• Title/Summary/Keyword: digital risk

Search Result 823, Processing Time 0.024 seconds

Factors Affecting Elderly People's Intention to Use of Digital Wealth Management Services (고령자들의 디지털 자산관리 서비스 이용의도에 영향을 미치는 특성 및 요인)

  • Kwak, Jae-Hyuk;Dong, Hak-Lim
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.411-422
    • /
    • 2022
  • The purpose of this study was to identify factors that affect the characteristics and intentions of the elderly to use digital wealth management services. The subjects of this study were 312 elderly people over 50 years old. Based on the Value-based Adoption Model(VAM), the research model added price value, social influence, and perceived risk as research variables. As a result of empirical analysis, it was found that usefulness, enjoyment, price value, and social influence all had a significant positive (+) effect on perceived value. It was found that technicality had a significant negative (-) effect. On the other hand, no significant effect relationship was tested on perceived risk. The perceived value had a significant positive (+) effect on the intention to use. This study was meaningful in the academic research that it applied a research model that reflected the characteristics of the elderly who were not treated as mainstream in the technology acceptance model for digital wealth management services. In addition, it provided practical implications for providers' marketing strategies and government/public institution policy establishment to increase the use of digital wealth management services for the elderly.

A Way for Maximum Use of Cancer Risk Assessment System CARA (암 발생 위험도 분석 시스템 CARA의 활용도 극대화 방안)

  • Yang, Gi-Chul;Cho, Kwang-Moon
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.121-126
    • /
    • 2012
  • In this paper, a way for maximum use of cancer risk assessment software system CARA which can assess cancer risks by using health related information only without doctor's diagnosis is proposed. A way of maximizing the usage of CARA with use of nation wide internet network is described along with the general description of CARA. If CARA is used, the damage causing by cancer can be reduced since it is possible to sort a group of people with high risks (before diagnosis at a hospital). Also, CARA is helpful for medical research by used as a tool to reveal correlations between personal information and cancers practically. Unlike other preexisting systems, CARA is a new system which can consider 30 different cancers simultaneously and it is very efficient for early detection of cancer.

A Study on the Development of Korean Inventory for the Multi-Hazard Risk Assessment -Based on Earthquake Damage Analysis (복합재난 손실 평가를 위한 한국형 인벤토리 구축 방안 연구 -지진재해 손실 평가를 중심으로)

  • Chai, Su-Seong;Shin, Su-mi;Suh, Dongjun
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1127-1134
    • /
    • 2017
  • The main goal of this study is to develop the system of multi-hazard risk assessment tools based on major inventories and functions. As a first step, designing and building a Korean inventory of the loss assessment was performed due to earthquake disasters. We focused on the special features, taking account of the possibly conflicting features of the various conditions such as different type of formats, environmental differences, and collected data relevant to the use of proposed risk assessment system in terms of constructing the Korean inventory including buildings and population.

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Design of Financial Information Security Model based on Enterprise Information Security Architecture (전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계)

  • Kim, Dong Soo;Jun, Nam Jae;Kim, Hee Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.307-317
    • /
    • 2010
  • The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British's ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT's information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies' financial and information security and to prevent from any risk of exposing the companies' information.

A Study on Automatic Security Diagnostic Evaluation System for Security Assurance (보안 안전성을 위한 자동화 보안진단평가 시스템에 관한 연구)

  • Eom, Jung Ho;Park, Seon Ho;Chung, Tai M.
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.109-116
    • /
    • 2009
  • In the paper, we designed an automatic security diagnostic evaluation System(SeDES) based on a security diagnostic evaluation model(SeDEM) for an organization's security assurance. The SeDEM evaluates a security level of an organization quantitatively by a security evaluation formula which is composed of security variables and security index as applying the statistical CAEL model for evaluate risk level of banks. The SeDES has a good expandability as changing security variables according to an organization scale, characteristics and so on. And it also has a excellent usage because it inputs only numeric data got from statistical technique to security index. We can understand more a security level correctly than the existent risk assessment system because it is possible to assess quantitatively with an security grade as well as score. analysis.

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.

A Study on Chinese User Resistance of Mobile Banking (모바일 뱅킹에 대한 중국 사용자 저항에 관한 연구)

  • Cheng, Shuang;Lee, Sang-Joon;Lee, Kyeong-Rak
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.105-114
    • /
    • 2014
  • There are many studies on the adoption intentions for mobile banking. But there are no apparent effect on the popularity of it. This is so because the users have resistance to innovation on Mobile Banking. Therefore, it is necessary to identify empirically the problem of user resistance. In this paper, we identified hindrance factors of mobile banking with previous papers. And then we conducted empirical study by survey reply from undergraduates and graduate students in China. The results of this study are as follows. Social Influence and Perceived Complexity have positive effect on Perceived Risk, and Trust has negative effect on Perceived Risk. Perceived Security and Perceived Protection of Private information have no effect on Perceived Risk. Perceived Risk has effect on User Resistance. The significance of this paper is that financial institutions and telecommunications companies of China could potentially establish new and more accurate strategies based on the resistance factors identified in this paper to gain more profits.

Impacts of Low User and Project Management Risk on IT Project of Public Sector: The Moderating Effect of User Knowledge (사용자 및 프로젝트 관리 위험 감소가 공공부문 IT 프로젝트 성과에 미치는 영향 : 사용자 지식의 조절효과)

  • Lee, Sooin;Kim, Sanghyun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.187-196
    • /
    • 2020
  • We tried to do research on main views(risk and knowledge-based) and propose user knowledge as a factor to be managed in order to strengthen the performance. This study empirically analyzed the user-related and project management risk that affect the IT project performance, and verified user knowledge as a moderating variable. The survey was conducted for respondents who have experience on IT Project of public sector and data were analyzed by Smart PLS 3.0. The results show that low user-related and project management risks have a positive effect on performance. In addition, user knowledge has been shown to enhance the impact of two risks on performance. These findings are meaningful in that they emphasize the importance of user knowledge in public-sector IT projects, as well as the repeated verification of integrated research results.

An Experimental Study on the Prospect Theory (전망이론에 관한 실험연구)

  • Guahk, Seyoung
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.107-112
    • /
    • 2017
  • This paper performed an experimental study to test the validity of the prospect theory proposed by Tversky and Kahneman as an alternative to the expected utility theory. 115 college students attended the hypothetical games to choose one of two lotteries, one is safe option while the other one is risky. The risky options were set up to have low, medium or high probability of payoffs or losses. The amount of payoffs and losses of the lotteries was either large or small. Maximum likelihood estimation of the hypothetical games have shown that in case of high probability of positive payoffs the respondents were risk averse and when the probability of positive payoffs were small the respondents were risk loving. when the possibility of loss is high they were risk loving, while the probability is of loss is low the respondents were found to be risk averse. When the probability of risky options were medium the results were significant statistically in case of only losses. The amount of positive payoff or losses does not affect the results. Overall the results of this experiments support the prospect theory more than those of Laury & Holts (2008).