• Title/Summary/Keyword: personal credit information

Search Result 91, Processing Time 0.027 seconds

Analysis of the Redemption Risk of Renters Using CoLTV (CoLTV 지표를 이용한 임대차주의 상환위험 분석)

  • Lee, Ta Ly;Song, Yon Ho;Hwang, Gwan Seok;Park, Chun Gyu
    • Korea Real Estate Review
    • /
    • v.28 no.1
    • /
    • pp.65-77
    • /
    • 2018
  • This paper analyzes the redemption risk of renters by estimating the LTV and CoLTV with finance market big data (individual credit information) and housing market big data (actual housing transaction data). The analysis showed that when using LTV, the redemption risk was higher in the case of the monthly renter than of the chonsei renter. On the other hand, when using CoLTV, the chonsei renter had a higher redemption risk than the monthly renter. This implies that there is a need to activate a guarantee system, such as risk management using the CoLTV index and the chonsei deposit return guarantee because it is possible for renters to experience losses on their chonsei deposits due to the higher redemption risk. Another implication is that the risk manager should consider the individual characteristics of renters because of the different effects of the redemption risk stemming from the characteristics of the rental contract and the personal characteristics of the renters. CoLTV was just a concept until this study calculated it using housing big data and actual housing transaction information. It helps identify the redemption risk through the characteristics of renters and their contracts.

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

A Study of Moral Development and Ethical Values of the Nurse (임상 간호사의 도덕성 발달과 윤리적 가치관에 대한 연구)

  • Kim, Mee-Jeong;Kim, Myung-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.5 no.2
    • /
    • pp.337-353
    • /
    • 1999
  • This study is to provide the basic sources to develop educational data that can establish ethical values with research on the interrelation between moral development and ethical values of nurses. The subjects of this study are the convenience sample from 111 nurses working in clinical settings from 5 general hospitals located in Pusan area. The questionnairs for this study are comprised two parts: Part 1 is SRM-SF(1995) guestionnaire, and translated by Kil, 1m Ju(1997): Part 2 is the guestion papers about the ethical values, and disigned by Jung, Hee Ja. The data were collected from June lth to 31th, 1997 and analyzed by S.A.S(Statistical Analysis System) Package for frequency, percent, and Pearson's correlation coefficient. The results of the study is as the followings: 1) According to the moral development. the nurses are in the levels of Stage3 or Transition3/4, which are generally focused on the personal relations or personality. Thus, nurses are considered to need to get the stage4 of education that helps them recognize a person as a member of society. a family as an unit of society, and human life as the values of human dignity. 2) According to the ethical values, nurses have the positive ethical values of respecting the right of the patients, providing information, keeping the secret, truth. and credit of patients. But they also experience some troubles by the patients to care and the clinical situation. Thus, to overcome the problems, nurses are considered to need to get the education that establishs the right ethical values. 3) The analysis result on the interrelation between moral development level and ethical values shows as r=0.28 and p=0.003. This indicates that the interrelation between them is low. In conclusion, it is considered that the moral development level is viewed broadly from a person and family to a society, and then it can affect to the ethical values positively.

  • PDF

The Study of the Influence of Low Cost Carriers' Web site Service Quality on Customer Loyalty (저가항공사의 웹 사이트 서비스 품질이 고객 충성도에 미치는 영향 연구)

  • Hyun, Hye-Won;Suh, Myung-Sun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.23 no.1
    • /
    • pp.103-112
    • /
    • 2015
  • In this study, a study was carried out to see what influence low-cost carrier's e-service quality has on low-cost carrier customers' perceived value and customer satisfaction and what impact the results have on customer loyalty based on the results of previous studies related to e-SERVQUAL, an e-SERVQUAL measurement model for general e-commerce. In addition, a survey of consumers who have experienced using low-cost carrier experience through web sites was conducted. For the analysis of the data collected, SPSS 18.0 was used to conduct frequency analysis, factor analysis, reliability analysis, correlation analysis, and regression analysis and thus to test a hypothesis. Research findings showed that perceived value and customer satisfaction are closely related to customer loyalty, and it was also observed that the reliability factor on the service provided on the web site acts as an important influencing factor for customer loyalty in the perceived value and security factors such as payment by credit cards and protection of personal information serve as important one in terms of customer satisfaction. This study has its limitation in that samples of users who have experienced low-cost carrier are concentrated on specific ages and professions. In the future, it is required to conduct further studies on whether difference is made on the importance of measurement factors related to e-service quality by gender, age group, occupation, and e-service quality.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Personal Financial Management Ability of College Students -A survey of D college- (대학생의 개인재무관리역량 -대구 D대학교를 중심으로-)

