• Title/Summary/Keyword: 정보보안 제도

Search Result 716, Processing Time 0.02 seconds

A Study on Cooperative-Intelligent Transport System Attack Scenarios and their Prevention and Response Mechanisms (C-ITS 공격 시나리오와 예방 및 대응 방안 연구)

  • Jang, Yoonsuh;Lee, Dong-Seob;Lim, Dong-Ho;Ahn, So-Hee;Shin, Jeonghoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.6
    • /
    • pp.133-140
    • /
    • 2015
  • C-ITS is a system that uses bidirectional communication between two vehicles or infrastructures to control traffic more conveniently, and safely. If C-ITS security is not properly prepared, it can cause traffic congestions and fatal traffic accidents, and therefore can affect greatly on the driver's life. This paper proposes the prevention and response mechanisms based on the cyber attack scenarios that can be used to attack C-ITS.

Fintech Trends and Mobile Payment Service Anlaysis in Korea: Application of Text Mining Techniques (국내 핀테크 동향 및 모바일 결제 서비스 분석: 텍스트 마이닝 기법 활용)

  • An, JungKook;Lee, So-Hyun;An, Eun-Hee;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.26-42
    • /
    • 2016
  • Recently, with the rapid growth of the O2O market, Fintech combining the finance and ICT technology is drawing attention as innovation to lead "O2O of finance", along with Fintech-based payment, authentication, security technology and related services. For new technology industries such as Fintech, technical sources, related systems and regulations are important but previous studies on Fintech lack in-depth research about systems and technological trends of the domestic Fintech industry. Therefore, this study aims to analyze domestic Fintech trends and find the insights for the direction of technology and systems of the future domestic Fintech industry by comparing Kakao Pay and Samsung Pay, the two domestic representative mobile payment services. By conducting a complete enumeration survey about the tweets mentioning Fintech until June 2016, this study visualized topics extraction, sensitivity analysis and keyword analyses. According to the analysis results, it was found that various topics have been created in the technologies and systems between 2014 and 2016 and different keywords and reactions were extracted between topics of Samsung Pay based on "devices" such as Galaxy and Kakao Pay based on "service" such as KakaoTalk. This study contributes to analyzing the unstructured data of social media by period by using social media mining and quantifying the expectations and reactions of consumers to services through the sentiment analysis. It is expected to be the foundation of Fintech industry development by presenting a strategic direction to Fintech related practitioners.

An Induction plan of Electronic Evaluation Sytem for Government R&D Program (국책과제 전자평가시스템 도입방안)

  • 송학현;최세하;조재영;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1020-1025
    • /
    • 2002
  • Government R&D Programs' success and failures depend on the choice of the excellent project from diverse proposal. Therefore project evaluation process should be transparency, objectivity and confidence. Institute of Information Technology and Assessment(IITA) working for the Ministry of Information and Communication(MIC). IITA management the informatization fund and government R & D program. IITA have execute choice of R & D project and assessment proposals and reformed the system of evaluation. This advanced evaluation system made in the end of the 90's and adapted it to the college basic R & D program in 1999. Advanced evaluation system is electronic and remote system. This advantage is very shift and correct to process. So the system save the task and money from 46% to 78%. But it is some Problem, security and technical experts for the choice of the Government R & D project in remote evaluation system.

Vulnerability analysis on the ARMv7 Thumb Architecture (ARMv7 Thumb Architecture 취약성 분석)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.1003-1008
    • /
    • 2017
  • The Internet of Things has attracted considerable research attention in recent years. In order for the new IoT technology to be widely used, the reliability and protection of information is required. IoT systems are very vulnerable to physical security due to their easy accessibility. Along with the development of SoC technology, many operating systems have been developed and many new operating systems have been introduced. In this paper, we describe the vulnerability analysis results for operating systems running on the ARMv7 Thumb Architecture hardware platform. For the recently introduced "Windows 10 IoT Core" operating system, I implemented the Zero-Day Attack by implanting the penetration code developed through the research into a specific IoT system. The virus detection test for the resulting penetration code was validated by referral to the "virustotal" site.

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

A Study on Application Methods of Drone Technology (드론기술 적용 방안 연구)

  • Kim, Hee-Wan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.601-608
    • /
    • 2017
  • In the fourth industrial revolution, drones are an important element to lead the industry by converging with information technology. Drones are developing various technologies by combining with communication / navigation / traffic management technology, control and detection / avoidance technology, sensor technology, SW and application technology. However, there are various problems in order to settle the drone technology. In this paper, it will be examined the problems of application of drones through application fields of drones, domestic and foreign cases, and core technologies of drones. The growth of the drone market requires improvement of laws and institutions. This paper proposed security vulnerability, privacy and safety problem in wireless communication, and present technical and management problems for drone service in the Korean environment in particular.

