• 제목/요약/키워드: Account Security

검색결과 404건 처리시간 0.032초

손익 및 배당정보가 외부자금조달의 공시효과에 미치는 영향 (THE IMPACT OF EARNINGS AND DIVIDEND INFORMATION ON THE VALUATION CONSEQUENCES OF EXTERNAL FINANCING ANNOUNCEMENTS)

  • 최도성;이성효
    • 재무관리연구
    • /
    • 제11권2호
    • /
    • pp.175-193
    • /
    • 1994
  • This paper relates the valuation consequences of common-stock, convertible-debt and straight-debt offering announcements to the issuing firms' stock price performance in periods before the announcements. Similar to previous studies on equity offerings, we find that the announcement effects of security offerings, regardless of offering types, are negatively correlated with the short-term pre-offering stock returns. We show that the informational impact of the preceding earnings and dividend(E/D) announcements account for the previous findings of the negative correlation. We further report that security issues following 'good-news' E/D announcements result in larger stock price declines than issues following 'bad-news' E/D announcements. The finding is consistent with the hypothesis that the E/D information affects the investors' assessments of the firm's cash flow expectations and of the probability of external financing.

  • PDF

선로과부하해소를 고려한 최적부하간단에 관한 연구 (A Study on the Optimal Load Shedding Considering Alleviation of the Line Overload)

  • 송길영;이희영
    • 대한전기학회논문지
    • /
    • 제36권6호
    • /
    • pp.381-389
    • /
    • 1987
  • This paper presents a method for optimal load shedding in preserving a system security following abnormal condition as well as a sudden major supply outage. The method takes account of static characteristic of generators control and voltage and system frequency characteristic of loads. The optimization problem is solved by a gradient technique to get the maximal effect by the least quantity of load shedding considering line overloads as well as voltage disturbances and system frequency. The method is illustrated on a 8-bus system. It has been found that the use of the proposed algorithm for model systems alleviate the line overload more efficiently than the former method. It is believed that this method will be useful in security studies and operational planning.

  • PDF

Access Control to Objects and their Description in the Future Network of Information

  • Renault, Eric;Ahmad, Ahmad;Abid, Mohamed
    • Journal of Information Processing Systems
    • /
    • 제6권3호
    • /
    • pp.359-374
    • /
    • 2010
  • The Future Internet that includes Real World Objects and the Internet of Things together with the more classic web pages will move communications from a nodecentric organization to an information-centric network allowing new a paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a Network of Information designed to enable more powerful semantic searches. In this paper, we propose a security solution for a model of information based on a semantic description and search of objects. The proposed solution takes into account both the access and the management of both objects and their descriptions.

금융상품정보제공 실태파악을 위한 금융상품팜플렛 내용분석 (A Study on the Information Disclosure of Financial services Using Content Analsysis)

  • 허은영;최현자
    • 대한가정학회지
    • /
    • 제38권11호
    • /
    • pp.63-75
    • /
    • 2000
  • To identify the actual situation of financial information disclosure, a content analysis was performed on pamphlets of a time deposit and a new reserve trust offered by banks and other financial institutes. Although consumers required information on interest rate, tax favor, loan service, protection of brink depositors and bank security to select a financial service account, informations offered on pamphlets are not sufficient. Therefore concrete way of information offer system shoed be developed. In offering interest rate, interest rate after tax deduction or payment at maturity should be also mentioned. Information on tax favor, protection of bank depositors and bank security should be contained in pamphlets as well. Use of easy terms and notes are recommended for developing pamphlets for financial products.

  • PDF

Provably Secure Forward Secure Certificateless Proxy Signature Scheme

  • Li, Jiguo;Li, Yanqiong;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권8호
    • /
    • pp.1972-1988
    • /
    • 2013
  • In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy signature scheme, and propose the formal definition and security model of the forward secure certificateless proxy signature. Our security model takes into account the super adversary in certificateless signature. Furthermore, we present a construction of forward secure certificateless proxy signature scheme with bilinear maps. Based on the difficulty of computational Diffie-Hellman problem, we prove the scheme is secure against chosen message attack in the random oracle model. Finally, we analyze efficiency of the proposed scheme.

정보보호 사전평가 제도 개발을 위한 국내외 관련 제도검토 및 정보화사업에서의 정보보호 현황분석 (An Analysis of InfoSec Implementation Status in the Public Information System Projects for the Institutionalization of InfoSec Pre-Assessment)

  • 김정덕;홍기향
    • 디지털융복합연구
    • /
    • 제1권1호
    • /
    • pp.69-91
    • /
    • 2003
  • The purpose of this paper is to provide several considerations to be taken into account when institutionalizing the information security(Infosec) pre-assessment. Infosec pre-assessment is a necessary process to embed the security requirements into the information systems at the early stages in their development, resulting in more cost-effective infosec. In order to provide some institutional issues, domestic infosec assessment schemes and U.S. Infosec certification and accreditation schemes are reviewed. Also, the current status of infosec implementation in the public information systems projects is analyzed. Based on the analyses, the seven suggestions are proposed in developing and performing the infosec pre-assessment scheme.

  • PDF

문서의 등급을 고려한 메시지전송 프로토콜 구현에 관한 연구 (A Study on the Implementation of a Message Transfer Protocol with Document Classification)

  • 신승중;김현수
    • 정보기술과데이타베이스저널
    • /
    • 제7권1호
    • /
    • pp.67-82
    • /
    • 2000
  • In this paper we have developed a message transfer protocol, CMP, which improves MSP's message processing capability. The proposed method has taken into account document classification to improve the efficiency of message processing. The difference between the conventional MSP and CMP has been addressed. The CMP's performance has been shown by various experiments including number, alphabet, Korean letter, Chinese letter, music sound and compression file transmission. And security capability of both protocols has been compared based on the specification of FIPS 140-2. The CMP's overall performance is shown to be superior to that of MSP on the processing speed in the performance perspective and on the function of cryptographic module interface and cryptographic key management in the security perspective respectively.

  • PDF

광시각암호를 이용한 생체정보보호 (Biometrical Information Security by Using Optical Visual Cryptography)

  • 이상이;류충상;이승현
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2004년도 춘계종합학술대회
    • /
    • pp.760-763
    • /
    • 2004
  • 지문 데이터를 광시각암호에 적합하게 Secret Sharing하고 Share 데이터의 일부를 공개된 네트워크로 전송하고 지문의 소유자가 나머지 Share를 소유하고 있다가 필요 시 지문과 함게 Share를 제시하여 본인임을 인식시키는 광시각암호 기반의 생체정보보호 방범을 제안한다.

  • PDF

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • 제9권4호
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.

Digital Competence In Education At The Present Stage Of Development Information Society

  • Blahodyr, Liudmyla;Kononenko, Andrii;Kulynych, Olena;Ianytskyi, Taras;Sinelnikova, Valentina;Mykytenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.13-16
    • /
    • 2021
  • The article defines the hypothesis of the research, it is an assumption that the process of forming ICT competence will be effective if: theoretically substantiated, developed and practically implemented a structural and functional model for the formation of ICT competence, taking into account interdisciplinary integration, the pedagogical conditions that contribute to the formation of ICT competence have been determined: interdisciplinary integration as the basis for building an interdisciplinary course, the content of which is aimed at the formation of ICT competence.