• Title/Summary/Keyword: internet finance

Search Result 187, Processing Time 0.029 seconds

Integrated OTP Authentication and Security Analysis (OTP 통합인증과 안전성 분석)

  • Kim, In-Seok;Kang, Hyung-Woo;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.101-107
    • /
    • 2007
  • In recent years, electronic financial services, such as internet banking, come into wide use since the personal computer and network technology have made reasonably good progress. The growth of electronic financial service contributes to promoting the business efficiency of financial institution and promoting the convenience of financial customer, while the security on electronic financial service is getting more important because it is not face-to-face financial service. Therefore, the financial sector had decided to introduce the OTP (One Time Password) in order to authenticate the identification of customer and has built the Integrated OTP Authentication Center for a customer being able to use only one OTP token in electronic financial transaction with several financial institution. In this paper, we introduce the business of Integrated OTP Authentication Center and present the security analysis on integrated OPT authentication service, which is the main function of Integrated OTP Authentication Center.

  • PDF

Content Distribution Strategy Analysis of Regional Broadcasting Companies: Based on MBCNET (지역방송의 뉴미디어 유통전략 분석 :MBCNET 사례를 중심으로)

  • Kim, Jongha Bell
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.636-643
    • /
    • 2013
  • The current media and content situation is increasingly more competitive and under the radical environment changes, the social & financial position of regional broadcasting companies has been threatened. The internet & mobile based platforms and smart media, however, bring a new opportunity of content distribution. This study analyzes the current status of MBCNET which is the superstation of regional MBC stations and specialists interviews to develop the content distribution strategies of regional broadcasting companies. According to the following: finance, ratings, and new media distribution analysis, the MBCNET outcome is deemed successful based on the content library and regional power. MBCNET utilized opportunity to develop strong content resources and distribution power. In order to maintain its competitive edge, MBCNET needs to adopt the following strategies: content and platform marketing power, research & development of competitive content based on user behavior analysis, and reorganization that is able to counteract N-screen circumstances.

XML Digital signature System based on Mobile Environment (모바일 환경에서의 XML 문서 디지털 서명 시스템)

  • Hao, Ri-Ming;Hong, Xian-Yu;Lee, Seong-Hyun;Lee, Jae-Seung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.701-704
    • /
    • 2007
  • Recently, More and more consumer enjoy the finance service such as settling, account transferring, stocks investment, and so via mobile device. In the mobile environment, data transferring between the devices is formatted as XML. However, the common XML file is exposed to the attack such as hacking and malignity code, to satisfy security of mobile environment is very difficult. The problem is more seriously at the open platform such as WIPI that is developed by our country. So there is enough reason to propose one system to protect the import data. In this paper, we development the system to digital signature and signature the XML document in order to protect data, and the system is observing the recommendation of the XML Signature Syntax and Processing by W3C. When designing and composition the system, we use the digital signature algorithm RSA, DSA, KCDSA, and HMAC, etc. we test the system at the open WIPI platform.

  • PDF

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

A Design of Smart Banking System using Digital Signature based on Biometric Authentication (바이오인증 기반의 전자서명을 이용한 스마트 뱅킹 시스템 설계)

  • Kim, Jae-Woo;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6282-6289
    • /
    • 2015
  • Today, there is an increasing number of cases in which certificate information is leak, and accordingly, electronic finance frauds are prevailing. As certificate and private key a file-based medium, are easily accessible and duplicated, they are vulnerable to information leaking crimes by cyber-attack using malignant codes such as pharming, phishing and smishing. Therefore, the use of security token and storage toke' has been encouraged as they are much safer medium, but the actual users are only minimal due to the reasons such as the risk of loss, high costs and so on. This thesis, in an effort to solve above-mentioned problems and to complement the shortcomings, proposes a system in which digital signature for Internet banking can be made with a simply bio-authentication process. In conclusion, it was found that the newly proposed system showed a better capability in handling financial transitions in terms of safety and convenience.

Determinants of Accessibility to Fintech Lending: A Case Study of Micro and Small Enterprises (MSEs) in Indonesia

  • SAPTIA, Yeni;NUGROHO, Agus Eko;SOEKARNI, Muhammad;ERMAWATI, Tuti;SYAMSULBAHRI, Darwin;ASTUTY, Ernany Dwi;SUARDI, Ikval;YULIANA, Retno Rizki Dini
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.10
    • /
    • pp.129-138
    • /
    • 2021
  • Several studies have revealed that information on borrower characteristics plays an important factor in approving their credit requests. Though the extent to which such characteritics are also applicable to the case of fintech lending remain uncertain. The aim of this study is, thus, to investigate the determinant factors that influence MSEs in obtaining credit through fintech lending. Here, we emphasize virtual trust in fintech lending encompasing the dimension of social network, economic attributes, and risk perception based on several indicators that are used as proxies. Primary data used in the study was gathered from an online survey to the respondents of MSEs in Java. The result of the study indicates that determinants of MSEs in obtaining credit from lender through fintech lending are statistically influenced by internet usage activities, borrowing history, loan utilization, annuity payment system, completeness of credit requirement documents and compatibility of loan size with the business need. These factors have a significant effect on credit approval because they can generate virtual trust of fintech lender to MSEs as potential borrowers. It concludes that the probability of obtaining fintech loans in accordance with their expectations are influenced by the dimensions of social network, economic attributes and risk perception.

