• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.027 seconds

The Mediating Role of Network Service for Customer Satisfaction during COVID-19 Online Classes: Evidence from University Students

  • Naveed Akhtar Qureshi;Raheela Haque
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.176-180
    • /
    • 2023
  • Aim of this study to examine the mediating role of network service between perceived quality, retailer service and customer satisfaction during COVID-19. Primary data gathered through adopted questionnaire from previous studies and 200 university students were asked to fill online questionnaire during COVID-19 situation in country. Structural Equation Modelling technique applied in order to test the proposed hypothesis generated from existing literature review. Findings revealed full mediation effect of network service for both perceived quality and retailer service on customer satisfaction during COVID-19. New insights of this study are key role of network services is identified and university students' satisfaction is measured for online classes in developing country, Pakistan. In future serial mediation is suggested for validity of existing results in developed and developing countries.

On Cyclic Delay Diversity with Single Carrier OFDM Based Communication Network

  • A. Sathi Babu;M. Muni Chandrika;P. Sravani;M. Sindhu sowjanyarani;M. Dimpu Krishna
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.95-100
    • /
    • 2024
  • Cyclic Delay Diversity (CDD) is a diversity scheme used in OFDM-based telecommunication systems, transforming spatial diversity into frequency diversity and thus avoiding intersymbol interference without entailing the receiver to be aware of the transmission strategy making the signal more reliable achieving full diversity gain in cooperative systems. Here the analyzation of the influence of CDD-SC scheme in Cognitive Radio Network (CRN) is done with the challenge of overcoming the complication called channel estimation along with overhead in CNR. More specifically, the closed-form expressions for outage probability and symbol error rate are divided under different frequencies among independent and identically distributed (i.i.d.) frequency selective fading channel model i.e., the signal is divided into different frequencies and transmitted among several narrow band channels of different characteristics. It is useful in the reduction of interference and crosstalk. The results reveal the diversity order of the proposed system to be mainly affected by the number of multipath components that are available in the CNR.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A Review on the Legal rights and obligation from the legal status of registered security guard (청원경찰의 법적 지위에 따른 권한과 의무)

  • Han, seung;Kim, yong geun
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.251-278
    • /
    • 2015
  • Registered security guards carry out police duties as civilian police who are in charge of security service, and so they have a two-fold status: a civilian in terms of a social standing and a policeman in the way that they execute the authority of security. The problem caused by this legal position is that their legal rights and obligation can be unclear in the task-action and working relationship. This paper attempts to study their functions, rights, and legal duties through the interpretation of the related positive law so as to reveal the problems that may spring from this ambiguous status of registered security guards. This endeavor illuminates their legal status specified in the positive law in and around the Act on the police assigned for special guard, observing their functions and the legal duties in the pursuit of their tasks, and ending up pointing out the problems of the positive law. As a result of research work, the most significant problems, even if multifarious, are the avoidance of the state reparation in the responsibility for the illegal behavior in connection with their operation; the unconstitutionality of the disciplinary punishment regulation originated from the entrust with full powers; the imperfection of the rules about the cooperative ties with the police; the possibility of human rights abuse caused by the ban on the labor dispute; the equality problems from the dual pay system; and the inadequacy of the codes about the recruitment qualification and method. This research is intended to help achieve the purpose of the security of national critical facilities through the smooth execute of duties as well as the protection of the guards' rights. Besides, the key focuses posed in this paper are worthy of being developed more accurately through the following researches.

  • PDF

Bursoscopic Evaluation for Degree of the Rotator Cuff Tear with Air Infusion Method (공기 주입과 동시에 시행한 견봉하 관절경 술식을 이용한 회전근개 파열의 정도 평가)

  • Moon, Young-Lae;Sohn, Hong-Moon;Kim, Nam-Hyung
    • Journal of the Korean Arthroscopy Society
    • /
    • v.6 no.2
    • /
    • pp.126-130
    • /
    • 2002
  • Purpose : To evaluate the diagnostic efficiency of the subacromial bursoscopy with glenohumeral air infusion technique for detection of the full thickness tear which we used to think as a partial thickness tear, because it was hidden by bursal tissue. Materials and methods : We chose 65 cases and divided them into 2 groups. The group I was 18 cases with partial thickness rotator cuff tears on glenohumeral arthroscopic evaluation, and the group 2 was 37 cases with full thickness rotator cuff tears which were repaired. We inflated the glenohumeral Joint with 50-100ml of air and observed air bubble leakage simultaneously on bursoscopy. Results : In group I, we could detect air leakage in 3 cases and found that it was full thickness tear. In group II, 2 cases revealed too much air leakage proved that it was incomplete repair and was in need of additional suture. Conclusion : Air infusion technique is though to be a valuable method in differentiation between the partial and full thickness tear and for evaluation of the security of the repair.

  • PDF

Network Analysis of Korean legislators using Bipartite Network Projection (입법 발의안을 통한 대한민국 국회의원 네트워크 분석)

  • Lee, Ji-Yeon;Jo, Hyun-Joo;Yoon, Ji Won
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.103-110
    • /
    • 2014
  • In study we analyze the network about the legislators in Korean National Assembly. We focused on 17th National Assembly since there were full of important changes in composition. Mutual cooperation is necessary to pass the bills beyond their given mission in legislation. In order to find out the relationship of legislators based on the introducing bills, total 5728 bills in 17th National Assembly, we used bipartite network projection. We can find who is a highly influential legislator and the difference between a ruling party and a main opposition party in aspects of cooperative behavior.

A Short and Efficient Redactable Signature Based on RSA

  • Lim, Seong-An;Lee, Hyang-Sook
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.621-628
    • /
    • 2011
  • The redactable signature scheme was introduced by Johnson and others in 2002 as a mechanism to support disclosing verifiable subdocuments of a signed document. In their paper, a redactable signature based on RSA was presented. In 2009, Nojima and others presented a redactable signature scheme based on RSA. Both schemes are very efficient in terms of storage. However, the schemes need mechanisms to share random prime numbers, which causes huge time consuming computation. Moreover, the public key in the scheme of Johnson and others is designed to be used only once. In this paper, we improve the computational efficiency of these schemes by eliminating the use of a random prime sharing mechanism while sustaining the storage efficiency of them. The size of our signature scheme is the same as that of the standard RSA signature scheme plus the size of the security parameter. In our scheme, the public key can be used multiple times, and more efficient key management than the scheme of Johnson and others is possible. We also prove that the security of our scheme is reduced to the security of the full domain RSA signature scheme.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

A Study on the Countermeasure of Traffic Terror (대중교통테러의 대응방안)

  • Kim, Jin-Hyeok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.109-123
    • /
    • 2007
  • Traffic terror is one of the terror types subject on transportation means. However, unlike the aircraft or ship, there is no case of negotiating with passengers as hostage but to unconditionally attack that the human casualty would be much greater. In act, the terror on subway or bus would have much bigger damage than the terror on aircraft or ship. Because of such fact, there is a need for full preparation thereto, however, there is no preparation of advance preventive measure, particularly, when comparing to the cases involving aircraft. In addition, the passengers who use railway and others in the position of citizens do not have any defense mechanism against any terror activity to make the problem even more serious. Therefore, in order to prevent traffic terror, the first thing is to implement the identity confirmation of passengers, followed by the through search of cargos of the passengers, supplement the capability against the terror by the security team members, strengthen the responsive capability of citizens, thorough check on facilities, expansion of social security network and others. All terrors are within the reach of our neighborhood at the time when we neglect it, and the most secured and safe way to prevent the terror is to check and prepare at all times beginning from our familiar facilities or means.

  • PDF

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.