• Title/Summary/Keyword: information Protection

Search Result 4,493, Processing Time 0.221 seconds

The Study of the Influence of Low Cost Carriers' Web site Service Quality on Customer Loyalty (저가항공사의 웹 사이트 서비스 품질이 고객 충성도에 미치는 영향 연구)

  • Hyun, Hye-Won;Suh, Myung-Sun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.23 no.1
    • /
    • pp.103-112
    • /
    • 2015
  • In this study, a study was carried out to see what influence low-cost carrier's e-service quality has on low-cost carrier customers' perceived value and customer satisfaction and what impact the results have on customer loyalty based on the results of previous studies related to e-SERVQUAL, an e-SERVQUAL measurement model for general e-commerce. In addition, a survey of consumers who have experienced using low-cost carrier experience through web sites was conducted. For the analysis of the data collected, SPSS 18.0 was used to conduct frequency analysis, factor analysis, reliability analysis, correlation analysis, and regression analysis and thus to test a hypothesis. Research findings showed that perceived value and customer satisfaction are closely related to customer loyalty, and it was also observed that the reliability factor on the service provided on the web site acts as an important influencing factor for customer loyalty in the perceived value and security factors such as payment by credit cards and protection of personal information serve as important one in terms of customer satisfaction. This study has its limitation in that samples of users who have experienced low-cost carrier are concentrated on specific ages and professions. In the future, it is required to conduct further studies on whether difference is made on the importance of measurement factors related to e-service quality by gender, age group, occupation, and e-service quality.

Analysis on Satellite Uplink Interference for Satellite/Terrestrial Integrated System (위성/지상 겸용망에서 위성 업링크 간섭 분석)

  • Kang, Kunseok;Hong, Tae Chul;Kim, Hee Wook;Ku, Bon-Jun;Chang, Dae-Ig
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.1
    • /
    • pp.107-114
    • /
    • 2014
  • The satellite 2.1 GHz frequency bands, 1980-2010 MHz and 2170-2200MHz are allocated for mobile satellite service including satellite IMT, while it does not preclude the use of these bands for mobile services. The concept of an integrated satellite/terrestrial network has been introduced in worldwide because the terrestrial use in these bands adjacent to existing terrestrial IMT bands is attractive to provide mobile broadband services. The integrated satellite/terrestrial infrastructure with a high degree of spectrum utilization efficiency has the ability to provide both multimedia broadband services and public protection and disaster relief solutions. In addition, it is required to consider interference issues between the terrestrial and satellite components in order to reuse the same frequency band to both satellite and terrestrial component. This paper analyzes the interference for satellite uplink in the satellite/terrestrial integrated system and the interference reduction scheme for satellite uplink interfered by terrestrial user equipment.

Interference Mitigation Techniques for Satellite Downlink in Satellite and Terrestrial Integrated System (위성/지상 겸용망에서 위성 다운링크 수신 단말 간섭 완화 기법)

  • Kang, Kunseok;Hong, Tae Chul;Kim, Hee Wook;Ku, Bon-Jun
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.4
    • /
    • pp.81-88
    • /
    • 2013
  • The satellite 2.1 GHz frequency bands, 1980-2010 MHz and 2170-2200MHz are allocated for mobile satellite service including satellite IMT, while it does not preclude the use of these bands for mobile services. The concept of an integrated satellite/terrestrial network has been introduced in worldwide because the terrestrial use in these bands adjacent to existing terrestrial IMT bands is attractive to provide mobile broadband services. The integrated satellite/terrestrial infrastructure with a high degree of spectrum utilization efficiency has the ability to provide both multimedia broadband services and public protection and disaster relief solutions. In addition, it is required to consider interference issues between the terrestrial and satellite components in order to reuse the same frequency band to both satellite and terrestrial component. This paper analyzes the interference for satellite downlink in the satellite/terrestrial integrated system and presents the interference mitigation techniques for satellite mobile earth station interfered by terrestrial base stations.

Influence of nursing teacher's infant right perception on infant care service (보육교사의 영유아 권리에 대한 인식이 보육서비스에 미치는 영향)

  • Lee, Hui-Kyeong;Lee, Jeong-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.332-339
    • /
    • 2017
  • The purpose of the present study was to verify the relationship between the nursing teachers' perception of infant rights and infant care service. The scale for infant rights consisted of 40 items based on the U.N. convention on the rights of the child and infant care service was measured with 40 items regarding respect of daily life, respect of autonomy, respect of opinion, respect of individualism, and provision of information. The study participants were 489 nursing teachers working at child care centers. According to the nursing teachers' perception of infant rights, the right of survival was highest, followed by the right of protection, the right of development, and the right of participation. The main study results showed that the rights of development and participation were meaningful in predicting various infant care services, but the right of survival was not. This study implies that the difference of nursing teachers' perception on the various types of different infant rights can affect various infant care services.

