• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.031 seconds

Best Practices on Validation and Extraction of Object oriented Designs with Code Visualization Tool-chain (코드 가시화 툴체인 기반 UML 설계 추출 및 검증 사례)

  • Lee, Won-Young;Kim, Robert YoungChul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.79-86
    • /
    • 2022
  • This paper focuses on realizing design improvement and high quality through visualization of reverse engineering-based software. As new technologies and complex software emerge in various areas of the fourth industry in the future, software verification with both stability and reliability is becoming an issue. We propose a reverse engineering-based UML design extraction and visualization for high-quality software ranging from simple computational software to machine learning-based data-oriented software. Through this study, it is expected to improve software quality through design improvement by checking the accuracy of the target design and identifying the code complexity.

The development model of PT Visionet Internasional (OVO) in Indonesia

  • Yuhang Xia;Yuming Liu;Myeongcheol Choi;Chuijie Meng;Haanearl Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.125-131
    • /
    • 2023
  • OVO is a digital platform that provides simple payments and smart financial services, as well as one of the largest digital payment platforms in Indonesia. It has wide coverage and security when making payments, and supports multiple settlement currencies. The purpose of this study is to explore the history, business model, and future strategic direction of OVO, an Indonesian e-wallet. To date, OVO has built its own mobile payment ecosystem covering a wide range of consumer scenarios including e-commerce, travel, offline shopping and finance. And it supports mobile banking, online banking, debit cards or selected partner merchants. Its three largest transaction categories are in the transportation, retail and e-commerce sectors. With over 110 million consumers and 1.3 million merchant users, it is one of the dominant e-wallets in Indonesian market and has become the country's e-payment market leader. OVO eWallet's 'One Card' model offers convenience and choice for users, thus contributing to the rapid growth of OVO eWallet. And OVO eWallet competes fiercely with other competitors, but OVO eWallet continues to grow in terms of the number of users and market share. Finally, this study analyzes the strategic goals and plans of OVO eWallet, predicts its future direction. OVO eWallet has a huge success, but there are still competition and challenges to face.

Design of Free-space Optical Communication Terminal Considering for Korean Domestic Weather Conditions (국내 기상 조건을 고려한 자유공간 광통신 단말기 설계)

  • Hajun Song;Heesuk Jang;Taehyun Yoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.238-246
    • /
    • 2024
  • Modern military operations rely heavily on broadband communication and data transmission. Recently, the rising use of intelligent unmanned technology necessitates more frequencies. Free-space optical(FSO) communication can offer high-data-rate communications with high security and no need for licensing. Therefore, the FSO communication holds significant interest and potential in the defense industry. In this paper, we present design of a FSO communication terminal taking Korean domestic weather conditions into account. The domestic atmospheric attenuation is analyzed using several models and two-year meteorological information for a city in Korea, and this analysis is utilized to design the FSO communication terminal. The design results were verified using an FSO communication test bed, and we achieved an Ethernet bandwidth of approximately 1.86 Gbps at a distance of 1.3 km with the optical amplifier output power of the test bed set to about 20 dBm.

Subjectivity Study on Cloud-based Smart Work Service of a Quasi-Governmental Agency (준 정부기관 C공단의 클라우드 기반 스마트워크 서비스 유형화 연구)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.113-123
    • /
    • 2014
  • Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. The purpose of this study is to propose Improvement plans on cloud-based smart work service of a quasi-governmental agency based on the view point of preference and tendency. To discover three types of cloud-based smart work issues and interpret theoretical definitions of those, we conducted a subjectivity analysis through qualitative methodology. At the result, the study draws three elements of typology: convenience type, concentration type, and collaboration type, and provides directions to strategic-policy studies for future cloud-based smart work services of quasi-governmental agency.

A Study on the Co-Relation of Organizational Culture and Organizational Commitment Among Startup Companies Employees (신생기업 임직원들의 조직문화와 조직몰입의 상관관계에 관한 연구)

  • Bokhari, Syed Asad Abbas;Aftab, Muhammad;Shahid, Manzoor
    • Industry Promotion Research
    • /
    • v.6 no.4
    • /
    • pp.95-103
    • /
    • 2021
  • Startup enterprises are expanding at an alarming rate in both industrialized and developing countries simultaneously. Many difficulties confront young entrepreneurs in terms of organizational and human resource management. As a result, it is critical to research startup enterprises because they have received little attention from the scientific community. In this study, we solely considered new startup enterprises operating at the small and medium-sized enterprise (SME) level in a developing country (Pakistan). The information was gathered through a survey method from ten businesses located in the metropolitan metropolis of Lahore. The correlation analysis was conducted to determine whether or not the hypothesized relationship between research variables was true. We discovered a positive and statistically significant association between all of the proposed hypotheses. The findings of this study have significant implications for industry, academics, and policymakers.

