• Title/Summary/Keyword: security model

Search Result 4,023, Processing Time 0.032 seconds

The Effects of BlockChain Technology Benefits on Acceptance Intentions of BlockChain Insurance Services : Based on the UTAUT Mode (블록체인 기술 혜택의 효과가 블록체인 보험 서비스의 수용의도에 미치는 영향 : UTAUT 모형을 기반으로)

  • Kim, Jong Pil;Song, Eugene
    • Journal of Information Technology Services
    • /
    • v.17 no.4
    • /
    • pp.163-189
    • /
    • 2018
  • In this study, we analyze the acceptance theories of insurance services using blockchain technology. Although insurance services using block-chain technology are still in discussion, specific development methods for service methods applying block-chain technology in insurance services are being studied. In this study, the following analysis was conducted to analyze the acceptance of insurance services using block chain technology, focusing on four factors of the UTAUT model. As a result of the analysis, the technology benefits of the blockchain affecting the performance expectations of UTAUT are security and reliability. In addition, the factors influencing UTAUT's effort expectations were found to be availability and economics. Therefore, it was found that performance expectation and effort expectation for technology acceptance are influenced by different technology benefits. Among the four factors of UTAUT, the factors affecting the insurance service using the blockchain technology are performance expectation and effort expectation, and social influence and promotion condition have no effect on acceptance intention. Also, the moderating effect of user innovation on acceptance intention of insurance service applying blockchain was significant only for effort expectation among UTAUT factors.

Global Changing of Consumer Behavior to Retail Distribution due to Pandemic of COVID-19: A Systematic Review

  • TIMOTIUS, Elkana;OCTAVIUS, Gilbert Sterling
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.69-80
    • /
    • 2021
  • Purpose: Consumers have unique behaviors that are classified based on their interests and considerations before buying. They are predicted will change due to the pandemic of COVID-19. This study provides insights for retailers about the dynamic of consumer behavior before and during the pandemic, including future predictions. Research design, data and methodology: The Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA) statement was applied in this study. Seven studies that were selected from five databases meet the criteria for cohort and cross-sectional analyses of gender, age, store types, and environmental concerns. Results: Consumer's gender and age contribute to consumer behavior change. Both offline and online stores can be integrated as omnichannel rather than substitute each other. Product distribution and consumer budget need to be reevaluated by retailers, while internet security is the most essential factor when developing their online transactions. Conclusions: COVID-19 pandemic has a significant impact on changing consumer behavior in most countries. Retailers are encouraged to adapt to the changes by modifying their business model with technology. However, it is still speculated and cannot be generalized due to different cultural and contextual factors. Future studies are always needed to synchronize along with the transition of consumers' behavior.

Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey

  • Wei, Zhe;Yu, Shuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3793-3814
    • /
    • 2021
  • Most secure solutions like cryptography are software based and they are designed to mainly deal with the outside attacks for traditional networks, but such soft security is hard to be implemented in wireless sensor networks to counter the inside attacks from internal malicious nodes. To address this issue, reputation has been introduced to tackle the inside malicious nodes. Reputation is essentially a stimulating mechanism for nodes' cooperation and is employed to detect node misbehaviors and improve the trust-worthiness between individual nodes. Among the reputation models, binomial distribution based reputation has many advantages such as light weight and ease of implementation in resource-constraint sensor nodes, and accordingly researchers have proposed many insightful related methods. However, some of them either directly use the modelling results, apply the models through simple modifications, or only use the required components while ignoring the others as an integral part of the whole model, this topic still lacks a comprehensive and systematical review. Thus the motivation of this study is to provide a thorough survey concerning each detailed functional components of binomial distribution based reputation for wireless sensor networks. In addition, based on the survey results, we also argue some open research problems and suggest the directions that are worth future efforts. We believe that this study is helpful to better understanding the reputation modeling mechanism and its components for wireless sensor networks, and can further attract more related future studies.

A weighted method for evaluating software quality (가중치를 적용한 소프트웨어 품질 평가 방법)

  • Jung, Hye Jung
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.249-255
    • /
    • 2021
  • This study proposed a method for determining weights for the eight quality characteristics, such as functionality, reliability, usability, maintainability, portability, efficiency, security, and interoperability, which are suggested by international standards, focusing on software test reports. Currently, the test results for software quality evaluation apply the same weight to 8 quality characteristics to obtain the arithmetic average. Weights for 8 quality characteristics were applied using the results from text analysis, and weights were applied using the results of text analysis of test reports for two products. It was confirmed that the average of test reports according to the weighted quality characteristics was more efficient.

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.