A Study on the Polarity of Apartment Price News Using Big Data Analysis Method (빅데이터 분석기법을 활용한 아파트 가격 관련 뉴스 기사의 극성 분석)

  • Cho, Sang-Yeon;Hong, Eun-Pyo
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.47-54
    • /
    • 2019
  • This study confirms the polarity of news articles on apartment prices using Opinion Mining which has widely been used for a big data analysis. The analyses were carried out utilizing internet news articles posted on the Naver for two years: 2012 and 2018. We proposed a sentiment analysis model and modeled a topic-oriented sentiment dictionary construction methods. As a result of analyzing the proposed sentiment analysis model, it was confirmed that there was a difference according to the tendency of the media companies in selecting social issues at the time of rising apartment prices. At the same time, we were able to find more affirmative articles in the media companies which share similar sentiment with the government in charge. In this paper, we proposed a sentiment analysis model that can be used in real estate field and analyzed the polarity of unformatted data related to real estate. In order to integrate them into various fields in the future, it is necessary to build the sentiment dictionaries by themes, as well as to collect various unformatted data over extended periods.

Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items (평가항목 제안 및 분석을 통한 블록체인 분산합의 알고리즘 성능 개선)

  • Kim, Do Gyun;Choi, Jin Young;Kim, Kiyoung;Oh, Jintae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.179-188
    • /
    • 2018
  • Recently, blockchain technology has been recognized as one of the most important issues for the 4th Industrial Revolution which can be represented by Artificial Intelligence and Internet of Things. Cryptocurrency, named Bitcoin, was the first successful implementation of blockchain, and it triggered the emergence of various cryptocurrencies. In addition, blockchain technology has been applied to various applications such as finance, healthcare, manufacturing, logistics as well as public services. Distributed consensus algorithm is an essential component in blockchain, and it enables all nodes belonging to blockchain network to make an agreement, which means all nodes have the same information. For example, Bitcoin uses a consensus algorithm called Proof-of-Work (PoW) that gives possession of block generation based on the computational volume committed by nodes. However, energy consumption for block generation in PoW has drastically increased due to the growth of computational performance to prove the possession of block. Although many other distributed consensus algorithms including Proof-of-Stake are suggested, they have their own advantages and limitations, and new research works should be proposed to overcome these limitations. For doing this, above all things, we need to establish an evaluation method existing distributed consensus algorithms. Based on this motivation, in this work, we suggest and analyze assessment items by classifying them as efficiency and safety perspectives for investigating existing distributed consensus algorithms. Furthermore, we suggest new assessment criteria and their implementation methods, which can be used for a baseline for improving performance of existing distributed consensus algorithms and designing new consensus algorithm in future.

Information Technologies of Accounting and Analysis in Modern Companies

  • Yaremenko, Liudmyla;Hevchuk, Anna;Vuzh, Tetiana;Vashchilina, Elena;Yermolaieva, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.151-159
    • /
    • 2021
  • This article addresses the issue of finding optimal solutions using the information technologies of accounting and analysis in modern companies. The aim of the study is to reveal available information technologies for the needs of small, medium and large businesses operating in modern conditions. This goal is achieved by using systematization, comparison, and analysis of information, obtained under the survey and open management statistics. For the first time, the paper systematizes up-to-date information of 2021 about the most popular programs, online services, platforms and cloud services that are used to improve accounting and analytical processes in enterprises of various sizes. The main global trends in software development in terms of COVID-19 pandemic have been identified. In particular, the study defines the countries that occupy the leading positions in the informatization of business processes. An attempt was made to classify information technologies by their use by various volume of businesses. The analysis of research results of the Internet search query frequency regarding the use of information technologies enabled to determine the most popular software products worldwide. The peculiarities of information technologies, their advantages and disadvantages were examined and the common and distinctive features were compared. It was determined that for the new enterprises to implement information technologies, it is necessary to conduct a step-by-step study of all available software products. The software evaluation algorithm was described to help select the optimal software for the specific business processes. The paper also describes the way to solve the problem of using accounting and analysis software for the businesses of a specific kind of activity.

An Evaluation Management System Using Blockchain

  • Lee, Su-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.229-235
    • /
    • 2021
  • Blockchain, recognized as one of the core technologies of the 4th industrial revolution, is an Internet-based distributed data management system which does not require centralized control. Blockchain is characterized by the integrity and reliability of information, and blockchains can be used where such characteristics are required. Typical applications of blockchain include finance, transaction, and evaluation management. In this paper, we designed a blockchain-based evaluation management system that allows users to freely create and manage evaluation instances. Evaluation managers can create an evaluation instance according to their purpose and allocate evaluation items and evaluators. When the evaluators finish evaluating the evaluation items, the evaluation manager can aggregate the evaluation results for the instance. Someone, who want to perform evaluation for various purposes but do not have an evaluation system, can implement the evaluation system relatively simply by using this system. In addition, due to the characteristic of the blockchain, evaluators cannot modify the evaluation scores they have already recorded, and neither the system administrator nor the evaluation administrator can modify the evaluation scores. For this reason, the reliability of the evaluation increases.