• Title/Summary/Keyword: Security Service Model

Search Result 759, Processing Time 0.028 seconds

Secure Biometric Data Utilization and Protection (바이오인식 정보의 안전한 활용 및 보호방안)

  • Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.841-852
    • /
    • 2021
  • Biometric recognition refers to a technology that identifies or verifies an individual after registering each individual's physical, physiological, and behavioral characteristics with an automated device. However, the biometric data used here corresponds to personal information since it can identify an individual. Therefore, when it is compromised or misused, it negatively affects the privacy of the data subject. In this paper, we review the current status of domestic laws related to biometric information and the status of infringements related to this. And then, some biometric application models are derived and vulnerabilities and countermeasures for each model are discussed. Finally, for the developer and service provider of the biometric system, protection guidance is presented.

Results Of Mathematical Modeling Of Organizational And Technological Solutions Of Effective Use Of Available Resource Of Modern Roofs

  • Arutiunian, Iryna;Mishuk, Katerina;Dankevych, Natalia;Yukhymenko, Artem;Anin, Victor;Poltavets, Maryna;Sharapova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.49-54
    • /
    • 2021
  • Relative to the outer surface of the mastic coating, the reliability of the available waterproofing resource is determined by the ability to stabilize the structural characteristics in difficult climatic conditions. Organic components of mastic as a result of solar radiation, elevated temperatures and their alternating change, atmospheric oxidants, especially in industrial areas, have a tendency to self-polymerization and loss of low molecular weight components. This is the gradual loss of deformability and the transition to brittleness with its tendency to crack as the reasons for the gradual transition from normal to emergency operating condition.The presented mechanism of functioning of the coating surface indicates the expediency of increasing its components, able to stabilize the structure and prevent changes in deformability.Durability, hydrophobicity, water displacement, water absorption are accepted as estimating indicators. The main dependences of the influence of the lost additional components of mastic on the operational properties of the formed coating characterize the ability to provide successful resistance to environmental influences and longer stability. As a result, mastic acquires additional service life.

Evaluation of the Use of Inertial Navigation Systems to Improve the Accuracy of Object Navigation

  • Iasechko, Maksym;Shelukhin, Oleksandr;Maranov, Alexandr;Lukianenko, Serhii;Basarab, Oleksandr;Hutchenko, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.71-75
    • /
    • 2021
  • The article discusses the dead reckoning of the traveled path based on the analysis of the video data stream coming from the optoelectronic surveillance devices; the use of relief data makes it possible to partially compensate for the shortcomings of the first method. Using the overlap of the photo-video data stream, the terrain is restored. Comparison with a digital terrain model allows the location of the aircraft to be determined; the use of digital images of the terrain also allows you to determine the coordinates of the location and orientation by comparing the current view information. This method provides high accuracy in determining the absolute coordinates even in the absence of relief. It also allows you to find the absolute position of the camera, even when its approximate coordinates are not known at all.

Investigation of the Effect of Blockchain-based Cryptocurrencies on Tourism Industry

  • Rashideh, Waleed;Alkhathami, Mohammed;Obidallah, Waeal J.;Alduraywish, Yousef;Alshammari, Abdulaziz;Alsahli, Abdulaziz
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.234-244
    • /
    • 2022
  • Tourism products involve the transfer of money that is flowing to countries with partners or borders, which do not possess any relations surrounding their business environment. Suitable platforms must be generated by the tourism industry, which are beneficial to users when their demands are satisfied based on financial, technology, knowledge, and industry matters. Intermediaries are applied to alleviate different problems that are related to the non-fulfilment of contracts of existing users and service providers who are offering their services and represent a reliable third party. However, it is significant that intermediaries must be reliable when charges are incurred for any possible commission. Cryptocurrencies rely on blockchain technology to provide smoothness in money interchange without the need for reliable third parties. This interchange allows an increasing number of different new forms, which are related to different customer-to-customer transactions. The study attempts to provide an appropriate answer to the main research question, which is: 'Will the widespread adoption of cryptocurrencies bring new types of customer-to-customer markets from a technological, organizational, and environmental perspective?'.

