• Title/Summary/Keyword: security service industry

Search Result 409, Processing Time 0.024 seconds

A Study on Acceptance Factors of Financial Mydata Service from Information Security Perspectives (정보보호 관점의 금융 마이데이터 서비스 수용 요인에 관한 연구)

  • Lee, Seok Ho;Bae, Chang Hang
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.137-152
    • /
    • 2022
  • Consumers' enhanced intention to adopt the Mydata service or their voluntary provision of personal information is a very essential element in the stable growth of the Mydata industry along with the creation of corporate values. The growing leakage of customer information according to the rising value of data can have negative impacts on the use of Mydata service and shrink quality custom service needs based on the personal information provided by financial consumers. This study set out to identify security risks that financial consumers could recognize and security factors that could supplement them and investigate the effects of these security factors on consumers' intention to adopt the Mydata service, thus providing useful implications for increasing the acceptance of financial consumers and finding a strategy to expand safe utilization. The findings raise a need to guarantee the stability and transparency of information provided by customers as information subjects, and they should be essential requirements for the Mydata service. The security factors applied to guarantee them should include convenience in terms of financial service.

A Study on the Effects of Service Quality in Machine Security Systems on Customer Satisfaction (기계경비시스템의 서비스품질이 고객만족에 미치는 영향에 관한 연구)

  • Huh, Koung-Mi;Hong, Tae-Kyung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.361-381
    • /
    • 2008
  • Quality rating of machine security systems is difficult because both tangible and intangible services are included. However, still, the research template applied the SERVQUAL model with the intention of confirming machine security systems' service quality formation and experimentally inspecting the relationship between service quality and customer satisfaction. Therefore, the following highlights the experimental research outcomes and their implications for small-scale businesses utilizing machine security systems in the Daegu region. First, after observing whether the determining factors constitute service quality, four components were found to have significant influence on customer satisfaction. Additionally, in observing any differences in their influences, the following in order were observed as having influence on customer satisfaction: empathy, assurance reliability, responsiveness, and tangibility. Moreover, though companies‘ newest facilities and equipment are important, it can be concluded that a company employees’ prudent consideration, individual interest, reliability, and assurance for the customer carry greater importance. Secondly, though we intended to survey machine security systems by employing the SERVQUAL model, determinant factor analysis results found applying SERVQUAL model in its original state a challenge. According to results from determinant factor analysis, the basis for forming service quality is determined by assurance reliability, empathy, tangibility, and responsiveness. Furthermore, in future research, while more accurately distinguishing between assurance and reliability, a more appropriate model must also be considered for modification in domestic machine security system industry‘s service quality evaluation.

  • PDF

Development of Indicators for Information Security Level Assessment of VoIP Service Providers

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.634-645
    • /
    • 2014
  • VoIP (Voice over Internet Protocol) is a technology of transmitting and receiving voice and data over the Internet network. As the telecommunication industry is moving toward All-IP environment with growth of broadband Internet, the technology is becoming more important. Although the early VoIP services failed to gain popularity because of problems such as low QoS (Quality of Service) and inability to receive calls as the phone number could not be assigned, they are currently established as the alternative service to the conventional wired telephone due to low costs and active marketing by carriers. However, VoIP is vulnerable to eavesdropping and DDoS (Distributed Denial of Service) attack due to its nature of using the Internet. To counter the VoIP security threats efficiently, it is necessary to develop the criterion or the model for estimating the information security level of VoIP service providers. In this study, we developed reasonable security indicators through questionnaire study and statistical approach. To achieve this, we made use of 50 items from VoIP security checklists and verified the suitability and validity of the assessed items through Multiple Regression Analysis (MRA) using SPSS 18.0. As a result, we drew 23 indicators and calculate the weight of each indicators using Analytic Hierarchy Process (AHP). The proposed indicators in this study will provide feasible and reliable data to the individual and enterprise VoIP users as well as the reference data for VoIP service providers to establish the information security policy.

