• Title/Summary/Keyword: Contact Center Security

Search Result 16, Processing Time 0.027 seconds

Security Management Model for Protecting Personal Information for the Customer Contact Center (컨택센터의 고객 개인정보 보호 모델)

  • Kwon, Young-Kwan;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.117-125
    • /
    • 2009
  • In this paper, we analyze the Contact Center's specific-security characteristics, including the threat model and weakness and study effective security measures focussing on protecting customer's personal information. Also, we establish the information security management system to reduce the possibility of information leakage from the internal employee in advance. As a result, we propose the "Security management model for protecting personal information for customer Contact Center" that complies with current ISO/IEC JTC 1 ISMS 27000 series standards.

A Novel Non-contact Measurement Method for the Detection of Current Flowing Through Concealed Conductors

  • Yang, Fan;Liu, Kai;Zhu, Liwei;Hu, Jiayuan;Wang, Xiaoyu;Shen, Xiaoming;Luo, Hanwu;Ammad, Jadoon
    • Journal of Magnetics
    • /
    • v.22 no.1
    • /
    • pp.43-48
    • /
    • 2017
  • In order to detect the current flowing through concealed conductor, this paper proposes a new method based on derivative method. Firstly, this paper analyzes the main peak characteristic of the derivative function of magnetic field generated by a current-carrying conductor, and a relationship between the current flowing through the conductor and the main peak of the derivative function is obtained and applied to calculate the current. Then, the method is applied to detect the conductor current flowing through grounding grids of substations. Finally, the numerical experimental and field experiment verified the feasibility and accuracy of the method, and the computing results show that the method can effectively measure the conductor current of grounding grids with low error, and the error is within 5 %.

Applied Method of Security System for IP Contact Center (IP 컨택센터 개인정보보호 시스템 적용 방안)

  • Bae, Eun-Hee;Park, Seok-Cheon;Park, Jun-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.897-900
    • /
    • 2013
  • 개인정보 유출 등의 사례가 사회적 이슈로 대두됨에 따라 개인정보 보호에 대한 중요성이 더욱 부각될 것임을 보여주고 있다. 특히, 컨택센터의 경우는 고객정보에 접근할 수 있는 인가자의 수가 다른 기업들에 비해 월등히 많기 때문에 컨택센터의 특성을 고려한 개인정보 보호기술이 적용되어야 한다. 본 연구에서는 IP Contact Center의 특징과 개인정보 보호 방안의 취약점에 대해 알아보고 기존의 시스템 내 개인정보보호기술 적용방안을 제안한다.

A Study on Personal Information Protection amid the COVID-19 Pandemic

  • Kim, Min Woo;Kim, Il Hwan;Kim, Jaehyoun;Ha, Oh Jeong;Chang, Jinsook;Park, Sangdon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4062-4080
    • /
    • 2022
  • COVID-19, a highly infectious disease, has affected the globe tremendously since its outbreak during late 2019 in Wuhan, China. In order to respond to the pandemic, governments around the world introduced a variety of public health measures including contact-tracing, a method to identify individuals who may have come into contact with a confirmed COVID-19 patient, which usually leads to quarantine of certain individuals. Like many other governments, the South Korean health authorities adopted public health measures using latest data technologies. Key data technology-based quarantine measures include:(1) Electronic Entry Log; (2) Self-check App; and (3) COVID-19 Wristband, and heavily relied on individual's personal information for contact-tracing and self-isolation. In fact, during the early stages of the pandemic, South Korea's strategy proved to be highly effective in containing the spread of coronavirus while other countries suffered significantly from the surge of COVID-19 patients. However, while the South Korean COVID-19 policy was hailed as a success, it must be noted that the government achieved this by collecting and processing a wide range of personal information. In collecting and processing personal information, the data minimum principle - one of the widely recognized common data principles between different data protection laws - should be applied. Public health measures have no exceptions, and it is even more crucial when government activities are involved. In this study, we provide an analysis of how the governments around the world reacted to the COVID-19 pandemic and evaluate whether the South Korean government's digital quarantine measures ensured the protection of its citizen's right to privacy.

An Efficient Contact Angle Computation using MADD Edge Detection (적응성 방향 미분의 에지 검출에 의한 효율적인 접촉각 연산)

  • Yang, Myung-Sup;Lee, Jong-Gu;Kim, Eun-Mi;Pahk, Cherl-Soo
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.127-134
    • /
    • 2008
  • In this paper, we try to improve the accuracy of automatic measurement for analysis equipment by detecting efficiently the edge of a waterdrop with transparency. In order to detect the edge of a waterdrop with transparency, we use an edge detecting technique, MADD (Modified Adaptive Directional Derivative), which can identify the ramp edges with various widths as the perfectly sharp edges and respond effectively regardless of enlarging or reducing the image. The proposed edge detecting technique by means of perfect sharpening of ramp edges employs the modified adaptive directional derivatives instead of the usual local differential operators in order to detect the edges of image. The modified adaptive directional derivatives are defined by introducing the perfect sharpening map into the adaptive directional derivatives. Finally we apply the proposed method to contact angle arithmetic and show the effiency and validity of the proposed method.