Relationship among e-Service Quality, Relationship Quality, and e-Loyalty of Small Medical Clinic (소형병원의 e-서비스품질, 관계의 질, e-충성도의 영향관계)

  • Kim, JI-Young
    • Journal of the Korean Applied Science and Technology
    • /
    • v.38 no.3
    • /
    • pp.689-699
    • /
    • 2021
  • The spread of the COVID-19 pandemic has been increasing non-face-to-face activities; as a result, this has resulted in the number of individuals obtaining medical information from the websites and mobile contents of medical institutions increasing. The study conducted the structural equation modeling to test hypotheses; as a result, all sub-factors of e-service quality of small medical clinic websites and mobile contents, usability, security, responsiveness, design, and information, had a significant positive effect on relationship quality, and relationship quality had a significant positive effect on e-Loyalty. Moreover, the structural equation model showed a good model fit, χ2/df of 2.021, NFI of .954, TLI of .969, CFI of .976, RMSEA of .046. Future research is suggested to study relationship quality by developing a system able to quickly and accurately respond to websites and mobile contents users; furthermore, improving e-service quality and relationship quality is likely to strengthen e-loyalty.

A Legal and Systematic Study On Consumer Protection In Electronic Commerce (전자상거래에서의 소비자보호에 관한 법.제도적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.787-796
    • /
    • 2009
  • The electronic commerce keeps going through a tremendous growth since the latter half of 1990's. But the consumer damages are being increased from characteristics such as non-confrontation, anonymity, internationality, unilaterality and possibility of temptation. Accordingly, this thesis has derived legal and systematic improvements for consumer protection in general as follows. First of all, it is necessary to extend the period to exercise the subscription withdrawal rights according to electronic commerce consumer protection law. Second, the electronic commerce has high possibility of causing errors by consumers because it is performed by non-confrontation and the accurate information must be provided to prevent errors in advance because it is not easy for consumers to prove their own errors. Third, a certification mark system on electronic agreement has to be adopted. Fourth, the legal, systematic and technological measures have to be adopted to prevent from having a sense of fear toward leaking or using personal information through a safe personal information management. Fifth, a strict supervision on internet trust mark is required. Finally, because the intervention or interference by a third party may take place through a hacking on messages or documents sent according to procedure in terms of online settlement, it is necessary to raise security on the system through a precise authentication between concerned parties.

A Comparative Assessment Between LVTS of Canada and Fedwire of America as a Wholesale Electronic Payment System (미국과 캐나다의 거액전자지급결제제도 비교연구 - 미국의 Fedwire와 캐나다의 LVTS를 중심으로 -)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.43-63
    • /
    • 2017
  • I focused on LVTS compare with Fedwire to advance a research effects in this paper. The Fedwire Funds Service is generally used to make large-value, time-critical payments. The Federal Reserve Banks provide the Fedwire Funds Service, a real-time gross settlement system that enables participants to initiate funds transfer that are immediate, final, and irrevocable once processed. The Fedwire Funds Service is a credit transfer service. While, The LVTS(Large Value Transfer System) is the high value electronic wire system that facilitates the transfer of irrevocable payments in canadian dollars across the country. Through LVTS, funds can be transferred between participating financial institutions virtually instantaneously in a fully collateralized environment. Thus in this article, first of all, I considered features of payment system between LVTS and Fedwire. Second, I analyzed the governing structure and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that the payment and banking system have to assume, with good reason, more efficiently accurately and securely operation together with conclusion.

  • PDF

Exploring User Attitude to Information Privacy (개인정보 노출에 대한 인터넷 사용자의 태도에 관한 연구)

  • Baek, Seung Ik;Choi, Duk Sun
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.45-59
    • /
    • 2015
  • As many companies have been interested in big data, they have invested a lot of resources to get more customer data. Some companies try to trade the data illegally. In order to collect more customer data, companies provide various incentive programs to customers. However, their results are normally much less than their expectations. This study focuses on exploring the relative importance of the factors which influence customer attitudes to providing his/her personal information. This study conducts a conjoint analysis to assess trade-offs among the five influential factors-monetary reward, concern for data collection, concern for secondary use, concern for unauthorized use, and concern for errors. This study finds that the customer attitude to providing personal information is most influenced by the concern for secondary use. Furthermore, it shows that there are some differences between the light internet user group and the heavy internet user group in the relative importances of these factors. The monetary rewards appeal to the heavy internet users, rather than the light internet users.