• Title/Summary/Keyword: 관리계정

Search Result 117, Processing Time 0.029 seconds

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

SNS Mall: A Study on the Analysis of SNS(Social Networking Service) Functions Applicable to Electronic Commerce for Building Regular Relationship with Customers (SNS 몰: 전자상거래에서 적용할 수 있는 SNS의 기능 분석 및 활용에 관한 연구)

  • Gim, Mi-Su;Ra, Young-Gook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.1-7
    • /
    • 2020
  • We can build regular customer relationships combining SNS (social networking service) with shopping mall like offline trade. A customer who once purchased is registered as reaular and the relationship continues afterward. The registered regular customer get sthe information about objective product shipment and besides it, he contacts with a story of frams, growth of vegetables, sows to harvests. Consumer can purchase with one click necessary foods as he looks at timeline. Sellers give information about news. discounts to customers. Besides it, food storages, recipes can be given to consumers. The good point here is that selling and promoting can be performed within one account. This is better than link is provided for selling an promoting separately. Like this, besides personal connections using SNS, categorization function gives consumers on line shopping mall service. Once the consumer purchase, he is registered as regular. Besides, the consumers who do not know each other, can share information, suggest products, spread the news.

A Methodology for Determining Cloud Deployment Model in Financial Companies (금융회사 클라우드 운영 모델 결정 방법론)

  • Yongho Kim;Chanhee Kwak;Heeseok Lee
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.47-68
    • /
    • 2019
  • As cloud services and deployment models become diverse, there are a growing number of cloud computing selection options. Therefore, financial companies need a methodology to select the appropriated cloud for each financial computing system. This study adopted the Balanced Scorecard (BSC) framework to classify factors for the introduction of cloud computing in financial companies. Using Analytic Hierarchy Process (AHP), the evaluation items are layered into the performance perspective and the cloud consideration factor and a comprehensive decision model is proposed. To verify the proposed research model, a system of financial company is divided into three: account, information, and channel system, and the result of decision making by both financial business experts and technology experts from two financial companies were collected. The result shows that some common factors are important in all systems, but most of the factors considered are very different from system to system. We expect that our methodology contributes to the spread of cloud computing adoption.

Development of Water Footprint Inventory Using Input-Output Analysis (산업연관분석을 활용한 물발자국 인벤토리 개발)

  • Kim, Young Deuk;Lee, Sang Hyun;Ono, Yuya;Lee, Sung Hee
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.4
    • /
    • pp.401-412
    • /
    • 2013
  • Water footprint of a product and service is the volume of freshwater used to produce the product, measured in the life cycle or over the full supply chain. Since water footprint assessment helps us to understand how human activities and products relate to water scarcity and pollution, it can contribute to seek a sustainable way of water use in the consumption perspective. For the introduction of WFP scheme, it is indispensable to construct water inventory/accounting for the assessment, but there is no database in Korea to cover all industry sectors. Therefore, the aim of the study is to develop water footprint inventory within a nation at 403 industrial sectors using Input-Output Analysis. Water uses in the agricultural sector account for 79% of total water, and industrial sector have higher indirect water at most sectors, which is accounting for 82%. Most of the crop water is consumptive and direct water except rice. The greatest water use in the agricultural sectors is in rice paddy followed by aquaculture and fruit production, but the greatest water use intensity was not in the rice. The greatest water use intensity was 103,263 $m^3$/million KRW for other inedible crop production, which was attributed to the low economic value of the product with great water consumption in the cultivation. The next was timber tract followed by iron ores, raw timber, aquaculture, water supply and miscellaneous cereals like corn and other edible crops in terms of total water use intensity. In holistic view, water management considering indirect water in the industrial sector, i.e. supply chain management in the whole life cycle, is important to increase water use efficiency, since more than 56% of total water was indirect water by humanity. It is expected that the water use intensity data can be used for a water inventory to estimate water footprint of a product for the introduction of water footprint scheme in Korea.

