• Title/Summary/Keyword: Financial Access

Search Result 296, Processing Time 0.023 seconds

Legal Research on FinTech Regulatory Sandbox Fostering Financial Innovations in Korea (핀테크 활성화를 위한 규제 샌드박스의 도입 방안 연구)

  • Ko, Young-Mi
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.213-267
    • /
    • 2017
  • Regulatory barrier is considered most challenging out of all FinTech barriers, which many technology innovators have always experienced. Even though technological solutions promise customers accessibility to more cost-effective and secured financial services, it is quite challenging to create regulatory environment that enables innovation FinTech industry. Especially, a common challenge FinTech innovators and business face is regulatory uncertainty and confusion rather than any particular regulation. Since many FinTech models are continuously introducing new innovative ways in providing financial services, significant confusion could be raised in applying principles of existing law and regulations. In addition, it is uncertain whether or not applying complex regulatory compliance model intended for large financial institutions to small start-ups is appropriate since most existing regulations and rules are established and introduced without considering innovative tools such as mobile instruments, e-trade, and internet. Therefore, new mechanism to access to regulatory information in a more cost-effective, quick and immediate way should be created. Regulators, technological innovators, and financial customers should cooperate each other to find out appropriate solutions for those issues. Many regulators are introducing regulatory sandbox which provides service providers with opportunities to test their innovations, during the test, providing regulators with enough time to understand risks of innovations. However, regulatory sandbox is not a panacea for all challenges to FinTech innovations. Therefore, regulators should make comprehensive and multidimensional efforts including regulatory sandbox in supporting FinTech ecosystem.

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

The Perceived Benefits of Electronic/digital Reference Services in Nigerian University Libraries: a survey

  • Uzoigwe, Comfort U.;Eze, Jacintha U.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.8 no.2
    • /
    • pp.49-65
    • /
    • 2018
  • Are the benefits derived from ICT based reference and information service worth the financial and other commitments devoted to it? In an attempt to answer this, this study delved into finding out the perceived benefits; the rational for ICT based reference services in Nigerian university libraries. The main objectives were to find out the purposes for using ICT facilities in reference services delivery and the perceived benefits derived from using ICT resources in reference and information services. Being a survey, questionnaire was used to collect data from the librarians of twelve (12) universities; two (2) each sampled from the six geopolitical zones of Nigeria. Data was analyzed using frequencies, mean scores and standard deviations. ANOVA statistical analysis was used to test the hypothesis of no significance difference in the benefits derived from ICT based reference services using p-value of 0.05 to calculate the level of significance. Findings showed that librarians and library users made use of ICT facilities for different reference purposes especially to obtain information they need using the internet. Other reference needs for which patrons used the ICT facilities included: - access to current e-books and e - journals, user education and access to global information in other libraries. Provision of current awareness services (CAS) and selective dissemination of information services (SDI), on-line searching using workstations in the library, provision of on-line public access catalogue (OPAC) services, keeping statistics of users of the reference section and compilation of bibliographies. Further findings showed that the librarians and library users derive a lot of benefits from their use of ICT facilities in reference services. The results showed that easy retrieval and dissemination of information to patrons were ranked highest by the librarians amongst others.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.

기술개발의 불확실성과 담보문제 해결을 위한 새로운 금융지원제도에 관한 연구 -다단계 금융지원과 신용금융제도의 제안-

  • 김선근
    • Proceedings of the Technology Innovation Conference
    • /
    • 1996.12a
    • /
    • pp.296-324
    • /
    • 1996
  • Technology financing is different from other forms of corporate financing such as equipment purchase or facility related financing in terms of its riskiness. It is, therefore, difficult for innovative entrepreneurs to access any fund even though there are various ready-made funds available for implementing their technology development projects. The objective of this paper is to suggest a new means of financial support, entitled "stepwise Financing Mechanism" and to introduce credit based financing program. The Stepwise Mechanism will alleviate riskiness of technology development greatly by dividing the process of the development. Also, a credit based financing will make market interest rate decline and may have the same result as increasing the supply of money.

  • PDF

The Development of Cloud Computing-Based Integrated EHS Management System for the Construction Companies (클라우드 컴퓨팅 기반 건설사용 EHS 통합관리시스템 개발)

  • Seo, Kwang-Kyu
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11b
    • /
    • pp.859-861
    • /
    • 2010
  • The construction companies are facing potential EHS(Environment, Health & Safety) of major accidents to cause casualties or a financial loss and increasing social responsibility. So, they have to voluntarily accomplish the EHS management system rather than passively with regard to EHS regulation. In this study, the integrated EHS management system is developed based on cloud computing, and construction companies are to materialize self-regulation EHS process of construction workplace and to standardize the total EHS business process using the developed system. The proposed system also provides risk analysis, education/control and continuous improvement for EHS tasks and users can easily access the system on the web at a low price through cloud computing service. Eventually, the integrated system contributes to the managerial improvement by minimizing economic and physical loss caused by construction accidents.

  • PDF

A Study on the Causes of Deteriorating International Competitiveness of Korean Shipping: with Reference to Cost of Capital (한국해운의 국제경쟁력 저하요인에 관한 연구: 자본비를 중심으로)

  • 오학균;이태우
    • Journal of the Korean Institute of Navigation
    • /
    • v.23 no.3
    • /
    • pp.61-73
    • /
    • 1999
  • Capital cost of ships for advanced maritime countries is generally regarded as an international cost, which is, or can be, irrelevant with respect to the nationality of shipowners. However, Korean shipowners have been not only forced by national laws and regulations to build their ships at Korean shipyards, but also restricted to access to foreign financial markets. Having said that, as far as Korean shipowners are concerned, the capital cost has become a national cost. Consequently, it causes them to lower International competitiveness. This paper aims to identify the causes deteriorating international competitiveness of Korean shipping with reference to capital costs and suggest constructive proposals.

  • PDF

IU_AMDroid : An Integrated User Authority Manager Model for the Android Platform (안드로이드 플랫폼을 위한 통합적인 사용자 인증 관리 모델)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.533-540
    • /
    • 2013
  • Currently, as the Android platform only supports single-user protection, it needs security solution for multi-users. Specially, it has to protect specific applications which have personal and financial information, and be available to support authority management for contents access. Thus, this paper proposes an integrated user authority manger model for the Android platform. It helps application authority which is capable to divide into three statuses: installation, execution, deletion with the help of information technology.

An Exploratory Study on the New Product Demand Curve Estimation Using Online Auction Data

  • Shim Seon-Young;Lee Byung-Tae
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.125-136
    • /
    • 2005
  • As the importance of time-based competition is increasing, information systems for supporting the immediate decision making is strongly required. Especially high -tech product firms are under extreme pressure of rapid response to the demand side due to relatively short life cycle of the product. Therefore, the objective of our research is proposing a framework of estimating demand curve based on e-auction data, which is extremely easy to access and well reflect the limited demand curve in that channel. Firstly, we identify the advantages of using e-auction data for full demand curve estimation and then verify it using Agent-Eased-Modeling and Tobin's censored regression model.