  • Lee, Sang-Kyung;Park, Su-Yong
    • Journal of the Korea society of information convergence
    • /
    • v.6 no.2
    • /
    • pp.23-44
    • /
    • 2013
  • First, the average scores of personal financial management ability in the college students' financial management attitude were 72.24 for male and 71.65 for female, so that male students showed a little higher score than female. College students who had an experience of opening a bank account and who kept a record of spending revealed higher scores. Those whose parents were elementary or middle school graduates unfolded the highest score, 73.67, and the lowest score, 63.35, from those whose parents had M.A. or Ph.D. The average scores of personal financial management ability in the college students' financial management knowledge indicated almost no difference with 63.26 for male and 63.35 for female. Only whether they had an experience of opening a bank account, keeping a record of spending, or a credit card revealed score differences. Depending on the students' majors, there were also score differences. Students from engineering department came up with the highest score, an average of 66.88, and students from art & physical education department with the lowest score, 53.39, in the financial management knowledge. The personal financial management ability in the college students' financial management function showed that the score of male students was a little higher than that of female, 64.26 versus 63.58. Students who kept a record of spending and whose parents' income was between three million won and four million won marked the highest score, an average of 65.26, and students whose parents' income was below two million won marked the lowest score, an average of 60.43, in the college students' financial management function. There were score differences in the college students' financial management function depending on the students' majors. Students from engineering department came up with the highest score, an average of 69.67, and students from public health department with the lowest score, 63.21.

  • PDF

Challenges and Opportunities of Small Business Management and Start-Ups in India

  • Potluri, Rajasekhara Mouly;Lee, Jung Wan;Khan, Saqib Rasool;Vali, Syed Mastan
    • Journal of Distribution Science
    • /
    • v.10 no.7
    • /
    • pp.5-11
    • /
    • 2012
  • The core objective of this research article is to investigate different challenges and opportunities in management as well as start-ups of small businesses in India. The prudence behind this research is to examine various problems in front of the small businesses and to offer vital support and cooperation to overcome those with the support of concerned institutions through consultancy and training programs. The researchers have an intention to make available the research results to the governmental agencies, concerned small business institutions and also to the educational institutions which are continually design plans, programs, policies and strategies to upgrade the managerial and technical dexterities of the small business Indian operators. After thorough revision of relevant literature on small businesses and its management, the researchers used a well structured questionnaire and in-depth personal interviews with 586small business operators selected from manufacturing, trading (retailing and wholesaling), finance, servicing/repair businesses which are located in the coastal districts of Andhra Pradesh in India. The researchers have used convenience sampling and collected data was analyzed with the support of Microsoft Excel and frequency distribution. Noticeably, majority of the small businessmen in India are facing myriad number of challenges both in management and at the time of establishment of their business operations. In particular, 72.47 percent of small businesses operators' have substantiated their strong opinion towards the challenges they are facing particularly finance, marketing and other problems while managing their businesses. The researchers also attempted to get the opinions on problems of the various categories of small businesses while starting their operations. A staggering 68percent of respondents identified the problems related to preparation of business plan, location selection, marketing and other problems like lack of proper credit facilities, skilled manpower, and other infra related problems while setting up of their businesses. On an average, 64.62 and 63.51 percent of small businesses are facing various kinds of problems both at the time of day-to-day management as well as start-up of their businesses respectively. The present research confined with the opinions of only four categories of small business operators particularly from the manufacturing, finance, trading (retailing and wholesaling), and servicing/repair which are continuing their business operations from the nine coastal districts of Andhra Pradesh in India. The present study emphatically provides concrete information required to the business community for identifying an assortment of challenges faced by different small business operators in managing and at the time of their inception. This research paper is first of its kind from this part of the world by offering extensive and credible information required for prospective entrepreneurs in facing the dynamic challenges in managing their business. Furthermore, this research presents invaluable inputs to the stakeholders like all types of governments, policy makers, practitioners, researchers, and educators' about the various impediments faced by the small business community in India.

