• Title/Summary/Keyword: internal users

Search Result 419, Processing Time 0.025 seconds

Analysis of PMIS Users Satisfaction and Loyalty Using Structural Equation Model

  • Kim, Min-Cheol;Lee, Hyung-Il;Cho, Sang-Ho;Kim, Ju-Hyung
    • Architectural research
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • Project management information systems (PMIS) have been implemented to support cooperation among the participants of construction projects. Unlike other information systems used by members from an organization with similar culture and business environment, the PMIS are members from one-off fragmented project organization with diverse professional background. Successful operation is significantly affected by the tendencies of client's side and individual awareness of participants. In this regard, it is imperative to evaluate the success of the system based on the individual characteristics of PMIS users. Thus, this study proposes a method for determining the system success by analyzing the extent of the effects of system factors such as System Quality, Information Quality, and Service Quality and individual factors such as a user's IT application ability, Extrinsic Motivation to achieve User Satisfaction, and loyalty. Accordingly, a structural equation model (SEM), an effective tool to examine of the comprehensive structure of a causal relationship, is applied for analysis because the internal awareness of individuals is established as a variable.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Investment Benefit Analysis of Safety Assessment and Inspection Technologies of Hydrogen Bus Fuel System Using Contingent Valuation Methods (조건부가치측정법을 이용한 수소버스 연료장치 안전성 평가 및 검사기술에 대한 투자 편익 분석)

  • Seohyun, Lim;Jeong Ah, Jang
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.4
    • /
    • pp.43-52
    • /
    • 2022
  • Recently, the government has been expanding the supply of hydrogen vehicles according to the roadmap for vitalizing the hydrogen economy, but is developing safety assessment and inspection technology for the relevant vehicles. This study analyzed the prevention of hydrogen bus accidents' economic effect that arises from the application and development of large-capacity CHSS oil pressure repetition-test assessment technology, hydrogen bus internal chamber pressure transmission and emission volume inspection technology, among various technologies capable of assessing the safety of a hydrogen bus fuel system. To this end, the contingent valuation method (CVM), one of the value evaluation methods of non-market goods, was applied to investigate users' willingness to pay for each inspection technology. The survey for users' willingness to pay was conducted by attaching posters to promote surveys on the internet and within buses to the entire public. As a result of the analysis, the average WTP of the hydrogen bus internal chamber pressure transmission volume inspection technology was 25.3 KRW, the average WTP of the hydrogen bus internal chamber pressure emission volume inspection technology was 18.6 KRW, and the average WTP of the large-capacity CHSS oil pressure repetition-test assessment technology was measured at 16.7 KRW. In addition, the costs and benefits of the introduction of the relevant inspection technology were defined through the interviewing of experts at related research institutions and businesses. As a result of conducting an economic analysis (4.5% discount rate) according to the development of each inspection technology, economic feasibility was seen in all assessment and inspection technologies. As much as the technology is indispensable for the safe use of hydrogen buses, it shows that investment in related technology is very necessary in the future. However, because it was decided that the relevant analysis will differ according to the distribution rate of hydrogen buses, further analysis following this future distribution rate of hydrogen buses is needed, and future users should be made clearly aware of the safety and environmental nature of the technology.

The Moderate Effect of the Attribute Alignability on the Relations Between Brand Attachment and Product Usage Behavior: Focus on Smartphone Users (브랜드 애착이 제품 사용 행동에 미치는 영향에 있어 속성 정렬 가능성의 조절적 역할: 스마트폰 사용자 중심으로)

  • Jo, Jae-Wook;Park, Seung-Bae
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.141-147
    • /
    • 2020
  • This study examined the effects of brand attachment on internal modification behavior and usability expanding behavior of product. It has been found that the attribute alignable difference of product plays a moderating effect in internal modification behavior and usability expanding behavior. As a result of the study, the more brand attachment is high, the more behavior of product internal modification behavior and usability expanding behavior of product are high. In addition, consumers with high brand attachment showed greater internal modification behavior of the product when the difference of attribute alignability was high. Also, consumers with high brand attachment showed greater usability expanding behavior of the product when the difference of attribute non-alignability was high. Companies can improve brand attachment and retain loyal customers by increasing the difference of attribute alignability in consumer's product internal modification behavior. In terms of consumer's behavior of expanding product usage, we can strengthen brand attachment and can be used as a differentiated competitive advantage of products through the attribute nonalignable difference.

A Study on Improving User Satisfaction through Internal Marketing of University Archives (대학기록관의 내부마케팅을 통한 이용자 만족도 제고 방안)

  • Ku, Young-Mi;Hong, Hyun-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.4
    • /
    • pp.235-254
    • /
    • 2019
  • According to the development of information technology, the paradigm of the archives is shifting from preservation management of past records to use-oriented services. In this regard, this study is conducted an empirical study on the effect of internal marketing factors of university archives on the customer orientation of employees in order to improve organizational satisfaction for users of records information service. Based on the previous research, the delegation of authority, internal communication, management support, and training are established as factors of internal marketing, and the parameters for this are job satisfaction, organizational commitment, customer orientation as dependent variables, and We set up hypothesis between research variables and attempted an analysis through statistical system. In summary, each element of internal marketing showed significant results on job satisfaction and organizational commitment, and management support was most closely related to job satisfaction, organizational commitment, and customer orientation of university archive staff.