A Longitudinal Study on the Effect of e-Commerce Technology Characteristics and Personal Value on Purchasing Behavior by Importance of Information Protection (전자상거래 기술특성과 개인가치가 정보보호 중요성에 의한 구매행동에 미치는 영향에 대한 종단적 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.159-171
    • /
    • 2017
  • The purpose of this study is to investigate the effects of e - commerce technology characteristics and personal values on purchasing behavior by information security importance. The results of the empirical study that examined the university students in 2006 and 2016 are as follows. First, personal value is centered on personal values, such as self - esteem and self - esteem in 2006. In 2016, however, personal values such as self - fulfillment and personal relationship with others are important. Transactional ease and product service serve as the main value of the fun and pleasure of life, but the sense of accomplishment as the core value of information protection. Second, the technical characteristics of e-commerce are as follows. In terms of ease of transaction and product service, technology characteristics are simplified and directly effected over time. On the other hand, information protection works very closely with individual value, There was a strong tendency to enjoy benefits. Especially in 2006, if you want to enjoy transactional convenience through transaction information security or benefit from product service, it has been changed to recognize the importance of information security through payment in 2016.

An Exploratory Study on Customer-oriented Attributes for the Revitalization of Digital Healthcare Service : Using Interpretive Structural Modeling (디지털 헬스케어 서비스 활성화를 위한 고객지향적 속성에 관한 탐색적 연구 : 해석적 구조 모형을 이용하여)

  • Ji, Daebum;Choi, Jeongil;Kim, Yonghee
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.105-119
    • /
    • 2018
  • The healthcare business is growing as a global core business because of the phenomenon of global aging, as well as in South Korea, skyrocketing health care costs accordingly, and changing the paradigm from treatment to the prevention-centered medical service. Especially, as the digital healthcare service stands out as a solution, major countries actively promote and support policies at the government level. Thus, this study will present attributes of a market-oriented service that would vitalize the digital healthcare service industry by investigating major attributes of the digital healthcare service. To analyze the relationships of the influences of attributes, this study used Interpretive Structural Modeling. As a result of literature research and ISM, this study can understand the eight basic attributes of the digital healthcare service (network scalability, context awareness, connection among information platforms, cost, trust, security, ease of use, usefulness) and analyze the relationships of the influences among the attributes. In addition, as this study finds some significant differences in Order Winner and Order Qualifier between the experts' group (security) and the users' group (trust, ease of use, usefulness), It provides meaningful implications for revitalization and promotion of digital healthcare service industry.

Effects of Emotional Labor on Customer Orientation by Service Career of Security Agents (시큐리티 요원의 근무경력에 따른 감정노동이 고객지향성에 미치는 영향)

  • Kim, Eui-Young;Lee, Jun-Woo;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.269-293
    • /
    • 2013
  • Raising the level of quality of the security industry is an urgent matter. Since security service is provided through direct contact with customers, the security agents' expression of emotion directly influences the evaluation of the security company or their own earnings. So emotion control at customers demand is necessary above all things, and this research established what difference the service career makes in the influence that the security agent's emotional labor exerts on customer orientation, and the results of the analysis are summarized as follows. First, the security agent's emotional labor exerted negative effects on customer orientation. From this, the conclusion that the higher the security agent's emotional labor, the lower the customer orientation, was obtained. Second, the service career showed differences in the effects of the security agent's emotional labor on the customer orientation. In other words, the conclusion that the lower the security agent's service career, the greater effects the emotional labor exerts on the customer orientation, was obtained. In conclusion, in order to raise the level of customer service, systematic education to control the emotional labor of the security agents with low service career is necessary. Particularly, since the emotional labor of new employees is related to the service environment, the improvement of the service environment of the security agents is more important than anything else.

  • PDF

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

A Study on Improvement Stability of Cloud Service using Attack Information Collection (공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

A Study on The Problem of The Revised Security Industry Law and Improvement Plan (개정 경비업법의 문제점과 개선방안에 관한 연구)

  • Park, Hyung-Sik
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.129-135
    • /
    • 2013
  • The revised security industry law revised 17 provisions among 31 provisions in order to root out the violent event. The main contents of the revised security industry law is the intensitfication of the required condition of permission, intensitfication of the obligation, management strengthening of the public resentment of group field, official, reason of expansion of the expenses instructor and guard, dress and equipment, vehicle, intensitfication of the managing director, intensitfication of the punishment, and etc. However, there is the problem including the putting under an obligation of the arrangement new appointment education, cause provider punishment of the service company violence, awareness of the police to the security company, excessive regulation, intensification of punishment problem, supervision power intensitfication of the revised security industry law is excessive the police, and etc. The individual responsibility education completion method and public resentment of group field in addition to is thought in order to solve this that exclusion of the prior education obligation, revision of the security industry law, burden on tax payers of the extra charge, punishment of the violence request contract trader, introduction of the guard qualification certificate system, and etc. are needed.