• Title/Summary/Keyword: security model

Search Result 4,015, Processing Time 0.028 seconds

The Impact of Perceived Risks Upon Consumer Trust and Purchase Intentions (인지된 위험의 유형이 소비자 신뢰 및 온라인 구매의도에 미치는 영향)

  • Hong, Il-Yoo B.;Kim, Woo-Sung;Lim, Byung-Ha
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.1-25
    • /
    • 2011
  • Internet-based commerce has undergone an explosive growth over the past decade as consumers today find it more economical as well as more convenient to shop online. Nevertheless, the shift in the common mode of shopping from offline to online commerce has caused consumers to have worries over such issues as private information leakage, online fraud, discrepancy in product quality and grade, unsuccessful delivery, and so forth, Numerous studies have been undertaken to examine the role of perceived risk as a chief barrier to online purchases and to understand the theoretical relationships among perceived risk, trust and purchase intentions, However, most studies focus on empirically investigating the effects of trust on perceived risk, with little attention devoted to the effects of perceived risk on trust, While the influence trust has on perceived risk is worth studying, the influence in the opposite direction is equally important, enabling insights into the potential of perceived risk as a prohibitor of trust, According to Pavlou (2003), the primary source of the perceived risk is either the technological uncertainty of the Internet environment or the behavioral uncertainty of the transaction partner. Due to such types of uncertainty, an increase in the worries over the perceived risk may negatively affect trust, For example, if a consumer who sends sensitive transaction data over Internet is concerned that his or her private information may leak out because of the lack of security, trust may decrease (Olivero and Lunt, 2004), By the same token, if the consumer feels that the online merchant has the potential to profit by behaving in an opportunistic manner taking advantage of the remote, impersonal nature of online commerce, then it is unlikely that the merchant will be trusted, That is, the more the probable danger is likely to occur, the less trust and the greater need to control the transaction (Olivero and Lunt, 2004), In summary, a review of the related studies indicates that while some researchers looked at the influence of overall perceived risk on trust level, not much attention has been given to the effects of different types of perceived risk, In this context the present research aims at addressing the need to study how trust is affected by different types of perceived risk, We classified perceived risk into six different types based on the literature, and empirically analyzed the impact of each type of perceived risk upon consumer trust in an online merchant and further its impact upon purchase intentions. To meet our research objectives, we developed a conceptual model depicting the nomological structure of the relationships among our research variables, and also formulated a total of seven hypotheses. The model and hypotheses were tested using an empirical analysis based on a questionnaire survey of 206 college students. The reliability was evaluated via Cronbach's alphas, the minimum of which was found to be 0.73, and therefore the questionnaire items are all deemed reliable. In addition, the results of confirmatory factor analysis (CFA) designed to check the validity of the measurement model indicate that the convergent, discriminate, and nomological validities of the model are all acceptable. The structural equation modeling analysis to test the hypotheses yielded the following results. Of the first six hypotheses (H1-1 through H1-6) designed to examine the relationships between each risk type and trust, three hypotheses including H1-1 (performance risk ${\rightarrow}$ trust), H1-2 (psychological risk ${\rightarrow}$ trust) and H1-5 (online payment risk ${\rightarrow}$ trust) were supported with path coefficients of -0.30, -0.27 and -0.16 respectively. Finally, H2 (trust ${\rightarrow}$ purchase intentions) was supported with relatively high path coefficients of 0.73. Results of the empirical study offer the following findings and implications. First. it was found that it was performance risk, psychological risk and online payment risk that have a statistically significant influence upon consumer trust in an online merchant. It implies that a consumer may find an online merchant untrustworthy if either the product quality or the product grade does not match his or her expectations. For that reason, online merchants including digital storefronts and e-marketplaces are suggested to pursue a strategy focusing on identifying the target customers and offering products that they feel best meet performance and psychological needs of those customers. Thus, they should do their best to make it widely known that their products are of as good quality and grade as those purchased from offline department stores. In addition, it may be inferred that today's online consumers remain concerned about the security of the online commerce environment due to the repeated occurrences of hacking or private information leakage. Online merchants should take steps to remove potential vulnerabilities and provide online notices to emphasize that their website is secure. Second, consumer's overall trust was found to have a statistically significant influence on purchase intentions. This finding, which is consistent with the results of numerous prior studies, suggests that increased sales will become a reality only with enhanced consumer trust.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

The Need for Modernization of the Tokyo Convention(1963) on the Issue of Unruly Passengers and the Inadequacy of Korean Domestic Legal Approaches (기내 난동승객관련 도쿄협약의 개정필요성과 한국국내법적 접근의 한계)