  • PDF

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

Consideration for defense preparedness against non-traditional security threats (focused on the threat of infectious diseases) (비전통 위협에 대한 국방 업무수행체계 유지방안 (감염병 위협 중심으로))

  • Kwon, Hyukjin;Shin, Donggyu;Shin, Youngjoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.105-112
    • /
    • 2022
  • The national defense requires uninterrupted decision-making, even under direct or indirect impacts on non-traditional threats such as infectious diseases. Since all work utilizes the information system, it is very important to ensure the availability of the information system. In particular, in terms of security management, defense work is being performed by dividing the network into a national defense network and a commercial Internet network. This study suggests a work execution plan that takes into account the efficiency of work performed on the Internet and the effectiveness of security through effective defense information system operation. It is necessary to minimize the network contact point between the national defense network and the commercial Internet, and to select a high-priority one among various tasks and operate it efficiently. For this purpose, actual cases were investigated for "A" institution and characteristics were presented. Through the targeted tasks and operation plans to improve the effectiveness of defense tasks and ensure security, presented in this paper, it will be possible to increase the availability of task performance even in non-traditional threats such as infectious diseases.

An Empirical Study on Key Factors Affecting Churn Behavior with the Voices of Contact Center Customers (고객센터 상담내용 분석을 통한 이탈 요인에 관한 실증 연구)

  • Jang, Moonkyoung;Yoo, Byungjoon;Lee, Jaehwan
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.141-158
    • /
    • 2017
  • Along with IT development, customers are getting more easily to express their opinions using various IT channels. In this situation, complaint management is a pressing issue for companies to acquire and maintain loyal customers with low cost. Most of previous studies have investigated customer complaint information by quantitative variables such as demographic information, transaction information, or complaint frequency, but studies focusing on qualitative aspects of complaint information are limited. Therefore, this paper considers the possibility for customers to leave even when they complain occasionally or briefly. This paper analyzes the quantitive aspects as well as the qualitative aspects using sentiment analysis with Exit-voice theory. The dataset contains 268,364 inquiries of 46,235 customers obtained from a contact center of a private security company in Korea. This paper carries out logistic regression and the results imply that the customers's explicit response and their implicit sentiment have different effect on customers leave. This study is expected to provide useful suggestions for the effective complaint management.

A Study on the Application of FLO-2D Model for Analysis of Debris Flow Damage Area (토석류 피해지역 분석을 위한 FLO-2D 모형의 적용에 관한 연구)

  • Jo, Hang-Il;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.2
    • /
    • pp.37-44
    • /
    • 2022
  • As the frequency of torrential rains and typhoons increases due to climate change, the frequency of occurrence of debris flow is also increasing. In particular, in the case of Kangwon-do, the occurrence of damage caused by mountain disasters is increasing as it has a topographical characteristic where the mountains and the coast are in contact. In order to analyze the flow characteristics in the sedimentary part of the debris flow, input data were constructed through numerical maps and field data, and a two-dimensional model, FLO-2D, was simulated. The damaged area was divided into the inflow part of the debris flow, the village center, and the vicinity of the port, and the flow center and flow velocity of the debris flow were simulated and compared with field survey data. As a result, the maximum flow depth was found to be 2.4 m at the debris flow inlet, 2.7 m at the center of the village, and 1.4 m at the port adjacent to the port so the results were similar when compared to the field survey. And in the case of the maximum flow velocity, it was calculated as 3.6 m/s at the debris flow inlet, 4.9 m/s in the center of the village and 1.2 m/s in the vicinity of the port, so It was confirmed that the maximum flow center occurred in the section where the maximum flow rate appeared.

A Study on the Circular Multi-Family Housing for Designing Local Identity (지역성 구현을 위한 집합주택 원형 주거동의 표현 특성 연구)

  • Moon, Eun-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.4
    • /
    • pp.121-129
    • /
    • 2013
  • This study was aimed at determining the characteristics of circular multi-family housing under the assumption that the shape of a residential building affects local identity. A total of six case studies were included in this study, three case studies on idle historical industrial facilities turned into residential buildings and another three on multi-family housing located in newly developed residential complexes. The study drew its conclusions as follows. First, the design of circular multi-family housing was intended to maximize security and defense from the outside in older times. This was later developed as the terrace house style with geometric urban squares designed under the urban planning of the Baroque period. This evolved high-density housing with a courtyard in the center offering a green open space, with the aim of restoring a sense of humanity. Second, the six case studies on circular multi-family housing were analyzed from the viewpoint of each factor of local identity, including historical and cultural, landscape, and community. Third, the historical and cultural elements of circular multi-family housing are found in some unused historical industrial facilities remodeled into residential buildings. They provide new capabilities and shapes desired by society at a given time, while maintaining familiar styles and elements of history, integrating a legacy of the past into the present. Fourth, circular multi-family housing with unique shapes and structures often become landmarks of a region with their distinctive appearance against a uniform urban environment and the monotonous scenery of residential complexes. They also show a high level of visual awareness with the distinctive shapes made possible when new elements are added to a historical exterior. Finally, circular multi-family housing with courtyards in the center prompt social contact between inhabitants, especially with dormitories and rental houses for the low-income bracket, which provide a small individual units with high use common space. Circular multi-family housing are planned in a manner similar to a small village or a city. They are designed to enhance sense of community, allocating various public amenities and provide cultural and commercial spaces on the ground floor and courtyard areas.