• 제목/요약/키워드: Internet Banking System

Search Result 113, Processing Time 0.065 seconds

A Study of Accident Prevention Effect through Anomaly Analysis in E-Banking (전자금융거래 이상징후 분석을 통한 사고예방 효과성에 관한 연구)

  • Park, Eun Young;Yoon, Ji Won
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.119-134
    • /
    • 2014
  • Financial companies are providing electronic financial transactions through a variety of user terminals for non-face-to-face services such as Internet banking, smart phone banking, or etc. However, in these services users' security awareness and the limitations of technical responses has frequently caused the financial loss so that fundamental protection measures are required from financial authorities. Accordingly, financial industry is planning and establishing systems that block unusual financial transactions by comprehensively analyzing and detecting user's electronic information, access information, transaction information, and so on in accordance with "Guide for building Unusual financial transactions detection system" to prevent the financial loss that happens in electronic financial transactions. In this paper, we analyze case studies of unusual financial transactions detection and prevention system that is built and operated in financial companies and current operating status and propose effects of the accident prevention and security measures later.

Design and Implementation of a Mobile Office System for Delivery Service (택배 서비스를 위한 모바일 오피스시스템 설계 및 구현)

  • 김의창
    • The Journal of Information Systems
    • /
    • v.12 no.1
    • /
    • pp.67-85
    • /
    • 2003
  • In the recent a mobile internet makes a change in internet business. The mobile internet service is resulting in M-commerce. Even if M-commerce provides only information service, there will be much possibilities to make applications in various areas such as, delivery service, trading service, banking service etc. in the near future. Delivery service requires many steps in processing, originally. This study is designed to implement a mobile system which makes short in delivery process. It includes that a delivery man receives a signature on a paper and input data at the delivered place by using PDA at hand. The mobile system will be contributed to shorten delivery speed. It is proposed to implement the mobile office system for improving service efficiency in the business of delivery service. This study is designed to implement a mobile system which make short in delivery process. It includes that a delivery man receives a signature on a paper and input data at the delivered place by using PDA at hand. The mobile system will be contributed to shorten delivery speed. It is proposed to implement the mobile office system for improving service efficiency in the business of delivery service.

  • PDF

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF

A Study of Secure Total Authentication System (안전한 통합 인증 시스템 연구)

  • Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.283-284
    • /
    • 2015
  • 본 논문에서는 기존 인증체계의 문제점을 살펴보고 이를 개선하기 위한 방안을 제안한다. 현재 국내에서 금융관련 서비스에서 공인인증서를 사용하는 서비스가 대부분이나 실용성 및 보안 문제로 인해 최근 정부에서는 공인인증서 사용 의무제도를 폐지하기에 이르렀지만 현재 공인인증서를 대체할만한 안전한 수단을 확보하지 못했고 기존의 OTP나 보안카드로 공인인증서의 공백을 메우기에는 역부족이다. 따라서 공인인증서를 대체할 수 있는 인증방안에 대해 제안하고 이를 통해 보다 안전한 인터넷 전자상거래를 유도하고자 한다.

  • PDF

A Design of Smart Banking System using Digital Signature based on Biometric Authentication (바이오인증 기반의 전자서명을 이용한 스마트 뱅킹 시스템 설계)

  • Kim, Jae-Woo;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6282-6289
    • /
    • 2015
  • Today, there is an increasing number of cases in which certificate information is leak, and accordingly, electronic finance frauds are prevailing. As certificate and private key a file-based medium, are easily accessible and duplicated, they are vulnerable to information leaking crimes by cyber-attack using malignant codes such as pharming, phishing and smishing. Therefore, the use of security token and storage toke' has been encouraged as they are much safer medium, but the actual users are only minimal due to the reasons such as the risk of loss, high costs and so on. This thesis, in an effort to solve above-mentioned problems and to complement the shortcomings, proposes a system in which digital signature for Internet banking can be made with a simply bio-authentication process. In conclusion, it was found that the newly proposed system showed a better capability in handling financial transitions in terms of safety and convenience.

