• Title/Summary/Keyword: 산업융합보안

Search Result 468, Processing Time 0.024 seconds

Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity (익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델)

  • Kim, Young Chan;Kim, Young Soo;Im, Kwang Hyuk
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2018
  • Along with the increase of internet shopping, crimes that exploited personal information on the invoice of goods are becoming more and more advanced and becoming more and more classified from the interception of goods through voice phishing attack, injury, sexual offense. Therefore, in order to guarantee the anonymity of the customer's delivery information, there is a need for a delivery tracking prevention system which keeps the route information of the product's destination secret among delivery companies. For this purpose, We suggest that delivery tracing protect model based smart contract for guaranteed anonymity to protect the anonymity by encrypting delivery information and by separation of payment and personal information using the anonymity technique of block chain-based cryptography. Our proposed model contributes to expansion of internet shopping based on block chaining by providing information about product sales to company and guaranteeing anonymity of customer's delivery information to customer.

A Study on the Effective Countermeasure of SPAM : Focused on Policy Suggestion (불법스팸 방지를 위한 개선방안 : 정책적 제안을 중심으로)

  • Sohn, Jong-Mo;Lim, Hyo-Chang
    • Journal of Industrial Convergence
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2021
  • Today, people share information and communicate with others using various information and communication media such as e-mail, smartphones, SNS, etc. However, it is being used in malicious attacks to send a large amount of illegal spam or to use it for fraud by using illegally collected personal information and devices that are vulnerable to security. Illegal spam, smishing, and fraudulent mail(SCAM) cause a lot of direct and indirect damage to companies and users, including not only social costs such as mental fatigue, but also unnecessary consumption of IT infrastructure resources and economic losses. Although there are regulations related to spam, violators of the law are still on the rise by circumventing the law, and victims are constantly occurring, so it is necessary to review what the problem is. This study examined domestic and foreign spam-related regulations and spam-related response activities, identified problems, and suggested improvement countermeasures. Through this study, it was intended to suggest directions for improving spam-related systems in order to block illegal spam and prevent fraudulent damage.

A Study on Improving Plan of the Evaluating System for Efficient Defense M&S Accreditation Work (효율적인 국방M&S 인정업무 수행을 위한 평가시스템 발전방안 연구)

  • Han, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.42-48
    • /
    • 2021
  • Recently, the defense industry has been improving high technology by developing convergence technology through the 4th industrial revolution. On the other hand, it is very difficult to guarantee the performance of high-tech weapon systems because the test for weapon systems has many risks and cannot perform in an actual operating environment. Therefore, M&S resources are needed to make sound weapon systems, but many people demand reliable M&S resources. Owing to the continuous demand and execution of the VV&A work, related rules have developed significantly, but tools and techniques for performing the work have not been developed. Hence, there are inefficient parts in the performance of work due to the absence of a systematic system. Accordingly, many risks may cause various safety accidents, such as security. This paper suggests a direction for the development of VV&A work procedures by improving efficiency and reducing risk.

Technology Commercialization and Management Performance Analysis of Smart farm Venture companies (스마트팜 벤처기업의 기술사업화와 경영성과 분석)

  • Dae-Yu, Kim;Taiheoun Park;Won-Shik Na
    • Advanced Industrial SCIence
    • /
    • v.2 no.2
    • /
    • pp.25-30
    • /
    • 2023
  • The purpose of this study is to empirically analyze the impact of corporate innovation activities on corporate innovation performance using data from companies participating in the smart farm project. A company's innovation activities were divided into planning capacity, R&D capacity, and commercialization capacity, and the impact of each innovation activity on the company's sales and patent creation was estimated. The moderating effect was also analyzed. Regression analysis was conducted as a research method, and as a result of the analysis, it was found that planning capacity, R&D capacity, and commercialization capacity related to innovation within a company have an impact on corporate performance creation. appeared to be In order to increase the business performance of technology commercialization, it was confirmed that planning and R&D capabilities as well as governmental technology policy support are needed.

Blockchain and AI-based big data processing techniques for sustainable agricultural environments (지속가능한 농업 환경을 위한 블록체인과 AI 기반 빅 데이터 처리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.2
    • /
    • pp.17-22
    • /
    • 2024
  • Recently, as the ICT field has been used in various environments, it has become possible to analyze pests by crops, use robots when harvesting crops, and predict by big data by utilizing ICT technologies in a sustainable agricultural environment. However, in a sustainable agricultural environment, efforts to solve resource depletion, agricultural population decline, poverty increase, and environmental destruction are constantly being demanded. This paper proposes an artificial intelligence-based big data processing analysis method to reduce the production cost and increase the efficiency of crops based on a sustainable agricultural environment. The proposed technique strengthens the security and reliability of data by processing big data of crops combined with AI, and enables better decision-making and business value extraction. It can lead to innovative changes in various industries and fields and promote the development of data-oriented business models. During the experiment, the proposed technique gave an accurate answer to only a small amount of data, and at a farm site where it is difficult to tag the correct answer one by one, the performance similar to that of learning with a large amount of correct answer data (with an error rate within 0.05) was found.

Analysis of Education Gap after Covid-19 Using Systems Thinking (시스템 사고를 활용한 Covid-19 이후 교육격차 분석)

  • Kyung-Do, Suh;Jung-il Choi;Pan-Am Choi;Jaerim Jung
    • Journal of Industrial Convergence
    • /
    • v.22 no.5
    • /
    • pp.39-48
    • /
    • 2024
  • Due to COVID-19, much research has been conducted on learning loss and educational gaps due to the postponement of the start of school and prolonged online distance learning, and most of the research has focused on the phenomenon of educational gaps. If a pandemic situation like this occurs in the future, fundamental policies are needed to resolve the educational gap. A fundamental solution requires not only an understanding of the educational gap phenomenon, but also the structure behind the phenomenon. Therefore, from a structuralist perspective, this study sought to model the educational gap caused by COVID-19 as a prototype of systems thinking and identify its structure. In addition, we looked at the unintended consequences resulting from policies aimed at resolving existing educational gaps. In order to respond to similar disaster situations in the future, policies for resolving the digital gap, support for basic academic skills, quality improvement for distance learning, and self-directed learning were discussed based on the structure of this study.

Development of T-commerce Processing Payment Module Using IC Credit Card(EMV) (IC신용카드(EMV)를 이용한 T-커머스 결제처리 모듈 개발)

  • Choi, Byoung-Kyu;Lee, Dong-Bok;Kim, Byung-Kon;Heu, Shin
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.51-60
    • /
    • 2012
  • IC(Integrated circuits)card, generally be named smard card, embedded MPU(Micro Processor Unit) of small-size, memory, EEPROM, Card Operating System(COS) and security algorithm. The IC card is used in almost all industry such as a finance(credit, bank, stock etc.), a traffic, a communication, a medical, a electronic passport, a membership management and etc. Recently, a application field of IC card is on the increase by method for payments of T-commerce, as T-commerce is becoming a new growth engine of the broadcating industry by trend of broadcasting and telecommunication convergence, smart mechanization of TV. For example, we can pay in IC credit card(or IC cash card) on T-Commerce. or we can be provided TV banking service in IC cash card such as ATM. However, so far, T-commerce payment services have weakness in security such as storage and disclosure of card information as well as dropping sharply about custom ease because of taking advantage of card information input method using remote control. To solve this problem, This paper developed processing payment module for implementing TV electronic payment system using IC credit card payment standard, EMV.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Analysis of relative importance priority based on blockchain technology characteristics using AHP technique (AHP 기법을 이용한 블록체인 기술 특성 기반 상대적 중요도 우선순위 분석)

  • Oh, Kyoung-Sang;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.239-250
    • /
    • 2021
  • When considering the introduction of a new technology, it is important to accurately grasp and selectively apply the technical characteristics related to the technology in order to fully utilize the advantages of the technology. In this study, the technical characteristics of high relative importance were analyzed in order to increase the efficiency of new application of blockchain technology by companies. The technical characteristics of the blockchain identified through previous research were reclassified from the perspective of the system hierarchy, and sub-factors of the technical characteristics were derived. In addition, a questionnaire survey on the relative importance of technical characteristics was conducted for internal experts and SI experts using the Analytical Hierarchy Process (AHP) technique. As a result of the analysis, respondents evaluated data protection as the most important factor in the threat of hacking related to security. In addition, it was different that the comparison results of the importance of the technical characteristics between the experts in the company and the SI experts and the priority of the technical characteristics between the expert groups by industry. It is expected that the results of this study will be usefully utilized when using blockchain technology in enterprises in line with the upcoming changes of the 4th industrial revolution. An empirical analysis of the internal and external factors required for adoption of blockchain technology by industry and the effect of technology introduction will be a meaningful study.