risks. Low involvement hierarchy is belief-behavior-evaluation. We applied this theory to messenger apps. We divided the functions of messenger apps into hedonic and utilitarian. In hedonic, there are customized background image, ring tone, and viewing friend's mini profile. In utilitarian, there are the number of users, speed, free charge, sharing multimedia and privacy protection with Lock.
behavior in depth. Combing these information with their existing database, G market can use this source to CRM. This procedure will explained in the following parts.
3.2 ISP& ESCROW&SSL
To ensure the security of E-commerce, G market provides some security program for transaction. This is represented by ISP, ESCROW service. Also, there is a SSL protocol that is used to protect the private info
protection as well as restrictions on government use of power.
The APEC represents more than 60 percent of world’s internet users, also decided in 2002(reaffirmed in 2004) to adopt cyber-security regulatory measures, which follow the council of Europe cybercrime convention. The African union, in particular its African commission on Human and Peoples’ Rights adopted in 2002 a declaration of p
Ⅰ. 서론
인공지능 시대의 본격적인 진입을 앞두고 있는 지금, 많은 전문가들은 동 기술의 ‘특이점’ 도래와 위험성을 강조하며 이에 대한 규제 필요성을 주장하기 시작하였다. 알고리즘에 의해 제공된 편향된 정보와 가치관에 의해 훼손되는 민주주의원리, 집적된 데이터가 권력화되어 나타나는
The number of smart phone in use is over 50 million
People can do almost all tasks of computers on their smart phone.
- Internet surfing
- Sending a mail
By using various applications
The secret of
smart phone revolution
↓
Applications
More useful and convenient
“Lastly started,
but the fastest spreading speed”
2011. 12 (estimated figure) 77.8%
(This year an