Women's Employment in Industries and Risk of Preeclampsia and Gestational Diabetes: A National Population Study of Republic of Korea

  • Jeong-Won Oh;Seyoung Kim;Jung-won Yoon;Taemi Kim;Myoung-Hee Kim;Jia Ryu;Seung-Ah Choe
    • Safety and Health at Work
    • /
    • v.14 no.3
    • /
    • pp.272-278
    • /
    • 2023
  • Background: Some working conditions may pose a higher physical or psychological demand to pregnant women leading to increased risks of pregnancy complications. Objectives: We assessed the association of woman's employment status and the industrial classification with obstetric complications. Methods: We conducted a national population study using the National Health Information Service database of Republic of Korea. Our analysis encompassed 1,316,310 women who experienced first-order live births in 2010-2019. We collected data on the employment status and the industrial classification of women, as well as their diagnoses of preeclampsia (PE) and gestational diabetes mellitus (GDM) classified as A1 (well controlled by diet) or A2 (requiring medication). We calculated odds ratios (aORs) of complications per employment, and each industrial classification was adjusted for individual risk factors. Results: Most (64.7%) were in employment during pregnancy. Manufacturing (16.4%) and the health and social (16.2%) work represented the most prevalent industries. The health and social work exhibited a higher risk of PE (aOR = 1.11, 95% confidence interval [CI]: 1.03-1.21), while the manufacturing industry demonstrated a higher risk of class A2 GDM (1.20, 95% CI: 1.03-1.41) than financial intermediation. When analyzing both classes of GDM, women who worked in public administration and defense/social security showed higher risk of class A1 GDM (1.04, 95% CI: 1.01, 1.07). When comparing high-risk industries with nonemployment, the health and social work showed a comparable risk of PE (1.02, 95% CI: 0.97, 1.07). Conclusion: Employment was associated with overall lower risks of obstetric complications. Health and social service work can counteract the healthy worker effect in relation to PE. This highlights the importance of further elucidating specific occupational risk factors within the high-risk industries.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

Considerations for the Migration of Electronic Medical Records to Cloud Based Storage (전자의무기록의 클라우드 기반 저장소 이동시 고려사항)

  • Yi, Myongho
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.1
    • /
    • pp.149-173
    • /
    • 2016
  • As cloud computing becomes more and more popular and ubiquitous, many organizations are deciding to move their whole information infrastructure to the cloud. The healthcare industry is one of those that is beginning to utilize cloud-based solutions en masse. Cloud based computing and storage offers numerous benefits including scalability, cost efficiency, and accessibility, which in turn have the potential to streamline hospital operations. Despite the potential benefits of acquiring this system, considerations must still be given to the migration of the massive amounts of personal and highly protected data to a cloud-based solution. Health care organizations must consider all matters of security, reliability, and availability, to ensure that patients' data remains compliant to the Health Insurance Portability and Accountability Act (HIPAA) compliant. This paper will examine the benefits and challenges of such operation to determine the best practices for the utilization of Electronic Medical Record (EMR) cloud based networking and storage for small to mid-sized hospitals.

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid

  • He, Shiming;Zeng, Weini;Xie, Kun;Yang, Hongming;Lai, Mingyong;Su, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1510-1532
    • /
    • 2017
  • In smart grid, privacy implications to individuals and their families are an important issue because of the fine-grained usage data collection. Wireless communications are utilized by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, random linear network coding introduces a new challenge for privacy preserving due to the encoding of data and updating of coefficients in forwarder nodes. We propose a distributed privacy preserving scheme for random linear network coding in smart grid that considers the converged flows character of the smart grid and exploits a homomorphic encryption function to decrease the complexities in the forwarder node. It offers a data confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. The data of the packet is encrypted and the tag of the packet is encrypted by a homomorphic encryption function. The forwarder node random linearly codes the encrypted data and directly processes the cryptotext tags based on the homomorphism feature. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.