• Title/Summary/Keyword: Non-traditional security

Search Result 60, Processing Time 0.025 seconds

A Study on the Perceived characteristics of the mobile payment service using the technology acceptance model (기술수용모델을 활용한 모바일 소액결제 시스템의 인지적 특성 분석)

  • 이석기;김성희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.103-109
    • /
    • 2004
  • Mobile payment service is a new innovating technology in the micro payment industry. Although it emerged only one or two years a9o in Korea, it is now highly used and prospered by many online companies. Traditional studies concerning the electronic payment system are usually about the payment process itself, so they stressed the security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article describes the phenomenon of technology adoption with a particular focus on telephone Payment service. The article identifies which characteristic of the telephone payment service affects to the user status (user, non-users). To do this, this article mainly used Roger's Technology Acceptance Model and some characteristics are added to the model. The most important perceptual characteristic that affects to the user status was not security, but ease of use-the telephone payment service had to enhance continuously for the competitive advantage over the other payment service. Observability and convenience are also noted as important.

  • PDF

Machine Learning-Based Malicious URL Detection Technique (머신러닝 기반 악성 URL 탐지 기법)

  • Han, Chae-rim;Yun, Su-hyun;Han, Myeong-jin;Lee, Il-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.555-564
    • /
    • 2022
  • Recently, cyberattacks are using hacking techniques utilizing intelligent and advanced malicious codes for non-face-to-face environments such as telecommuting, telemedicine, and automatic industrial facilities, and the damage is increasing. Traditional information protection systems, such as anti-virus, are a method of detecting known malicious URLs based on signature patterns, so unknown malicious URLs cannot be detected. In addition, the conventional static analysis-based malicious URL detection method is vulnerable to dynamic loading and cryptographic attacks. This study proposes a technique for efficiently detecting malicious URLs by dynamically learning malicious URL data. In the proposed detection technique, malicious codes are classified using machine learning-based feature selection algorithms, and the accuracy is improved by removing obfuscation elements after preprocessing using Weighted Euclidean Distance(WED). According to the experimental results, the proposed machine learning-based malicious URL detection technique shows an accuracy of 89.17%, which is improved by 2.82% compared to the conventional method.

A Study on U-Service for Security in U-City Newtown Planning (신도시계획의 계획지표를 반영한 U-City의 U-방범서비스 개선방안 연구)

  • Yoon, Hyo Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5D
    • /
    • pp.645-654
    • /
    • 2009
  • This study started with necessity of historical spatial planning skills in U-city planning. Though U-city technology and information are very important, U-city development should be considered on the base of various experience of spatial planning. This study explored spatial planning indexes change in the recent newtown plans. In particular, safety and security were intensively analyzed. In addition, many theories on safe urban space, ubiquitous technology, traditional defensible space, and CPTED (Crime Prevention through Environmental Design) are compared. The findings are as follows. First, each planning is not integrated and there is lack of network among each planning. Specifically, from the crime prevention perspective, there is only mechanical monitoring such as CCTV without architectural approach. Even though CCTV is social needs, it is necessary to adopt it with architectural environment in order to improve the synergy effect of spatial planning and non-spatial planning.

Tasks and Development plan of R.O.K. Navy to support Korean government's 『Indo-Pacific Strategy』 (한국의 『인도-태평양 전략』 지원을 위한 해군의 역할·발전방안 고찰)

  • Ji, Young
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.83-107
    • /
    • 2023
  • To Republic of Korea in the Indo-Pacific region, the stability and prosperity of the area are directly coupled with national survival, interest. Currently, on account of strategic competition between U.S.A, and China in this area as well as supranational·non-conventional threats, the security environment is unstable, required joint/allied responses. So, lots of states inside(U.S.A., Japan, ASEAN, etc.), also, out of this Indo-Pacific area like EU-NATO, open their own strategy related in Indo-Pacific issues to be involved. R.O.K. government took its own line with publishing self strategy following this international trend, it can be shown korean government's strong intend to join in the pending security issues in this region with 'strategic clarity'. Now, R.O.K. Navy has to back up governments, policy. First, R.O.K. Navy should strengthen the relationship inside and take part in the multilateral cooperation of security. Second, to convey this deterrence message to potential threats, Navy is required to show of forces and have combined exercises. Also, as naval forces of advanced countries, Korea, Navy should be taken action in non-traditional threats, and help developing states improve their sea power. To fulfill this tasks in the wide ocean area, Navy need five inherent characteristics(mobility, flexibility, sustainability, capability of presence and projection). In the end, this paper propose the development plan following operational environment (SWOT) analysis as well.