  • Bae, Jong-In;Lee, Jae-Woon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.1
    • /
    • pp.3-27
    • /
    • 2012
  • Although aviation safety and security have been improving, which has made air transportation more reliable, the international aviation community has witnessed a steady increase in the number of unruly passenger incidents. Under international law, the Tokyo Convention (The Convention on Offences and Certain Other Acts Committed on Board Aircraft of 1963) is applicable to unruly passenger issues. While the Tokyo Convention has been a successful convention which 185 member states have ratified, it has its shortcomings. Three major shortcomings are related to definition, jurisdiction, and enforcement. Firstly, the Tokyo Convention does not provide for a definition of unruly passengers, thereby resulting in a situation where conduct that may be considered to be a criminal offence in the country of embarkation may not be a criminal offence in the country where the aircraft lands. Having different definitions may lead to ineffective action on the part of air carriers. Secondly, the fact that the state of landing does not bear jurisdiction produces circumstances in which it is impossible to punish an unruly passenger who clearly committed an offence on board. Thirdly, the Tokyo Convention only recognizes the competence of the state of registry to exercise criminal jurisdiction but does not impose the duty to actually use that competence in any specific case. Along with ratifying the Tokyo Convention, Korea enacted the Aviation Navigation Safety Act in 1974 as a domestic legal approach to dealing with the problem of unruly passengers. Partially reflecting the ICAO's model legislation, Circular 288, the Aviation Safety and Security Act was enacted in 2002. Although the Korean Aviation Safety and Security Act is a comprehensive act which has been constantly updated, there is no provision with respect to jurisdiction and only the Korean criminal code is applicable to jurisdiction. The Korean criminal code establishes its jurisdiction in connection with territoriality, nationality and registration, which is essentially the same as the jurisdictional principles of the Tokyo Convention. Thus, the domestic legal regime cannot close the jurisdictional gap either. Similarly, Korean case law would not take an active posture to jurisdiction unless the offence in question is a serious one, such as hijacking. A Special Sub Committee of the ICAO Legal Committee (LCSC) was established to examine the feasibility of introducing amendments to the Convention on Offences and Certain Other Acts Committed on Board Aircraft of 1963 with particular reference to the issue of unruly passengers. The result of the ICAO's findings should lead to the modernization of the Tokyo Convention, thereby reducing the number of incidents caused by unruly passengers and enabling all parties concerned to respond to unruly passengers more effectively.

  • PDF

Private Income Transfers and Old-Age Income Security (사적소득이전과 노후소득보장)

  • Kim, Hisam
    • KDI Journal of Economic Policy
    • /
    • v.30 no.1
    • /
    • pp.71-130
    • /
    • 2008
  • Using data from the Korean Labor & Income Panel Study (KLIPS), this study investigates private income transfers in Korea, where adult children have undertaken the most responsibility of supporting their elderly parents without well-established social safety net for the elderly. According to the KLIPS data, three out of five households provided some type of support for their aged parents and two out of five households of the elderly received financial support from their adult children on a regular base. However, the private income transfers in Korea are not enough to alleviate the impact of the fall in the earned income of those who retired and are approaching an age of needing financial assistance from external source. The monthly income of those at least the age of 75, even with the earning of their spouses, is below the staggering amount of 450,000 won, which indicates that the elderly in Korea are at high risk of poverty. In order to analyze microeconomic factors affecting the private income transfers to the elderly parents, the following three samples extracted from the KLIPS data are used: a sample of respondents of age 50 or older with detailed information on their financial status; a five-year household panel sample in which their unobserved family-specific and time-invariant characteristics can be controlled by the fixed-effects model; and a sample of the younger split-off household in which characteristics of both the elderly household and their adult children household can be controlled simultaneously. The results of estimating private income transfer models using these samples can be summarized as follows. First, the dominant motive lies on the children-to-parent altruistic relationship. Additionally, another is based on exchange motive, which is paid to the elderly parents who take care of their grandchildren. Second, the amount of private income transfers has negative correlation with the income of the elderly parents, while being positively correlated with the income of the adult children. However, its income elasticity is not that high. Third, the amount of private income transfers shows a pattern of reaching the highest level when the elderly parents are in the age of 75 years old, following a decreasing pattern thereafter. Fourth, public assistance, such as the National Basic Livelihood Security benefit, appears to crowd out private transfers. Private transfers have fared better than public transfers in alleviating elderly poverty, but the role of public transfers has been increasing rapidly since the welfare expansion after the financial crisis in the late 1990s, so that one of four elderly people depends on public transfers as their main income source in 2003. As of the same year, however, there existed and occupied 12% of the elderly households those who seemed eligible for the National Basic Livelihood benefit but did not receive any public assistance. To remove elderly poverty, government may need to improve welfare delivery system as well as to increase welfare budget for the poor. In the face of persistent elderly poverty and increasing demand for public support for the elderly, which will lead to increasing government debt, welfare policy needs targeting toward the neediest rather than expanding universal benefits that have less effect of income redistribution and heavier cost. Identifying every disadvantaged elderly in dire need for economic support and providing them with the basic livelihood security would be the most important and imminent responsibility that we all should assume to prepare for the growing aged population, and this also should accompany measures to utilize the elderly workforce with enough capability and strong will to work.

