• Title/Summary/Keyword: security demands

Search Result 245, Processing Time 0.021 seconds

A Study on Hotel CRM(Customer Relationship Management) using Big Data and Security (빅 데이터를 이용한 호텔기업 CRM 및 보안에 관한 연구)

  • Kong, Hyo-Soon;Song, Eun-Jee
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.69-75
    • /
    • 2013
  • Customer is the base factor of income for some corporations, so that effective CRM (Customer Relationship Management) is very important to develop the business. In order to use CRM efficiently, we should figure out customers' demands and provide services or products that the customers want. However, it is getting difficult to comprehend customers' demands because they have complicated form and getting more diverse. Recently, social media like Twitter and Facebook let customers to express their demands, and using big data is a very effective method for efficient CRM. This research suggests how to utilize big data for hotel CRM, which considers customer itself as asset of business. In addition, we discuss security problems of big data service and propose the solution for that.

Microbusinesses and Occupational Stress: Emotional Demands, Job Resources, and Depression Among Korean Immigrant Microbusiness Owners in Toronto, Canada

  • Kim, Il-Ho;Noh, Samuel;Choi, Cyu-Chul;McKenzie, Kwame
    • Journal of Preventive Medicine and Public Health
    • /
    • v.52 no.5
    • /
    • pp.299-307
    • /
    • 2019
  • Objectives: While occupational stress has long been a central focus of psychological research, few studies have investigated how immigrant microbusiness owners (MBOs) respond to their unusually demanding occupation, or how their unresolved occupational stress manifests in psychological distress. Based on the job demands-resources model, this study compared MBOs to employees with regard to the relationships among emotional demands, job resources, and depressive symptoms. Methods: Data were derived from a cross-sectional survey of 1288 Korean immigrant workers (MBOs, professionals, office workers, and manual workers) aged 30 to 70, living in Toronto and surrounding areas. Face-to-face interviews were conducted between March 2013 and November 2013. Results: Among the four occupational groups, MBOs appeared to endure the greatest level of emotional demands, while reporting relatively lower levels of job satisfaction and job security; but MBOs reported the greatest job autonomy. The effect of emotional demands on depressive symptoms was greater for MBOs than for professionals. However, an inspection of stress-resource interactions indicated that though MBOs enjoyed the greatest autonomy, the protective effects of job satisfaction and security on the psychological risk of emotional demands appeared to be more pronounced for MBOs than for any of the employee groups. Conclusions: One in two Korean immigrants choose self-employment, most typically in family-owned microbusinesses that involve emotionally taxing dealings with clients and suppliers. However, the benefits of job satisfaction and security may protect MBOs from the adverse mental health effects of job stress.

Demand Survey Method for Commercialization of Police Science Technology and Equipment

  • Myeonggi, Hong;Junho, Park;JeongHyeon, Chang;Seongju, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.609-625
    • /
    • 2023
  • This study is a demand research for the selection of public safety science and technology equipment and suggests an empirical research method. The technology demand survey is the beginning of the selection of innovative technology. And it is the basis of collecting information required for the technology required in the market and helping to apply it to the field. The demand survey for police science and technology can reduce the uncertainty of crime prevention and help the smooth implementation of security policies. However, in Korea, adoption of security science and technology equipment was centered on social issues or researchers' opinions rather than the demands of field users. Until, there was no research has been conducted on the demands of field police officers for selection of security science and technology equipment in Korea. Also, there was no preferential study for the demand for security science and technology equipment. Therefore, this study proposes a methodology that can systematically identify the needs for the technology and equipment of field experts suitable for the public security situation for the selection of security science and technology equipment. Specifically, we propose a sample design for a technology classification system and a survey tool for technology awareness and satisfaction. It is expected that this tool will provide a classification system for security science and technology equipment selected for the Korean police and will help determine the priority of equipment suitable for the field.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

A Study on the Information Security Control and Management Process in Mobile Banking Systems

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.218-232
    • /
    • 2015
  • According to the development of information processing technology and mobile communication technology, the utilization of mobile banking systems is drastically increasing in banking system. In the foreseeable future, it is expected to increase rapidly the demands of mobile banking in bank systems with the prevalence of smart devices and technologies. However, the keeping 'security' is very important in banking systems that handles personal information and financial assets. But it is very difficult to improve the security of banking systems only with the vulnerabilities and faults analysis methods of information security. Hence, in this paper, we accomplish the analysis of security risk factor and security vulnerability that occur in mobile banking system. With analyzed results, we propose the information security control and management processes for assessing and improving security based on the mechanisms which composes mobile banking system.

