• Title/Summary/Keyword: 사이버 거래

Search Result 161, Processing Time 0.029 seconds

Factors that Affect the Intention of Password Security Behavior (패스워드 보안행위의도에 영향을 미치는 요인)

  • Lee, Dong-Hee;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.187-198
    • /
    • 2018
  • Recently, financial transactions and electronic commerce in cyberspace are being performed more quickly and conveniently, with the development in diverse types of fintech and biometric authentication. But user authentication using passwords still occupies a big proportion even in these new services. therefore, safe creation and management of passwords is fundamental and indispensable to protect personal information and asset. This study examined the patterns of password usage by conducting a survey and analyzed factors influencing password security behavior intentions using the heath belief model. As a result, perceived susceptibility, perceived severity, perceived benefits, and perceived barriers significantly affected security behavior intentions, and especially, perceived severity had a moderating effect in other factors.

A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis (봉쇄와 보안장비 수준 기반 정보보호 위험관리 수준 측정 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1261-1266
    • /
    • 2021
  • Existing information security risk assessment methods focus on evaluating the vulnerability of information assets. However, when the form of information assets changes and new types of information assets emerge, there is a limitation in that the evaluation standards for them are also added or deleted. Existing methods have insufficient research on the path through which cyber threats are introduced. In particular, there is very little research on blocking the inflow path for web-based information systems with public IPs. Therefore, this paper introduces the main research contents of the BDLA (Blockade and Defense Level Analysis)-based information security risk assessment model. In addition, by applying the BDLA-based information security risk assessment model, the information security risk level was studied by measuring the blockade level and security equipment level of 17 public institutions.

For the financial institution computer system security, research (금융기관 전산시스템 보안 강화에 대한 연구)

  • Kim, Myung-Soo;Choi, Dae-Young;Seo, Won-Woo;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.67-70
    • /
    • 2014
  • Last was the main issue of financial security in the future will be more emphasis on security. Such as March 20, 2013 Computational crisis, June 25 Cyber terrorism information to credit card companies and customers due to carrier spill in Financial computational security measures 'released in 2014 and the financial authorities' customer information leakage prevention measures "were published the efforts to protect customers' information assets and ensure the stability of the financial transactions carried out by financial institutions protected status check "the information annually authorities This study business operations for the protection of information technology services for IT systems security equipment, data security operating services, security management services operations, operational management of IT systems security requirements from the point to the need for information security, IT systems administrator it would be great help.

  • PDF

Ethereum Phishing Scam Detection based on Graph Embedding and Semi-Supervised Learning (그래프 임베딩 및 준지도 기반의 이더리움 피싱 스캠 탐지)

  • Yoo-Young Cheong;Gyoung-Tae Kim;Dong-Hyuk Im
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.165-170
    • /
    • 2023
  • With the recent rise of blockchain technology, cryptocurrency platforms using it are increasing, and currency transactions are being actively conducted. However, crimes that abuse the characteristics of cryptocurrency are also increasing, which is a problem. In particular, phishing scams account for more than a majority of Ethereum cybercrime and are considered a major security threat. Therefore, effective phishing scams detection methods are urgently needed. However, it is difficult to provide sufficient data for supervised learning due to the problem of data imbalance caused by the lack of phishing addresses labeled in the Ethereum participating account address. To address this, this paper proposes a phishing scams detection method that uses both Trans2vec, an effective graph embedding techique considering Ethereum transaction networks, and semi-supervised learning model Tri-training to make the most of not only labeled data but also unlabeled data.

Analysis of trends in information security using LDA topic modeling

  • Se Young Yuk;Hyun-Jong Cha;Ah Reum Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.99-107
    • /
    • 2024
  • In an environment where computer-related technologies are rapidly changing, cyber threats continue to emerge as they are advanced and diversified along with new technologies. Therefore, in this study, we would like to collect security-related news articles, conduct LDA topic modeling, and examine trends. To that end, news articles from January 2020 to August 2023 were collected and major topics were derived through LDA analysis. After that, the flow by topic was grasped and the main origin was analyzed. The analysis results show that ransomware attacks in 2021 and hacking of virtual asset exchanges in 2023 are major issues in the recent security sector. This allows you to check trends in security issues and see what research should be focused on in the future. It is also expected to be able to recognize the latest threats and support appropriate response strategies, contributing to the development of effective security measures.