Comparison on Patterns of Conflicts in the South China Sea and the East China Sea through Analysis on Mechanism of Chinese Gray Zone Strategy (중국의 회색지대전략 메커니즘 분석을 통한 남중국해 및 동중국해 분쟁 양상 비교: 시계열 데이터에 근거한 경험적 연구를 중심으로)

  • Cho, Yongsu
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.273-310
    • /
    • 2020
  • This study aims at empirically analyzing the overall mechanism of the "Gray Zone Strategy", which has begun to be used as one of Chinese major maritime security strategies in maritime conflicts surrounding the South China Sea and East China Sea since early 2010, and comparing the resulting conflict patterns in those reg ions. To this end, I made the following two hypotheses about Chinese gray zone strategy. The hypotheses that I have argued in this study are the first, "The marine gray zone strategy used by China shows different structures of implementation in the South China Sea and the East China Sea, which are major conflict areas.", the second, "Therefore, the patterns of disputes in the South China Sea and the East China Sea also show a difference." In order to examine this, I will classify Chinese gray zone strategy mechanisms multi-dimensionally in large order, 1) conflict trends and frequency of strategy execution, 2) types and strengths of strategy, 3) actors of strategy execution, and 4) response methods of counterparts. So, I tried to collect data related to this based on quantitative modeling to test these. After that, about 10 years of data pertaining to this topic were processed, and a research model was designed with a new categorization and operational definition of gray zone strategies. Based on this, I was able to successfully test all the hypotheses by successfully comparing the comprehensive mechanisms of the gray zone strategy used by China and the conflict patterns between the South China Sea and the East China Sea. In the conclusion, the verified results were rementioned with emphasizing the need to overcome the security vulnerabilities in East Asia that could be caused by China's marine gray zone strategy. This study, which has never been attempted so far, is of great significance in that it clarified the intrinsic structure in which China's gray zone strategy was implemented using empirical case studies, and the correlation between this and maritime conflict patterns was investigated.

  • PDF

The Level of Job Satisfaction and Organizational Commitment of Medical Record Technicians (의무기록사의 직무만족도 및 조직몰입도)

  • Choei, Eun-Mi;Kim, Young-Hoon
    • Korea Journal of Hospital Management
    • /
    • v.8 no.3
    • /
    • pp.72-91
    • /
    • 2003
  • The purpose of this study is to investigate the recognition of health information managers, and to analyze the level of job satisfaction and organizational commitment of medical record technicians. The data for this study were collected through a self-administered survey with a structured questionnaire to 172 subjects from medical record technicians working in hospitals in Seoul and Gyeonggi Province as well as the faculty of medical schools across South Korea. In this analysis frequency, t-test, ANOVA, factor analysis and structural equation model were used. The main findings of this study are as follows: 1. As for recognition of the seven dimensions in the role of health information managers, the role as clinical data specialist received the most positive feedback, followed by document & repository managers, patient information coordinators, health information managers, data quality managers, security officers and research & decision support analyst. 2. The level of job satisfaction among medical information handlers and managers averaged 3.14. In terms of the factors in the work environment concerned with job satisfaction, being able to work independently and as team players reached the top among 6 factors with the average of 3.39, followed by professional position, salary & rewards, expectations for job performance and administration. 3. The average rate of organizational commitment stood at 3.09. Respondents tend to be focused on present tasks rather than future-oriented tasks. 4. The result of the analysis based on the relationship between recognition as health information managers, job satisfaction and organizational commitment found that all analysis are statistically meaningful. The more the respondents were aware of their roles as health information managers, the more they tended to be committed to their work and satisfied with their work. The more the respondents were committed to their work, the more satisfaction was seen. The effects of recognition as health information managers on organizational commitment measured 0.27 and for job satisfaction it was 0.17. The effects of organizational commitment on job satisfaction stood at 0.71. The feasibility of the model meets the standard at Chi-square value of 66.755 and the P value of 0.057. The Normed Fit Index (NFI) of 0.930 was in compliance with the standard for model feasibility and the squared multiple correlation coefficient of this model was 8% in organizational commitment and 60% in job satisfaction.