A study on the Plan for Enhancing Internal Customer Satisfaction for Hybrid Weight (혼합 가중치를 고려한 내부고객만족 향상 방법에 관한 연구)

  • Kim, Chang-Soo;Lee, Mun-Kyo;Lim, Sung-Uk
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.6
    • /
    • pp.205-214
    • /
    • 2007
  • Nowadays the customer is classified with external customers and the inside customers. Which are not only end users who consume products but also all people who contribute to their earnings through the management activity of the enterprise. Furthermore, the fact that the external customer satisfaction index and inside customer satisfaction index are closely related is supported by many researches. It is interpreted if the inside customer satisfaction is not improved, achievement of the external customer satisfaction cannot be easy. In this paper, First, we will deduce the inefficient index through DEA model in each department after setting up the weight of items of inside customer satisfaction and measuring them. Second, as well as research entire models about improvement methods of inside customer satisfaction getting improvement methods for reaching a goal in the minimum amount of efforts.

State Management of the Development of National Cybersecurity Systems

  • Kryshtanovych, Myroslav;Storozhev, Roman;Malyshev, Kostiantyn;Munko, Anna;Khokhba, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.11-16
    • /
    • 2022
  • The main purpose of the study is to determine the main elements of the state management of the development of national cybersecurity. Cybersecurity ensures the protection of the properties of information resources and the operability of technical and software users and is directed against relevant cyber incidents. Therefore, today it is impossible to ignore the importance of public administration of the processes taking place in it. The methodological support of our study is determined by its goals and objectives and is based on the use of a combination of general scientific and special methods of scientific knowledge, which ensured the completeness and reliability of the results obtained. The article has limitations and concerns the lack of practical implementation of the research results. The study is purely theoretical to reflect the main aspects of the modern system of state management of the development of national cybersecurity. Further research requires an analysis of the world experience of state management of the development of national cybersecurity.

Development, Reliability and Factor Structure of a Korean Perceived Restorativeness Scale Using Forest Users

  • Shin, Won Sop;Yeoun, Poung Sik
    • Journal of Korean Society of Forest Science
    • /
    • v.97 no.2
    • /
    • pp.152-155
    • /
    • 2008
  • The Korean version of Perceived Restorativeness Scale was administered to 150 SanEum Recreational Forest visitors to investigate it's psychometric properties. Factor analysis revealed that the scale consists primarily of four factors related to compatibility, preference, being away and coherence. The internal consistency of the scale was positive. Based on these tests, it appears that the scale is a sound measure of restorativeness or psychological health benefits from forest experience.

An Exploratory Study on the Balanced Scorecard Model of Social Enterprise

  • Lee, Yoeng-Taak;Moon, Jae-Young
    • International Journal of Quality Innovation
    • /
    • v.9 no.2
    • /
    • pp.11-30
    • /
    • 2008
  • The purpose of this study is to develop BSC model of social enterprise. Performance analysis tool of BSC have been brought over from the business world, designed and created from the perspectives of profit-based businesses. The BSC is a strategic performance measurement and management tool designed for the private sector acting as a communication/information and learning system, to measure 'where we are now' and 'where to aim for next'. It prescribes a plan for translating 'vision' and 'strategy' into concrete action across four perspectives at different stages, depending on the business. These perspectives are 'financial', 'customer', 'internal processes' and 'learning and growth', each of which is connected by cause-and-effect relationships that reflect the firm's strategy. Social aims of social enterprise are to accomplish desired outcomes which are to employ vulnerable people and to provide social services. The measurement factors of financial perspective are stable funding, efficiency of budgeting, stakeholders' financial supports, and trade profit. The measurement factors of customer perspective are government, social service users, employees, local communities, sup plier, social activity company, and partnership with external organizations. The measurement factors of internal process perspective are organizational culture, organizational structure/management, internal/external communication, quality of products and services, information sharing. The measurement factors of learning and growth perspective are training and development, management participation, knowledge sharing, leadership of CEO and manager, and learning culture.

Network 2-Factor Access Control system based on RFID security control system (RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템)

  • Choi, Kyong-Ho;Kim, Jong-Min;Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.53-58
    • /
    • 2012
  • Network Access Control System that is one of the efforts to protect the information of internal applies to effectively control of insider and automatic network management and security. However, it has some problems : spoofing the authorized PC or mobile devices, connect to the internal network using a system that authorized users are away. In addition, information leakage due to malicious code in the same system. So in this paper, Network 2-Factor Access Control System based on RFID security control system is proposed for safety communication environment that performing a two-factor authentication using authorized user and devices to connect to the internal network.