• Title/Summary/Keyword: CyberBank

Search Result 29, Processing Time 0.03 seconds

Implementation of payment settlement system through Cyber Bank for Electronic Commerce (전자상거래용 사이버뱅크의 지불결제시스템 구축)

  • Kim, Moon-Shik;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.121-130
    • /
    • 2008
  • In line with the enhanced weight and variety of electronic commerce in business activities, new type of payment settlement and banking system which will enable to store, create and transfer values from the existing method of payment settlement is highly required. Cyber Banking system draws strong attention being the solution of there requirements. The existing Cyber Banking system has the difficulty of operation, administration, in addition to the problem of initial facility investment of big amount, resulted from the usage of the current business process. As the existing Cyber Bank system is unable to carry out the function of storing, creating, and transferring values due to the adoption conventional credit card system instead of the application of non-stop payment system between the seller and buyer. As a result, current Cyber Bank system still imply the deficiency of non-performing cash payment function on internet. This paper describes (1) an integrated application process, One Process One Input (OPOI) which is essential for software development of the Cyber Bank, (2) an application process of payment settlement system to be applied to the electronic commerce in Internet. And then, with these for a basis, (3) design and implementation of payment settlement system through CyberBank for Electronic Commerce. Consequently, by means of this suggested process, we could attempt to solve the problem of existing Cyber Bank system and further to explore the possibility of advanced Cyber Banking being the non-stop payment settlement system. The effectiveness of this suggested system has been practically confirmed.

Design and Implementation of the Internet Problem bank for the Fairness test on the Realtime Multimedia Education Environment (실시간 멀티미디어 교육에서 공정 평가를 위한 인터넷 문제 은행의 설계 및 구현)

  • 김종률;박길철
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.797-801
    • /
    • 2002
  • Information network technologies introduce a new education environment. Cyber education is growing rapidly as a field of practice especially in distance education system. The development of multimedia environment based on such technology as graphics, image, voice, and video, personal computer systems use has become the media for interactive teaching-teaming service. These features have made integrated multimedia education feasible. This research suggested a direction for the development of an interactive distance education system. I have developed an education system which cooperate problem bank and learning system. This system support arbitration of the relative difficulty in the problem bank database. An ongoing version of this research was evaluated. Those findings reveal several factors that influence how the proposed system can be tailored to the students' perspectives in order to come up with the enhanced version of this system.

  • PDF

A Study on the Necessity of Establishing the National Cyber Security Act through a Comparative Legal Analysis (국내 관련 법과 비교 분석을 통한 국가사이버안보법안의 제정 필요성 연구)

  • Kim, Sung-Hyun;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.9-35
    • /
    • 2018
  • During the recent years, cyber attacks have been increasing both in the private sector and the government. Those include the DDOS cases in 2009, the Blue House cyber attack, bank hackings etc. Cyber threats are becoming increasingly serious. However, there is no basic law related to cyber security at present, and regulations related to cyber security are scattered in various domestic laws. This can lead to confusion in the application of the law and difficult to grasp the regulations related to cyber security. In order to overcome this situation, the bill on the prevention and countermeasures against cyber crisis was initiated in 2006, but it has been abrogated. Since then, it has been repeatedly proposed, but it has been abrogated repeatedly due to the overlapping of existing laws and concerns about infringement of personal information. The most recent initiative was the National Cyber Security Act, which was initiated by the government in January 2017. The act focuses on resolving the absence of a basic law related to cyber security, strengthening its responsiveness in the event of a cyber security crisis, and fostering security strength. Therefore, this study seeks to contribute to the establishment of National Cyber Security legislation as a basic law of cyber security by examining the necessity of National Cyber Security legislation through comparative legal analysis with existing domestic laws related to cyber security and suggesting policy implications.

A Study on Development of GenBank-based Prototype System for Linking Heterogeneous Content (GenBank를 활용한 이종의 콘텐트 연계 프로토타입 시스템 개발 연구)

  • Ahn, Bu-Young;Shin, Young-Ju;Kim, Dea-Hwan
    • Journal of Information Management
    • /
    • v.40 no.4
    • /
    • pp.109-133
    • /
    • 2009
  • Among biological information, GenBank, provided by the National Center for Biotechnology Information (NCBI)of the United States, is a representative database on genetic information and is the most widely used by researchers around the world. Korea Institute of Science and Technology Information (KISTI) visits NCBI on a regular basis and downloads the latest version of GenBank to reorganize the information gathered there into a database. This database is provided for Korean researchers of science and technology through the Bio-KRISTAL search engine, developed by KISTI. This study aims to design a service model that links information on papers, patents, and biodiversity and other contents of NDSL, an integrated service on scientific and technological information run by KISTI, with GenBank's reference and organism fields and to develop a prototype system. For this purpose, this paper explores the possibility of a linkage and convergence service between heterogeneous content by: (a) collecting GenBank data from NCBI's FTP site; (b) dividing GenBank text files into basic and reference genetic information and restructuring them into a database; (c) extracting article and patent information from the GenBank reference fields to generate new tables; and (d) leveraging data mapping technology to implement a prototype system where GenBank and NDSL data are interlinked and provided.

The Development of a Project-Based Cyber Learning Community for Teacher Education (교사교육을 위한 프로젝트 기반 가상학습커뮤니티 구축)

  • Jo, Mi-Heon;Lee, Ok-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.2
    • /
    • pp.243-254
    • /
    • 2005
  • Along the information technology progresses, the demand for the educational application increases which derives the need for cyber education. Cyber education should take the knowledge construction model rather than the knowledge delivery model. For the educational paradigm shift by cyber education, 'Project-Based Learning' and 'Cyber Learning Community' need to be adopted. In this study, project-based cyber learning community for teacher education is developed with 5 major categories: Home(community vision, general information, project list, Q&A), project learning center(preparation for the instructional activities, group-based learning activities, presentations), meeting plaza(request for group mentoring, sharing ideas, meeting specialist, survey participating, forum participating, result presentation), references(cases of project studies, materials for project studies, materials for teacher education, general materials), management(project management, project cases, idea bank, finding partners, dialog with instructors, sharing references, sharing experiences, survey, forum).