  • PDF

A Design of Web Server Architecture Environment for Reliability Enhancement and Secure Web Services (신뢰성 향상과 안전한 웹 서비스를 위한 웹 서버 아키텍처 환경의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.343-350
    • /
    • 2010
  • In the existing design of web server architecture, data encryption technique is used to keep the reliability, stability, and safety of web service. But the use of data encryption technique wastes the work of cpu while decreasing throughput of web server and increasing average response time so that it shows negative effect on the capacity of web application server. Also, the latest web applications require security and safety for the safe internet communication. Therefore, this paper suggests the improved web server which uses thread pool and Non-blocking I/O adding new web service modules to the existing web server for the safe web service, provides reliability and safety to show the safe web service capacity. And we compare and evaluate the safety and capacity through experiment on the existing traditional Tomcat based web server and the proposed system to evaluate the safety and capacity of the proposed web server system.

A study on the problems in appling CIF, Incoterms 1990 into the contract of sale. (1990년(年) 인코텀즈에 따른 CIF조건(條件)의 활용상(活用上)의 문제점(問題點))

  • Choi, Myung-Kook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.6
    • /
    • pp.11-51
    • /
    • 1993
  • This study is focused on the problems and the suggestions of proper ideas for solving them which are arisen from appling CIF, Incoterms 1990 into the contract of sale after reviewing of the contents of traditional CIF contract and the main changes of CIF, Incoterms 1990. This study summerized as follows: First, when the seller provide the buyer with non-negotiable sea waybill or inland waterway document instead of negotiable bill of lading, it is my feeling that the essence of symbolic delivery in traditional CIF contract is fading. And if the buyer has paid for the goods in advance, or a bank wishes to use the goods as security for a loan extended to the buyer, it is not sufficient that the buyer or the bank be named as consignee in a non-negotiable document. This is true because the seller by new instractions to the carrier could replace the named consignee with someone else. To protect the buyer or the bank it is therefore necessary that the original instructions from the seller to the carrier to deliver the goods to the named consignee be irrevocable. Second, CIF term can only be used for sea and inland waterway transport. When the ship's rail serves no practical purposes such as in the case of roll-on/roll-off or container traffic, CIP term instead of CIF term is more appropriate to use. Third, the EDI method still contains many legal and technical problems to be solved in order to be used thoroughly' in the international sale of goods. Therefore, the parties wishing to replace the traditional paper-based trade documents by electronic messages must exchange the agreement on EDI each other in order to prevent and sol ye unexpected problems. Forth, it may be that the goods are to be carried in bulk without such marking or naming of consignee as would amount to appropriation. Then the risk will not pass until effective appropriation has been made. Therefore, the seller needs to appropriate by issuing of separate bills of lading or delivery orders for parts of the bulk cargo. And in case the goods are bought while they are carried at sea, some problems on the passing of risk would arise. One possibility is that the buyer might have to assume risks which have already occured at the time when the contract of sale is entered into force. The other possibility would be to let the pissing of the risk concide with the time when the contract of sale is concluded. The parties are advised to ascertain the applicable law and any solution which might follow there form. Finally, Incoterms are restricted to deal with the main principles for the division of functions, costs and risks between the parties and the rest is left to their individual contract as supplemented by the custom of the trade, the individual terms of the contract of sale and the applicable law. Thus, the parties are advised to ascertain the applicable law on their individual contract of sale in order to solve the problems on the transfer of property, the remedy and so on.

