• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.029 seconds

An Study on the Environment Analysis and the Correspondence Strategy of Electronic Commerce (전자상거래의 환경분석과 대응전략에 관한 연구 -전라북도 기업을 중심으로-)

  • Kim Dong-Gyoon;Cha Soon-Kwean
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.29-66
    • /
    • 2000
  • The current economic environmental changes such as globalization, information and opening of the market is calling for or needing the more rapid change of management and/or marketing strategies of the company than they did before to survive in tile borderless international competition. Under this situation, this study focuses on the correspondence strategies of Electronic Commerce which is one of the key elements to overcome or lead the above demands through seeking the problems of the current EC acception and application specially in Chollabuk Do province. For the above purpose, this study surveys the questionary with business firms of above area and figures out what is the correlation between business form and size and EC acception and application and what is the problems on it. And than provides several counter strategies which are following based on the survey to keep this area companies from out of business and lead the above economic environmental changes. To expand the adoption and application of EC to this area, firstly, top managers of the company must recognize the necessity and importance of EC compared with traditional commerce and change their perception and attitude concerning EC positively, and than try to accept it as soon as possible. Secondly, the company need the retained earning to invest to EC and educate their managers and employees with total participation. Thirdly, local government has to improve its attention to EC as a best way or opportunity to reduce and overcome the economical gap and development its economy because EC can remove the physical time or distance and space, scale and capital limitations. Finally, government has to expand and establish information infrastructure such as technical infrastructure(communication and security technology), Functional infrastructure like standard protocol, Organizational infrastructure(interchange agreement, relative law) and social infrastructure to improve efficient electronic transaction which can Increase the company' international compatitiveness under the current economy trend.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Study on Recognization for Quality Importance of Cloud Services (클라우드 서비스의 품질 중요도 인식에 대한 연구)

  • Jang, Kyoung-Seung;Shin, Seung-Jung;Jung, Jinkwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.39-44
    • /
    • 2015
  • Although there are usual security threats caused by the characteristics of cloud services, more public institutions plan to introduce the cloud services rapidly, as the increase of recognition for its advantage. The previous studies have focused on the security threats and the quality as a hindrance of activation of cloud services. Those also have stressed the importance of the quality in the cloud user side. But there was no consideration about which quality factors impact on the satisfaction of users. Therefore, this study analyzed the importances of quality in specific five major factors. The results also presented that the SLA guarantee is more important than the security performance. This research will contribute to cloud services providers in Korea, by aiding the establishment of effective quality strategies.

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

Evaluation of Functional Ability and Nutritional Risk according to Self-Rated Health (SRH) of the Elderly in Seoul and Kyunggi-do (서울 및 경기지역 노인의 건강자가평가에 따른 기능적 건강 및 영양위험 평가)

  • Choi, Yoon-Jung;Park, Yu-Sin;Kim, Chan;Jang, Yu-Kyung
    • Journal of Nutrition and Health
    • /
    • v.37 no.3
    • /
    • pp.223-235
    • /
    • 2004
  • A functional ability and adequate nutritional status are the major determinants of health status, Self-rated health (SRH) is a worldwide method to assess health status and it is recognized as a predictor of morbidity and mortality in the elderly, This study was designed to evaluate the functional ability and nutritional risk according to SRH in the elderly. Four hundred nine free-living elderly people (118 male, 291 female), aged $\geq$ 65 years were interviewed by trained interviewers using structured questionnaires including demographic information, SRH, anthropometric measurements, functional ability, general health status, and nutritional risk. SRH was divided into three status such as “Good”, “Moderate” and “Poor” status. And all the data were analyzed by oneway ANOVA, spearman correlation, and x$^2$ analysis using SPSS 9.0 version at p 〈 0.05. Of all the subjects, 48.9% perceived their health status as “poor”, and their functional abilities (activities of daily living, instrumental activities of daily living) were more impaired than their counterparts (“good” and “moderate”). Poor self-rated health was also related to: a higher prevalence of illnesses (p 〈 0,001) especially in hypertension, arthritis. Self-rated health was significantly related to food security (p 〈 0.001), food enjoyment (p 〈 0.001) ,and nutritional knowledge (p = 0.0 13). Also NSI checklist total score was the highest in “poor” health status (p 〈 0.001). Better self-rated health was related to better food security, and better food enjoyment. However, smoking, alcoholic intake, exercise, eating behaviors, and demographic characteristics were not significantly different among the three SRH status. SRH was closely related to chronic diseases, functional ability, and nutritional risk in the elderly. Therefore, public health strategies for the elderly should be focused on the elderly who are “poor” in SRH, to improve nutritional status and functional ability, and to reduce risk factors of chronic diseases.

