• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.024 seconds

Use Intention of Mobile Fingerprint Payment between UTAUT and DOI in China

  • Wu, Runze;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.15 no.10
    • /
    • pp.15-28
    • /
    • 2017
  • Purpose - With the rapid growth of Chinese mobile pay market, it's necessary to run a study of the aims why users prefer to intention of use for mobile fingerprint payment. To reach this goal, UTAUT added Perceived Security and DOI. Research design, data, and methodology - The researchers conducted this study by using collected 3126 responses and the collected data was analyzed by applying statistical techniques factor analysis, AMOS, and Cronbach's Alpha and SPSS 22.0. Results - The result shows that compatibility and relative advantage of mobile fingerprint payment have positive effect on performance expectancy and effort expectancy separately, and the performance expectancy and effort expectancy have positive effect on people's use intention of mobile fingerprint payment. Social influence has a positive effect on the users' use intention of mobile fingerprint payment, Facilitating conditions has a slight effect on the users' use intention of mobile fingerprint payment, Perceived security has the most significant effect on he users' use intention of mobile fingerprint payment. Conclusions - The research showed that compatibility is one of the most important elements that make users continue to use the product. The mobile fingerprint payment must own clearer advantages than other ones that it can reach the biggest market. The Social Influence has a positive influence on the intention of use.

Community Empowerment Models of Tourism Village Based on Superior Commodities: Realizing Economic Resilience

  • Cahyono, Arie Eko;Kurniawan, Moh. Usman;Sukidin, Sukidin;Kantun, Sri
    • Journal of Distribution Science
    • /
    • v.16 no.11
    • /
    • pp.29-36
    • /
    • 2018
  • Purpose - Research on community empowerment based on superior commodities to improve the economic resilience of the tourist village of Lumajang Regency is an investigative descriptive study to obtain an overview of the problems of community economic development, especially regarding economic resilience. The output of this research activity is the formation of integrated and comprehensive strategic programs and activities in order to improve economic empowerment and food security of the community around the tourist village. Research design, data, and methodology - This research method applies several methods of analysis such as the Loqation Quotion (LQ) method, SWOT analysis, Trend analysis, and analysis of Community Economic Empowerment in the agricultural sub-sector. Results - This research has strategic values and objectives in addition to providing important information to improve food security of tourism villages in Lumajang district in particular and disadvantaged communities in Indonesia in general. Through this supportive community economic empowerment programs, Lumajang District has an agricultural area and at the same time as a nature-based tourism area that supports it. Conclusion - Village tourism community empowerment activities are taken based on existing superior commodities. The existing tourism village program in Lumajang district can be used as one of the references for the upcoming tourism village program.

Design of Multi-Level Abnormal Detection System Suitable for Time-Series Data (시계열 데이터에 적합한 다단계 비정상 탐지 시스템 설계)

  • Chae, Moon-Chang;Lim, Hyeok;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.1-7
    • /
    • 2016
  • As new information and communication technologies evolve, security threats are also becoming increasingly intelligent and advanced. In this paper, we analyze the time series data continuously entered through a series of periods from the network device or lightweight IoT (Internet of Things) devices by using the statistical technique and propose a system to detect abnormal behaviors of the device or abnormality based on the analysis results. The proposed system performs the first level abnormal detection by using previously entered data set, thereafter performs the second level anomaly detection according to the trust bound configured by using stored time series data based on time attribute or group attribute. Multi-level analysis is able to improve reliability and to reduce false positives as well through a variety of decision data set.

An Application of FSA Methodology to Hatchway Watertight Integrity of Bulk Carriers (살물선의 화물창 덮개부 수밀 건전성에 대한 공식안전평가의 적용)

  • Eun-Chang Lee;Jae-Ohk Lee;In-Cheol Yeo;Young-Soon Yang
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.37 no.3
    • /
    • pp.69-77
    • /
    • 2000
  • This study was a part of FSA study which was initiated by IMO and was applied to hatchway watertight integrity of bulk carriers. Hazards which were involved in high risk level were identified as follows. Ship Operation out of Design Criteria(Hatch Coaming Damage) and Poor Maintenance & Inspection(Securing Arrangement Damage). The potential risk was calculated by risk analysis and risk control option was made to reduce potential risk. The potential risk was about U$60,000/ship-year and could be reduced to about U$30,000/ship-year by applying RCO 1(Advanced system directly related to Hatchway Security). In addition, effectiveness of RCOs was shown by cost benefit assessment.

