• Title/Summary/Keyword: Banking System

Search Result 407, Processing Time 0.028 seconds

A Study on the Framework of Cutover Decision Making on Large-scale IS Development Projects: A Core Banking Development Case of D Bank (대규모 정보시스템 개발 프로젝트의 컷오버 의사결정 프레임워크에 관한 연구: D은행 코어뱅킹 시스템 구축 사례를 중심으로)

  • Jeong, Cheon-Su;Ahn, Hyun-Chul;Jeong, Seung-Ryul
    • Information Systems Review
    • /
    • v.14 no.1
    • /
    • pp.1-19
    • /
    • 2012
  • A large-scale IS development project takes a long time, thus its project manager needs to be more careful on risk management. In particular, appropriate cutover decision making is critical in large-scale IS development projects because the opening of the large-scale IS significantly impacts the organization. Regardless of its importance, cutover decision making in conventional IS development projects has been done in a quite simple way. Conventional cutover decisions have been made by considering just whether the new IS operates or not from the system, application, and data implementation perspectives. However, this approach may lead to unsatisfactory performance or system failure in complex large-scale IS development. Under this background, we propose a new framework for cutover decision making on large-scale IS projects. To validate the applicability, we applied the framework to a core banking system development case. The case study shows that our framework is effective in proper cutover decision making.

  • PDF

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF

A Study on the Institutional Limitations and Improvements for Electronic Financial Fraud Detection (전자금융 이상거래 분석 및 탐지의 법제도적 한계와 개선방향 연구)

  • Jeon, Geum-Yeon;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.255-264
    • /
    • 2016
  • Due to the development of information and communication technology, the great change on economics has grown and the biggest change is the e-commerce. With the methods of electronic financial frauds becoming advanced, reported phishing incidents have greatly increased. The Fraud Detection System(hereafter FDS) has taken effect to prevent electronic financial frauds, but economic losses still occurring. This Paper aims to analyze the financial environment, financial information technology environment, financial information technology security environment and some features of the institutional changes. In order to supplement the defect of FDS, it gives some recommendations for the improvement of the effective FDS Management System and information sharing on frauds with some public institution and a major consideration for collection or utilization of personal information.

A Study on Payment Finality and Usefulness in the Electronic Payment System -Based on U.C.C. 4A- (국제전자자금이체시스템에서 지급의 최종성과 유용성에 관한 고찰(미국의 전자금융제도를 중심으로))

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.35-53
    • /
    • 2010
  • In connection with a non-cash payment through the banking system, "finality of payment" has acquired diverse meanings. In according to Section 4A-209(2), the acceptance by the beneficiary's bank by means of receiving payment "pursuant to section 4A-403(a)(1) or 4A-403(a)(2)," constitutes final settlement through a Federal Reserve Bank or through a funds-transfer system" or credit to the account of the beneficiary's bank. Above of all, Acceptance by beneficiary's bank is the most important. According to 4A-209(b), the beneficiary's bank can accept a payment order in one of four ways : First, by paying the beneficiary; obligating itself to pay the beneficiary or, Second, by notifying the beneficiary of receipt of the order or notifying the beneficiary that its account was credited or, Thirdly, by receiving full payment from the sender's order or Lastly, by passage of time, i.e., the opening of the next funds transfer business day of the bank following the payment date of the order. A beneficiary's bank is considered to have accepted a payment order when the earliest of the four means of acceptance occurs.

  • PDF

Payment PKI based on EMV and Efficient IC Card Authentication Mechanism (EMV 기반의 전자지불 PKI와 효율적인 IC 카드 인증메커니즘)

  • Song Sang Heon;Choi Seok Jin;Ryou Jea Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.755-764
    • /
    • 2004
  • Recently 'Banking IC Card Standard' and EMV Standard by the domestic standard is selected, and it is situation that is developing infrastructure vigorously to alternate Magnetic Stripe card by IC card. This paper analyzes EMV standard that is selecting public key cipher, and research wishes to study unexhausted EMV PKI relatively than internet PKI, WAP PKI etc. This paper propose utilizable EMV base Payment PKI model in IC card base payment system development, and developed EMV CA system with this. Also, this paper supplemented IC card Authentication mechanism that is defined in EMV standard, and propose 'Efficient smart card Authentication mechanism' to improve performance of this mechanism, and estimate performance.