  • PDF

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

A Low-Cost Approach for Path Programming of Terrestrial Drones on a Construction Site

  • Kim, Jeffrey;Craig, James
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.319-327
    • /
    • 2022
  • Robots for construction sites, although not deeply widespread, are finding applications in the duties of project monitoring, material movement, documentation, security, and simple repetitive construction-related tasks. A significant shortcoming in the use of robots is the complexity involved in programming and re-programming an automation routine. Robotic programming is not an expected skill set of the traditional construction industry professional. Therefore, this research seeks to deliver a low-cost approach toward re-programming that does not involve a programmer's skill set. The researchers in this study examined an approach toward programming a terrestrial-based drone so that it follows a taped path. By doing so, if an alternative path is required, programmers would not be needed to re-program any part of the automated routine. Changing the path of the drone simply requires removing the tape and placing a different path - ideally simplifying the process and quickly allowing practitioners to implement a new automated routine. Python programming scripts were used with a DJI Robomaster EP Core drone, and a terrain navigation assessment was conducted. The study examined the pass/fail rates for a series of trial run over different terrains. The analysis of this data along with video recording for each trial run allowed the researchers to conclude that the accuracy of the tape follow technique was predictable on each of the terrain surfaces. The accuracy and predictability inform a non-coding construction practitioner of the optimal placement of the taped path. This paper further presents limitations and suggestions for some possible extended research options for this study.

  • PDF

A Study on the Intention to Use Biometric Authentication When Using Mobile Easy Payment Service: Focusing on the Comparison of Experienced and Non-Experienced Persons (모바일 간편결제 서비스 이용 시 생체인증 사용의도에 관한 연구: 경험자와 비경험자 비교를 중심으로)

  • Jae-Seung Ju;Won-Boo Lee
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.1-22
    • /
    • 2021
  • In the newly encountered economy caused by the Corona virus Disease-19, remote transaction becomes a new normal that disrupt traditional economic order. In the middle of the disruption, mobile tech is placed and remote finance on mobile is highly noticed and considered as an infra-tech to support the new ecology, In mobile finance. remote payment is becoming the most common service and personal identification on it is critical to operate the new service. There are various means of remotely identifying a person. Recently the use of biometric information is increasing. In this study, a correlation analysis was conducted on factors that effects to biometrics usage and the intention to use in remote personal identification. Variables for critical factor in the remote identification were classified into 4 groups such as Performance expectancy, Effort expectancy, Social influence, and Security. The empirical analysis based on the Unified Theory of Acceptance and Use of Technology (UTAUT) was conducted. The relationship between variables and the intention to use is also analyzed. In the study, stepwise regression analysis was conducted four times in which variables were adjusted in individual stage. As a result, the analysis suggests that performance expectancy, effort expectancy, social influence, security have positive effects for intention to use. Additionally, effort expectancy and security have moderating effects to intention to use depends on biometric authentication experience. The analysis has shown positive effect of variables grouped on the intention to use them. It also suggests that the intention to use biometric authentication will quickly grow. This study is expected to make a contribution to utilize and improve the use of biometric information in mobile payment.

The Legal Problems and Policy Suggestions for Vitalizing Cyber Trade Transactions (사이버무역거래에 관한 법적 문제와 활성화방안)

  • 이신규
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.1-17
    • /
    • 2001
  • This study is to examine some legal problems of cyber trade transactions and to suggest some policy implications to vitalize cyber trade by internet accomplishes electronic business from all process integration of production, marketing and customer service. However, there are some legal problems for the electronic commerce to be used in international trade activities such as trade contract transport documents and payment systems by internet. First international trade rules have to be legislated so that electronic documents has same legal function like traditional documents. Also electronic signature must has authenticity, integrity, non-repudiation, writing and confidentiality. Second, traditionally international payment systems such as letters of credits, remittance, documentary collections and open account have been operated as an important and popular method of payment. In the modern world of electronic commerce, information technology has made it possible to pay for the sale of goods and services over the internet. The payment methods such as Credit Card, Debit Card, Electronic Cash, Electronic Fund Transfers enable partly sellers, buyers and service providers to settle payment electronically through the internet. To settle the problems of payment systems, the security requirements for safe electronic Payments such as authenticity, integrity, non-repudiation have to be guaranteed. Also, electronic data interchange in transport documents has to be adopted and negotiability of electronic bills of lading has to be guaranteed. Electronic payment systems through SWIFT enable the sellers and the buyers to conduct and settle international business-to-business electronic commerce in case of solving the above problems and harmonizing the Bolero project.

  • PDF