• Title/Summary/Keyword: international security

Search Result 3,109, Processing Time 0.03 seconds

Examining the Influencing Factors of Third-Party Mobile Payment Adoption: A Comparative Study of Alipay and WeChat Pay

  • Mu, Hong-Lei;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.247-284
    • /
    • 2017
  • Purpose The first purpose of this study is to investigate factors that are likely to influence user's intention to adopt third-party mobile payment platform. A comprehensive study about mobile payment services have used various variables to explain user's use intention based on the theory of reasoned action (TRA) or the theory of planned behavior (TPB). Variables such as simplicity, security, costs, relative advantage, individual mobility, subjective norm, trust, satisfaction, attitude towards use, perceived usefulness, perceived ease of use and so on. Among these factors, we expect to find out the most influential factors effecting user's use intention of the third-party mobile payment services. Second, we also examine whether the most influential factors have the same influence to different third-party mobile payment services by conducting comparative study of Alipay and WeChat Pay. Design/methodology/approach Empirical data for this study were collected from Chinese who has the experience using or have used Alipay or WeChat Pay. Participants needed to be familiar with Alipay or WeChat Pay because such users may be more aware of both the advantages and disadvantages of Alipay and WeChat Pay. We conduct a pilot test using Smart PLS 2.0, which includes 50 Alipay users and 82 WeChat Pay users. The result indicates that all the measurement fit for the context. And then 980 questionnaires were mainly sent out to the college students and the e-mails users randomly. To encourage participation, we give the participants a small gift as a present. Finally, we received a total of 683 replied. Data from respondents who gave incomplete or invalid answers were excluded to assure the validity of the constructs. 79 questionnaires were rejected, finally the valid data are 604 (with 372 Alipay users and 232 WeChat Pay users). Findings The results suggest that users' intention is determined by their trust on third-party mobile payment service and perceived usefulness of use. Comparative study results also indicated that the factors have different influence on Alipay group and WeChat Pay group, which offers a new aspect for academic field, and provides useful information to mobile payment service providers in China.

Low Power Implementation of Integrated Cryptographic Engine for Smart Cards (스마트카드 적용을 위한 저전력 통합 암호화 엔진의 설계)

  • Kim, Yong-Hee;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.6
    • /
    • pp.80-88
    • /
    • 2008
  • In this paper, the block cipher algorithms, 3-DES(Triple Data Encryption Standard), AES(Advanced Encryption Standard), SEED, HASH(SHA-1), which are domestic and international standards, have been implemented as an integrated cryptographic engine for smart card applications. For small area and low power design which are essential requirements for portable devices, arithmetic resources are shared for iteration steps in each algorithm, and a two-level clock gating technique was used to reduce the dynamic power consumption. The integrated cryptographic engine was verified with ALTERA Excalbur EPXA10F1020C device, requiring 7,729 LEs(Logic Elements) and 512 Bytes ROM, and its maximum clock speed was 24.83 MHz. When designed by using Samsung 0.18 um STD130 standard cell library, the engine consisted of 44,452 gates and had up to 50 MHz operation clock speed. It was estimated to consume 2.96 mW, 3.03 mW, 2.63 mW, 7.06 mW power at 3-DES, AES, SEED, SHA-1 modes respectively when operating at 25 MHz clock. We found that it has better area-power optimized structure than other existing designs for smart cards and various embedded security systems.

A Study on Policy Making for e-Navigation from the Viewpoint of a Maritime Digital Communication Network (e-Navigation을 위한 해상디지털통신 구축에 관한 정책 연구)

  • Lim, Hyuntaek;Cho, Yong-Gab
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.679-685
    • /
    • 2018
  • In order to reduce marine accidents using advanced information and communication technology, various research and development projects are conducted globally on e-Navigation related technologies and services. Existing studies do not provide policy measures for LTE-M. In order for these technologies and services to be installed on vessels and to contribute to the prevention of accidents at sea, the law should be expand operational organizations and systems. In particular, communication equipment and related technical standards should be prepared, and its digital communication technology (LTE-M, VDES, Digital-MF / HF, etc.) In this study, we conducted short, medium, and long term performance assessment of the identification system and the policy for effective implementation of Korean e-Navigation. We presented a visible plan of the relevant policy. For example, e-Navigation core services, e-Navigation communication networks and operating systems, e-Navigation international standard leading technologies and e-navigation services activated in the field. To do this, we conducted research based on the progress data of the Korean e-Navigation project, which was led by the Ministry of Maritime Affairs and Fisheries, and conducted research discussions with practitioners and experts in related fields. As a result of this study, it is expected that the proposed policies will contribute to the reduction of marine accidents, the promotion of the maritime industry and the development of additional government policies for national security.

A Study on the Application of Cross-Certification Technology for the Automatic Authentication of Charging Users in ISO 15118 Standard (ISO 15118 충전 사용자 자동인증을 위한 교차인증서 기술의 적용에 관한 연구)

  • Lee, Sujeong;Shin, Minho;Jang, Hyuk-soo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • ISO 15118 is an international standard that defines communication between electric vehicles and electric vehicle chargers. Plug & Charge (PnC) was also defined as a technology to automatically authenticate users when using charging services. PnC indicates automatic authentication technology where all processes such as electric vehicle user authentication, charging and billing are automatically processed. According to the standard, certificates for chargers and CPSs (Certificate Provisioning Services) should be under the V2G (Vehicle to Grid) Root certificate. In Korea, the utility company operates its own PKI (Public Key Infrastructure), making it difficult to provide chargers under the V2G Root Certificate. Therefore, a method that can be authenticated is necessary even when you have different Root Certificates. This paper proposes to apply cross-certificate technology to PnC authentication. Automatic authentication of Cross Certification is to issue a cross-certificate of the Root CA and include it in the certificate chain to proceed with automatic authentication, even if you have different Root certificates. Applying cross-certificate technology enables verification of certificates under other Root certificates. In this paper, the PnC automatic authentication and cross certificate automatic authentication is implemented, so as to proceed with proof of concept proving that both methods are available. Define development requirements, certificate profiles, and user authentication sequences, and implement and execute them accordingly. This experiment confirms that two automatic authentication are practicable, especially the scalability of automatic authentication using cross-certificate PnC.

Plant Immunity against Viruses: Moving from the Lab to the Field (식물바이러스 면역반응 최신 연구 동향 및 전망)

  • Kim, Nam-Yeon;Hong, Jin-Sung;Jeong, Rae-Dong
    • Research in Plant Disease
    • /
    • v.24 no.1
    • /
    • pp.9-25
    • /
    • 2018
  • Plant viruses cause significant yield losses and continuously threaten crop production, representing a serious threat to global food security. Studies on plant-virus interactions have contributed to increase our knowledge on plant immunity mechanism, providing new strategies for crop improvement. The prophylactic managements consist mainly following international legislations, eradication of infected plants, and application of pesticide to decrease the population of vectors. Hence, putting together the pieces of knowledge related to molecular plant immunity to viruses is critical for the control of virus disease in fields. Over the last several decades, the outstanding outcomes of extensive research have been achieved on comprehension of plant immunity to viruses. Although most dominant R genes have been used as natural resistance genes, recessive resistance genes have been deployed in several crops as another efficient strategy to control viruses. In addition, RNA interference also regulates plant immunity and contribute a very efficient antiviral system at the nucleic acid level. This review aims at describing virus disease on crops and summarizes current resistance mechanisms. Furthermore, we will discuss the current biotechnological approaches to control viral diseases and the future questions that are to be addressed to secure crop production against viruses.

