• Title/Summary/Keyword: 금융정보시스템

Search Result 580, Processing Time 0.024 seconds

A Design and Implementation of In/Out Bound Call Flow Module for SOHO CTI (SOHO CTI용 인/아웃바운드 콜 플로우 모듈 설계 및 구현)

  • Park Chan Il;Moon Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.71-84
    • /
    • 2005
  • Recently, the expert call center solution has become the center of interest, since finance and tele-marketing system, which is focused on a communication industry, have been increasing, Specially, the call center market is growing up with a supporting Caller-ID for a cellular phone in Korea, In the present, although large size companies are developing expensive solutions and instruments to service only for the big companies, there little solutions for SOHO markets, Therefore, in this paper we have shown a design and an implementation of a CTI system which is capable of in/outbound call processing by using CTI, and providing stable services by linking the customer's DB. And these functionalities have become possible by integrating functions of PBX and the computer control of the PBX. First, we have constructed call flows and analyzed packets for the standard communication through the PBX in call. Then, we have designed and implemented a middleware which linked a call between a client and a customer. Finally, we have constructed a database module for applying the CRM technology to the management of customer's contents.

  • PDF

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

A Case Study of Knowledge Management based on SECI (SECI기반 지식관리실증연구)

  • Chang, Woo-Kwon;Kim, Hyun-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.4 s.50
    • /
    • pp.277-301
    • /
    • 2003
  • Knowledge Management is presented as the management method having the survival and competition of enterprise under variously changing management environment. Knowledge Management is introduced recently as successful survival strategy of advanced enterprise. Scientifically, however, the definition. study model and propulsion method of KM leave much to be desired, and now it has become the subjects of active study among scholars. To creation of the competitive power of the company have to be important knowledge based continuous innovation. That is to say, the knowledge management means a lot to knowledge assets included knowledge, knowledge creating, sharing, and acting This study aims to propose models on the research result based a case study of the financial industry in knowledge creating processes(SECI) and deriving knowledge management styles in the flied works of the bank.

Analysis on National Economic Loss of Cyber Attack: Voice Phishing Case (사이버공격의 국가 경제적 손실분석 - 보이스 피싱을 중심으로)

  • Shin, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2341-2346
    • /
    • 2012
  • Voice phishing against the old or weak persons have used the methods which are social engineering in the object and financial structure and function. Until recently Voice phishing from Chaina caused economic devastation and the economic loss by phishing grows with the South Koreans in the whole. Korean government and public organizations involved have been strengthening protection system and a financial security devices. But it is not easy to verify how much effects of security measures are. In this paper I will study the economic loss caused by voice phishing and potential economic effects of security measures and security device reinforcements of the Republic of Korea. Direct costs are reported about 100 million dollars and potential economic effects of voice phinshing secure measures may be around 320 million dollars.

Damage Prediction of Infomation and Communication Facilities for Prolonged Power Outage (장기간 정전사태에 대비한 기반시설-정보통신시설-에서의 피해예측)

  • Song, Chang Young;Cho, In Uh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2012
  • Critical infrastructures (energy, information technology and communications, banking, transportation, public government services, etc.) are now more vital to modern society. Citizens, businesses and governments all rely on an array of interlinked physical and information infrastructures to satisfy their needs and perform their daily operations. At the same time, these infrastructures are becoming increasingly interdependent, such that failure of one of them can often propagate and result in domino effects. Recent dramatic episodes, from 9/11 to the Madrid train bombings, the April 2010 ash cloud the power cuts in Korea in 2011, and the cyber-attacks have highlighted the need for a comprehensive, internationally coordinated policy for the protection of critical infrastructures. For the purposes of this report, we define critical infrastructure as infrastructure whose failure would result in substantial damage to society and/or the economy.

An Empirical Study on Measurement and Improvement for the Service of Education and Administration in the University (대학의 교육 및 행정 서비스품질의 측정과 향상 방안에 관한 실증적 연구)

  • Lee, Pil-Jae;Kim, Yoo-Ra;Jeong, Hae-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.197-209
    • /
    • 2008
  • Since the theories of service quality were introduced in Korea, they have been applied to the various organizations, such as hospital, hotel travel agency bank, telecom company, and even retail market. Compared with these areas, however studies on the service qualify in educational institutions have been scarcely conducted. Also, higher educational service challenges user-oriented education system of the 21st century concept of Service quality from the theories of market economy. The purpose of this study is to identify the dimensions of educational and administrative service, and their influence upon the satisfaction and value on service quality, and formulate the service quality model based on the revised quality dimensions using SERVQUAL measuring method, to find out the most influential factors upon the service qualify among these factors. This study also suggests proper measures for improving service quality.

