• Title/Summary/Keyword: 전자대응수단

Search Result 65, Processing Time 0.03 seconds

Implementation of payment settlement system through Cyber Bank for Electronic Commerce (전자상거래용 사이버뱅크의 지불결제시스템 구축)

  • Kim, Moon-Shik;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.121-130
    • /
    • 2008
  • In line with the enhanced weight and variety of electronic commerce in business activities, new type of payment settlement and banking system which will enable to store, create and transfer values from the existing method of payment settlement is highly required. Cyber Banking system draws strong attention being the solution of there requirements. The existing Cyber Banking system has the difficulty of operation, administration, in addition to the problem of initial facility investment of big amount, resulted from the usage of the current business process. As the existing Cyber Bank system is unable to carry out the function of storing, creating, and transferring values due to the adoption conventional credit card system instead of the application of non-stop payment system between the seller and buyer. As a result, current Cyber Bank system still imply the deficiency of non-performing cash payment function on internet. This paper describes (1) an integrated application process, One Process One Input (OPOI) which is essential for software development of the Cyber Bank, (2) an application process of payment settlement system to be applied to the electronic commerce in Internet. And then, with these for a basis, (3) design and implementation of payment settlement system through CyberBank for Electronic Commerce. Consequently, by means of this suggested process, we could attempt to solve the problem of existing Cyber Bank system and further to explore the possibility of advanced Cyber Banking being the non-stop payment settlement system. The effectiveness of this suggested system has been practically confirmed.

IETM (Interactive Electronic Technical Manual) for Urban Regeneration (도시재생사업에서의 전자매뉴얼)

  • Yu, Jung-Ho
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.74-81
    • /
    • 2008
  • Urban Regeneration has an object to restore a function of urban through physical/cicumstance, social lift/culture, industrial/economic regeneration. It has characteristics like existence of a lot of projects, complextity of stakeholders' structure, long period of project life cycle to achieve variety of project's promotion strategy. To accomplish a Urban regeneration that has above characteristics successfully, information about other projects should be managed organically. And it should provie information linked up with each projects by integrated management. We need a decision making method that helps users cope with requirements of change during project, and offers information when each users need to make a decision timely. So I propose a strategy to build the IETM considering urban regeneration characteristics.

  • PDF

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

금융적(金融的) 충격(衝擊) 거시경제적(巨視經濟的) 효과(效果)에 대한 분석(分析): 금융실명제(金融實名制)의 효과(效果)를 중심으로

  • U, Seung-Hui;Yu, Jae-Gyun
    • KDI Journal of Economic Policy
    • /
    • v.15 no.3
    • /
    • pp.131-160
    • /
    • 1993
  • 본고(本稿)에서는 다양한 형태의 금융충격(金融衝擊)의 거시경제효과(巨視經濟效果)를 분석하기 위해, 모든 금융충격(金融衝擊)을 통화의 지불수단으로서의 이용률(利用率)을 급격하게 변화시킴으로써 화폐시장(貨幣市場)에 초과수요나 초과공급을 초래하는 현상으로 이해하고, 동 충격을 유통속도충격(流通速度衝擊)과 통화승수충격(通貨乘數衝擊)으로 분리하여 그 규모를 추정할 수 있도록 전자(前者)는 은행의 예금회전율(預金回轉率)과 현금통화보유성향(現金通貨保有性向)에 의해, 후자(後者)는 현금통화보유성향과 지급준비보유성향에 의해 설명하는 일반적인 모형을 개발했다. 동 모형을 아용하여 80년대 이후 우리나라의 금융충격사례(金融衝擊事例)에 대해 분석한 결과는 다음과 같다. 82년 거액어음사기사건과 7.3조치에 의한 실명제예고조치(實名制豫告措置)는 M2를 3% 이상 감소시키는 효과를 초래하였으나, 실제로는 통화당국의 대응으로 오히려 3.0% 수준의 M2가 초과공급된 반면, 1988년의 금융실명제(金融實名制) 실시예고와 민간(民間)에 의한 1993년 8월 12일의 금융실명제실시예견은 M2를 각각 3.9% 및 4.9% 감소시키는 효과를 초래하여 정부의 통화공급대응(通貨供給對應)에도 불구하고 결과적으로는 각각 0.8% 및 0.6% 수준의 M2 과소공급을 초래한 것으로 추정되었다. 93년 8월 12일의 금융실명제 전격실시는 개략적으로 7~8%의 M2 통화량감소효과를 초래한 것으로 추정되지만, 실제로는 통화당국(通貨當局)의 신축적 통화공급으로 0.3~0.6% 정도의 M2 초과공급이 이루어진 것으로 추정되었다. 한편 본고(本稿)에서는 이와 같이 추정된 사례별 금융충격의 거시경제효과(巨視經濟效果) 시뮬레이션 결과(結果)도 같이 보여주고 있다.