Relative Location based Risk Calculation to Prevent Identity Theft in Electronic Payment Systems (전자지불거래에서 상대위치와 연동한 도용 위험성 산출방법)

  • Suh, Hyo-Joong;Hwang, Hoyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.455-461
    • /
    • 2020
  • Electronic payment system using Internet banking is a very important application for users of e-commerce environment. With rapidly growing use of fintech applications, the risk and damage caused by malicious hacking or identity theft are getting significant. To prevent the damage, fraud detection system (FDS) calculates the risk of the electronic payment transactions using user profiles including types of goods, device status, user location, and so on. In this paper, we propose a new risk calculation method using relative location of users such as SSID of wireless LAN AP and MAC address. Those relative location information are more difficult to imitate or copy compared with conventional physical location information like nation, GPS coordinates, or IP address. The new method using relative location and cumulative user characteristics will enable stronger risk calculation function to FDS and thus give enhanced security to electronic payment systems.

A Multi-password Management Scheme using Pseudopia Function (슈도피아 함수를 이용한 다중 패스워드 관리 방안)

  • Jang, Hwa-Sik;Shin, Weon;Rhee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3438-3444
    • /
    • 2000
  • In this paper, we propose an efficient passwork management scheme using the Pseudopia function which performs a mukti-password management and change scheme in the cyberspace. For a givne user and a web-site, the Pseudopia automatically generates a user name and a password that can be used to establish an anonvous account at the web-site. In the proposed scheme, a user can protect his password using " the personal etropy" which relates to his own life experiences, that identified only by himself. The proposed scheme can be applied to the broad tools for the internet related applications such as electronic commerce and Internet banking system.

  • PDF

Housing Needs of the Residents for Digital Home Design (디지털 홈 디자인을 위한 거주자 요구조사)

  • Oh, Chan-Ohk
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.11a
    • /
    • pp.147-148
    • /
    • 2004
  • Our society is rapidly digitalizing. The effects of his digitalization are very diverse and one of them is that our living environments are changing. Many routine places which certain activities have been taken places are changing. For example, home office, education at home using internet, home shopping, internet banking, and so on. These facts cause the home to be extended and digitalized. That is, as our living patterns are changing, the housing needs are also changing. The purpose of this study is to graspe the digital related housing needs of the residents and suggest the directions of the digital home design. The subjects were 400 housewives who lived in 85m2 sized multi-family houses in Busan. They were relatively young in their age, had high education level, and middle income. On the base of their demands, the digital home designed as follows would be desirable: 1) safe and secure design and digital system, 2) design to improve residents' health and encourge family interaction, 3) human, warm, and soft interior mood, 4) the space composition different from the existing one.

  • PDF

Factors Influencing Information Systems Adoption: A Review of the Literature

  • Hakemi, Aida;Masrom, Maslin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.19-26
    • /
    • 2019
  • For the last two decades, a number of information systems are developed for various aims, depending on business' needs. There are a lot of organizations in the world which are using information systems in their environment, such as telecommunications organizations, universities and banks. Using information system has become crucial for most of organizations regarding with increasing the performance of work procedures and improve productivity and efficiency in general. There are many different models that have been designed and validated to explain the effect of constructs on the adoption of technologies. The aim of this research is to review the literature on information systems adoption and to analyze the different types of models which are frequently applied by researchers in their efforts to examine the factors that estimate the adoption of technologies. The research explores information systems adoption literature that focuses on development models.

A study on the System for the Mobile electronic account (모바일 기반의 디지털콘텐츠 사례 전자장부시스템에 관한 연구)

  • Song Eun-Jee
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.19-24
    • /
    • 2005
  • Mobile service is able to offer the elastic service to anyone regardless of the place and the tin. With this characteristics, the ubiquitous service could be also provided even to the place which the access was limited with the existing line service, which could improve the mutual connection and could result in the service extension Mobile communication companies, which realized the limit of sale only by telephone conversation, have made an effort to develop wireless internet with concentration as its alternation. Especially concentrating their effort both to the development of distinctive and various contents and to tin development of system for mobile service such as the mobile banking, mobile game and etc., they have done their best to secure the number of the people using the wireless internet. This study is to propose the electronic account system based on the mobile as a case study of contents production for such a mobile service. This system has its advantage to perform the financial management immediately when the income and outcome happen without limitation of the time and space. The information could be stored, searched and modified by using of the mobile phone for this system was made up for the weak point of the financial management for wired internet.

  • PDF