A Study on the Performance Evaluation based on Modular Face Recognition System (모듈화된 얼굴인식 시스템을 이용한 성능 시험에 관한 연구)

  • Hong Tae-Hwa;Moon Hyeon-Joon;Shin Yong-Nyuo;Lee Dong-Geun;Kim Jae-Sung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.35-44
    • /
    • 2005
  • Face recognition out of biometrics is considerable interesting due to high performance and accessibility in applications to security such as access control and banking service. Therefore, a study on the protocol of the performance test is an important issue to understand the art-of state and to show a direction in future works, in addtion to developing algorithms. We present a design criterion for the performance test protocol of face recognition system and show the result of experiment executed on identification and verification scenario based on PCA algorithm and XM2VTS DB

Enhancing Business Process Efficiency using TOC (TOC를 이용한 업무프로세스 효율성 향상)

  • Bae Hye-Rim;Rhee Seung-Hyun;Cha Nam-Wook
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.169-189
    • /
    • 2006
  • Recently, many companies are trying to survive in a competitive business environment and they employ various kinds of information systems. Business Process Management (BPM) system is a software system that integrated enterprise information systems based on processes, which is considered an essential element for managing inner and outer processes. Though the BPM system has been applied to major processes only so far, companies begin to extends target processes applied into enterprise wide. In such settings, not only exact but also efficient management of processes is required. The efficiency of BPM has two perspectives: one is the performance of users that handle assigned tasks, and the other is the performance of the Business Process (BP) engine that carries out execution of processes. In this paper, in order to deal with the seconde perspective, we develop Drum, Buffer, and Rope (DBR) method, which have been considered innovative Theory of Constraint (TOC) method in manufacturing domain, for efficient management of processes. A new method, BP-DBR, has been developed, and we show that it is effective for business processes. The effectiveness of the method has been proved in terms of efficiency measures such as average process completion time and average number of completed processes, through a series of simulations on real banking processes.

  • PDF

A Study on the Feature of Dwelling Space to Ubiquitous Environment (유비쿼터스 환경에서의 주거공간 특성에 관한 연구)

  • Lee, Sang-Won;Han, Young-Ho
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.05a
    • /
    • pp.88-92
    • /
    • 2005
  • The Ubiquitous life is not a life style that exists in a science fiction or in a far distance future anymore. The Combination of electronic and physical space, this new type of space was created by the ubiquitous network system, and this system will offer us new life style. Also the pattern of our living will be changed by the information that has obtained from this ubiquitous network system. By offering a new way of communication from the ubiquitous surrounding, our life style such as shopping, medical treatment, banking, and working conditions and a notion such as the preference in a job title would have shifted. This study have arrived at the development of the high technology, in other words Ubiquitous age , I have considered the notion of home-network that have observed by the preceding investigators as well as the theoretical consideration of residential space in ubiquitous surrounding. After I look into the usages and examples of residential space in ubiquitous surrounding of today's society, I hope that this would be helpful for the design that strives for the comfortable living in this ubiquitous age.

  • PDF

A Practical Privacy-Preserving Multi-Party Computation Protocol for Solving Linear Systems (선형계를 위한 실용적인 프라이버시 보존형 다자간 계산 프로토콜)

  • Yi Ok-Yeon;Hong Do-Won;Kang Ju-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2006
  • We consider a privacy-preserving cooperative computation protocol evaluating a beneficial function of all participants' secret inputs, such that each party finally holds a share of the function output. We propose a practical privacy-preserving cooperative computation protocol for solving the linear system of equations problem md the linear least-squares problem. Solutions to these problems are widely used in many areas such as banking, manufacturing, and telecommunications. Our multi-party protocol is an efficiently extended version of the previous two-party model.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.