Secure Boot + Measured Boot: Guaranteeing the Integrity of the Linux Booting Process (보안부팅+측정부팅: 리눅스 부팅 과정의 무결성 보장)

  • Lee, Yunjae;Yoo, Seehwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.504-509
    • /
    • 2017
  • Preserving the integrity of the booting process is important. Recent rootkit attacks and subverting OS attacks prove that any post-OS security mechanism can be easily circumvented if the booting process is not properly controlled. Using an actual case as an example, the hacker of the Se-jong government office simply bypassed the user's password authentication by compromising the normal booting process. This paper analyzes existing pre-OS protection using secure boot and measured boot, and proposes another bootloader that overcomes the limitations. The proposed bootloader not only guarantees the integrity of all the pre-OS binaries, bootloaders, and kernel, it also makes explicit records of integrity in the booting process to the external TPM device, so that we can track modifications of BIOS configurations or unintended booting process modifications.

A study on the longitudinal optimum separated distance of tunnel face in 2-arch tunnel (2-Arch 터널의 막장면 종방향 적정 이격거리에 관한 연구)

  • Lee, Min-Kyu;Jeong, Ji-Su;Lee, Sung-Ki;Lee, Seung-Ho
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.9 no.4
    • /
    • pp.323-330
    • /
    • 2007
  • Recently, due to the effective land utilization and environmental protection, the construction of 2-arch tunnel has been gradually increased. In spite of this tendency, the mechanical information for the 2-arch tunnel, especially such as its behavior characteristics and mechanism are not enough. Therefore in this study, the theoretical and numerical studies on the behavior characteristics of 2-arch tunnel are carried out and longitudinal optimum separated distance of tunnel face is proposed by considering the analysis results from the behavior of advanced excavation of tunnel and stress of central pillar. As a result, longitudinal optimum separated distance of tunnel face is in 0.5D for the better safety of 2-arch tunnel by rapidly decreasing the stress concentration of central pillar.

  • PDF

Knowledge and Attitudes about Human Papillomaviruses and Immunization among Turkish Pediatricians

  • Ozsurekci, Yasemin;Oncel, Eda Karadag;Bayhan, Cihangul;Celik, Melda;Ozkaya-Parlakay, Aslinur;Arvas, Mehmet;Ceyhan, Mehmet
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.12
    • /
    • pp.7325-7329
    • /
    • 2013
  • Background: Human papillomavirus (HPV) is one of the most common sexually transmitted infectious agents, and the effectiveness of vaccine delivery programs will depend largely upon whether providers recommend vaccines. The objectives of this study were to examine pediatrician characteristics, knowledge, and attitudes associated with HPV and HPV immunization. Materials and Methods: Attendees of the national pediatric meeting in 2011, were asked to complete a questionnaire that, aside from demographic information, elicited level of agreement with statements regarding HPV, its related diseases, and HPV vaccination. It also documented attitudes and beliefs about HPV vaccination. Results: Of the 480 attendees, 226 (47%) filled in the questionnaire. The level of pediatrician HPV-related knowledge varied. The majority (78%) were aware that HPV infection is the most common sexually transmitted infection, while 51% were unaware that a condom is ineffective protection against HPV infection. Between 60-80% of respondents were aware of the effectiveness of HPV vaccination for women. On the other hand, only 10% were aware of reasons why men should be vaccinated against HPV. The majority (75%) of Turkish pediatricians were likely to recommend HPV vaccination to their daughter, if they had one. Seventy percent of pediatricians agreed that the HPV vaccination should be added to the National Immunization Program (NIP) in Turkey. However, the respondents documented concerns about the cost of the vaccination. Conclusions: Increasing pediatricians' knowledge and awareness of HPV and HPV vaccination may assist with the implementation of an effective NIP.

Channel Interference Analysis of Wideband WLAN Based IEEE802.11n for 3rd Generation Digital Signage (3세대 디지털 사이니지를 위한 IEEE802.11n 광대역 무선랜에 대한 채널 간섭 분석)

  • Ko, Hojeong
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.1
    • /
    • pp.6-11
    • /
    • 2016
  • In this paper, we have analyzed the effects of co-channel, adjacent-channel, and the human shield(Body Blockage) for wideband WLAN based on the IEEE802.11n 40MHz channel bandwidth required for high speed digital signage service. Simulation results show that wideband WLAN can be operated with 78 interferers over 63m distance in co- channel, 80 interferer over 61m distance in adjacent channel. By applying the mitigation method for reducing the interference, we have confirmed that protection distance is improved to 51m using beamforming, and 40m using cognitive radio in co-channel interference. Also body blockage interference is reduced using adaptive channel bandwidth, C/I ratio, beamforming, power control mitigation methodology.

The implementation of Smart Care System for Dementia Patients (치매 환자를 위한 스마트 캐어 시스템 구현)

  • Ha, Eun-Sil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3832-3840
    • /
    • 2014
  • The rapidly aging population is also increasing the number of dementia patients rapidly. Studies have revealed the early signs of slowing progress. Therefore, dementia patient safety, continuous care, daily living, and health care are becoming more important. In this paper, a smart home care system using smart phones and Bluetooth communication technology was used to monitor the state of dementia patients of based on the results of grading dementia, health care of the dementia patients at home and provide for the safety of the system using motion sensors and gas leak sensors to respond to various emergency situations, such as fire, gas leak protection, and loitering. Using this system, the patient can stay longer in their home due to the nature of Korean culture before admission, while reducing the family's economical, physical and psychological burden and allowing the consultation of specialists through the system by building a database of individuals and providing professional service and specialty care referral agencies through the link.

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.