Gender Differences in Influence of Socio-demographic Characteristics on Mode Choice in India

  • SAIGAL, Taru;VAISH, Arun Kr.;RAO, N.V.M.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.531-542
    • /
    • 2021
  • The study aims to investigate differences between men and women in influence of various socio-demographic factors on choice of mode of transport. For this purpose, a binary logit model of choice probabilities is implemented on survey data of a developing country city. Results indicate women's choice of travel mode to be more environment-friendly than that of men. Well-educated, working and middle-aged individuals appear to be the most likely to choosing more-polluting modes of transport for frequent travelling purposes. Individuals in the sample who are the least socioeconomically well off are found the most likely to be promising for the environment. The findings of this study suggest the future transportation policies toward development of existing infrastructure of greener modes of transportation in the city such as, public transportation services and pedestrian lanes, so as to manage the rising issues of degrading environmental quality. The study highlights how the consideration and inclusion of socio-demographic factors is crucial for policy recommendation regarding curtailing the environmental damages contributed by transportation sector. Because mobility crucially affects all other indicators of empowerment, and women are the ones using green modes extensively, the city's transportation system should be so developed which gives their safety and security due importance.

How Businessmen Improve Their Economic Stability and Quality of Life after Retirement

  • SEO, Kyeong-Sook;KIM, Jae-Tae
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.12
    • /
    • pp.23-31
    • /
    • 2022
  • Purpose: This research is to answer the following research questions because of the importance of learning how retired businesspeople increase their financial security and quality of life. (1) how does an entrepreneur contribute to economic development? (2) what types of investments are performed by businesspeople after retirement? (3) how entrepreneurial financial attainment capacity and anticipated net income after retirement are related? Research design, data and methodology: This research has conducted the qualitative analysis (QCA) using the current literature review. In the traditional positivist research paradigm, the quality of research is evaluated based on issues of validity, reliability, and objectivity. Contrary to the positivist approach, QCA focuses on the underlying meaning of the data. Results: This research found that finance management is increasingly challenging for businesspeople. The solutions based on the literature investigation suggest four categories. (1) Planned spending and revenue allocation, (2) Investing in the stock market, (3) Create a culture of saving, (4) Get Informed. Conclusions: This research puts forth a model to describe the connection between an investor's financial achievement potential and their desired net profits in retirement. The results of this study support the idea that the ability to achieve financial success as an entrepreneur has a salutary effect on the amount of money saved for retirement.

Critical Factors of Reacquainting Consumer Trust in E-Commerce

  • FAN, Mingyue;AMMAH, Victoria;DAKHAN, Sarfraz Ahmed;LIU, Ran;MINGLE, Moses NiiAkwei;PU, Zhengjia
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.561-573
    • /
    • 2021
  • Knowing how to build and maintain consumer trust is crucial for e-commerce. Despite the number of empirical studies that have explored the factors that influence consumer trust, none of them considers the relative importance of different antecedents and how they interact to influence consumer trust. Therefore, based on the integrated Decision Making Trial and Evaluation Laboratory (DEMATEL) and Interpretive Structural Modeling (ISM) approaches, we establish a hierarchical structural model, which not only demonstrates the intensity of the relationships but also identifies the interdependence among the drivers of consumer trust in E-commerce. The findings confirm that propensity to trust is the most important determinant of consumer trust. The brand-related factors and platform-related factors are prominent in the process of building trust as they influence consumer trust indirectly through propensity to trust. Geographic location, demographic variables, and high security are identified as the root causes that affect consumer trust through other trust antecedents. Furthermore, the findings of this study offer valuable insights into an important element of e-commerce and provide a useful platform for future research. More represented samples and factors are encouraged for further research to ensure research fairness and minimize consumer distrust and uncertainty.

The Impact of Quality and Price on the Loyalty of Electronic Money Users: Empirical Evidence from Indonesia

  • PUTRA, Pratama;JAYADI, Riyanto;STEVEN, Ignatius
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.1349-1359
    • /
    • 2021
  • The electronic money market in Indonesia continues to experience an increase in the number of users and volume of transactions. However, the electronic money market, especially server-based, in Indonesia is becoming concentrated into a few issuers. Electronic money issuers compete in price and promotion wars to gain new customers and maintain their existing ones. This paper presents an analysis of the orientation and factors that influence the loyalty in electronic money products. The research model variables in this study are adopted from the E-Service Quality and Marketing Mix categories. These variables are hypothesized to affect the perceived value and then customer loyalty. The research population consists of all Indonesians who use server-based electronic money, with a sample of 400 individuals. The results show that, in the E-Service Quality group, reliability, responsiveness, and security significantly affect perceived value, while the perceived price and perceived promotional benefits significantly affect perceived value in the Marketing Mix group. The perceived price has the highest effect on the perceived value and customer loyalty, while the perceived value has a significant effect on customer loyalty. Finally, it was found that the customer is more sensitive to the price than quality in using electronic money.

LSTM Android Malicious Behavior Analysis Based on Feature Weighting

  • Yang, Qing;Wang, Xiaoliang;Zheng, Jing;Ge, Wenqi;Bai, Ming;Jiang, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2188-2203
    • /
    • 2021
  • With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short-Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.