• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.047 seconds

A Study on the Factors Influencing the User Experience of Mobile Payment Services in China -Centered on people in their 20s and 30s- (중국의 모바일 결제 서비스의 사용자 경험에 영향을 미치는 요인에 관한 연구 -20,30대 중심으로-)

  • Du, Jian;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.271-276
    • /
    • 2021
  • This study is about finding factors affecting user experience in China's mobile payment. The recen development of 5G networks and the spread of phones provide the basis for the development of mobile payment, and the development of mobile payment is showing a rapid upward trend. Because of the simplicity and mobility, it is appealing to people, especially young people. Therefore, this study conducted a survey on mobile payment users in 20s and 30s and confirmed the factors affecting the user experience through regression analysis. Unlike previous studies on mobile payment technology, this study focused on user experience and identified factors affecting user experience, so it is expected to be helpful in the development of mobile payment in China.

A Study on Smart Contract for Personal Information Protection (개인정보보호를 위한 스마트컨트랙트 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.215-220
    • /
    • 2019
  • The block chain technology is a technique that prevents manipulation of data and ensures integrity and reliability. Ethereum is building a smart contract environment as a type of encryptionenabled system based on block chains. Smart contracts can be implemented when conditions are met, thus increasing confidence in digital data. However, smart contracts that are being tried in various ways are not covered by information security and personal information protection. The structure in which the network participant can view the open transaction ledger is exposed to data or personal information listed in the block chain. In this study, it is possible to manage the data of personal information recorded in the block chain directly. This study is protected personal information by preventing the exposure of personal information and by executing time code, it is possible to erase recorded information after a certain period of time has elapsed. Based on the proposed system in the future, it is necessary to study the additional management techniques of unknown code defects or personal information protection.

Exploring the Performance of Synthetic Minority Over-sampling Technique (SMOTE) to Predict Good Borrowers in P2P Lending (P2P 대부 우수 대출자 예측을 위한 합성 소수집단 오버샘플링 기법 성과에 관한 탐색적 연구)

  • Costello, Francis Joseph;Lee, Kun Chang
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.71-78
    • /
    • 2019
  • This study aims to identify good borrowers within the context of P2P lending. P2P lending is a growing platform that allows individuals to lend and borrow money from each other. Inherent in any loans is credit risk of borrowers and needs to be considered before any lending. Specifically in the context of P2P lending, traditional models fall short and thus this study aimed to rectify this as well as explore the problem of class imbalances seen within credit risk data sets. This study implemented an over-sampling technique known as Synthetic Minority Over-sampling Technique (SMOTE). To test our approach, we implemented five benchmarking classifiers such as support vector machines, logistic regression, k-nearest neighbor, random forest, and deep neural network. The data sample used was retrieved from the publicly available LendingClub dataset. The proposed SMOTE revealed significantly improved results in comparison with the benchmarking classifiers. These results should help actors engaged within P2P lending to make better informed decisions when selecting potential borrowers eliminating the higher risks present in P2P lending.

Quality Analysis for the Data Distribution Service of the Real-time Integrated Railway Safety Monitoring and Control System (실시간 철도안전 통합 감시제어시스템의 데이터 분산 서비스 품질 적합성 분석)

  • Kim, Sang Ahm;Kim, Seon Woo
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.351-361
    • /
    • 2018
  • In this paper, we analyse DDS(Data Distribution Service) QoSs(Quality of Services) with experiments, which can control the network transmission quality provided by 'Object Management Group' DDS standard to satisfy the data transmission quality requirements of 'Real-time integrated railway safety monitoring and control system(RIRSMCS)'. 'RIRSMCS' is a system for collecting and analyzing data from various sensors at a railway field to predict and prevent the risk of potential railway accidents. Data transmission quality should be ensured for transmitting the collected data in real-time, accurately and stably for this system. Experimental results show that it is possible to ensure real-time, accurate and stable data transmission for monitoring and control of railway safety using DDS QoS.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

Factors Influencing Information Privacy Behavior: A Replication Study

  • Kim, Gimun;Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.231-237
    • /
    • 2021
  • Over a decade ago, Krasnova et al. identified the factors that influence Facebook users' self-disclosure. These factors include perceived risks, relationship building, relationship maintenance, self-presentation, and enjoyment. Meanwhile, during the past 10 years, there have been significant changes in terms of function, media, and competition. SNSs have been functionally enhanced, used in mobile environment, and had many competitors. Based on these facts, it is believed that the influence of the factors on self-disclosure is different from those of Krasnova et al. The purpose of this study is to verify through a replication study whether the factors adopted in the study of Krasnova et al. are still important in explaining self-exposure. The study empirically find the result significantly different from those of Krasnova et al. Based on the result, the study provides meaningful implications and suggestions for future research.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

IC Card Security System for CEPS in Internet (CEPS 인터넷 서비스를 위한 IC카드 기반의 보안 시스템 구축)

  • Lee, Jong-Hoo;Ra, Eun-Ju;Baek, Sang-Soo;Ji, Seok-Jin;Lee, Yong;Ryu, Jae-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.23-37
    • /
    • 2002
  • As the world-wide use of the Internet increases rapidly due to development of computer network the Electronic Commerce for business by treating it is growing as compared to the traditional one for the information exchange in the academic and research areas. The Electronic Payment System used for EC includes the Payment Broker System and the Electronic Purse System. And usually Electronic Purse System operates with IC cards. Saving the money in IC card has a high portability and security. Therefore, the Electronic purse System based on IC card is recently issued in the EC. In this paper, we design and implement of a IC card security system for Common Electronic Purse Specifications in Internet. CEPS is a Electronic Purse System proposed VISA, and conform EMV(Europay Mastercard VISA) security structure. With our system, users easily use Electronic Purse System with only Web browser and IC card. Original EMV paid no regard to using in the Internet. But our system, conforming to CEPS and EMV, is easily used in the Internet.

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

A Study on the Blockchain-Based Insurance Fraud Prediction Model Using Machine Learning (기계학습을 이용한 블록체인 기반의 보험사기 예측 모델 연구)

  • Lee, YongJoo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.270-281
    • /
    • 2021
  • With the development of information technology, the size of insurance fraud is increasing rapidly every year, and the method is being organized and advanced in conspiracy. Although various forms of prediction models are being studied to predict and detect this, insurance-related information is highly sensitive, which poses a high risk of sharing and access and has many legal or technical constraints. In this paper, we propose a machine learning insurance fraud prediction model based on blockchain, one of the most popular technologies with the recent advent of the Fourth Industrial Revolution. We utilize blockchain technology to realize a safe and trusted insurance information sharing system, apply the theory of social relationship analysis for more efficient and accurate fraud prediction, and propose machine learning fraud prediction patterns in four stages. Claims with high probability of fraud have the effect of being detected at a higher prediction rate at an earlier stage, and claims with low probability are applied differentially for post-reference management. The core mechanism of the proposed model has been verified by constructing an Ethereum local network, requiring more sophisticated performance evaluations in the future.