• Title/Summary/Keyword: $I_2$-convergence

Search Result 951, Processing Time 0.027 seconds

The legal issues on the fintech and e-commerce payment (전자상거래 지급결제의 핀테크 활성화를 위한 보안 및 법제도적 과제)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.25-31
    • /
    • 2015
  • While information and communication develop, the Electronic commerce payment system is progressing. Recently, a government established the electronic commerce activation policy which simplified a payment Through this policy, the information which the financial company monopolizes can be fused with the other industry and create the popularization use of the electronic payment service and value added services. But on the other hand, the concern for the security is very high, Accordingly, the finnancial institute take a restriction of the requirements for the participation company according to the financial scale, this policy is led by the private institue, rather making a participation of fin tech venture difficulty. This paper tries to deal with the technical and legal problems for the activation of electronic payment system and fin tech. So I will examine the security matter that follows in grifting the innovation technology onto the existing payment service and propose a desirable way to improve the current legislation.

The Effect of Career Choice Motives of the Private Security Guards on Job evaluation and Job Attitude (민간경비원의 직업선택동기가 직업선택평가 및 직무태도에 미치는 영향)

  • Kim, Sang-Jin
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.73-82
    • /
    • 2016
  • This study is to investigate the Effect of Career Choice Motives of the Private Security Guards on Job choice evaluation and Job Attitude. For this study visiting the 8 companies around the capital area and surveyed from May 1st to October 10th 2015 using the stratified random sampling method. A total of 240 questionnaires were distributed and among them, 220 copies were used except for analysis. I used SPSSWIN 21.0 and AMOS 21.0 to reliability analysis, factor analysis, analysis of structural equation model, path analysis. The level of statistical significance was set to .05. The following are conclusions. Job choice motivation has a positive effect on Job choice evaluation and Job attitude but Job choice evaluation doesn't play intermediary role on relationship between Job choice motivation and Job attitude.

A Study on The Security Measures of Insurance Crimes (보험범죄의 보안대책에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.53-60
    • /
    • 2016
  • Security measures for the current insurance crime has focused on the capture oriented and reactive response in the screening stage of insurance payments. However, since leaving the damages that can not be healed by post-punishment, it is necessary to take measures to prevent the insurance crimes in advance. In this paper, I would like to try to identify problems through analyzing the characteristics and cases of the insurance crimes, and to present alternatives to it. The problems with the current insurance system that causes the insurance crimes are, First, When signing the insurance contract, it is too inattentive to confirm about the credit status of the policyholder, duplicate join or not, whether voluntarily sign up etc. Second, a thorough investigation or criminal charges in case of insurance accident is not being done properly. Third, information exchange and management to malicious policyholders is not being done properly. Therefore, in order to guard people from insurance crimes, First, it should strengthen the audit of such credit conditions, accident experiences in the insurance contract at the policyholders. Second, we need to block insurance crimes in advance through the continuous upgrades of insurance fraud analysis systems and social network. Third, it is necessary to strengthen the surveillance systems for the insurance crimes by the information sharing.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

A Study on Models for Strengthening Infrastructure Protection through Analysis of Cyber Intrusions (침해사고 분석을 통한 기반시설 보호 강화 모델 연구)

  • Yoon, Oh Jun;Han, Bok Dong;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.29-36
    • /
    • 2015
  • The hacking threats made against the Korea Hydro & Nuclear Power(KNDP) and the leakage of critical information on nuclear power safety raised the public awareness on the importance of protecting and managing national infrastructure necessary for sustaining the state and society. Cyber security activities and relevant institutions in the ROK, however, are still insufficient, because of which there is a possibility that similar incidents would reoccur and cause serious damages. Hence, a grave and direct threat is posed to the national security of the ROK. In this thesis, I would like to give my analysis and assessment on the recent cyber intrusions against infrastructure at home and abroad, measures established in response and their implementation, and the deficiency of the existing infrastructure protection system ; and lastly propose measures to reinforce infrastructure protection of the ROK.