Calculating the Audit Fee Based on the Estimated Cost (예정원가계산에 의한 감사보수 산정)

  • Mun, Tae-Hyoung
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.189-206
    • /
    • 2016
  • It was required to attach the documents on the details of external audit including the number of the participants in external audit, audited parts and audit times under the Article 7-2 on the audit report to the accounting audit report from 2014 in accordance with the amendment to the Act on External Audit of Stock Companies. This study aim to calculate the audit fee based on the estimated cost of service calculation of the government contribution agencies by reflecting the implementation of the revised external audit. This study calculated the audit fee for the target company (a listed company assumed to have no internal control risks and relevant audit risks for unqualified opinion in the previous year, 100 billion won of total amount of asset, manufacturing company in the previous year and preliminary client request) by putting together four items of expenditure including employment costs, expenditure, general management expenses and profit in accordance with the calculation system of cost of service under the State Contract Act. Then, it used the data collected from the documents on the details of the revised external audit after requesting estimation on the target company with the estimated cost to Big-4 accounting firms to identify the participants and times of the accounting audit. The employment costs applied 150% of participation rate of the base price of employment costs for the academic research service cost in 2014, the expenditure used the average value of accounting firms of corporate business management analysis of the Bank of Korea (2013), the general management expenses applied 5% of the general management rate of service business under Article 7-1 of the Enforcement Rule of the Act on Contracts to which the State is a Party and the profit applied 10% of profit rate of service business under Article 7-2 of the Enforcement Rule of the Act on Contracts to which the State is a Party. Based on the calculation of the estimated costs by applying the above, the audit fee was estimated at 50,617,769won. Although the result is not the optimal audit fee, it may be used as a basic scale to compare the audit fees of companies without criteria. Also, such amendment to the Act on External Audit of Stock Companies may improve independence of auditors and transparency of the accounting system rather than previous announcing only the total audit times.

  • PDF

A Study on Public Interest-based Technology Valuation Models in Water Resources Field (수자원 분야 공익형 기술가치평가 시스템에 대한 연구)

  • Ryu, Seung-Mi;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.177-198
    • /
    • 2018
  • Recently, as economic property it has become necessary to acquire and utilize the framework for water resource measurement and performance management as the property of water resources changes to hold "public property". To date, the evaluation of water technology has been carried out by feasibility study analysis or technology assessment based on net present value (NPV) or benefit-to-cost (B/C) effect, however it is not yet systemized in terms of valuation models to objectively assess an economic value of technology-based business to receive diffusion and feedback of research outcomes. Therefore, K-water (known as a government-supported public company in Korea) company feels the necessity to establish a technology valuation framework suitable for technical characteristics of water resources fields in charge and verify an exemplified case applied to the technology. The K-water evaluation technology applied to this study, as a public interest goods, can be used as a tool to measure the value and achievement contributed to society and to manage them. Therefore, by calculating the value in which the subject technology contributed to the entire society as a public resource, we make use of it as a basis information for the advertising medium of performance on the influence effect of the benefits or the necessity of cost input, and then secure the legitimacy for large-scale R&D cost input in terms of the characteristics of public technology. Hence, K-water company, one of the public corporation in Korea which deals with public goods of 'water resources', will be able to establish a commercialization strategy for business operation and prepare for a basis for the performance calculation of input R&D cost. In this study, K-water has developed a web-based technology valuation model for public interest type water resources based on the technology evaluation system that is suitable for the characteristics of a technology in water resources fields. In particular, by utilizing the evaluation methodology of the Institute of Advanced Industrial Science and Technology (AIST) in Japan to match the expense items to the expense accounts based on the related benefit items, we proposed the so-called 'K-water's proprietary model' which involves the 'cost-benefit' approach and the FCF (Free Cash Flow), and ultimately led to build a pipeline on the K-water research performance management system and then verify the practical case of a technology related to "desalination". We analyze the embedded design logic and evaluation process of web-based valuation system that reflects characteristics of water resources technology, reference information and database(D/B)-associated logic for each model to calculate public interest-based and profit-based technology values in technology integrated management system. We review the hybrid evaluation module that reflects the quantitative index of the qualitative evaluation indices reflecting the unique characteristics of water resources and the visualized user-interface (UI) of the actual web-based evaluation, which both are appended for calculating the business value based on financial data to the existing web-based technology valuation systems in other fields. K-water's technology valuation model is evaluated by distinguishing between public-interest type and profitable-type water technology. First, evaluation modules in profit-type technology valuation model are designed based on 'profitability of technology'. For example, the technology inventory K-water holds has a number of profit-oriented technologies such as water treatment membranes. On the other hand, the public interest-type technology valuation is designed to evaluate the public-interest oriented technology such as the dam, which reflects the characteristics of public benefits and costs. In order to examine the appropriateness of the cost-benefit based public utility valuation model (i.e. K-water specific technology valuation model) presented in this study, we applied to practical cases from calculation of benefit-to-cost analysis on water resource technology with 20 years of lifetime. In future we will additionally conduct verifying the K-water public utility-based valuation model by each business model which reflects various business environmental characteristics.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.