  • PDF

Comparative Study on Major Nations's Related Legislation for Counter-terrorism (테러대응 관련 법제의 국가별 비교 연구)

  • Kwon, Jeong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.343-352
    • /
    • 2010
  • As a result of comparing and analyzing the related legislation of each nation, more superior legislative systems should be made to cope with a number of terrors effectively. And also it is required to devise some concrete regulations such as the following in superior legislative systems. First, because it is hard to collect information on terrorism and watch over suspects according to Communication Privacy Protection Law. More in-depth discussion into the issue of surveillance is needed for the protection of lives and property, although public concerns of privacy are a valid point of contention. Second, it is necessary to take complementary measures on immigration as surveillance, since the current Immigration Control Law has restrictions in many ways to hinder efforts to root out terrorists. Third, under the current law on financial activities, it is impossible to block influx of terror financing. Therefore it is necessary to come up with ways of making the punishment procedures. Fourth, considering that convicted terrorists get punished under the standard procedures and precedents, it is required to clearly differentiate between what the terror acts are and what terrorist groups are. Fifth, it is necessary to make use of the private security system to enhance the security system of national facilities.

A Study on Electronic System of Purchase Institution the Raw Materials for Earning Foreign Currencies (외화획득용 원료 등 구매제도의 전자화에 관한 연구)

  • Jeong, Yoon-Say;Chung, Jason
    • International Commerce and Information Review
    • /
    • v.15 no.1
    • /
    • pp.357-379
    • /
    • 2013
  • Recently, the government was introduced as currency for earning of raw materials purchasing system for electronic Government management of foreign trade in 2011, and revised regulations for electronic proof of purchase. In addition, the currency for earning of raw materials, such as procurement system in 2012, followed by electronic proof of purchase local letter of credit. The government electronic trading will be promoting local trading of electronic procedures. This study will be a preceding research on the goods control system for acquiring foreign currency and the obligation of using digitalized approval of purchase due to the revision of foreign trade law. Also, it will conduct theoretical and legal research regarding the obligation of digital establishment of the local L/C which is a result of amendments to the rules of operation for the Bank of Korea's trade finance. Further, it will analyze the legal and operational problems and its response plans for the establishment of the local trade integrated management system which promotes the digitalization of the local trade process.

  • PDF

A Study of Electronic Transaction Law : Basic Electronic Trasaction Law in Korea and Uniform Electronic Transaction Act (전자상거래법 소고 - 우리나라 전자거래기본법과 미국 통일전자거래법 (Uniform Electronic Transaction Act)을 중심으로 -)

  • Kim, Un-Young
    • Korean Business Review
    • /
    • v.13
    • /
    • pp.207-221
    • /
    • 2000
  • In this era of changing system, we may learn lesson from newly developed Uniform Electronic Transation Act(UETA) in 1999. Korea has its counterpart as the Basic Electronic Transaction Act and Electronic Signature Act made by 1999. While UETA stresses on transaction law between individuals, that of Korean stresses on the role of government in electronic transaction. Both laws have the common definitions as electronic record, electronic signature, however, UETA has its own definitions such as automated transaction, computer program, electronic agent, information, information processing system, and security procedure. Especially, transferable record in section 16 is one of the most unique concept which Korean law does not provide. Korean government is planning to introduce electronic note in the near future, which will make unprecedented reform in Korean financial industry. Since Korean law does not have such a concept as electronic note, revision of the law is expected soon. Korean law has its specialty which puts stress on cyber mall, authentication agency, and consumer protection. In U.S., the interpretation of law by court is important when they have disputes according to common law traditon. Studies on cases on disputes in U.S. is needed most for Korean application.

  • PDF

Enhancing Throughput and Reducing Network Load in Central Bank Digital Currency Systems using Reinforcement Learning (강화학습 기반의 CBDC 처리량 및 네트워크 부하 문제 해결 기술)

  • Yeon Joo Lee;Hobin Jang;Sujung Jo;GyeHyun Jang;Geontae Noh;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.129-141
    • /
    • 2024
  • Amidst the acceleration of digital transformation across various sectors, the financial market is increasingly focusing on the development of digital and electronic payment methods, including currency. Among these, Central Bank Digital Currencies (CBDC) are emerging as future digital currencies that could replace physical cash. They are stable, not subject to value fluctuation, and can be exchanged one-to-one with existing physical currencies. Recently, both domestic and international efforts are underway in researching and developing CBDCs. However, current CBDC systems face scalability issues such as delays in processing large transactions, response times, and network congestion. To build a universal CBDC system, it is crucial to resolve these scalability issues, including the low throughput and network overload problems inherent in existing blockchain technologies. Therefore, this study proposes a solution based on reinforcement learning for handling large-scale data in a CBDC environment, aiming to improve throughput and reduce network congestion. The proposed technology can increase throughput by more than 64 times and reduce network congestion by over 20% compared to existing systems.