• Title/Summary/Keyword: Channel management

Search Result 1,335, Processing Time 0.026 seconds

Cyber Insurance and Distribution Channels

  • Kwak, Young-Arm;Cho, Young-Sang
    • Journal of Distribution Science
    • /
    • v.16 no.5
    • /
    • pp.61-70
    • /
    • 2018
  • Purpose - These days, an individual user, private entity, hears everyday news of hacking and personal information leakage in the era of a most-connected society. This study investigates cyber attack, cyber insurance and distribution channels for insurance goods in South Korea by analyzing various cases of cyber attacks in domestic and overseas case. Research design, data and methodology - This study adopted various study cases instead of the one large case for deep quality analysis, and focused on various cases of domestic and overseas cyber attacks with insurance. Result - As a result of analyzing the cases that were hacked, types of massive losses and damages arising out of internet blackout due to cyber risks are paralyzation of public and private website and portal, electronic administrative system, public infrastructure, and consequently a normal operation of nation is impossible. These losses and damages however can be coverable under cyber insurance. Conclusions - This paper suggests insurance carriers, as suppliers, should provide multiple channels to sell to the customer and should expand the strategy of advertisement and promotion in order for them to change their mind and compare the price and value of the information of individual users and private entity in view of cost savings.

A Study of Countermeasure against Security Risk of Fintech Services for Financial Innovation (금융혁신을 위한 핀테크 서비스의 보안 리스크 대응방안 연구)

  • Park, Jeong-Kuk;Kim, Injai
    • Knowledge Management Research
    • /
    • v.16 no.4
    • /
    • pp.35-45
    • /
    • 2015
  • Fintech, which means the convergence of finance and information technology, becomes a hot topic in the financial sector. Through innovative activities on financial services, ICT(Information and Communication Technology) is integrated into the overall financial industry, and a new form of financial services could be expected to improve the existing financial system. On the other hand, fintech services are relatively vulnerable to security issues. Due to the process simplication and the channel fusion, the leakage of personal and financial informations, authentication bypass, phishing, and pharming are getting more concerned. In this study we investigated the security risk of fintech services in the viewpoints of service provider, technology adoption, and security policy. The possible countermeasures to reduce those risks are suggested because security is an important criterion for selecting financial services. This study basically offers quantification of the potential security risks and step-by-step control measures about business processes in the fintech services. The suggested security model includes user authentication, terminal security, payment information protection, API(Application Programming Interface) security, and abnormal transaction monitoring. This study might contribute to an understanding of the security risks and some possible measures for mitigating those risks on the practical perspective.

AI Platform Solution Service and Trends (글로벌 AI 플랫폼 솔루션 서비스와 발전 방향)

  • Lee, Kang-Yoon;Kim, Hye-rim;Kim, Jin-soo
    • The Journal of Bigdata
    • /
    • v.2 no.2
    • /
    • pp.9-16
    • /
    • 2017
  • Global Platform Solution Company (aka Amazon, Google, MS, IBM) who has cloud platform, are driving AI and Big Data service on their cloud platform. It will dramatically change Enterprise business value chain and infrastructures in Supply Chain Management, Enterprise Resource Planning in Customer relationship Management. Enterprise are focusing the channel with customers and Business Partners and also changing their infrastructures to platform by integrating data. It will be Digital Transformation for decision support. AI and Deep learning technology are rapidly combined to their data driven platform, which supports mobile, social and big data. The collaboration of platform service with business partner and the customer will generate new ecosystem market and it will be the new way of enterprise revolution as a part of the 4th industrial revolution.

  • PDF

Energy Efficient Transmit and Receive Strategies (에너지 효율적인 송수신 운용 방안)

  • Oh, Changyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.3-9
    • /
    • 2014
  • We propose energy efficient transmit and receive strategies for nomadic M2M devices. Recently, communication applications consume more and more battery. Hence, the efficient battery management is becoming increasingly important. Turbo code as a channel coding is being widely used in many communication areas. Accordingly, the efficient energy management in using turbo code is an important issue. In this paper, we optimize joint transmit and receive energy for M2M devices pair. We first model the transmit energy and receive energy. Then, we develop the energy efficient transmit and receive strategies.

A Case Study on the Introduction of Electronic Finance Service (전자금융 서비스에 관한 농협 사례)

  • Kim, Byung-Gon
    • Proceedings of the Korea Database Society Conference
    • /
    • 2010.06a
    • /
    • pp.127-139
    • /
    • 2010
  • Until now, systems in financial companies have been constructed and operated based on great mainframe proved being stability. But it has had many disadvantages since they only implement maintenance adding and changing function. So they need construction of new systems(development of critical application, integration of various service channel, management of customer data). In spite of great construction costs and high risk, it is necessary that they construct e-financial system. Nowadays financial institutions must actively offer services to customers. In other words, the key of service is being moved from providers to customers. In oder to develop and sell new products in a timely manner, integrated management about appropriate and valid customer data is needed. And new system that covers expanded area of work is needed since the original parts of the area is being broken gradually. In this paper, we search construction processes of e-financial system of Nonghyup to respond to new financial environment flexibly and actively, concrete contents about innovation activities of e-financial system and the cases of service utilization. Also, we suggest the development direction of e- financial system for Nonghyup following day.

  • PDF

An Empirical Research on Factors Affecting Mobile User's Attitude towards Mobile Marketing in India

  • Satish Kumar, G.N.
    • Asia-Pacific Journal of Business
    • /
    • v.3 no.1
    • /
    • pp.10-16
    • /
    • 2012
  • India is having a high growth rate of Mobile subscribers which has opened up a new marketing channel of communication with customers. There is a need to study the factors affecting Mobile user's attitude towards Mobile marketing and the relationship between these factors. To study the mobile users attitude towards mobile marketing 489 mobile users opinion is taken on 12 statements for a period of 5 months. Using factor analysis method these 12 statements are grouped into 5 groups they are Mobile advertisement, Mobile Usability, Mobile Promotions, Mobiles shopping and Mobile Marketing. Confirmatory Factor Analysis (CFA) was performed to confirm the findings. SPSS Statistics 17.0 is used to conduct factor analysis and the validity of the model. Once the model was validated, SPSS Amos 18.0 was used to fit a model based on Structure Equation Model to analyze the factors affecting Mobile user's attitude and the relationship between these factors. The present study revealed that Mobile Advertisement and Mobile Sales Promotion are having positive effect on Mobile Marketing where as Mobile Shopping and Mobile Phone Usability is having negative effect on Mobile Marketing. The impact of indicators like Mobile Phone user's permission and personalization of Mobile Phone communication on Mobile Marketing are also discussed in this article.

  • PDF

Cause Diagnosis and Reduction Measures of Foaming in the Treated Wastewater Outlet of D Wastewater Treatment Plant (하수처리수 방류구의 거품발생 원인진단 및 저감방안: 국내 하수처리장 사례를 중심으로)

  • Shin, Jae-Ki;Cho, Youngsoo;Kim, Youngsung;Hwang, Soon-Jin
    • Korean Journal of Ecology and Environment
    • /
    • v.49 no.2
    • /
    • pp.124-129
    • /
    • 2016
  • This study was conducted to suggest the cause analysis and mitigation measures of foaming generated in the effluent of wastewater treatment plant. The foam generated in the outlet connected with the tidal river system was identified as structural problems. And the main cause of foaming was air entrainment by an impinging jet and the internal accumulation by the diffusion barrier. In consideration of these conditions, it present the effective ways such as micro-screen and submerged outlet, to mitigate the foaming generated in the water channel and outlet end.

BER Improvements of 0.96 Tbps WDM Signals through Optimal Parameter Values of Optical Phase Conjugator (광 위상 공액기의 최적 파라미터 값 도출을 통한 0.96 Tbps WDM 신호의 BER 개선)

  • Lee, Youngkyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.79-88
    • /
    • 2015
  • In this paper, it is investigated that the limitation due to the asymmetry of optical power and chromatic dispersion with respect to optical phase conjugator (OPC) for compensating optical signal distortion in WDM system is overcomed by using OPC position offset and optimal dispersion coefficients of fiber sections, which depend on OPC position offset. It is confirmed that overall WDM channels are efficiently compensated by applying the optimal parameter values obtained from the proposed method into 24 channels ${\times}40$ Gbps WDM system with non zero - dispersion shifted fiber (NZ-DSF) of 1, 000 km, such as power penalties of inter-channel are reduce to almost 3.5 dB from the infinite value. It is also confirmed that the flexible design of WDM system with OPC is possible by using the optimal parameters, in which OPC is placed at ${\pm}15km$ from 500 km for efficiently compensating overall channels. Thus, the methods proposed in this research will be expected to alternate with the method of making a symmetrical distribution of power and local dispersion in real optical link which generates a serious problem if it was not made but it is the condition in the case of applying the OPC into multi-channels WDM system.

Opportunistic Interference Management for Interfering Multiple-Access Channels (간섭 다중 접속 채널에서의 기회적 간섭 관리 기술)

  • Shin, Won-Yong;Park, Dohyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.929-937
    • /
    • 2012
  • In this paper, we introduce three types of opportunistic interference management strategies in multi-cell uplink networks with time-invariant channel coefficients. First, we propose two types of opportunistic interference mitigation techniques, where each base station (BS) opportunistically selects a set of users who generate the minimum interference to the other BSs, and then their performance is analyzed in terms of degrees-of-freedom (DoF). Second, we propose a distributed opportunistic scheduling, where each BS opportunistically select a user using a scheduler designed based on two threshold, and then its performance is analyzed in terms of throughput scaling law. Finally, numerical evaluation is performed to verify our result.

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.