MTS Service Environmental Quality's Effects on the Customer Satisfaction and Continuous Use Intention in the Agile Business Environment (애자일 경영 환경에서의 모바일증권거래시스템 서비스 환경 품질이 고객만족과 지속적 사용의도에 미치는 영향)

  • Chang, Hwan-Shick;Noh, Hye-Young;Kim, Dae-Cheol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.3
    • /
    • pp.131-141
    • /
    • 2019
  • Recently the business environment surrounding the financial investment industry is changing rapidly, and the demands of customers (diversity and the cycle of change etc.) are getting shorter. In this context, it can be said that companies are forced to adopt an agile management environment. In particular, non-face-to-face channels, including MTS, is adopting the agile system into the digital finance sector from a company-wide and strategic perspective. This study analyzed the effects of MTS services' environment quality on customer satisfaction and continuous intention to use for MTS users who are rapidly increasing under the agile management environment in the financial investment industry. This study surveyed the quality of service environment (accessibility, convenience, design, security), customer satisfaction, and continuous intention to use for 350 MTS users. First, accessibility, convenience, and security of MTS service environment quality had a positive effect on customer satisfaction, and design was rejected Second, customer satisfaction has a positive effect on continuous intention to use. Third, convenience and security of MTS service environment quality have positive effects on continuous intention to use, and accessibility and design were rejected. The results of this study, together with demographic analysis, are expected to provide useful implications for MTS activation studies and securities firms' strategies.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN

  • Lian, Weichen;Li, Zhaobin;Guo, Chao;Wei, Zhanzhen;Peng, Xingyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.264-284
    • /
    • 2021
  • As the next-generation network architecture, software-defined networking (SDN) has great potential. But how to forward data packets safely is a big challenge today. In SDN, packets are transferred according to flow rules which are made and delivered by the controller. Once flow rules are modified, the packets might be redirected or dropped. According to related research, we believe that the key to forward data flows safely is keeping the consistency of flow rules. However, existing solutions place little emphasis on the safety of flow rules. After summarizing the shortcomings of the existing solutions, we propose FRChain to ensure the security of SDN data forwarding. FRChain is a novel scheme that uses blockchain to secure flow rules in SDN and to detect compromised nodes in the network when the proportion of malicious nodes is less than one-third. The scheme places the flow strategies into blockchain in form of transactions. Once an unmatched flow rule is detected, the system will issue the problem by initiating a vote and possible attacks will be deduced based on the results. To simulate the scheme, we utilize BigchainDB, which has good performance in data processing, to handle transactions. The experimental results show that the scheme is feasible, and the additional overhead for network performance and system performance is less than similar solutions. Overall, FRChain can detect suspicious behaviors and deduce malicious nodes to keep the consistency of flow rules in SDN.

The Strategic Approach of 'Freedom of Navigation Operations' ('항행의 자유 작전'의 전략적 접근)

  • Kim, Jeong-Min
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.115-140
    • /
    • 2021
  • The South China Sea is a significant maritime shipping route with abundant submarine and fishing resources. Over 40,000 ships pass through the South China Sea every year, constituting around 50% of global shipping and 66% of crude oil. In particular, 30% of Korea's import cargo and 90% of energy imports pass through this body of water. The US and China realized the significance of this sea area from early on and are embodying national interest through maritime security at the national strategic level by implementing the 'Indo-Pacific' and 'One Belt One Road' strategies, respectively. Such geopolitical conflicts are manifested in the 'freedom of navigation operations' by the US in the South China Sea. Despite its significance, there is a lack of studies in Korea on the freedom of navigation operations, and most previous studies only focus on analyzing international law and agreements. This article examines the origin and background of the strategic perception of the freedom of navigation operations and derives implications for the peace and security of the Korean Peninsula as the strategic competition between the US and China continues.

  • PDF

Social Media Bigdata Analysis Based on Information Security Keyword Using Text Mining (텍스트마이닝을 활용한 정보보호 키워드 기반 소셜미디어 빅데이터 분석)

  • Chung, JinMyeong;Park, YoungHo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.5
    • /
    • pp.37-48
    • /
    • 2022
  • With development of Digital Technology, social issues are communicated through digital-based platform such as SNS and form public opinion. This study attempted to analyze big data from Twitter, a world-renowned social network service, and find out the public opinion. After collecting Twitter data based on 14 keywords for 1 year in 2021, analyzed the term-frequency and relationship among keyword documents with pearson correlation coefficient using Data-mining Technology. Furthermore, the 6 main topics that on the center of information security field in 2021 were derived through topic modeling using the LDA(Latent Dirichlet Allocation) technique. These results are expected to be used as basic data especially finding key agenda when establishing strategies for the next step related industries or establishing government policies.