  • PDF

A Study on Serials Cancellation and Alternatives to Subscription in the Electronic Age (디지털세대의 연속간행물 구독취소와 대응방안에 관한 연구)

  • 신은자
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.1
    • /
    • pp.105-126
    • /
    • 2001
  • Serials subscription prices continue to escalate but university library budgets of those have not grown concurrently at the same rate. In fact, library budgets of serials subscription have decreased as a percentage of total library expenditure. Also titles with little or no use should be cancelled to make room for new serials that might be needed to reflect new research interests or changes in curriculum. This study includes overview of the serials cancellation and substitute solutions for subscriptions in university library. Taking into account costs and coverages, availability of cancelled serials through interlibrary loan is high in general. There is a potential for considerable savings by providing access to low-use titles, and that is a combination of commercial document delivery and pay per view based on e-business could be a viable alternative to subscription in many cases.

  • PDF

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

Development of A Recovery-algorithm of False-Positive Mail based on the Property of the Privacy (Privacy 속성 기반의 오인된 메일 복구 알고리즘 개발)

  • Seo, Sang-Jjin;Park, Noh-Kyung;Jin, Hyun-Joon
    • Journal of IKEEE
    • /
    • v.9 no.2 s.17
    • /
    • pp.108-114
    • /
    • 2005
  • While E-mail has become an important way of communications in IT societies, it creates various social problems due to increase of spam mails. Even though many organizations and corperations have been doing researches to develop spam mail blocking technologies, more cost and system complexities are required because of varieties of blocking technologies. In case of adopting spam blocking technologies, system reliability largely relies on the False-positive error rate with the order of employing spam blocking filters. In this paper, a False-positive mail recovery technique based on privacy information is proposed and implemented in order to improve the reliability of spam locking filters. Through the implemented prototype, recovery procedure for False-positive mails is verified and the results are summarized and analyzed.

  • PDF

A Study of the Changing Library Environment and its Preparation in Digital Age (디지털 시대의 도서관 환경 변화와 그 대응 연구)

  • Han Sang-Wan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.2
    • /
    • pp.97-120
    • /
    • 1998
  • Library takes its way to digitalization to fill its role in modern information society. This study discusses social environment of this trend and investigates library circumstances, and refines the meaning of a library. A digital library is led by current stream of new media, rapid development of digital technology and recording methods, and revolution of information circulation and production such as electronic publishing. However, rich information sources in printed forms are even significant as a ground of a digital library. The digital library is not a brand-new feature of a library but the result of digitalization of information resources to accomplish the purpose of the library.

  • PDF

Research on prototype of UT-based u-public transit application service of u-Gov (차세대 전자정부에 있어서 UT 기반의 u-public transit 응용서비스 프로토타입 연구)

  • Jeong, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.147-154
    • /
    • 2012
  • The evolution of u-Gov will play a big impact due to the development of information and communication technology. The evolution plays as a critical mean for the government innovation which pursues the value of new administration. In this paper, through an analysis of the difference between e-Gov and u-Gov, I suggested the composition of prototype system of u-public transit application services which can be applied to u-Gov. I also studied the method for removing unstable elements of e-Gov which may occur when the prototype is implemented and the implications of the its UT-based policy for responding to u-public transit.

IDS Performance on MANET with Packet Aggregation Transmissions (패킷취합전송이 있는 MANET에서 IDS 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.695-701
    • /
    • 2014
  • Blackhole attacks having a unauthorized change of routing data will cause critical effects for transmission performance. The transmission performance will be improved to the a certain level by using or having IDS(Intrusion Detection System)/IPS(Intrusion Prevention System) as countermeasures to blackhole attacks. In this papar, the effects of IDS to ene-to-end performance of packet aggregation transmission are analyzed on MANET(Mobile Ad-hoc Network) with IDS under blackhole attacks. MANET simulator based on NS-2 is used to analyze performance parameters as MOS, connection ratio, delay and packet loss rate as standard performance parameters, an another performance factor which is suggested in this paper. VoIP(Voice over Internet Protocol) traffics, one of voice services, is used for performance analysis. A suggestion for IDS implementation on MANET with packet aggregations under blackhole is shown as one of results.