• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.038 seconds

FinTech in Saudi Arabia: A User Experience Aanalysis of FinTech Platforms

  • Abdulhadi M. Eidaroos
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.177-185
    • /
    • 2023
  • The global FinTech industry has experienced significant growth, with key projects developing the financial sector. In Saudi Arabia, startups have used technology to offer FinTech services. In this area, it is important to investigate the usability of platforms that offer FinTech services. This research aims to examine the usability of samples of Saudi FinTech websites and identify design issues impacting user experience. Usability testing was conducted on the websites of two FinTech firms identified design issues, including navigation problems on the homepage and a lack of transparency in displaying investment details, negatively impacting end users. Employing usability methods can assist in enhancing the development of FinTech platforms and addressing these issues. This study contributes to a deeper understanding of FinTech usability problems and the user experience, enabling advancements in the industry.

Power Consumption Analysis for Security attack in TPM

  • Kennedy, Grace;Cho, Dong-Sub
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.917-919
    • /
    • 2011
  • Recently, most network communication chips are powered; which causes power consumption a heavily constraint. Since, there are a lot of expectations on TPM to have a high performance in terms of authentication of its device. During the design process there is a need to estimate the security of the design but it always when the chip has already been manufactured. This paper designed a power consumption control monitor in TPM device which evaluate the voltage drop during processing of use. Therefore we will analyze the power consumption profile. The result shows that the voltage drop leads to vulnerability of the system to attackers during communication process.

A Study on Blockchain-Based Asynchronous Federated Learning Framework

  • Qian, Zhuohao;Latt, Cho Nwe Zin;Kang, Sung-Won;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2022.05a
    • /
    • pp.272-275
    • /
    • 2022
  • The federated learning can be utilized in conjunction with the blockchain technology to provide good privacy protection and reward distribution mechanism in the field of intelligent IOT in edge computing scenarios. Nonetheless, the synchronous federated learning ignores the waiting delay due to the heterogeneity of edge devices (different computing power, communication bandwidth, and dataset size). Moreover, the potential of smart contracts was not fully explored to do some flexible design. This paper investigates the fusion application based on the FLchain, which is the combination of asynchronous federated learning and blockchain, discusses the communication optimization, and explores the feasible design of smart contract to solve some problems.

Design and Optimization of Four Element Triangular Dielectric Resonator Antenna using PSO Algorithm for Wireless Applications

  • Dasi swathi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.67-72
    • /
    • 2023
  • This paper portrays the design and optimization of a wideband four element triangular dielectric resonator antenna (TDRA) using PSO. The proposed antenna's radiation characteristics were extracted using Ansoft HFSS software. At a resonant frequency of 5-7 GHz, the four element antenna provides nearly 21 percent bandwidth and the optimized gives 5.82 dBi peak gain. The radiation patterns symmetry and uniformity are maintained throughout the operating bandwidth. for WLAN (IEEE 802.16) and WiMAX applications, the proposed antenna exhibits a consistent symmetric monopole type radiation pattern with low cross polarisation. The proposed antenna's performance was compared to that of other dielectric resonator antenna (DRA) shapes, and it was discovered that the TDRA uses a lot less radiation area to provide better performance than other DRA shapes and PSO optimized antenna increases the gain of the antenna

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

Effect of Health and Beauty Store App Service Quality on Customer Satisfaction

  • Kyu-dong Kim;Jeong-lae Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.456-463
    • /
    • 2023
  • We conducted this study to identify the components of H&B store app service quality and their effect on customer satisfaction. The survey was conducted through an online survey for teenagers or older with experience in using H&B store app. A total of 330 copies were distributed and a total of 282 copies were used for the final analysis. The results of this study are summarized as follows: First, eight factors such as ease of use & design, fulfillment, playfulness, responsiveness, personalization, security, contextual usefulness, interactivity were derived as service quality components of H&B store app. Second, as a result of regression analysis, the six service quality components, such as 'ease of use & design', 'fulfillment', 'playfulness', 'responsiveness', 'security', and 'interactivity' were found to have a significant positive (+) effect on customer satisfaction (p<0.05) and 'playfulness (β=.372)' had the greatest effect on customer satisfaction. Based on the results of this study, we should strive to establish effective marketing strategies in the H&B industry.

