• Title/Summary/Keyword: 정보기술보안

Search Result 5,223, Processing Time 0.037 seconds

An Empirical Study on the Effects of Personal and Systematic Characteristics on the Acceptance of Technologically Innovative Products - With Focus on Cloud Computing - (개인특성 및 시스템특성이 기술혁신제품의 수용에 미치는 영향 연구 - 클라우드 컴퓨팅을 대상으로 -)

  • Park, Cheol-Woo;Jeong, Hae-Joo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.2
    • /
    • pp.63-76
    • /
    • 2012
  • The possibility of successful commercialization of technologically innovative products depends on the degree to which consumers select and utilize the product. Therefore, the research that endeavors to find the usage behavior and the acceptance intention of users of technologically innovative products is a very important quest. This study empirically analyzes the factors that influence commercialization of a technologically innovative product: cloud computing. Existing studies examined acceptance intentions by expanding the TAM model and excluded attitude and usage behavior. This study determined attitude, usage behavior and personal characteristics of consumers to be important influencing factors. The results of the empirical analysis are as follows: First, the self-efficacy of personal characteristics had a significant effect on ease of use and acceptance intention and perceived costs had a significant influence on the factors of perceived usefulness and perceived ease of use. Second, research on the systematic characteristics of cloud computing confirmed that security was an important factor affecting acceptance intention while innovativeness was critical to ease of use. Third, of the usage characteristics among users of technologically innovative products, perceived usefulness had an effect on the acceptance and usage behavior of cloud computing, and perceived ease of use had an important influence on perceived usefulness. Currently, when cloud computing services have not yet become widespread to the public, this study proposed meaningful results for policy direction and commercialization strategies by revealing variables that influence acceptance and usage behavior.

  • PDF

Highly ordered In2O3 zig-zag nanocolumns for selective detection of acetone (아세톤의 선택적 감지를 위한 In2O3 zig-zag nanocolumns)

  • Jae Han Chung;Ho-Gyun Kim;Yun-Haeng Cho;Junho Hwang;See-Hyung Park;Sungwoo Sohn;Su Bin Jung;Eunsol Lee;Kwangjae Lee;Young-Seok Shim
    • Journal of Surface Science and Engineering
    • /
    • v.57 no.1
    • /
    • pp.38-48
    • /
    • 2024
  • We fabricated In2O3 zig-zag nanocolumns(ZZNCs) by oblique angle deposition method based on e-beam evaporator for highly sensitive and selective CH3COCH3 sensor. Our results indicate that as the ZZNCs layer stacks, the gas response also increases. In comparison to thin films, ZZNCs at 5 layer show a 117-fold enhancement in gas response and a rapid response time (~2 s). When measured with various gases, it showed a high selectivity towards acetone. Under conditions of 80% R.H., exposure to CH3COCH3 gas theoretically indicated a detection limit of 1.2 part-per-billion(ppb). These results suggest the potential of In2O3 ZZNCs as a breath analyzer for the diagnosis of diabetes.

A Study on the Determinants of Blockchain-oriented Supply Chain Management (SCM) Services (블록체인 기반 공급사슬관리 서비스 활용의 결정요인 연구)

  • Kwon, Youngsig;Ahn, Hyunchul
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.119-144
    • /
    • 2021
  • Recently, as competition in the market evolves from the competition among companies to the competition among their supply chains, companies are struggling to enhance their supply chain management (hereinafter SCM). In particular, as blockchain technology with various technical advantages is combined with SCM, a lot of domestic manufacturing and distribution companies are considering the adoption of blockchain-oriented SCM (BOSCM) services today. Thus, it is an important academic topic to examine the factors affecting the use of blockchain-oriented SCM. However, most prior studies on blockchain and SCMs have designed their research models based on Technology Acceptance Model (TAM) or the Unified Theory of Acceptance and Use of Technology (UTAUT), which are suitable for explaining individual's acceptance of information technology rather than companies'. Under this background, this study presents a novel model of blockchain-oriented SCM acceptance model based on the Technology-Organization-Environment (TOE) framework to consider companies as the unit of analysis. In addition, Value-based Adoption Model (VAM) is applied to the research model in order to consider the benefits and the sacrifices caused by a new information system comprehensively. To validate the proposed research model, a survey of 126 companies were collected. Among them, by applying PLS-SEM (Partial Least Squares Structural Equation Modeling) with data of 122 companies, the research model was verified. As a result, 'business innovation', 'tracking and tracing', 'security enhancement' and 'cost' from technology viewpoint are found to significantly affect 'perceived value', which in turn affects 'intention to use blockchain-oriented SCM'. Also, 'organization readiness' is found to affect 'intention to use' with statistical significance. However, it is found that 'complexity' and 'regulation environment' have little impact on 'perceived value' and 'intention to use', respectively. It is expected that the findings of this study contribute to preparing practical and policy alternatives for facilitating blockchain-oriented SCM adoption in Korean firms.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

A Novel Redundant Binary Montgomery Multiplier and Hardware Architecture (새로운 잉여 이진 Montgomery 곱셈기와 하드웨어 구조)