  • PDF

The Design and Implementation of A Distributed Intrusion Detection System for Multiple Attacks (대규모 네트워크 상의 다중공격에 대비한 분산 침입탐지시스템의 설계 및 구현)

  • 최주영;최은정;김명주
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.21-29
    • /
    • 2001
  • For multiple attacks through large networks e.g., internet, IDS had better be installed over several hosts and collect all the audit data from them with appropriate synthesis. We propose a new distributed intrusion detection system called SPIDER II which is the upgraded version of the previous standalone IDS - SPIDER I. As like the previous version, SPIDER II has been implemented on Linux Accel 6.1 in CNU C. After planting intrusion detection engines over several target hosts as active agents, the administration module of SPIDER II receives all the logs from agents and analyzes hem. For the world-wide standardization on IDS, SPIDER II is compatible with MITRE's CVE(Common Vulnerabilities and Exposures).

  • PDF

A Design of Fair Blind Signatures Protocol using PVNIOT (PVNIOT를 적용한 공정한 은닉 서명 프로토콜 설계)

  • 김상춘;권기현
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.33-40
    • /
    • 2003
  • The biggest problem for the oblivious transfer protocol is the rapid increasement of network traffic and computational complexity if the protocol is used as a sub-protocol compare to the case that when it is used as a standalone protocol. To fix such problems, in this paper, we propose a verifiable Non-interactive OT protocol that reduces the network traffic and computational complexity by preprocessing the necessary computations when the network traffic is low. The proposed protocol uses third root mechanism instead of square root mechanism that is used for the Fiat-Shamir signature mechanism and also uses 1-out-of-2 oblivious transfer based on signature mechanism. We also analyze the proposed protocol by comparing to the Lein Harn, YNIOT protocols.

  • PDF

An Energy Efficient Routing Algorithm Based on Clustering in Wireless Sensor Network (무선센서 네트워크에서의 에너지 효율적인 클러스터링에 의한 라우팅 알고리즘)

  • Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.3-9
    • /
    • 2016
  • Recently, a lot of researches have been done to increase the life span of network using the energy efficient sensor node in WSN. In the WSN environment, we must use limited amount of energy and hardware. Therefore, it is necessary to design energy efficient communication protocol and use limited resources. Cluster based routing method such as LEACH and HEED get the energy efficient routing using data communication between cluster head and related member nodes. In this paper, we propose an energy efficient routing algorithm as well as performance result using simulation.

A Study on the Integrated Logistic Support of Force Support System (전력지원체계의 종합군수지원 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.77-85
    • /
    • 2016
  • Integrated logistics support activities is to comprehensively manage the logistic support elements in the whole pro cess, from the design, development, acquisition request from the time it takes, operating and disposal for the efficient and cost-effective logistics support equipment. In other words, maintain the performance of the weapon system, and is required to be filed from the time the economic comprehensive logistic support until discarded activities, managing all logistic support throughout the life cycle period. This study was an intensive study for a seamless integrated logistics support force support system, the result wa s determined that the insufficient number of parts to the weapons sector, presents some development direction for se amless integrated logistics support force support system and should.

Design of Device Management System for Removing Smartphone Malware (스마트폰 악성코드 제거를 위한 단말 관리 시스템 설계)

  • Jeong, Gi-Seog
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.67-75
    • /
    • 2011
  • Recently, the number of smartphone users is rising rapidly due to an influx of foreign smartphones and sales of domestic products. According to the increase of smartphone users, smartphone malwares are also increasing sharply. Hence it is necessary to protect smartphone against mobile malwares. There are device management protocols as SNMP, TR-069. But these protocols are not suitable for mobile device management because of restrictive management function and unsupported mobility. OMA DM which is a standard for mobile device management has been adopted as mobile device management protocol for most of 2G,3G. Thus it amounts that OMA DM is suitable for smartphone management system. In this paper, the mobile device management system based on OMA DM is designed. This system can remove smartphone malware by remote control.

A Case Study of Extra Reinforcement by Road Extension work on Existing Cut Slope Reinforced with Counterweight Fill and Stabilizing Piles (압성토 및 억지말뚝으로 보강된 도로의 확장공사로 인한 추가 보강사례 연구)

  • Park, Jeong-Yong;Kim, Woo-Seong;Kim, Jae-Kyoung;Yang, Tae-Sun;Na, Kyung-Joon
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.2
    • /
    • pp.67-72
    • /
    • 2008
  • To confirm the stability of a cut slope in the road extension construction site, several investigations were carried out and countermeasures of slope was studied. This paper describes a study of design case of extra reinforcement on existing cut slope reinforced by preloading and piles in roads. To investigate the effect of stabilizing piles installed in a cut slope, an instrumentation system also designed, was. As a result that the stabilizing file and earth anchor are considered as the extra reinforcement, both stabilizing pile and earth anchor guarantee the stability of cut slope. However, stabilizing pile is selected in aspects of economy and continuity to the existing cut slop reinforcement including counterweight fill and stabilizing piles.

  • PDF