  • PDF

International Study and Transformational Learning: What Covid-19 Has Taught Us

  • Rodgers, Steve
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1221-1221
    • /
    • 2022
  • Studying abroad in and of itself should be a unique and transformational learning experience for university students. Too often, "study abroad" is a code word for "faculty vacation" or "easy credit hours". For an international learning experience to be truly transformational it must offer an intense and directed program that maximizes the time the student spends in the accumulation of information that is new or different from what the student has "learned" previously. "Study abroad" may be a misnomer because it is not only about studying in another country or culture, that is, taking courses that usually have an attendance time of a few hours a week, but it is also about living in another country which becomes a 24/7 learning experience. Providing these programs during the Covid-19 pandemic has been a keen opportunity for institutional learning. When this immersion in foreign culture is combined with academic rigor applied to a student's chosen field of study the growth can be exponential. So, what is the relationship between academic and personal growth? The National Association for Study Abroad has found that "students who have studied abroad are better able to work with people from other countries, understand the complexity of global issues, and have greater intercultural learning. One study found that students returned from their study abroad experiences more tolerant and less fearful of other countries, but with a greater sense of nationalism-a phenomenon they called 'enlightened nationalism'." It is often said that "you only really learn to appreciate things that are important to you when they are gone, when you miss them." The international learning environment can provide this opportunity. The restrictions on various societies in the past two years due to the international Covid pandemic have provided existing study abroad programs with a true testing ground for the validity of their programs. At the end of the day, American colleges and universities are not helpless in the face of these developments. A lot depends on how a university positions itself for a future based on the uncertainties of the past. As Winston Churchill was working to form the United Nations after WWII, he famously said, "Never let a good crisis go to waste". In another context, Churchill's insight on human nature can also be applied to the coming semesters and years as studying abroad rebounds. What new strategies will be developed and maintained? Institutional commitment without fear will be necessary to assure that "studying abroad" will continue to develop as a truly unique and transformational learning experience.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Methods for Integration of Documents using Hierarchical Structure based on the Formal Concept Analysis (FCA 기반 계층적 구조를 이용한 문서 통합 기법)

  • Kim, Tae-Hwan;Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.63-77
    • /
    • 2011
  • The World Wide Web is a very large distributed digital information space. From its origins in 1991, the web has grown to encompass diverse information resources as personal home pasges, online digital libraries and virtual museums. Some estimates suggest that the web currently includes over 500 billion pages in the deep web. The ability to search and retrieve information from the web efficiently and effectively is an enabling technology for realizing its full potential. With powerful workstations and parallel processing technology, efficiency is not a bottleneck. In fact, some existing search tools sift through gigabyte.syze precompiled web indexes in a fraction of a second. But retrieval effectiveness is a different matter. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Furthermore, the most relevant documents do not nessarily appear at the top of the query output order. Also, current search tools can not retrieve the documents related with retrieved document from gigantic amount of documents. The most important problem for lots of current searching systems is to increase the quality of search. It means to provide related documents or decrease the number of unrelated documents as low as possible in the results of search. For this problem, CiteSeer proposed the ACI (Autonomous Citation Indexing) of the articles on the World Wide Web. A "citation index" indexes the links between articles that researchers make when they cite other articles. Citation indexes are very useful for a number of purposes, including literature search and analysis of the academic literature. For details of this work, references contained in academic articles are used to give credit to previous work in the literature and provide a link between the "citing" and "cited" articles. A citation index indexes the citations that an article makes, linking the articleswith the cited works. Citation indexes were originally designed mainly for information retrieval. The citation links allow navigating the literature in unique ways. Papers can be located independent of language, and words in thetitle, keywords or document. A citation index allows navigation backward in time (the list of cited articles) and forwardin time (which subsequent articles cite the current article?) But CiteSeer can not indexes the links between articles that researchers doesn't make. Because it indexes the links between articles that only researchers make when they cite other articles. Also, CiteSeer is not easy to scalability. Because CiteSeer can not indexes the links between articles that researchers doesn't make. All these problems make us orient for designing more effective search system. This paper shows a method that extracts subject and predicate per each sentence in documents. A document will be changed into the tabular form that extracted predicate checked value of possible subject and object. We make a hierarchical graph of a document using the table and then integrate graphs of documents. The graph of entire documents calculates the area of document as compared with integrated documents. We mark relation among the documents as compared with the area of documents. Also it proposes a method for structural integration of documents that retrieves documents from the graph. It makes that the user can find information easier. We compared the performance of the proposed approaches with lucene search engine using the formulas for ranking. As a result, the F.measure is about 60% and it is better as about 15%.