• Title/Summary/Keyword: service user risk

Search Result 156, Processing Time 0.021 seconds

Crime risk implementation for safe return service (안심귀가 구현을 위한 범죄위험도 산출)

  • Park, Mi Ri;Kim, Yu Sin;Choi, Sang Hyun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.5
    • /
    • pp.1097-1104
    • /
    • 2015
  • Rapid social and economic growth has brought positive results. At the same time, due to the increase in crime, crime prevention is important. There are many papers that analyze crime trends and crime type. Based on this, there are studies to ensure the safety of people. The study calculated the risk for the crime. it is necessary to exert a great effect on crime prevention alternatives. This paper uses crime data provided from San Francisco and victims data provided from FBI. And, it proposes the crime risk calculation. By analyzing the type of user, risk degree is given different weights according to the user, and assess the risk of crime.

A Study of Countermeasure against Security Risk of Fintech Services for Financial Innovation (금융혁신을 위한 핀테크 서비스의 보안 리스크 대응방안 연구)

  • Park, Jeong-Kuk;Kim, Injai
    • Knowledge Management Research
    • /
    • v.16 no.4
    • /
    • pp.35-45
    • /
    • 2015
  • Fintech, which means the convergence of finance and information technology, becomes a hot topic in the financial sector. Through innovative activities on financial services, ICT(Information and Communication Technology) is integrated into the overall financial industry, and a new form of financial services could be expected to improve the existing financial system. On the other hand, fintech services are relatively vulnerable to security issues. Due to the process simplication and the channel fusion, the leakage of personal and financial informations, authentication bypass, phishing, and pharming are getting more concerned. In this study we investigated the security risk of fintech services in the viewpoints of service provider, technology adoption, and security policy. The possible countermeasures to reduce those risks are suggested because security is an important criterion for selecting financial services. This study basically offers quantification of the potential security risks and step-by-step control measures about business processes in the fintech services. The suggested security model includes user authentication, terminal security, payment information protection, API(Application Programming Interface) security, and abnormal transaction monitoring. This study might contribute to an understanding of the security risks and some possible measures for mitigating those risks on the practical perspective.

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim;Jungyeon Sung;Daekil Kim;Dan J. Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.3
    • /
    • pp.156-175
    • /
    • 2017
  • The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.

A Study on the FinTech : The consideration of the Security (핀테크의 보안 고려사항에 대한 연구)

  • Lee, Yujin;Chang, Beomhwan;Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.111-123
    • /
    • 2016
  • Recently, mobile devices have been widely used. Therefore, the service users want that are not constrained by time and space. Among them, electronic payment services, mobile finance service is enjoying a tremendous popularity. The FinTech is the result of the fusion of finance and ICT(Information & Communication Technology). Security experts is pointed the FinTech security risk. New technology and Innovative FinTech services are even available, Insecure FinTech services is insignificant. In this paper we were surveyed market and product trends of FinTech and analyzed the threats about FinTech. Also, we analyzed the security considerations for FinTech using a questionnaire. As a result, users considers secure payment process and privacy. Therefore, we proposed security considerations for each vulnerability. So, we must be resolved of security technology and policy issues. If establishing a secure payment process and the unclear legal issue is resolved, FinTech service will provide a secure financial services to the user.

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Relation between Smartphone Addiction and Interpersonal Competence of College Students using Social Network Service (소셜네트워크서비스를 이용하는 대학생들의 스마트폰 중독과 대인관계능력의 관계)

  • Park, Soonjoo;Kwon, Min-A;Baek, Min-Ju;Han, Na-Ra
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.5
    • /
    • pp.289-297
    • /
    • 2014
  • The purpose of this study was to investigate the relation between smartphone addiction and interpersonal competence of college students using social network service(SNS) through smartphones. This study used a descriptive study design. The convenience sample consisted of 502 college students in six cities. The data were collected from May to June in 2012 using Korean Smartphone Addiction Proneness Scale and Interpersonal Competence Questionnaire. Descriptive statistics, ${\chi}^2$-test, t-test, analysis of variance, and Pearson correlation coefficient were used to analyze the data. The results showed that 24.8% of SNS users were considered as a risk group, while 75.2% were normal user group. There were no significant differences of interpersonal competence between risk group and normal user group in the SNS users. However, risk group had higher self-disclosure scores than normal user group. The subjects who had higher scores for virtual life, one of smartphone addiction subdomains, had lower interpersonal competence and those with higher smartphone addiction scores showed lower score of managing interpersonal conflict in subdomains of interpersonal competence. These findings would contribute in development of preventive interventions for smartphone addiction and improvement program for interpersonal competence in college students.

