• Title/Summary/Keyword: 보안회사

Search Result 230, Processing Time 0.024 seconds

자판기 불법자금모집업체 식별 및 근절대책

  • 한국자동판매기공업협회
    • Vending industry
    • /
    • v.3 no.1 s.9
    • /
    • pp.64-69
    • /
    • 2004
  • 고수익을 미끼로 한 자판기 분양사기가 최근 급증하고 있어 큰 문제가 되고 있다. 무조건 자판기 수익성만을 과대포장하여 투자자들의 `묻지마` 투자를 유도한 후 돈만 챙기고 사업에서 손을 떼어버리는 사기행각은 그 피해대상이 대부분 서민이라는 점에서 문제의 심각성을 더한다. 자판기가 불법 자금 모집을 통해 사기의 대상으로 외부 인식이 악화되어 버린다면 자판기 산업의 입지 역시 크게 좁혀 질 수 밖에 없다. 자판기 품목에 있어서는 불법자금모집의 대표적인 사례가 되는 경우는 확정수익을 보장한다며 투자자를 모집하는 경우이다. 그 후 일정기간동안 수익을 보장하며 투자자를 안심시킨 다음 일순간 돌변하여 자금을 챙겨 잠적을 하는 수순을 밝는다. 선의의 투자자들은 이럴 경우 엄청난 피해를 입게 되는 게 보통이다. 대개의 경우 기계 1~2대의 소량물량이 아닌 5대~l0대 단위의 투자를 유도하기 때문이다. 이제는 자판기 산업에 있어 이러한 악성 불법자금 모집업체들이 근절되어야 한다. 이 불법 사기행각의 대상이 더 이상 자판기 분야에 발을 붙이지 못하도록 하는 제도적 비책이 시급히 강구 되어야 한다. 이러한 가운데 금융감독원 비은행감독국 비제도금융조사팀에서는 올들어 지난 9월말까지 고수익을 미끼로 투자자금을 모집하다가 금감원에 적발된 유사 금융업체 85개사 명단을 사법당국에 통보했다. 불법자금모집 업체들이 투자자들을 유혹하기위해 미끼로 내세운 사업을 종류별로 보면 자판기, 게임기, 컴퓨터단말기 등 특정상품 운영권 제공이 29개사로 가장 많고, 사이버 쇼핑몰 및 인터넷사업(18개사), 납골당 등 부동산 투자(12개사), 영화등 문화 및 레저사업(10개사), 영화문화 및 레저산업(10개사), 벤처투자사(9개사) 등이었다. 자판기 분야에 있어서는 주로 성인용품자판기, 복권자판기 등의 품목이 불법자금 모집의 집중 타킷이 되었다. 금감원은 최근들어 유사 금융업체의 자금모집이 전문가도 속을 정도로 지능화하고 있다며 개인투자자들이 피해를 예방할 수 있는 불법업체 식별법을 금감원 인터넷 사이트(www.fss.or.kr)에 게시했다. 금감원은 특히 사업현황에 대해 지나치게 보안을 유지하는 업체, 1백$\%$이상의 터무니없는 고수익을 보장한다고 광고하는 업체, 제도권 금융회사의 지급보증을 강조하는 업체에 대해서는 투자에 앞서 금감원이나 업종 관련 정부당국에 사실여부를 확인해 보고 투자여부를 결정하라고 통보했다. 아울러 금감원은 금융소비자들이나 자판기 업계에서 불법자금 모집업체를 발견하여 전화(02-3786-8155~9)나 인터넷소비자 보호센터와 경찰에 신고해줄 것을 요청했다. 이제는 산업계도 더 이상 자판기 분야의 불법자금업체를 방치하지 말고 적극적인 금감원 신고를 통해 시장을 정화할 수 있게 해야 한다. 미꾸라지 한두마리가 온 개천 물 다 흐려놓는 이치처럼 자판기불법자금업체들로 인해 전체 산업에 미치는 영향이 실로 심각함을 인식해야 할 때이다. 금호 산업정보에서는 산업계에서 불법자금업체 근절에 많은 관심을 가질 수 있게 하기 위해 금융감독원 비은행감독국 비제도금융조사팀에서 배포한 $\ulcorner$불법자금 모집업체 고수익 보장 유혹에 주의$\lrcorner$ 에 대한 보도자료의 세부내용을 게재한다.