Fault Tree Analysis and Fault Modes and Effect Analysis for Security Evaluation of IC Card Payment Systems (IC카드 지불결제 시스템의 보안성 평가를 위한 고장트리 분석(FTA)과 고장유형과 영향 분석(FMEA))

  • Kim, Myong-Hee;Jin, Eun-Ji;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.1
    • /
    • pp.87-99
    • /
    • 2013
  • The demands of IC card payment system has been increased according to the rapid advancement of the IT convergence application technologies. Recently IC card payment systems are in demands of the usage space at anytime and anywhere by developing the wireless communication technology and its related multimedia processing technology. Therefore the security of IC card payment system becomes more important and necessary. There are many fault analysis methods to evaluate the security and safety of information systems according to their characteristics and usages. However, the only assessment method to evaluate the security of information systems is not enough to analyse properly on account of the various types and characteristics of information systems by the progress of IT convergence and their applications. Therefore, this paper proposes an integrative method of the Fault Tree Analysis (FTA) and Fault Modes and Effect Analysis/Criticality (FMEA/C) based on criticality to evaluate and improve the security of IC card payment system as an illustration.

Study on Improving Airport Security to Prevent Air Terrorism (항공테러 방지를 위한 공항보안 개선대책 연구)

  • Kim, Kwanho
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.4
    • /
    • pp.90-105
    • /
    • 2013
  • As witnessed in September 11 attacks, air terrorism is often the most effective means to achieve their goals, and thereby requires a sophisticated level of security measures. Moreover, considering the nature of air transportation, the prevention of air terrorism demands a wide range of international cooperation and joint efforts such as timely sharing of information related to air terrorism (such as latest terror techniques and list of terrorists) between nations, International Air Transport Association (IATA) and International Civil Aviation Organization (ICAO) As most air terrorism can be effectively prevented through security and search activities in airports, this study has focused on researching security measures and issues in major airports around the world, along with the potential measures to improve them. To achieve this effect, this paper offers solutions to preventing air terrorism by exploring appropriate responses to various type of air terrorism, deployment of advanced security and search equipment, techniques to identify terrorists, R&D on equipments to physically take down terrorists and systematic improvements on airport security search process.

Development Status and Prospects of Graphical Password Authentication System in Korea

  • Yang, Gi-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5755-5772
    • /
    • 2019
  • Security is becoming more important as society changes rapidly. In addition, today's ICT environment demands changes in existing security technologies. As a result, password authentication methods are also changing. The authentication method most often used for security is password authentication. The most-commonly used passwords are text-based. Security enhancement requires longer and more complex passwords, but long, complex, text-based passwords are hard to remember and inconvenient to use. Therefore, authentication techniques that can replace text-based passwords are required today. Graphical passwords are more difficult to steal than text-based passwords and are easier for users to remember. In recent years, researches into graphical passwords that can replace existing text-based passwords are being actively conducting in various places throughout the world. This article surveys recent research and development directions of graphical password authentication systems in Korea. For this purpose, security authentication methods using graphical passwords are categorized into technical groups and the research associated with graphical passwords performed in Korea is explored. In addition, the advantages and disadvantages of all investigated graphical password authentication methods were analyzed along with their characteristics.

Intergrating Security Model for Mobile-Grid (Mobile-Grid 환경에서의 통합 보안 모델)

  • Kang, Su-Youen;Lee, Sung-Young
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.585-588
    • /
    • 2002
  • Grid provides integral ing system that enables to use distributed computing resource and services as adapts traditional infrastructures to overcome the distributed computing environments. But, computing today is moving away from a restriction of the desktop, becoming diffused into our surrounding and onto our personal digital devices. In such mobile computing environments, users expects to access resource and services at any time from anywhere in such Mobile-Grid computing. This expectation results security issues, since the computing environments is expanded. This paper describes the security challenges in Mobile-Grid computing, explaining why traditional security mechanism fail to meet the demands of these environments. This paper describes policy driven security mechanism enabled entity to use service and data in trust Mobile-Grid environments and a set of security service module that need to be realized in the Mobile-Grid security architecture presents a set of use pattern that show hew these modules can be used for billing service in a secure Mobile-Grid environments.

  • PDF

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF