• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.024 seconds

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

An Estimation Method for Location Coordinate of Object in Image Using Single Camera and GPS (단일 카메라와 GPS를 이용한 영상 내 객체 위치 좌표 추정 기법)

  • Seung, Teak-Young;Kwon, Gi-Chang;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.112-121
    • /
    • 2016
  • ADAS(Advanced Driver Assistance Systems) and street furniture information collecting car like as MMS(Mobile Mapping System), they require object location estimation method for recognizing spatial information of object in road images. But, the case of conventional methods, these methods require additional hardware module for gathering spatial information of object and have high computational complexity. In this paper, for a coordinate of road sign in single camera image, a position estimation scheme of object in road images is proposed using the relationship between the pixel and object size in real world. In this scheme, coordinate value and direction are used to get coordinate value of a road sign in images after estimating the equation related on pixel and real size of road sign. By experiments with test video set, it is confirmed that proposed method has high accuracy for mapping estimated object coordinate into commercial map. Therefore, proposed method can be used for MMS in commercial region.

A Study on Technical GIS Policy for Integrating GIS with Emerging IT for National GIS Development (국가GIS 발전을 위한 신기술 도입방안에 관한 연구)

  • Lee, Bong-Gyou
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.1 s.9
    • /
    • pp.5-12
    • /
    • 2003
  • The purpose of this paper is to present guidelines on technical GIS policy for integrating GIS with emerging information technologies and infrastructure systems for national GIS development. These guidelines are expected to advance the development of GIS and stimulating GIS industry, by anticipating potential problems. This paper consists of foul parts. After Introduction, section two covers the present and upcoming status of essential information technologies including communications, security, LBS, Ubiquitous and standardization. Section 3 describes the guidelines for combing GIS and emerging IT for national GIS development. The final section summarizes and derives conclusions.

  • PDF

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

Research On Factors for Adoption and Business performance of ASP Introduction - Focused on Cosmetic Industries (국내 미용업계의 ASP 도입 요인과 성과에 관한 연구)

  • Song, Yeong-Woo;Jeon, In-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.3011-3022
    • /
    • 2009
  • The analytic test results are as follows. This thesis categorized into independent variables, multiple factors, such as asset attributes, cost reduction expectation, corporate IT competence, service qualities, system adequacy, information security, easy system management, uncertain IT, supplier capacity, intra-industry competition. And, this research thesis categorized into moderators, the factor, such as the adequacy between suppliers and customers industries. And, this categorized into dependent variables, multiple factors, such as the effects of ASP introduction. But, it was analyzed that only cost reduction expectation out of independent variables had not positive effects on the effects of ASP introduction. And, it was confirmed that the higher communications between suppliers and customers' industries, and the higher fulfillment of contracts, suppliers' service qualities, and suppliers' cooperation with customers had the adjusting effects on factors of ASP-based introduction.

The Effects of Mobile Application Quality on Satisfaction and Intention to Pay Mobile Application (모바일 애플리케이션의 품질이 사용자 만족과 애플리케이션 지불의도에 미치는 영향)

  • Kim, Sang-Hyun;Park, Hyun-Sun
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.81-109
    • /
    • 2011
  • The increase in the number of smartphone users has recently been steep, which started to offer companies and individuals more opportunities to enter into a new business field. Furthermore, the smartphone applications have become one of the hottest topics inside and outside the mobile industry. Still the market is in its infancy and intention to pay of charged application of most smartphone users is relatively low. However, rate of charged application in appstore is expected to be increase steadily for some years to come. In this perspective, it is important to consider the smartphone mobile application. Research on smartphone application is still in its early stage. Thus, the purpose of this study is to find what are the effective factors on user satisfaction and intention to pay of mobile application. Based on information system success model, we proposed system quality(stability, usability, security), information quality(timeliness, accuracy, enjoyment) and service quality(reactivity, reliability, empathy) as factors to effect on user satisfaction in mobile application. The results showed that stability, usability, timeliness, accuracy, enjoyment, reactivity and empathy affected significantly user satisfaction. The relationship among satisfaction and intention to pay of mobile application was significantly supported. The implications of the findings is that firms and individual developers of mobile application should focus on customer retention through enhancing satisfaction and quality.

Security Problems in Aircraft Digital Network System and Cybersecurity Strategies (항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.633-637
    • /
    • 2017
  • Cyber attacks on aircraft and aeronautical networks are not much different from cyber attacks commonly found in the ground industry. Air traffic management infrastructure is being transformed into a digital infrastructure to secure air traffic. A wide variety of communication environments, information and communications, navigation, surveillance and inflight entertainment systems are increasingly threatening the threat posed by cyber terrorism threats. The emergence of unmanned aircraft systems also poses an uncontrollable risk with cyber terrorism. We have analyzed cyber security standards and response strategies in developed countries by recognizing the vulnerability of cyber threats to aircraft systems and aviation infrastructure in next generation data network systems. We discussed comprehensive measures for cybersecurity policies to consider in the domestic aviation environment, and discussed the concept of security environment and quick response strategies.

Security Association and Testbed Implementation for Separated Business and Organizational Networks (업무망/기관망의 보안 연결 방안 연구 및 테스트베드 구축)

  • Park, Se-Chul;Jang, In-Sik;Lee, Jae-Yong;Kim, Byung-Chul;Lee, Myung-Sin;Hyun, Dae-Hwan;Chung, Dae-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.12
    • /
    • pp.42-53
    • /
    • 2011
  • As IT industry using networks have been developed explosively, online operations that were conducted in offline are increasing rapidly, and even relationship with other people made online. As online crimes are increasing accordingly, building security networks is getting very important. As a result, network separation between business and organization network has been performed recently, but this causes network user inconvenience and efficiency reduction. In this paper, we propose reassociation methods for already separated networks for many public organizations. We implement two reassociation methods using NAT device and shared storage and show their experimental results.

A study on the improvements of law for industrial technology outflow prevention : Focusing on international M&A (해외 M&A시 산업기술 유출 방지를 위한 법 개선 연구)

  • Kim, Seong-Jun;Kim, Woo-Hyun;Yi, Yeong-Seo
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.7-34
    • /
    • 2011
  • Achieving high-level technology in fields such as IT-related industry, semiconductors, mobile phones, LCD, automobile, shipbuilding, etc., Korea has become an international market leader in those fields. In results, there are the increasing numbers of technology leakage attempts in various manners. Recently, technology leakages are not limited to illegal industrial espionage, but also occur during usual corporate proceedings such as technology transfer, joint research and M&A. In fact, there was a technology leakage issue in the M&A between Ssangyong Motors of Korea and Shanghai Motors of China. Current M&A regulations of Korea are not independent laws, but are spread over various laws, such as commercial law, Capital Markets and the Financial Investment Services Act, Foreign Trade Act, etc. This paper focuses on whether the current Korean regulations regarding M&A are able to effectively restrict the leakage of major information of corporate during M&A and seeks the complements.

  • PDF

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.12
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.