  • PDF

The Development Scheme of Domestic Third Party Logistics for Revitalization of Electronic Trade (전자무역의 활성화를 위한 국내 제3자물류 발전방안)

  • Cha, Soon-Kwean;Jang, Heung-Hoon
    • Journal of Korea Port Economic Association
    • /
    • v.24 no.2
    • /
    • pp.155-174
    • /
    • 2008
  • This paper proposed several activation strategies at both the government and company parts for the development of domestic third party logistics(TPL) to pull electronic trade era much earlier. In the government side, it must need to arrange and integrate complex regulation rules on the Logistics for more smooth access and use the TPL market. Also, it has to provide multiple support policies such as tax reduction, technical and financial service providing, and logistics information system to TPL. Finally, it should construct the government levels education system to train and forster a competent man who is well qualified as a electronic and logiscic expert. The TPL company must build up a total logistics information system concerned with an innovative operation system such as SCM, JIT etc. which can provide logistic services on demand to the electronic trade customers to maximize consumer satisfaction. In the shipper company level, it try to join a long-term strategic alliance with TPL to reduce logistic cost and increase logistic service to its electronic trade consumers.

  • PDF

An empirical study on the critical success factors of MRO e-marketplace (MRO e-marketplace의 성공 요인에 관한 탐색적 연구)

  • 김상수;하종태
    • Proceedings of the Korea Database Society Conference
    • /
    • 2001.11a
    • /
    • pp.473-505
    • /
    • 2001
  • 예측 기관에 따라서 B2B의 시장 규모 및 성장률에 대한 차이는 있지만 B2B 시장이 빠른 속도로 성장하고 있으며, 이 같은 추세는 계속될 것이라는 점에 대한 이견은 없는 편이다. B2B는 기업에게 비용 절감과 시간 절약, 업무 효율성 증대 등의 다양한 효과를 제공해 줄 수 있기 때문에 앞으로도 그 중요성은 더 커질 것으로 예상된다. 그러나 B2B의 중요성 및 성장세와는 별도로 아직까지 B2B에 참여하는 기업들이 큰 효과를 거두지 못하고 있는 것이 사실이다. 이에 따라 많은 학자들과 컨설팅 회사들이 B2B의 모형, 추진 전략, 성공 요인들을 다양한 각도에서 제시하고 있다. 하지만 B2B에 대한 실증적 연구가 부족하여, 기업의 실무자들이 실질적인 도움을 얻기에는 부족한 점이 있기 때문에 B2B의 성공 요인과 추진 전략에 대한 실증적 연구가 절실히 필요하다. 본 연구의 목적은 B2B 유형 중 가장 널리 활용되고 있는 MRO e-marketplace의 성공에 영향을 주는 요인들을 실증적으로 분석하는 것이다. MRO e-marketplace의 성공 요인을 환경적 특성, 제품 특성, B2B 사이트 특성 등 3 그룹으로 분류한 후, 38개 기업에서 수집된 설문지를 분석하여 MRO e-marketplace의 성공 요인을 실증적으로 분석하였다. MRO e-marketplace의 성공 요인들을 요인 분석한 결과, 기업 내부 환경 요인, 기업 외부 환경 요인, 제품 정보 요인, 제품 공급 능력 요인, 사이트 기본 기능 요인, 사이트 편의성 요인, 사이트 보안성 요인 등 총 8개 요인으로 분류되었다. 한편 MRO e-marketplace의 도입 효과를 측정한 비용 절감, 시간 절약, 업무 효율성 증대, 거래 투명성 증대 등의 4개의 문항은 하나의 요인으로 묶여, 이를 MRO e-marketplace 성공으로 정의하였다. MRO e-marketplace의 성공에 영향을 미치는 요인을 찾기 위해, 추출된 8개 요인과 MRO e-marketplace 성공 간의 상관 관계를 분석하였다. 8개 요인 중에서 기업 내부 환경 요인, 제품 공급 능력 요인, 사이트 기본 기능 요인이 MRO e-marketplace의 성공에 영향을 미치는 것으로 나타났다. 마지막으로 MRO e-marketplace 성공 요인들의 상대적 중요도를 파악하기 위해 회귀 분석을 실시하였는데, 참여 기업의 내부 환경 요인이 가장 큰 중요한 것으로 나타났고, 그 다음은 제품 공급 능력 요인과 사이트 기본 기능 요인으로 나타났다. 이 같은 실증적 결과는 MRO e-marketplace나 B2B의 성공을 위해서는 참여 기업의 내부 환경 조성이 매우 중요함을 시사해 준다. 또한 참여 기업의 제품 공급 능력 요인 역시 MRO e-marketplace의 성공에 직접적인 영향을 주기 때문에 공급기업들의 제품 공급 능력을 높이는데 노력해야 한다. 또한 MRO e-marketplace를 운영하는 기업들은 사이트의 기능을 높이는데 많은 노력을 기울여야 한다는 것을 시사하고 있다. MRO e-marketplace의 성공 요인을 실증적으로 분석한 본 연구의 결과는 MRO e-marketplace와 B2B의 추진 전략의 이론적 모형 개발에 유용하게 활용될 수 있을 것이다. 또한 본 연구의 결과는 MRO e-marketplace와 B2B의 성공을 높이기 위한 추진 전략을 수립하는데 유용하게 활용될 수 있을 것으로 기대된다.

  • PDF

A Study on the Protection for Original Technology and Improved Patent when Research Institutes or Universities Transfer their Research Outputs (출연연 및 대학에서 연구성과물의 기술이전 시 개량특허와 원천기술의 보호에 관한 검토 : H대학교와 D제약사의 신약후보물질 관련 개량특허 탈취논쟁여부를 중심으로 (대상판결: 서울중앙지방법원 2014.12.24. 선고 2013가합85597 판결))

  • Kang, Sun Joon;Kim, Min Ji;Won, Yoo Hyung;Oh, Keon Taek
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.313-333
    • /
    • 2017
  • As science and technology advanced, specialized and massive, development through mutual cooperation or research based on patent licensing such as material transfer contract, technology transfer contract etc are actively taking place to minimize or separate the cost and risk of R&D. In R&D, such mutual work can enjoy the merit of division of labor by effectively allocating resources and manpower to accomplish its goal. Inevitably, however, there are also many possibilities of disputes regarding the ownership and use of intellectual property rights resulting from such mutual/post-studies, or inventions upgraded by using prior patents. The case reviewed by this paper is noticeable regarding the recent trend of upgraded inventions. In the case, a pharmaceutical company conducted tests/assessments on the complete technology of patent owned by a university on the premise of transferring the technology, and then terminated the technology transfer contract due to reasons of toxicity. The university then filed a damage claim suit against the company for infringing the contract. This is a dispute case betw een a university which developed a potential ingredient for new medicine and a pharmaceutical company which agreed to transfer and receive the technological later on. Regarding the upgraded inventions of source patents, this case has many implications on the protection of prior patents, research contract, and research security to protect the accomplishment of research. This paper reviews the subject ruling and the protection of upgraded patents and source technologies. As critical notes, the paper also summarizes the major issues of case ruling to observe the standard of ruling patent infringement related to the extortion of upgraded patents. Then, through the ruling of the case above, the paper suggests implications and future strategies.

