• Title/Summary/Keyword: cyber market

Search Result 183, Processing Time 0.026 seconds

A New Product Risk Model for the Electric Vehicle Industry in South Korea

  • CHU, Wujin;HONG, Yong-pyo;PARK, Wonkoo;IM, Meeja;SONG, Mee Ryoung
    • Journal of Distribution Science
    • /
    • v.18 no.9
    • /
    • pp.31-43
    • /
    • 2020
  • Purpose: This study examined a comprehensive model for assessing the success probability of electric vehicle (EV) commercialization in the Korean market. The study identified three risks associated with successful commercialization which were technology, social, policy, environmental, and consumer risk. Research design, methodology: The assessment of the riskiness was represented by a Bayes belief network, where the probability of success at each stage is conditioned on the outcome of the preceding stage. Probability of success in each stage is either dependent on input (i.e., investment) or external factors (i.e., air quality). Initial input stages were defined as the levels of investment in product R&D, battery technology, production facilities and battery charging facilities. Results: Reasonable levels of investment were obtained by expert opinion from industry experts. Also, a survey was carried out with 78 experts consisting of automaker engineers, managers working at EV parts manufacturers, and automobile industry researchers in government think tanks to obtain the conditional probability distributions. Conclusion: The output of the model was the likelihood of success - expressed as the probability of market acceptance - that depended on the various input values. A model is a useful tool for understanding the EV industry as a whole and explaining the likely ramifications of different investment levels.

Cyber Risk Management of SMEs to Prevent Personal Information Leakage Accidents (개인정보유출 사고 방지를 위한 중소기업의 사이버 위험관리)

  • So, Byoung-Ki;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.375-390
    • /
    • 2021
  • Purpose: Most of cybersecurity breaches occur in SMEs. As the existing cybersecurity framework and certification system are mainly focused on financial and large companies, it is difficult for SMEs to utilize it due to lack of cybersecurity budget and manpower. So it is necessary to come up with measures to allow SMEs to voluntarily manage cyber risks. Method: After reviewing Cybersecurity market, cybersecurity items of financial institutions, cybersecurity framework comparison and cybersecurity incidents reported in the media, the criticality of cybersecurity items was analyzed through AHP analysis. And cybersecurity items of non-life insurers were also investigated and made a comparison between them. Result: Cyber risk management methods for SMEs were proposed for 20 major causes of cyber accidents. Conclusion: We hope that the cybersecurity risk assessment measures of SMEs in Korea will help them assess their risks when they sign up for cyber insurance, and that cyber risk assessment also needs to be linked to ERM standardization.

A Study on the Consumer Behavior in the Cyber Shopping Mall (사이버쇼핑몰의 소비자행동에 관한 연구)

  • 유한종
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.11-16
    • /
    • 2002
  • Nowday, Cyber shopping mall increased market size. The Consumer Behavior chainged new trend. This study on the systematic access to establishment of the concept of cyber shopping mall as well as to problems to overall parts of EC service as well is required. The objectives of this study are that how service consumers perceive the quality of EC service, and that what effect the quality makes on their satisfaction and re-purchase intention. This means that the research enables a marketing manager to take the meaning of comparative weight among the components of EC service quality, and to provide very useful information to establish marketing strategies which are close to the consumers.

  • PDF

A Study on Plan for the activation of an e-market in Gangwon Province (강원권역 전자시장 활성화 방안 연구)

  • La, Kong-Woo;Min, Tae-Hong
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.283-307
    • /
    • 2005
  • The research was carried out at the electronic Gw-mart located at Gangwon province. The secondary data and the various other reference materials were used for the research. This research brings forth the concrete activation plan for the activation of an electronic market in the Gangwon province. So, the activation plan for an e-market at Gang won can be done in six ways, first result of the undertaken research achieved in six ways- first, concentration has to be laid on the internet portal sites, second, the local sites should be well connected with the shopping mall facilities, third, a trustworthy shopping mall has to be established by maintains the product quality and quantity, fourth, a visible distinction should be made between the various products, fifth, the division of labor must be specified and a provisions should be made for a efficient after service.

  • PDF

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

A Study on Business model of through Second life (세컨드 라이프(Second Life)를 통한 문화콘텐츠 비즈니스 모델연구)

  • Choi, Eunyoung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.431-435
    • /
    • 2008
  • Thanks to the development of internet, on-line market expands exponentially and corresponding solid business models are drawn attentions. Most of on-line trading items are limited with selling game related items however, Linden Lab made its turning point by introducing cyber reality game to shape the cyber life with creating his own Avatar in 2003. After 2003, Second life has grown sharply that over 12 million users around the world. While former games are progressed within fixed scenario, the concept of avatars who live his or her own lives at the cyber space that successfully differentiate from former online game. Further, cyber money, Linden Dollar can be used to buy real estate, cloth, shoes just like at real economy system. Not only for using corporate marketing, various areas of activities; promotion of public sector, politics, education are also functioned at the cyber life. In Korea, Korean version of Second life was introduced at the end of 2007 that draws attentions from the users. In this study, I examine various business models of cyber through Second life and suggest feasible culture-contents applying models.

  • PDF

VIP-targeted CRM strategies in an open market

  • Lee, Hanjun;Shim, Beomsoo;Suh, Yongmoo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.1
    • /
    • pp.229-241
    • /
    • 2015
  • Nowadays, an open-market which provides sellers and consumers a cyber place for making a transaction over the Internet has emerged as a prevalent sales channel because of convenience and relatively low price it provides. However, there are few studies about CRM strategies based on VIP consumers for an open-market even though understanding VIP consumers' behaviors in open-markets is important to increase its revenue. Therefore, we propose CRM strategies targeted on VIP customers, obtained by analyzing the transaction data of VIP customers from an open-market using data mining techniques. To that end, we first defined the VIP customers in terms of recency, frequency and monetary (RFM) values. Then, we used data mining techniques to develop a model which best classifies and identifies infiluential factors customers into VIPs or non-VIPs. We also validate each of promotion types in the aspect of effectiveness and identify association rules among the types. Then, based on the findings from these experiments, we propose strategies from the perspectives of CRM dimensions for the open-market to thrive.