANC). Findings - The results revealed that unique and distinct models explain the conditions for high and low profitability in the Indonesian and Malaysian halal cosmetic markets. While customer-focused selling strategy is necessary to attain a higher profit in both the markets, margin-focused selling strategy appears to be an essential factor only in Malaysia. Complexity of the interactions of selling strategies with industry factors and differences between across two study markets confirmed that complexity theory can support the research configurational model. The theoretical and practical implications are also illustrated. Originality/value - Despite the rapid growth of the global halal industry, there is little knowledge about the halal cosmetic market. This study contributes to the current literature of the halal market by performing a set of asymmetric analytical approaches using a complex theoretical model. It also deepens our understating of how the Korean firms can approach the Muslim consumer's needs to generate more beneficial turnover/revenue.

For the financial institution computer system security, research (금융기관 전산시스템 보안 강화에 대한 연구)

  • Kim, Myung-Soo;Choi, Dae-Young;Seo, Won-Woo;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.67-70
    • /
    • 2014
  • Last was the main issue of financial security in the future will be more emphasis on security. Such as March 20, 2013 Computational crisis, June 25 Cyber terrorism information to credit card companies and customers due to carrier spill in Financial computational security measures 'released in 2014 and the financial authorities' customer information leakage prevention measures "were published the efforts to protect customers' information assets and ensure the stability of the financial transactions carried out by financial institutions protected status check "the information annually authorities This study business operations for the protection of information technology services for IT systems security equipment, data security operating services, security management services operations, operational management of IT systems security requirements from the point to the need for information security, IT systems administrator it would be great help.

  • PDF

The Influence of Entrepreneurship Education Experiences on the Intention of Entrepreneurship (대학생의 개인적 특성인 창업교육 경험이 창업의도에 미치는 영향)

  • Choi, Tae-Wol;Yun, Suk-Ju;Pea, Sang-Muk
    • Industry Promotion Research
    • /
    • v.4 no.2
    • /
    • pp.61-67
    • /
    • 2019
  • A total of 84 questionnaires were analyzed for students with experience in entrepreneurship education in Cheonan-Asan, Chungnam province. The purpose of this study was to examine the effect of the experience of founding education, the personal characteristics of university students, on intention to start a business. As a result, first, there was a correlation between the intention of incubation of college students and the intention of incubation. Significantly at the level. Second, education satisfaction, which is a subordinate factor of entrepreneurship education, did not have a significant effect on achievement desire and self-efficacy, which are subdomains of entrepreneurship intention. Third, creativity was found to have a significant effect on both the desire for achievement and self-efficacy of intention, and creativity showed explanatory power of .603 and 35.1% for R2. The value of .493 and R2 of creativity and self-efficacy are 25.5%.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Classification Performance Improvement of UNSW-NB15 Dataset Based on Feature Selection (특징선택 기법에 기반한 UNSW-NB15 데이터셋의 분류 성능 개선)

  • Lee, Dae-Bum;Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.5
    • /
    • pp.35-42
    • /
    • 2019
  • Recently, as the Internet and various wearable devices have appeared, Internet technology has contributed to obtaining more convenient information and doing business. However, as the internet is used in various parts, the attack surface points that are exposed to attacks are increasing, Attempts to invade networks aimed at taking unfair advantage, such as cyber terrorism, are also increasing. In this paper, we propose a feature selection method to improve the classification performance of the class to classify the abnormal behavior in the network traffic. The UNSW-NB15 dataset has a rare class imbalance problem with relatively few instances compared to other classes, and an undersampling method is used to eliminate it. We use the SVM, k-NN, and decision tree algorithms and extract a subset of combinations with superior detection accuracy and RMSE through training and verification. The subset has recall values of more than 98% through the wrapper based experiments and the DT_PSO showed the best performance.

The Effect of Bakery Customers Product and Service Quality Factors on Value Perception, Customer Satisfaction and Behavioral Intentions: Focused on Famous Bakery Customers

  • HONG, Pil-Tae
    • The Korean Journal of Franchise Management
    • /
    • v.11 no.3
    • /
    • pp.7-18
    • /
    • 2020
  • Purpose: Recently, information on 'Delicious Restaurants (Mat-zip)' and 'Famous Bakeries' can be obtained through various media such as TV, Internet search, and SNS, and the culture of finding and sharing them has become a trend. Since PZB's SERVQUAL, there have been many studies measuring service quality, leading to hotels, restaurants and coffee shops. These studies of service quality include product quality in the service quality dimension. Hotels, restaurants, and coffee shops are provided with intangible services while customers visit and stay, but 'Delicious Restaurants (Mat-zip)' and 'Famous Bakeries' often stop by to buy products and return home. Therefore, the study on the effect of quality on customer behavior on 'Delicious Restaurants (Mat-zip)' should consider product quality separately. In this study, we want to study how each quality element affects the perceived value and response of customers by separating product quality and service quality. Research design, data, and methodology: This study tested the structural model of how the quality of products and services of famous bakeries affect customers' perceived value and response. As the quality factors, products, tangible services, and employee services were adopted, and perceived values adopted utilitarian and hedonic values, and customer responses adopted customer satisfaction and behavior intention. For this study, 203 survey data with experience using famous bakeries were analyzed using SPSS 22.0 and AMOS 22.0. Result: The research results are as follows. First, product quality positively influenced utilitarian value, hedonic value, and customer satisfaction, tangible service quality positively influenced utilitarian value, and employee service quality positively influenced hedonic value. Second, utilitarian value had a positive effect on behavioral intention, and hedonic value had a positive effect on customer satisfaction. Conclusions: In a famous bakery, it is basic that product quality should be given priority, and for customer satisfaction, employee service quality is half as important. In addition, for Behavior Intension (revisit by the customer), in addition to product quality, the quality of tangible services and employee services should be maintained at a quarter level.

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

A Hybrid Modeling Method for RCS Worm Simulation (RCS 웜 시뮬레이션을 위한 Hybrid 모델링 방법)

  • Kim, Jung-Sik;Park, Jin-Ho;Cho, Jae-Ik;Choi, Kyoung-Ho;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.43-53
    • /
    • 2007
  • Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. In this paper, we propose a hybrid modeling method for RCS(Random Constant Spreading) worm simulation. The proposed hybrid model simulates worm attacks by synchronizing modeling network and packet network. So, this model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet. Moreover, our model have the capability of dynamic updates of the modeling parameters. Finally, we simulate the hybrid model with the CodeRed worm to show validity of our proposed model for RCS worm simulation.