Analysis of Privacy Violation Possibility of Partially Anonymized Big Data (온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석)

  • Jung, Kang-soo;Park, Seog;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.665-679
    • /
    • 2018
  • With the development of information and communication technology, especially wireless Internet technology and the spread of smart phones, digital data has increased. As a result, privacy issues which concerns about exposure of personal sensitive information are increasing. In this paper, we analyze the privacy vulnerability of online big data in domestic internet environment, especially focusing on portal service, and propose a measure to evaluate the possibility of privacy violation. For this purpose, we collected about 50 million user posts from the potal service contents and extracted the personal information. we find that potal service user can be identified by the extracted personal information even though the user id is partially anonymized. In addition, we proposed a risk measurement evaluation method that reflects the possibility of personal information linkage between service using partial anonymized ID and personal information exposure level.

A Study on the Loyalty to Web Based Cyber Trading Systems (웹기반 사이버트레이딩시스템의 충성도에 관한 연구)

  • 이원호;김은홍;권순범
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.29 no.2
    • /
    • pp.97-116
    • /
    • 2004
  • Recently, e portion of on-line stock brokerage has been rapidly increased to be more than 50%, on the basis of contracted money. The usage of wCTS(Web Based Cyber Trading Systems) has now got into the steady state over the initial diffusion stage, which means wCTS has got more-than-half customer base in on-line service. Therefore, brokerage service providers have their competitive strategic focus on customer retention through the enhancement of customer loyalty. This study provides framework and survey results on explanation of wCTS user's loyalty, what and how factors affect wCTS user's loyalty. We adopt the results of early studies on information technology acceptance and diffusion such as TAM(Technology Acceptance Model) and IDT(Innovation Diffusion Theory). We also referred loyalty theory of marketing area and studios on CTS usage. We categorized explanation factors as three groups characteristics of users, characteristics of system, social environment. And we assumed that these three factors could affect the loyalty through two parameters : customer satisfaction and trust to the system. This study firstly shows that the ease of use and usefulness, the major factors of TAM. can also be applied to the loyalty of wCTS with resulting that the usefulness is more important than the ease of use In wCTS. Secondly, it shows that the innovative and risk-sensitive user has the lower degree of loyalty. Thirdly, it shows that the satisfaction and trust impact the loyalty simultaneously, the trust particularly impacts more strongly than the loyalty, due to the characteristics of monetary transaction in wCTS. This study provides meaningful results to the other on-line EC service fields as a first empirical research regarding the loyalty to wCTS which is a typical on-line EC service.

The Impact Perceived Risk on User's Trust and Continuance Intention in Mobile Payment Systems (모바일 결제시스템에서 지각된 위험이 사용자의 신뢰 및 지속사용에 미치는 영향)

  • Choi, Hun;Choi, Yoo-jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1096-1102
    • /
    • 2016
  • Various services have been provided due to the recent development of IT technology and widespread usage of smartphones. In recent years, Fintech service that provides financial services through mobile devices has been the trending issue. However, mobile payment services haven't been widely used. The risk factors that appear when users seek to utilize a service, in particular, is one of the biggest hinderance in the expansion of mobile payment services. The failure of gaining the trust of the consumers appear to be the continuing hinderance factor. Therefore this study is to analyse the impact of perceived risk factors on trust and continuance intention of mobile payment services. For the research purpose, we conducted survey and the research results show that most of perceived risk factors have influence on trust and continuance intention except on the impact of perceived financial risk on trust.