A Study on the Affecting Factors in Performance of Internal Leakage Prevention on Industrial Technology (산업기술의 내부 유출방지 성과에 영향을 미치는 요인에 관한 연구)

  • Ko, Gi-Choel;Jung, Jin-Sup;Choi, Sung-Kyu;Han, Kyeong-Seok
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.159-167
    • /
    • 2017
  • According to the statistics of the National Industrial Security Center under the National Intelligence Service, 209 national technologies have been leaked abroad in the past 5 years. Small and medium-sized enterprises and leakage by insiders accounted for 73% and 80% of them, respectively. This suggests that all the capabilities for preventing leakage of industrial technology should be focused on small and medium-sized enterprises and leakage by insiders. Related studies have been actively conducted on legal consideration of industrial technology leakage crimes, improvement of industrial security policies, and industrial security measures for preventing leakage of industrial technology, but adequate empirical studies have not been carried out on factors of leakage of industrial technology. In particular, there have been few studies on the effect of the experience of industrial technology leakage and enterprise scale(large enterprise, small and medium-sized enterprise) on achieving results in leakage prevention. Therefore, this study extracted factors affecting performance to prevent industrial technology leakage by analyzing previous related papers and to empirically analyze relationships with performance by applying the TAM model after classifying variables into the TOE framework by characterizing these properties.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

A Study on the Qualitative Evaluation Factors for Mobile Game Company (모바일게임 기업의 정성적 평가요인에 관한 연구)

  • Choi, Seok Kyun;Hwangbo, Yun;Rhee, Do Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.125-146
    • /
    • 2013
  • Nowadays, the performance of the mobile game sales is influencing the ranking of game companies listed on KOSDAQ. In the meantime, venture capital companies had focused on online game. Recently, however, they have great interest in mobile games and mobile game companies. In addition, angel investors and accelerators are increasing investment for the mobile game companies. The most important issues for mobile game investor is how to evaluate the mobile game companies and their contents. Therefore, this study derived the evaluation factors for the mobile game company. And research method converged of the opinions of both supply side and demand side of the game industry. Ten professionals who are responsible for the supply of the game industry and CEO group & development experts of game development company were selected for survey in this study. Also ten professionals who are responsible for the demand of the game industry and the investment company were selected for survey in this study. And Delphi technique was performed according to the survey. Management skills, development capabilities, game play, feasibility, operational capabilities has emerged as five evaluation factors to evaluate the mobile game company. And the 20 sub-factors including CEO's reliability were derived. AHP(Analytic Hierarchy Process) theory is applied to analyze the importance of the qualitative elements which were derived by Delphi technique. As a result, the analysis hierarchy of evaluation factors for the mobile game company was created. Pair-wise comparison for each element was performed to analyze the importance. As a result, 'Core fun of the game' (12,2%), 'Involvement of the game' (10.3%), 'Security Reliability' (8.9%), 'Core developers' ability' (7.6%) appeared in order of importance. The significance of this study is offering more objective methodology for realistic assessment and importance of elements to evaluate mobile game company.

  • PDF

A qualitative Research on Establishment of Department of Private Investigation and Its Future Direction (민간조사학과 개설의 필요성과 성장방향에 대한 질적 연구)

  • Jo, Sung-Gu;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.181-205
    • /
    • 2011
  • There are various discussions about introducing private investigation in South Korea these days, and training private investigators is one of the main topics. Training private investigators, unlike other training, is required to instill expertise and ethical quality into the trainees since the major task of the investigators includes protecting the lives of the citizens as well as their properties. Therefore, many agree to the idea that systematic educational programs need to be organized to produce private investigators with expertness and morality. In this study, we explored the opinions of those who are concerned with this issue of establishing private investigation in the university education and analyzed the data by using the NVivo 2 program. The result revealed that the reasons that people supported the idea of launching private investigator services were as follows. First, there is lack of manpower to maintain peace and public order in the country. Second, the police does not intervene actively and help harmed victims unless it is a consequential incident. Third, in position to wield public power, police officers cannot get involved in civil affairs. Also, absence of an academic institution to educate private investigators and lack of the police and clients' trust in private investigation were the two biggest reasons that people approved the proposal to introduce department of private investigation in universities. The interviewees of the study believed the outlook and future direction for private investigation would change depending on the status of the licensed private investigation business bill. Before the bill passes, they thought that the work of private investigators will be performed by insurance companies, foreign private investigation businesses, domestic consulting firms, and security providers which supply similar services. On the other hand, after the bill passes, they believed that numerous private investigator corporations resembling existing security corporations will be founded in addition to the current market, and that private investigation in the academic field will also be vitalized.

  • PDF

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.