Groping for Cooperative Space Activities in the Northeast Asia (동북아시아에서의 우주협력의 모색)

  • Rhee, Sang-Myon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • no.spc
    • /
    • pp.59-86
    • /
    • 2007
  • The purpose of this paper is to suggest to tackle the problem of poor cooperation in space activities, by re-examining the nature of the competitive political environment, and by building up a normative overarching framework, One of the most acute problems that hampers regional cooperation is the U.S. influence as represented in the MTCR, a supplier's cartel, as was evidenced in the ill-fate of the 2001 launch contract between China and Korea the next year. Notably China, the third space power in the world, has not been allowed to join the MTCR despite her application in June 2004. A possible reconciliation between China and the MTCR over her application for a partnership would set a cornerstone in building up a cooperative environment in the Northeast Asia. Just as the Helsinki process was an overarching norm building framework, comprising human rights, security and environmental issues, it would be desirable that a future peace framework in Northeast Asia dealing with the pending issues of Korean peninsula should also comprise of such broad issues as one relating to cooperation in space activities in the region. South Korea could tap expertise from her neighbor China. When South Korea become an independent space power either with her own technology or otherwise, she would be in a better position to play a role as a balancer in coordinating between the two neighboring space giants. It is remarkable that the Japanese led APRSAT has contributed much in establishing Sentinel Asia as a part of the Disaster Management Scheme, in that each participant, whether it be a state agency, or a private entity like a university or a research institute, can tap the common data to contribute to the common good of safety.

  • PDF

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

The Attitude of the Korean Television Drama in Mongolia Market Impact Korea Country Image, Corporate and Product's Image Formation (몽골 시장에서 한국 드라마에 대한 태도가 한국 국가 이미지, 기업 및 제품 이미지 형성에 미치는 영향 연구)

  • Odmandakh, Batsukh;Lee, Kee-Sung;Jin, Chang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.223-232
    • /
    • 2016
  • The purpose of the study is to explore the attitude of the Korean television drama in mongolia market impact Korea country image, corporate and product's image formation. The research is conducted effects of Korean image, its company, product and belief of its product and influence of procurement of Korean products in Mongolia in terms of Mongolian has enormously watched Korean drama since latest of 1990. Korean drama can influence Korean products image. Watching Kore and rama can influence view of Mongolian in quality of Korean products, design etc. Korean dramas can affect images of Korean company. Watching Korean drama can influence opinion of Mongolian in staff, culture, level of technique of Korean company moreover, competitiveness of Korean company in international market and etc. Korean drama can influence Korean image. Watching Korean drama can reach aspect of Mongolian in Korean education level, national security, reconstruction and income of population and etc. The most effective factor in product reliability and procurement was country image but company image can not influence that. In conclusion according to survey result within Mongolian customers that Korean drama has some influence in Korean image, its company image, product image, and product reliability and procurement of Korean product.

A Study of Partial Preview Control Method of ePUB-based eBook DRM (ePUB 기반 전자책 DRM의 부분열람 제어 방법에 관한 연구)

  • Kim, Eun-Bum;Kim, Kyung-Il;Kim, Tae-Hyun;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.249-256
    • /
    • 2012
  • ePUB is one of the most pervasive eBook formats since it was announced as a 2009 standard in IDPF(International Digital Publishing Forum). ePUB is compressed as a ZIP Archive format and structured as a standard format of OCF. Domestically and internationally, eBook services applying DRM into ePUB have currently been active, while it does not satisfy various needs from business because it does not support preview service which is due to the encryption of the whole ePUB as a single key. This study suggests a way to apply diverse business models by providing eBook content based on ePUB multiple key encryption method, not by encrypting it simply as a single key. The encryption method which applies a multiple key encryption method is suggested as a practically appliable form together with licence issuing and delivery method and decryption method in eBook readers. The multiple key encryption method suggested in this study will make it possible to support partial preview services of ePUB based eBook content. It will be applied to diverse service models and enhance the security level better then single key based encryption method.