System Development and Management for Underachieved Students (자존감 향상 프로그램 개발 및 운영사례)

  • Kim, Young-Jun;Kim, Hee-Kyo;Oh, Kyeong-seok
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.183-190
    • /
    • 2018
  • With decreasing the number of high school graduates, it is vital for each college to maintain its enrollment number as well as to preserve its dropout rate in a lower level. It is true that all universities and colleges have experienced inevitable dropouts that were in fact more serious in 2 to 3-year colleges. There have been prior studies to examine what factors affected to students' dropout in various ways. However, no specific programs were employed to mitigate the rates of dropout. In this study, new encouraging program is introduced for the students who were not ready to study and isolated from classroom. The result showed that the program led to the GPA enhancement in larger number of participants. Nevertheless, the sustainablity of the program would be unclear unless it combines with other existing programs.

A Study on the Establishment of the Policing Technology R&D Organization (치안과학기술 연구개발조직 설립에 관한 연구)

  • Kim, Yeon Soo
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.59-68
    • /
    • 2015
  • Recently, the rapid development of science and technology is a new challenge and opportunity in the policing environment. In the major industrialized countries of the West presents a strategy called SMART Policing the police to strengthen police capacity in accordance with this social change and actively utilize the science and technology in policing field. In this study, we attempted to discuss our country for the establishment of security technology research and development organization. First, I propose that installed the R&D planning department at the Office of Planning and Coordination in the National Police Agency. Secondly, it is need to establish the (provisional) Police Science and Technology Center, that integrate the functions of each organization's R&D-related work. Finally, it should integrate Police Science Institute and the National Forensic Service in (provisional) Policing Technology Research Institute.

A Study on The Core Values of Korea National Police (경찰의 핵심가치에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.45-50
    • /
    • 2014
  • The police have a responsibility to ensure the safety such as the Public peace and order, life and property of the people. Therefore the police system is to be provided in the organization and functioning. And the policemen should live correctly in public or private living. The police shall perform the duties matching the expectations of the people. But in reality the poloce disappointed, so the people were often to be angry. In this paper, I want to derive the core values of the police as a way to get the confidence of the people by analyzing the code of ethics, the moral of the police institution and the great acts of policemen. Core values are the most important values as the basis for action a nd the most important foundation that make up the organizational culture. Core values of korean police are justice and the spirit of sacrifice, honor.

The Policy of China toward Asia (중국의 대 아시아 정책)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.63-67
    • /
    • 2017
  • With the rise of China, the power and hegemony is moving to China in East Asia. The foreign policy of the China government is directly or indirectly affecting Korea, neighboring countries and the world. China is advocating a new international policy, a new security system, silk road policy and a new paradigm. China is a newly emerging powerful nation in Asia, and it is clear that China has the economic power to reestablish the Asian order and take over the hegemony. In addition, we want to run the world supremacy with the United States in political, economic, military and diplomatic sectors. In order to overcome the crisis of the Korean peninsula, which is being triggered by North Korea's nuclear and missile development, we are in the position to do our best to cooperate with Korea, the United States and Japan and further improve relations with China. In this study, I analyzed the policy of Southeast Asia and China macroscopically.

Energy Efficient Data-centric based Sensor Network Routing Protocol (에너지 효율적인 데이타 기반 센서 네트워크 라우팅 프로토콜)

  • Park Noseong;Kim Daeyoung
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.261-277
    • /
    • 2005
  • We propose the PAD (Power Aware Data-centric Routing Protocol), which finds minimum energy routes and prolongs network life-time, for the data-centric sensor networks. Firstly, the PAD discovers the minimum energy Property graph by removing redundant communication links. The proposed a1gorithm to find the minimum energy property graph is faster, simpler and easier to implement than existing aIgorithms. Secondly, the PAD runs the DDBF (Distributed Data-centric Bellman-Ford Algorithm) to determine routing paths between a base node and all sensor nodes. The DDBF selves the drawbacks of the distributed bellman-ford algorithm, i.e. slow convergence and a possible cyclic routing path. Since the PAD is a fully distributed algorithm with low overhead, it can be used in various kinds of resource limited sensor network applications.