Impact of Information and Communication Technologies on Spatial Structure (정보화와 정보기술이 공간구조에 미친 영향)

  • 박삼옥;최지선
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.119-144
    • /
    • 2003
  • This study attempts to figure out the impact of Information and communication technologies (ICTs) on spatial structure and to speculate on spatial strategies in the electronic economy from a geographical perspective. The unprecedented development of ICTs based on the explosive use of the Internet was enough to lead to the expectation that physical distance would not be a significant barrier in business activities. In fact, however, at least at a current stage, the development of ICTs has not automatically removed the inequality in spatial structure. The accessibility to electronic space is different by economic and social status within a country as well as between countries. The importance of place, locality, and place-specific assets has been strengthened in the global economy. Physical proximity is still of great importance because it helps to minimize transaction costs, to exploit place-specific social networks, and to accumulate credibility for successful businesses. Likewise, the development of electronic commerce such as B2B and B2C EC also does not necessarily result in the ignorance of place and locality. Rather, the recognition of the importance of spatial strategies is extremely important for the success in online businesses. As a conclusion, the spatial dimension becomes more important in the digital era for successful businesses and balanced regional developments than ever before. The need for the improvement of ICT infrastructures, the development of human resources, and the establishment of regional innovation systems in peripheral areas cannot be overemphasized even in the digital era.

  • PDF

다세대 확산모형을 활용한 기업용 전용선 서비스 시장 수요예측

  • 전효리
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.338-341
    • /
    • 2001
  • 본 연구는 현재 정부의 규제완화 및 다양한 대체서비스의 등장으로 인해 점차 시장내 경쟁이 심화되어 가고 있는 기업용 전용선 서비스 시장에 있어 향후 경쟁상황이 어떻게 진행될지에 대한 연구를 통하여 이에 속한 기업들의 향후 시장전략을 제시하는 것을 목적으로 하고 있다. 향후 경쟁상황을 예측하는데 있어 본 연구에서는 사용하는 방법론으로 첫째, 기업용 전용선 서비스 시장의 전체 수요예측을 우선적으로 실시한 후 둘째, 전체 시장의 수요를 바탕으로 이에 속하는 개별 서비스간의 경쟁관계와 대체관계에 의한 개별 서비스 수요를 예측하게 된다. 이상과 같은 서비스간의 수요를 도출함으로써 시장내 경쟁상황과 경쟁정도를 파악하게 된다. 현재 기업용 전용선 서비스 시장의 경우 가장 큰 특징이 바로 신규 대체 서비스들의 등장이고, 이들 서비스에 의해 전체 시장규모가 얼마나 성장할 것인지, 전체 시장에서 개별 서비스들의 기여도는 어느 정도가 되는지가 최대 관심사이다. 이에 대한 문제를 해결하기 위해 본 연구에서는 신규 대체 서비스가 시장에 진입하였을 때 파급효과가 얼마나 되는지를 추정하여 수요를 예측하였다. 이에 대한 추정결과 연구대상으로 하고 있는 전용회선서비스, 프레임릴레이서비스, 가상사설망서비스에서 전용회선서비스에 대한 타 유사서비스들의 영향력은 그리 크지 않는 것으로 나타났으며, 이에 반해 가상사설망서비스는 프레임릴레이서비스를 대체하고 있는 것으로 분석되었다. 연구 결과를 통해 사업자들은 향후 시장경쟁 상황을 예측할 수 있기 때문에 이에 대해 적절한 사업전략을 수립하는데 큰 도움을 얻게 되리라 기대한다.적 분할납품 전략 적용 수요지로 선택하고 사이버 거래를 통해 생성된 물류가 부분적 분할납품 전략 적용 수요지에 분배되게 함으로써 각 분배 센타의 재고 완충역할을 수행하게 한다. 이에 따라 안전 재고 및 역 배송을 최소화 할 수 있을 뿐 아니라 미 출고로 인한 손실을 최소화하며 고객의 서비스를 일정하게 유지시킬 수 있을 것으로 기대된다.증진, 페기물 발생 억제 분야에 상당한 성공을 거두었으며, 지금도 지속적으로 유지 관리 및 미비한 부분(CAER, 등)의 향상에 노력하고 있다. Dow Korea의 수입 판매 부분에 주로 관련된 Product Stewardship 및 Distribution Code는 여러 사업부 및 여러 지역(미국, 유럽, 아시아 등)에 위치한 담당자가 관련된 까닭에 가장 복잡한 부분이어서 많은 인력과 시간을 소비하면서 노력하고 있으나 아직까지 소정의 목표에 도달하지 못했으며, 2000년 말에 모든 실행지침이 실행되도록 목표, 실행 계획 및 조직을 수정하여 노력하고 있다.lumn density at distant position from MD5 is larger than that in the (:entral region. We have deduced that this hot-core has a mass of 10sR1 which i:s about an order of magnitude larger those obtained by previous studies.previous studies.업순서들의 상관관계를 고려하여 보다 개선된 해를 구하기 위한 연구가 요구된다. 또한, 준비작업비용