A Framework for Implementing Information Systems Integration to Optimize Organizational Performance

  • Ali Sirageldeen Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.11-20
    • /
    • 2023
  • The primary aim of this study is to investigate the influence of Service Provider Quality (SPQ), System Quality (SQ), Information Quality (IQ), and Training Quality (TQ) on the interconnected aspect of organizational performance known as growth and development (GD). The study examined the influence of information systems (IS) on organisational performance and provided a theory-based technique for conducting research. The theoretical foundation for this study is derived from the widely employed [1]. IS success model in information systems research. The study's framework incorporates several novel elements, drawn from a comprehensive review of both recent and earlier literature, which researchers have utilized to evaluate the dimensions of [1]. In this study, we collected data from a diverse group of 348 individuals representing various industries through a web-based questionnaire. The collected data were subjected to analysis using SPSS. We conducted a multiple regression analysis involving 15 factors to assess several hypotheses regarding the relationship between the independent construct IS effectiveness and the dependent construct organizational performance. Several noteworthy descriptive statistics emerged, which hold significance for management. The study's findings strongly indicate that information systems exert a significant and beneficial influence on organizational performance. To sustain and continually enhance organizational effectiveness, the study recommends that managers periodically scrutinize and assess their information systems.

Determinants of Intent to Leave among Workers at Long-Term Care Institutions (노인의료복지시설 근무자들의 이직의도 결정요인)

  • Oh, Ji-Young;Seo, Young-Joon;Park, Hyun-Suk
    • The Korean Journal of Health Service Management
    • /
    • v.6 no.1
    • /
    • pp.87-103
    • /
    • 2012
  • The purpose of this study is to investigate the determinants of intent to leave among workers at long-term care institutions in South Korea. The model represents a revision of the Price(2001) model which extends previous research by providing a comprehensive review of the economic, psychological, sociological literature. This study also examined the moderating effects of values toward independent variables on the job satisfaction and organizational commitment. The sample used in this study consisted of 400 workers from 9 long-term care hospitals and facilities nationwide. Data were collected with self-administered questionnaires and analysed using multiple regression analysis and path analysis. The main results of the study were as follows. The variance of job satisfaction and organizational commitment explained by the independent variables used in the study are 74.5% and 76.3% respectively. The results of this study revealed that the following variables have significant negative effects on intent to leave among workers; organizational commitment, job satisfaction, positive affectivity, supervisor support, job significance, job security, job growth. And the following variables have significant positive effects on intent to leave among workers; job opportunity, negative affectivity. This result is same when the moderating role of values were considered in the analysis. Among demographic variables, only age was found to have a significant positive effect on the intent to leave among workers.

An Empirical Study on the Factors Influencing the Acceptance of Mobile Easy Payment Services: A Case of Chinese User (모바일 간편 결제 서비스 수용요인에 관한 실증연구: 중국사례를 중심으로)

  • Chen, Lu;Lee, Dong-Myung
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.1-13
    • /
    • 2017
  • In this paper, a research model was designed to investigate the factors influencing the intention to use of mobile easy payment services in China. Our research model includes the service factors(instant connectivity, economic and security), social factors(subjective norms and image), the user's individual factors(self-efficacy personal innovativeness and suitability), perceived ease of use, perceived usefulness and intention to use. A survey was conducted to collect the data with users who have had the actual using experience about mobile easy payment services. In this research, the data were collected by online survey, and in final analysis, 439 users' questionnaires were used. The empirical paper proves research hypothesis by using SPSS 22.0 and AMOS 23.0. The results of the study are as follows: the mobile easy payment service factors, social factors and the user's individual factors partially give positive effects to perceived ease of use and perceived usefulness; perceived ease of use gives positive effects to perceived usefulness. In addition, perceived ease of use and perceived usefulness have positive effects to on intention to use.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF