• Title/Summary/Keyword: Financial Information Security Trust

Search Result 39, Processing Time 0.022 seconds

Study the role of information security personnel have on an organization's information security level (정보보호담당자의 역할이 조직의 정보보호수준에 미치는 영향)

  • Choi, Dong-Keun;Song, Mi-Sun;Im, Jong In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.197-209
    • /
    • 2015
  • The issue of information security within an organization began to be recognized as risk of the organization. Because of this, not only ISO(Information Security Officer) but an executive or CEO were forced to resign. In addition, it brought about heavy financial damage to the company and made the company difficult to restore trust to customers. At a time when inadvertent disclosure of personal information has become accepted as a matter of survival because of having a bad effect within an organization, how the information security specialist causes influence on information protection level of the organization. For these reasons, targeting the information security specialists of various industry sectors, we'll analyse how task performance rate of the information security specialist within an organization cause influence to the information security level. The goal of this study is for the company to raise the task proportion of information security specialist and to improve the information protection level of the organization.

Analysis of Blockchain Network and Cryptocurrency Safety Issues

  • Taegyu Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.40-50
    • /
    • 2023
  • Blockchain is a technology designed to prevent tampering with digital documents or information, safeguarding transaction data and managing it in a structured manner. This proves beneficial in addressing issues of trust and data protection in B2B, B2C, and C2B transactions. Blockchain finds utility not only in financial transactions but also across diverse industrial sectors. This study outlines significant cases and responses that jeopardize the security of blockchain networks and cryptocurrency technology. Additionally, it analyzes safety and risk factors related to blockchain and proposes effective testing methods to preemptively counter these challenges. Furthermore, this study presents key security evaluation metrics for blockchain to ensure a balanced assessment. Additionally, it provides evaluation methods and various test case models for validating the security of blockchain and cryptocurrency transaction services, making them easily applicable to the testing process.

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

Gender Difference on Trust in Internet-Only Banks Using the Multi-Group Path Analysis (다집단 경로 분석을 통한 남녀 간 인터넷전문은행의 신뢰 차이)

  • Nam, Sang-Wook;Hong, Eun-Joo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.99-105
    • /
    • 2018
  • The purpose to this study is to analyze the difference of trust toward Internet-only bank into two groups according to the gender. We specially examined whether there is any gap in the determinant of trust. For this, we attempted to analyze the significance of the difference in the path coefficients between the gender through latent mean and path analysis. As a results, the difference of the determinant of trust between the male and the female group occurred in the factor of benefit and security. Moreover, it reconfirmed that trust are later strongly extended to relationship commitment. These findings suggest that it's very important to establish a trust with customers.

Secure RFID-based Payment System against Various Threats (위.변조에 안전한 RFID 지급결제시스템)

  • Kim, In-Seok;Choi, Eun-Young;Lee, Dong-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.141-146
    • /
    • 2007
  • Barcodes have been widely used to implement automatic identification systems but there are various problems such as security weakness or distance restriction in scanning barcode signals in a barcode-based automatic identifcation systems. Recently researchers are gradually interested in radio frequency identification (RFID) and RFID systems have been applied to various fields than before. Especially one of RFID application fields, a bank system uses RFID tagged bankontes to prevent illegal transactions such as counterfeiting banknotes and money laundering. In this paper, we propose a RFID system for protecting location provacy of a banknote holder. In addition, our paper describes that a trust party can trace a counterfeit banknote holder to provide against emergencies.

The Impact of Perceived Risks and Switching Costs on Switching Intention to Cloud Services: Based on PPM Model (지각된 위험과 전환비용이 클라우드 서비스로의 전환의도에 미치는 영향에 관한 연구: PPM 모델 중심으로)

  • Lee, Seung Hee;Jeong, Seok Chan
    • The Journal of Information Systems
    • /
    • v.30 no.3
    • /
    • pp.65-91
    • /
    • 2021
  • Purpose In this study, we investigated the impact of perceived risk and switching costs on switching intention to cloud service based on PPM (Pull-Push-Mooring) model. Design/methodology/approach We focused on revealing the switching factors of the switching intention to the cloud services. The switching factors to the cloud services were defined as perceived risk consisting of performance risk, economic risk, and security risk, and switching costs consisting of financial and learning costs. On the PPM model, we defined the pull factors consisting of perceived usefulness and perceived ease of use, and the push factor as satisfaction of the legacy system, and the mooring factor as policy supports. Findings The results of this study as follows; (1) Among the perceived risk factors, performance risk has a negative effect on the ease of use of pull factors, and finally it was found to affect the switching intention to the cloud services. Therefore, cloud service providers need to improve trust in cloud services, service timeliness, and linkage to the legacy systems. And it was found that economic risk and security risk among the perceived risk factors did not affect the switching intention to the cloud services. (2) Of the perceived risk factors, financial cost and learning cost did not affect the satisfaction of the legacy system, which is a push factor. It indicates that the respondents are positively considering switching to cloud service in the future, despite the fact that the respondents are satisfied with the use of the legacy system and are aware of the switching cost to cloud service. (3) Policy support was found to improve the switching intention to cloud services by alleviating the financial and learning costs required for cloud service switching.

The Vulnerability Analysis of CA Arcot VPS (CA Arcot VPS의 취약점 분석)

  • Lee, Sang-Ho;Kim, Sung-Ho;Nyang, Dea-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.825-830
    • /
    • 2013
  • CA Arcot corporation in U.S.A has secure on-line financial trade solution and patent that verify whether transaction had change using virtual session. But, VPS(Virtual Private Session) has another vulnerability by way to construct CAPTCHA. We can't fully trust safety of VPS, Cause it could be attacked by using color information of CAPTCHA. In this paper, We suggest the method of attack VPS, and also point out the vulnerability of VPS though simulation.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.

Impact of Service Quality on Behavioural Intention to Use Fin Tech Payment Services: An Extension of SERVEQUAL Model

  • Vikas Sharma;Sanjay Taneja;Munish Gupta;KshitizJangir;Ercan Ozen
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.1093-1117
    • /
    • 2023
  • The study aims to determine the impact of quality outcomes on behavior intentions in Financial Technology (FinTech) payment services. The study is focused on the development and testing of the impact of the SERVQUAL model on the TAM, i.e., Technology Acceptance Model for the measurement of the behavioral intention of users to use fintech payment services. The sample entails 578 specific survey responses from northern India from October to December 2022. The respondents were users of FinTech. The PLS-SEM technique was employed to explain the implementation process. Consequently, it discovered a significant relationship between the SERVQUAL models and the impact on behavioral intentions identified by TAM. The study will provide insight into the factors that impact the quality outcomes and adoption of Fintech payment services to the providers. The paper demystifies FinTech payment services in the range of perception of service quality outcomes and provides essential theories. The TAM model reflects the customer's sense of satisfaction, usefulness, and attitude. In contrast, the SERVQUAL model demonstrates the user's assessment of service quality outcomes such as quality, trust, security, and service quality positively affects behavioral intention in FinTech payment services.

The Relationship among Web Design, e-Satisfaction, e-Loyalty, and Customer Defection (웹디자인, e-만족, e-충성도, 고객이탈 간의 관계에 관한 연구)

  • Kim, Keum Soo;Chung, Ki Han
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.213-229
    • /
    • 2009
  • The purpose of this paper is to identify the relationship among five factors of web design, e-satisfaction, e-loyalty, and customer defection and provide the implications of marketing strategies in online shopping. The research findings are as follows: first, ease of use of web design affects positively e-satisfaction more than the other factors except financial security. Second, e-satisfaction affects positively e-loyalty. Third, e-satisfaction does not affect customer defection. Fourth, informativeness, styling, ease of use, and trust of web design affect indirectly e-loyalty by mediating e-satisfaction. Therefore, because there is a good circular relationship among web design, e-satisfaction, and e-loyalty, it is very important to enhance web design for customers. When customers satisfy highly with the factors of web design, e-loyalty is higher and customer defection is lower. Further, in a curriculum of web design it is needed to reflect the findings of this paper.