The number of Internet users and corporations around the world including in Korea has grown and is on the increase at present. Therefore information technology (IT) has become an essential part of doing business today. However, as organizations continue to increase their use of IT, the security risks and concerns associated with it are growing even more rapidly.
There are many methods currently being used to prevent computer crime and abuse. These methods are categorized into five elements; (1) user authentication, (2) encryption, (3) virus detection, (4) physical barriers, and (5) logical barriers.
Our study deals with virus vaccine software in Korean in order to analyze customer"s preference for these programs. Questionnaires were obtained from the organizations and individuals working with Internet or through networks. The data collected from questionnaires are used for analyzing customer"s preference.
Based on the preference, customer"s perceptual map of products can be drawn. In order to describe the perceptual map, factor analysis with preference regression was used to explain the dimensions of the perceptual map.
The dimension of the perceptual map consists of the components extracted through the factor analysis. There are three components: (1) Core Quality (2) Efficiency (3) Peripheral Quality. Therefore we can make up three two-dimensional graphs: (i) Core Quality and Efficiency (ii) Core Quality and Peripheral Quality (iii) Efficiency and Peripheral Quality.
The "Core Quality" is the most important component of the three. It is made up of (1) online support, (2) quick response to newly emerging virus, (3) convenient menu to run the program, (4) design, and (5) upgrade of the program. These five factors can be condensed into characteristics such as effectiveness and interface of program.
On the contrary, "Efficiency" component is least important one out of three components. The development of CPU in the personal computers makes "Efficiency"...