• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.036 seconds

Consumer Acceptance Intention on Block Chain Consensus Mechanismbased Payment System (블록체인 기반 결제시스템에 대한 관광 소비자 수용의도)

  • Jae-Hyun Kwak
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.27-47
    • /
    • 2019
  • The purpose of this study is to propose a conceptual model for the tourism application of the block chain consensus construct and to test the intention of technology acceptance of potential consumers. First, we have tried to investigate the security, reliability, functionality was derived. Secondary, structural validation of the proposed model confirmed the factors influencing the acceptance of block chain technology in terms of consumers. Based on this, we apply the Unified Theory of Acceptance and Use of Technology to evaluate. Individual innovation and block-chain technology have a strong causal relationship with the proposed block chain acceptance intentions based on the Hybrid Block Chain Consensus system, which shows strong innovation and strong cognitive status. In addition, the factors directly affecting the acceptance of block-chain are the benefits expected from the block chain, the technical infrastructure required to use the service, the perceived benefits available. The influence of the surrounding environment on the adoption of technology and ease of use on new technology did not affect the acceptance intention significantly.

Input Certification protocol for Secure Computation

  • Myoungin Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.103-112
    • /
    • 2024
  • This study was initiated with the aim of authenticating that inputs have not been tampered with without disclosing them in the case of computations where multiple inputs are entered by participants using the same key. In general, in the authentication stage, authentication is performed after the input value is disclosed, but we do not want to reveal the inputs until the end. This is a case of deviating from the traditional security model in which malicious participants exist in cryptography, but it is a malicious attack method that can actually occur enough. Privacy infringement or distortion of calculation results can occur due to malicious manipulation of input values. To prevent this, this study studied a method that can authenticate that the message is not a modified message without disclosing the message using the signature system, zero-knowledge proof, and commitment scheme. In particular, by modifying the ElGamal signature system and combining it with the commitment scheme and zero-knowledge proof, we designed and proved a verification protocol that the input data is not a modified data, and the efficiency was improved by applying batch verification between authentication.

Real-time Dog Behavior Analysis and Care System Using Sensor Module and Artificial Neural Network (센서 모듈과 인공신경망을 활용한 실시간 반려견 행동 분석 및 케어 시스템)

  • Hee Rae Lee;Seon Gyeong Kim;Hyung Gyu Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.4
    • /
    • pp.35-42
    • /
    • 2024
  • In this study, we propose a method for real-time recognition and analysis of dog behavior using a motion sensor and deep learning techonology. The existing home CCTV (Closed-Circuit Television) that recognizes dog behavior has privacy and security issues, so there is a need for new technologies to overcome them. In this paper, we propose a system that can analyze and care for a dog's behavior based on the data measured by the motion sensor. The study compares the MLP (Multi-Layer Perceptron) and CNN (Convolutional Neural Network) models to find the optimal model for dog behavior analysis, and the final model, which has an accuracy of about 82.19%, is selected. The model is lightened to confirm its potential for use in embedded environments.

A 2D / 3D Map Modeling of Indoor Environment (실내환경에서의 2 차원/ 3 차원 Map Modeling 제작기법)

  • Jo, Sang-Woo;Park, Jin-Woo;Kwon, Yong-Moo;Ahn, Sang-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.355-361
    • /
    • 2006
  • In large scale environments like airport, museum, large warehouse and department store, autonomous mobile robots will play an important role in security and surveillance tasks. Robotic security guards will give the surveyed information of large scale environments and communicate with human operator with that kind of data such as if there is an object or not and a window is open. Both for visualization of information and as human machine interface for remote control, a 3D model can give much more useful information than the typical 2D maps used in many robotic applications today. It is easier to understandable and makes user feel like being in a location of robot so that user could interact with robot more naturally in a remote circumstance and see structures such as windows and doors that cannot be seen in a 2D model. In this paper we present our simple and easy to use method to obtain a 3D textured model. For expression of reality, we need to integrate the 3D models and real scenes. Most of other cases of 3D modeling method consist of two data acquisition devices. One for getting a 3D model and another for obtaining realistic textures. In this case, the former device would be 2D laser range-finder and the latter device would be common camera. Our algorithm consists of building a measurement-based 2D metric map which is acquired by laser range-finder, texture acquisition/stitching and texture-mapping to corresponding 3D model. The algorithm is implemented with laser sensor for obtaining 2D/3D metric map and two cameras for gathering texture. Our geometric 3D model consists of planes that model the floor and walls. The geometry of the planes is extracted from the 2D metric map data. Textures for the floor and walls are generated from the images captured by two 1394 cameras which have wide Field of View angle. Image stitching and image cutting process is used to generate textured images for corresponding with a 3D model. The algorithm is applied to 2 cases which are corridor and space that has the four wall like room of building. The generated 3D map model of indoor environment is shown with VRML format and can be viewed in a web browser with a VRML plug-in. The proposed algorithm can be applied to 3D model-based remote surveillance system through WWW.

