• Title/Summary/Keyword: 거래선 유형

Search Result 14, Processing Time 0.024 seconds

Characteristics of Exportation of Korean TV programs: Focused on MBC Case (지상파 방송프로그램의 해외 판매 특성에 관한 연구: MBC 사례를 중심으로)

  • Lee, Moon-Haeng
    • Korean journal of communication and information
    • /
    • v.59
    • /
    • pp.233-258
    • /
    • 2012
  • The purpose of this study is to research on the mechanism of exportation of Korean TV programs. As a result, the buying countries of Korean TV programs have been relatively diversified : 40 countries across the world. However, examining the frequency of exportation has shown that it primarily focused on few countries such as Japan and Taiwan. Furthermore, drama has been the most preferred genre by foreign countries. Fortunately, remakes, dubbing productions, publications, and merchandising have been started to develop. As for the trade partner, the portion of foreign distributors has been ranked as a the most prioritized type. Therefore, it is necessary to open the existing closed system of distribution of Korean free TV to build more diversified partnership.

  • PDF

Vulnerability Analysis and Hacking Attack about WiBro Internet Financial Transaction (WiBro 인터넷 금융거래 취약점분석과 해킹공격)

  • Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.414-417
    • /
    • 2011
  • 2011년 현재 유무선 인터넷을 이용해 VoIP, e-mail 통신을 하며, 금융거래인 은행거래, 주식거래, 안전결제 서비스를 이용하고 있다. 하지만 유무선 인터넷에서 침해사고가 발생하여 VoIP, e-mail이나 은행거래, 주식거래, 안전결제에 취약점 가능성이 있다. 2011년 3월 개인정보보호법 국회통과로 금융거래에서 개인정보를 보호해야 한다. 본 논문에서는 WiBro 인터넷 금융거래에서 VoIP, e-mail이나 은행거래, 주식거래, 안전결제를 할 때, SecuiScan을 이용하여 취약점을 분석한다. 취약점을 분석한 결과, 발견된 취약점을 이용하여 실험실 환경에서 해킹공격을 실시한다. 해킹결과 분석과 침해사고 유형에 따른 보안성 강화를 위한 보안 대책을 제시한다. 본 논문의 연구는 WiBro 인터넷 금융거래 보안성 강화에 기여할 것이다.

  • PDF

An Efficient Algorithm for Computing Multiplicative Inverses in GF($2^m$) Using Optimal Normal Bases (최적 정규기저를 이용한 효율적인 역수연산 알고리즘에 관한 연구)

  • 윤석웅;유형선
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.1
    • /
    • pp.113-119
    • /
    • 2003
  • This paper proposes a new multiplicative inverse algorithm for the Galois field GF (2/sup m/) whose elements are represented by optimal normal basis type Ⅱ. One advantage of the normal basis is that the squaring of an element is computed by a cyclic shift of the binary representation. A normal basis element is always possible to rewrite canonical basis form. The proposed algorithm combines normal basis and canonical basis. The new algorithm is more suitable for implementation than conventional algorithm.

  • PDF

Own-Brand Exporting Small and Medium Enterprises' Satisfaction with Export Assistance Programs: A Comparison Study based on the Product Type and the Level of Economic Development of Host Countries (자사브랜드 수출중소기업의 수출지원 서비스에 대한 중요도 및 만족도: 제품 유형과 진출국가수준에 따른 비교 연구)

  • Heo, Kyung Jun;Jung, Gyu Il;Chung, Jae Eun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.2
    • /
    • pp.107-120
    • /
    • 2015
  • This study compares own-brand exporting SMEs' utilization of various government-run exporting service programs that provided support in searching for overseas distributors, in overseas market research, and in marketing support. Researchers measure how important firms found each of these components of the program, as well as firms' satisfaction with these services, based on the type of product exported (industrial vs. consumer goods) and the level of economic development of the host countries (developed, newly industrialized, and developing.) A total of 245 own-brand exporting SMEs were surveyed and analyzed in this study. Results indicated that KOTRA was the most frequently used organization by the sample SMEs, regardless of the product type and the economic level of host countries. Industrial-goods exporting SMEs found support in searching for overseas distributors more important than consumer-goods exporting SMEs. SMEs exporting to developed countries considered overseas market research and marketing support and searching for overseas distributor programs more important than SMEs exporting to NIE or developing countries. In addition, industrial-goods exporting SMEs were more satisfied with the overseas market research and marketing support and searching for overseas distributor programs than consumer-goods exporting SMEs. However, there were no differences in satisfaction among firms based on the level of economic development of host countries. Several cases of significant correlations between the importance of and satisfaction with the utilization of government exporting service programs were found.

  • PDF

Modified Multi-bit Shifting Algorithm in Multiplication Inversion Problems (개선된 역수연산에서의 멀티 쉬프팅 알고리즘)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.1-11
    • /
    • 2006
  • This paper proposes an efficient inversion algorithm for Galois field GF(2n) by using a modified multi-bit shifting method based on the Montgomery algorithm. It is well known that the efficiency of arithmetic algorithms depends on the basis and many foregoing papers use either polynomial or optimal normal basis. An inversion algorithm, which modifies a multi-bit shifting based on the Montgomery algorithm, is studied. Trinomials and AOPs (all-one polynomials) are tested to calculate the inverse. It is shown that the suggested inversion algorithm reduces the computation time up to 26 % of the forgoing multi-bit shifting algorithm. The modified algorithm can be applied in various applications and is easy to implement.

  • PDF

A secure token-updated authentication scheme using security key (비밀키를 이용한 토큰 업데이트 보안 인증 기법)

  • Liang, Jun;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2007
  • Recently, a large number of authentication schemes based on smart cards have been proposed, using the thinking of OTP (one-time password) to withstand replay attack. Unfortunately, if these schemes implement on PCs instead of smart cards, most of themcannot withstand impersonation attack and Stolen-Verifier attack since the data on PCs is easy to read and steal. In this paper, a secure authentication scheme based on a security key and a renewable token is proposed to implement on PCs. A comparison with other schemes demonstrates the proposed scheme has following merits: (1) Withstanding Stolen-Verifier attack (2) Withstanding Impersonation attack (3) Providing mutual authentication; (4) Easy to construct secure session keys.

  • PDF

A Secure Protocol for the Electronic Auction (전자경매를 위한 보안 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.29-36
    • /
    • 2007
  • Recently, Jaiswal et al. proposed a protocol to improve the multi-agent negotiation test-bed which was proposed by Collins et al. Using publish/subscribe system, time-release cryptography and anonymous communication, their protocol gives an improvement on the old one. However, it is shown that the protocol also has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, anonymity disclosure, collusion between customers and a certain supplier. So proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that the way that market generates random number to the supplier is better than the supplier do by himself in guaranteeing anonymity. Market publishes interpolating polynomial for sharing the determination process data. It avoids collusion between customer and a certain supplie

  • PDF

A improved authentication protocol for the forward security (개선된 포워드 보안을 위한 인증 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.17-27
    • /
    • 2007
  • This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In the proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. And another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even an attacker steals the parameters from the KDC, the attacker still can not calculate session key. According to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.

  • PDF

A Research on The technology Innovation Factors for adopting RFID (RFID 도입을 위한 기술 혁신 요인에 관한 연구)

  • Lee, Jae-Beom;Lee, Hak-Seon;Lee, Sang-Cheol
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.436-441
    • /
    • 2005
  • RFID란 무선인식기술을 말하는 것으로써 무선으로 사람, 물건, 동물 등을 인식, 추적, 식별할 수 있는 기술이다. 이러한 RFID에 대하여 많은 관심이 증대되고 있는 현실속에서 RFID를 도입함으로써 많은 효익을 얻을 것이라는 예측에도 불구하고 아직까지 대부분의 기업들은 RFID 도입에 적극적이지 못하고 있는 실정이다. 이에 따라 본 연구에서는 RFID 도입을 혁신의 한 유형으로 보고, 혁신모형에 기반하여 RFID 도입에 영향을 미치는 요인을 파악하여, 현재 RFID를 도입한 기업 및 도입을 고려중인 기업을 대상으로 RFID도입에 영향을 미치는 요인에 대한 실증분석을 실시함으로써, RFID가 경쟁도구로서 기업에 보다 빨리 확산되고 활성화 될 수 있는 효율적이고 체계적인 방향을 제시하고자 한다. 이를 위하여 혁신이론에 관한 선행연구를 기초로 RFID 도입이 혁신에 적합한지를 확인하고, 기술적 요인을 RFID 도입에 대한 영향정도를 살펴보았으며, 거래업체와의 관계특성요인(파워)에 대한 조절효과도 검증하였다.

  • PDF