  • PDF

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks

  • Pan, Hongyu;Fang, Yong;Huang, Cheng;Guo, Wenbo;Wan, Xuelin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4008-4023
    • /
    • 2022
  • Since machine learning was introduced into cross-site scripting (XSS) attack detection, many researchers have conducted related studies and achieved significant results, such as saving time and labor costs by not maintaining a rule database, which is required by traditional XSS attack detection methods. However, this topic came across some problems, such as poor generalization ability, significant false negative rate (FNR) and false positive rate (FPR). Moreover, the automatic clustering property of graph convolutional networks (GCN) has attracted the attention of researchers. In the field of natural language process (NLP), the results of graph embedding based on GCN are automatically clustered in space without any training, which means that text data can be classified just by the embedding process based on GCN. Previously, other methods required training with the help of labeled data after embedding to complete data classification. With the help of the GCN auto-clustering feature and labeled data, this research proposes an approach to detect XSS attacks (called GCNXSS) to mine the dependencies between the units that constitute an XSS payload. First, GCNXSS transforms a URL into a word homogeneous graph based on word co-occurrence relationships. Then, GCNXSS inputs the graph into the GCN model for graph embedding and gets the classification results. Experimental results show that GCNXSS achieved successful results with accuracy, precision, recall, F1-score, FNR, FPR, and predicted time scores of 99.97%, 99.75%, 99.97%, 99.86%, 0.03%, 0.03%, and 0.0461ms. Compared with existing methods, GCNXSS has a lower FNR and FPR with stronger generalization ability.

A Comparative Study of Phishing Websites Classification Based on Classifier Ensemble

  • Tama, Bayu Adhi;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.617-625
    • /
    • 2018
  • Phishing website has become a crucial concern in cyber security applications. It is performed by fraudulently deceiving users with the aim of obtaining their sensitive information such as bank account information, credit card, username, and password. The threat has led to huge losses to online retailers, e-business platform, financial institutions, and to name but a few. One way to build anti-phishing detection mechanism is to construct classification algorithm based on machine learning techniques. The objective of this paper is to compare different classifier ensemble approaches, i.e. random forest, rotation forest, gradient boosted machine, and extreme gradient boosting against single classifiers, i.e. decision tree, classification and regression tree, and credal decision tree in the case of website phishing. Area under ROC curve (AUC) is employed as a performance metric, whilst statistical tests are used as baseline indicator of significance evaluation among classifiers. The paper contributes the existing literature on making a benchmark of classifier ensembles for web phishing detection.

Construction of Multi-Agent in Cyber-Space (사이버 스페이스 상에서 멀티에이전트 구축을 위한 연구)

  • 이달상;이춘근
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 1998.04a
    • /
    • pp.63-70
    • /
    • 1998
  • 인터넷 환경하에 전자상거래 분야는 이미 일부 선진국을 중심으로 성공적으로 도입, 운영되고 있다. 하지만 국내외적으로 전자상거래 분야는 전통적인 방법에 지나치게 편중되어 있어서 산업 발전에 여러 가지 제약을 받고 있는 것도 사실이다. 이러한 문제점을 개선, 보안하기 위해서 사이버 스페이스 상에서 에이전트 구축을 위한 판매 활동개념(미디어 에이전트 뱅크 시스템 : MABS; Media Agent Bank System)을 도입 했는데, 이것이 바로 판매 및 구매 정보시스템인 웹상에 있는 에이전트이다. MABS는 기업의 제조나 판매에서 발생하는 판매 정보를 국내외적으로 홍보하고 판매하여 실시간으로 기업이 판매 정보를 국내외적으로 홍보하고 판매하여 실시간으로 기업이 판매 정보를 즉시 공유하고 커뮤니케이션함으로써 기업의 생산성에 바로 반영되는 새로운 판매 방법론이다. MABS의 개념을 구현하기 위해 미디어 뱅크(주)에 의해서 개발되고 있는 사이버 스페이스상의 에이전트 시스템은 기존의 전자 상거래 개념을 좀 더 개선하고 보완하려는 의도에서 개발된 중소 제조 산업을 위한 에이전트 구축 시스템이며, 이는 모든 산업분야에 응용하여 적용시킬 수 있는 도구로서 인터넷을 보다 활성화 시키는 기능을 갖는다.

  • PDF

A Study on the New Payment Methods in the Cyber Trade Age (사이버 무역시대(貿易時代)의 신결제방식(新決濟方式)에 관한 연구(硏究))

  • Park, Seok-Jae
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.237-256
    • /
    • 2000
  • Electronic commerce has been threatening to address the transaction inefficiencies in international trade that is conducted through letters of credit(L/Cs) and other forms of traditional paper-based financial instruments. The replacement of traditional paper documets with electronic alternatives is becoming more of a relity within a number of business sectors. The conceptual model of electronic L/Cs presented in this paper is intended to provide a framework for discussing the development of a paperless credit. The TradeCard network provides a business-to-business e-commerce infrastructure that enables buyers and sellers to conduct and settle international trade transactions securely over the Internet. Sellers and Buyers should select the best payment methods of traditional L/Cs, electronic L/Cs, TradeCard, Bank Credit Card etc. in consideration of their business circumstances.

  • PDF