  • PDF

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.

The Determination of Risk Group and Severity by Traffic Accidents Types - Focusing on Seoul City - (교통사고 위험그룹 및 사고유형별 심각도 결정 연구 - 서울시 중심 -)

  • Shim, Kywan-Bho
    • International Journal of Highway Engineering
    • /
    • v.11 no.2
    • /
    • pp.195-203
    • /
    • 2009
  • This research wished to risk type and examine closely driver special quality and relation of traffic accidents by occurrence type of traffic accidents and traffic accidents seriousness examine closely relation with Severity. Fractionate traffic accidents type by eight, and driver's special quality for risk group's classification did to distinction of sex, vehicle type, age etc. analyzed relation with injury degree adding belt used putting on availability for security the objectivity with wave. Used log-Linear model and Logit model for analysis of category data. A head-on collision and overtaking accident, right-turn accident are high injury or death accident and possibility to associate in relation with accident type and seriousness degree. In risk group analysis The age less than 20 years in motor-cycle driver, taxi driver in 41 years to 50 years old are very dangerous. The woman also was construed to the more risk group than man from when related to car, mini-bus, goods vehicle etc. Therefore, traffic safety education and Enforcement for risk group that way that can reduce accident that produce to reduce a loss of lives at traffic accidents appearance a head-on collision and overtaking accidents, right-turn accidents should be studied and as traffic accidents weakness class may have to be solidified.

  • PDF

A Study on the Usefulness of Accounting Information for the Predication of Medium and Small Enterprises' Bankruptcy (중소기업 도산예측에 회계정보 유용성에 관한 연구)

  • Lee, Sung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1460-1466
    • /
    • 2008
  • The purpose of this study is to verify how the accounting information of a bankrupt firm which is defined as a dishonor, an impaired total capital, a poor financial performance of a business, a rejection of auditor's opinion and an incongruity of auditor's opinion differs from that of a healthy firm on the basis of the index of financial affairs if the accounting information released by KOSDAQ is valuable. The sampling firms consists of 45 KOSDAQ firms that went bankrupt from 2000 to 2007 and 45 healthy firms which are selected in accordance with the sizes of assets. It has also selected the 30 sampling firms for the confirmation of the model in the same way. According to the result of the in-depth analysis, the variables related to security among the 17 indexes of financial affairs that have been used in this study for 5 years show a noticeable difference between a bankrupt firm and a healthy one. The accuracy of failed firms using this model for confirmation demonstrates 76.7% in 5 years before the bankruptcy, 76.7% in 4 years before that, 65.0% in 3 years before it, 76.7% in 2 years, 88.3% in 1 year. This data shows that the process from a healthy firm to a bankrupt one has progressed gradually and confirms the value of the index of financial affairs, exhibiting the accuracy with 83.8% of a presuming sample and 76.7% of a confirming sample for 5 years.

A Study on the Improvement of Marine Pollution Response Education Program of Korea Coast Guard Academy - Focusing on Comparison between Domestic and Foreign Curriculums - (해양경비안전교육원 해양오염방제교육 프로그램 개선에 관한 연구 - 유류오염 방제 교육과정에 대한 국내외 비교를 중심으로 -)

  • Choi, Hyun Kue
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.4
    • /
    • pp.365-375
    • /
    • 2017
  • Approximately 250 marine pollution accidents involving oil and HNS spills are reported every year in the Republic of Korea. It is necessary that a strengthen of specialization of marine pollution response personnel on marine pollution response due to a diminution of damage when a major oil and HNS spill incident occurred, as in the case of the M/V Heibei Spirit and the M/V Maritime Maisie. In regard to this, the International Maritime Organization (IMO) has planned to revise the OPRC Model Training Course to strengthen expertise for oil spill incident responses. Through a comparison of curriculum with the Korea Coast Guard Academy (KCGA) program, a revised IMO Model Course and the OSRL training institute, this study recommends the following improvements for the education program of the KCGA in response to oil spills. This study suggests several options in line with this approach to revise the oil spill response education curriculum, exercise, discussions and making materials. Accreditation of the KCGA as an institute that provides an IMO Model training course developed according to the revised IMO Model Course material is proposed.