Design Guidelines of Convergent Education Environment Based on Design Thinking through STEAM Theory

  • Kim, Sunyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.56-63
    • /
    • 2023
  • I proposed the architectural guideline for educational environment based on design thinking approach to integrate and enhance learners' activities and achievements. The physical environment of design education learning space should be applied by teaching methods and learning activities, especially for STEAM-based convergent education, the architectural space conditions should support the design process based on design thinking. The learning environment conditions influence design education with physical design factors and learners' communication, and the flexible environment based on design thinking, which is crucial for design education. The 3 steps of design thinking experiences also allow students to learn the context of ideas, skills and outcomes. Therefore, I argued that the learning surrounding based on design thinking needs flexible and mobile, connected, integrated, organized, and team-focused environments to support learners' understanding, participation, and collaboration, and to achieve the design process based on research findings. For spaces for convergent learning environments based on design thinking, common design principles should be reviewed, such as coexistence with technology, safety and security, transparency and spatial extension, multi-purpose space and outdoor learning.

Design and Implementation of the Security System using RFID and Biometric Information (RFID 및 생체정보를 이용한 보안시스템의 설계 및 구현)

  • Choi, Jae-Kwan;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.251-256
    • /
    • 2010
  • In times past, simple numeric password was the commonly used method in security system. For complement this method, the security system using biometric information is appeared. But it usually uses the scheme to utilize portion of biometric information, and has limited application fields. This biometric security system has low reliability because of some problems such as steal, robbery, and so on. Furthermore, it is associated secondary crime as leaking personal information. For this reason new security system using the unique individual biometric is required. In this paper, we propose the security scheme which used face image and iris analysis. While face image processing for specific person identification, it calculate some feature points of face image and iris's features in our proposed scheme. After person identification applying RFID tags in doorway, several feature information is extracted from camera image, and these compare with registered information of our system for final identification.

A Study on the Consultation for Technology Leakage Victim Using NLP

  • KANG, In-Seok;LIM, Heon-Wook
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.33-39
    • /
    • 2020
  • Purpose: The purpose of this study is that victims of technology leaks and people concerned about leaks complain of stress over security concerns. However, there are no psychological treatments among the government's comprehensive plans to prevent technology leaks. Therefore, the government intends to present education methods using the NLP (Neuro Linguistic Program), a collective counseling technique, to heal the psychological injury of the victims. Psychological counseling methods include cognitive behavioral therapy, psychoanalytic behavioral therapy, humanism therapy, art therapy, and other psychological therapies. Among them, NLP (Neuro Linguistic Programming) method was used. NLP has three concepts: neuron, language, and programming, and is used as a general method for group counseling. Research design, data and methodology: In relation to composition, Chapter 1 explained the purpose and necessity of the study, Chapter 2 explained the types of psychological counseling and NLPs to help understand the study, introduced the prior study related to the development of collective counseling programs through NLP, and Chapter 3 developed a security psychological counseling education program. In addition, FGI(Focus Group Interview) was conducted for professionals. Results: Corporate counseling considered most in this study should satisfy client, counselor and manager differently from individual counseling. For this purpose, the result was composed of 11 times. In order to derive personal problems for clients, they consisted of finding, loving, expressing, and emancipating self. And, It solved the leakage anxiety to suggest a professional solution for the counselor. In addition, this course helps them become familiar with counseling techniques for becoming a good security administrator. Lastly, it was configured to leave the result for the manager to suggest the organizational development method through this training. The implication of this study is to derive psychological counseling methods for security officers. Most companies in the field of security counseling complain about technology leakage stress. There is currently no psychotherapy support project under the policy. And It was developed because it can expect sales improvement from security consultation. Conclusions: In conclusion, the results were organized to be left to the manager so that he could suggest how to develop the organization through this time.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.