  • Lim Dae-Sung;Chang Nam-Su;Ji Sung-Yeon;Kim Sung-Kyoung;Lee Sang-Jin;Koo Bon-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.33-41
    • /
    • 2006
  • RSA cryptosystem is of great use in systems such as IC card, mobile system, WPKI, electronic cash, SET, SSL and so on. RSA is performed through modular exponentiation. It is well known that the Montgomery multiplier is efficient in general. The critical path delay of the Montgomery multiplier depends on an addition of three operands, the problem that is taken over carry-propagation makes big influence at an efficiency of Montgomery Multiplier. Recently, the use of the Carry Save Adder(CSA) which has no carry propagation has worked McIvor et al. proposed a couple of Montgomery multiplication for an ideal exponentiation, the one and the other are made of 3 steps and 2 steps of CSA respectively. The latter one is more efficient than the first one in terms of the time complexity. In this paper, for faster operation than the latter one we use binary signed-digit(SD) number system which has no carry-propagation. We propose a new redundant binary adder(RBA) that performs the addition between two binary SD numbers and apply to Montgomery multiplier. Instead of the binary SD addition rule using in existing RBAs, we propose a new addition rule. And, we construct and simulate to the proposed adder using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is faster by a minimum 12.46% in terms of the time complexity than McIvor's 2 method and existing RBAs.

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.

Monitoring Method Using Moving CCTV in Common Duct (이동형 CCTV 장치를 이용한 공동구 모니터링 방법)

  • Kang, Jin-A;Kim, Tae-Hoon;Oh, Yoon-Seuk;Choi, Hyun-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.1-12
    • /
    • 2011
  • There has been the increasing concern with the safety of seven major urban infrastructure such as road, electricity, water supply, sewerage and so on due to urban expansion and new town development. However, high technology development for the common duct which can be an alternative for the safety issue has not been completed due to the law of the national security area. Existing management method of the common duct by people could not respond to the urgent accidents adequately and immediately since it is impossible for us to get access to that in case of fire or gas leak. This study suggests to the method of installing monitoring devices and processing CCTV images with a water supply in a TestLab(a variety of the USN(Ubiquitous Sensor Network) equipment was tested in the TestLab in KICT). The suggested management method of common duct facilities make it possible to do real-time monitoring and prompt access and response to an accident inside the common duct.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.

A Study on the Ransomware Detection System Based on User Requirements Analysis for Data Restoration (데이터 복원이 가능한 사용자 요구사항 분석기반 랜섬웨어 탐지 시스템에 관한 연구)

  • Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.50-55
    • /
    • 2019
  • Recently Ransomware attacks are continuously increasing, and new Ransomware, which is difficult to detect just with a basic vaccine, continuously has its upward trend. Various solutions for Ransomware have been developed and applied. However, due to the disadvantages and limitations of existing solutions, damage caused by Ransomware has not been reduced. Ransomware is attacking various platforms no matter what platform it is, such as Windows, Linux, servers, IoT devices, and block chains. However, most existing solutions for Ransomware are difficult to apply to various platforms, and there is a limit that they are dependent on only some specific platforms while operating. This study analyzes the problems of existing Ransomware detection solutions and proposes the onboard module based Ransomware detection system; after the system defines the function of necessary elements through analyzing requirements that can actually reduce the damage caused by the Ransomware from the viewpoint of users, it supports various OS without pre-installation and is able to restore data even after being infected. We checked the feasibility of each function of the proposed system through the analysis of the existing technology and verified the suitability of the proposed techniques to meet the user's requirements through the questionnaire survey of a total of 264 users of personal and corporate PC users. As a result of statistical analysis of the questionnaire results, it was found that the score of intent to introduce the system was at 6.3 or more which appeared to be good, and the score of intent to change from existing solution to the proposed system was at 6.0 which appeared to be very high.

A Study on the Next-Generation Coastal Guard System (차세대 해안경계시스템에 관한 연구)

  • Lee, Jang-Il;Shin, Eui-Soo;Cha, Ji-Eun
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.115-138
    • /
    • 2022
  • The Korean military is preparing for successful manpower reduction using advanced science and technology, in addition to carrying out the initiative of the Defense Innovation 4.0. Accordingly, studies on core technologies related to defense reform have been conducted both internally and externally in the military, and the corresponding results have also been applied. Nevertheless, compared to the development of such technologies, it is considered necessary to have more preparation for the policies related to the operation of the newly introduced equipment. As for the placement of personnel and the organization of time in service (TIS) with respect to the operation of surveillance equipment, there has been a tendency to sustain the conventional practice. Therefore, this study intends to suggest the schemes for facilitating policy improvements in the operation of manpower and security regulations in the field of information for the purpose of introducing a successful next-generation coastal guard system. To do this, the approach of this study was focused on the policies for the operation of the guard system. This is in contrast to previous studies that centered on its equipment and technologies. In addition, how to efficiently operate the guard system was also studied in view of cognitive science by deriving the most efficient time for a person to execute surveillance through the monitor based on the previous studies.

  • PDF