  • PDF

The Genealogical Study on SWIFTNet Trade Service Utility and Bank Payment Obligation (SWIFTNet TSU BPO의 계보학적 연구)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.3-21
    • /
    • 2016
  • The thesis examines genealogical study of various aspects to overcome lots of problems which come by when we execute SWIFTNet TSU BPO. Practical implications regarding the innovation of electronic trade infrastructure are as follows. First, the shipping documents in the SWIFTNet TSU BPO are directly sent to an importer by an exporter after the baseline is confirmed. With this process itself, therefore, the bank cannot secure the account receivable. When initiating the SWIFTNet TSU BPO deal, it is needed to set regulations on the bank's account receivable security in the contract. Second, the SWIFTNet TSU BPO should also have an institutionally unified sharing platform with security, stability and convenience. It other words, it is needed to develop services which meet e-payment paradigm and international environments through continued analysis on market changes and flow. Third, the SWIFTNet TSU is useful in terms of promptness, reduction of risk in foreign exchange payment, cost reduction. Therefore, the SWIFT should be perfectly united and linked among the banks, importer and exporter to make the SWIFTNet TSU more convenient in countries around the world. Fourth, the SWIFT should be approached from the aspect of expansion of network and creation of a new business model through analysis on these problems with a worldwide perspective. At the same time, it is necessary to build a cooperative system to share information and promote comprehensive management for efficient operation.

  • PDF

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

A Comparative Study on Each Nation's Counter terrorism Organization and Function (각국의 테러대응 조직과 기능의 비교 연구)

  • Kwon, Jeong-Hoon;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.45-69
    • /
    • 2009
  • This study is to present effective and rational strategies by comparing and analyzing plans of some nations such as the United States, Britain, Germany and Japan against terrorism. Nations mentioned above have made alliance to prevent the possible terrorism after 9.11 attack and performed various tasks efficiently. The result of this study is summarized as follows. First, it is required that there should be an integrated system which works properly. Each nation has not distinguished natural disaster from man-made one based on the damage and the abilities of authorities to deal with. On the other hand, South Korea tells two disasters according to causes and runs distributed systems in which each government division performs its duties to manage each disaster. Accordingly, in economic terms, it is much more effective to provide integrated counter terrorism, not distributed one. Second, information sharing must be stimulated. To take actions quickly when an accident occurs, the government needs to have united and integrative systems, which make it prepare for various types of terrorism well. In addition, it is necessary for a government-related organization to tie up with other channels for collecting, analyzing and sharing information. For this, integrative systems for terrorism should be taken into consideration.

  • PDF

A Study on the Management System of Bioterrorism by the Phases of Crisis Management (위기관리단계별 생물테러 관리체계에 관한 연구)

  • Kim, Chang-Ho;Lee, Kwang-Lyeol
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.113-144
    • /
    • 2007
  • The entire world has lived in terror threatened by new-terrorism since the 9.11 terror. Having appeared since 9.11, new-terrorism is new kind of terror targeting victims at random. Bioterrorism is one good example. Since bioterrorism happens secretly, it's hard to identify. The case becomes even harder to detect if it takes the form of a new epidemic. This study set out to apply the four phases of crisis management regarding outbreak and measures of SARS, the latest new epidemic, and to prepare against bioterrorism taking the form of a new epidemic, It also shows the efforts to study what to prepare and what kind of actions to take in case of bioterrorism by applying the four phases. There results demonstrate that the preventive measures against bioterrorism include arranging terror-related laws and identifying and monitoring expected pathogenic organs. In the preparation phases, they should integrate the related agencies, prepare for the standard operating procedures(SOP), execute integrated training sessions among the related agencies, and secure the necessary resources such as vaccine, cures, and exploration devices. In the response phases, they need to set up a rapid diagnosis system, quarantine and then cure the patients, and pursue cooperation from the media and promotions and further an international cooperation system to take appropriate measures. And the final recovery phases should involve offering emergency support by checking the situations and engaging in activities to prevent another terror attack by providing counseling, exchanging information, and analyzing and evaluating the causes.

  • PDF

The Role of Innovative Activities in Training Students Using Computer Technologies

  • Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.105-112
    • /
    • 2022
  • Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth.

An Improvement Study on the Hydrological Quantitative Precipitation Forecast (HQPF) for Rainfall Impact Forecasting (호우 영향예보를 위한 수문학적 정량강우예측(HQPF) 개선 연구)

  • Yoon Hu Shin;Sung Min Kim;Yong Keun Jee;Young-Mi Lee;Byung-Sik Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.87-98
    • /
    • 2022
  • In recent years, frequent localized heavy rainfalls, which have a lot of rainfall in a short period of time, have been increasingly causing flooding damages. To prevent damage caused by localized heavy rainfalls, Hydrological Quantitative Precipitation Forecast (HQPF) was developed using the Local ENsemble prediction System (LENS) provided by the Korea Meteorological Administration (KMA) and Machine Learning and Probability Matching (PM) techniques using Digital forecast data. HQPF is produced as information on the impact of heavy rainfall to prepare for flooding damage caused by localized heavy rainfalls, but there is a tendency to overestimate the low rainfall intensity. In this study, we improved HQPF by expanding the period of machine learning data, analyzing ensemble techniques, and changing the process of Probability Matching (PM) techniques to improve predictive accuracy and over-predictive propensity of HQPF. In order to evaluate the predictive performance of the improved HQPF, we performed the predictive performance verification on heavy rainfall cases caused by the Changma front from August 27, 2021 to September 3, 2021. We found that the improved HQPF showed a significantly improved prediction accuracy for rainfall below 10 mm, as well as the over-prediction tendency, such as predicting the likelihood of occurrence and rainfall area similar to observation.