  • PDF

The Nuclear Security Summit Achievements, Limitations, and Tasks against Nuclear Terrorism Threat (핵테러리즘 위협에 대한 핵안보정상회의 성과, 한계 및 과제)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.

Design and Implementation of a Comparative Shopping Agent for E-Commerce (비교쇼핑 에이전트의 설계와 구현)

  • Choi, Moo-Jin;Hwang, Jin-Yeol
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.97-113
    • /
    • 2005
  • This paper designed and implemented(programmed) a comparative shopping agent that helps consumers to shop at on-line shopping malls over Internet. At offline stores, as consumers usually tell a sales clerk about a manufacturer, functions and price range of an item they want to purchase, the sales clerk will show the products or relevant catalogues. Then the consumer will compare functions, design and prices of the product and buy it with the lowest price. PriceMeter, a comparative shopping agent, introduced in this paper, is designed best geared to this consumers' buying behavior. Basically, as consumers enter a manufacturer's name, price, features and etc. at a search window, PriceMeter will search the web and provide a list of product informations such as features and prices that meet the search conditions. Consumers can see the information in either a form of catalogue or a printing format. As consumers click specific items to examine closely, it will show prices and information about shopping malls that sell the requested items. Clicking a 'Buy' icon, the consumers will be transferred to the right web page at the linked shopping mall. The emergence of the comparative shopping agent will expedite a consumer-centered retailing economy in the age of e-commerce. As consumers are provided with a better set of product and shopping mall information, they can make better purchasing decisions and gain more bargaining power shifted from manufacturers(sellers). The presentation of this comparative shopping agent is intended to promote the consumer-centered B2C e-commerce.

A Study of Financial Structure, Profitability, Growth and Financial Risk of Food Service Franchisor (외식산업프랜차이즈본사의 재무구조, 수익성, 성장성 및 재무위험에 관한 연구)

  • Choi, Hoang-Taig
    • The Korean Journal of Franchise Management
    • /
    • v.5 no.1
    • /
    • pp.85-108
    • /
    • 2014
  • This study provides the information about size, financial structure, profitability and growth of franchisors using financial data(asset, liability, equity, sales volume, operating income and net income) in uniform franchise offering circular of fair trade commission. The data were collected from 1,050 franchisors in various business fields: fast food, family restaurant, bakery, agriculture & fishery and liquor shop in the uniform franchise offering circular in 2012 and 2011. Results of this study are as follows: For company size, median of total assets was KRW 675 million and the accumulated median assets rate was 0.48%, but the accumulated median company numbers were 49.9%, which showed small size. For financial structure, 525 companies were below 200% debt ratio, while 314 (29.9%) companies were in over 200% debt, and 211 (20.1%) companies were impaired in capital. These also showed financial structure was vulunerable. For profitability, median of ROA for total companies were only 4.72%, which showed low profitability. For growth, median of growth rate for sales were 7.57% per year, which showed mature industry. In overall, the results showed franchisors should improve their financial status.