• Title/Summary/Keyword: Financial Information System

Search Result 1,233, Processing Time 0.027 seconds

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

CCM-UW MACA Protocol of UWA Communication Applied Security Based Lightweight Blockcipher(LEA) (경량블록암호알고리즘 LEA를 적용한 수중음파통신 CCM-UW MACA 프로토콜)

  • Lee, Jae-Hoon;Yun, Chae-won;Yi, Okyeon;Shin, Su-Young;Park, Soo-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.851-854
    • /
    • 2015
  • 수중음파통신은 물속에서 지상과는 달리 음파를 사용하여 통신한다. 또한 제한된 전력과 자원을 사용하기 때문에 최소한의 연산으로 본래의 목적을 수행해야만 하는 조건이 따른다. 따라서 수중음파통신에 보안을 적용하기 위해서는 기밀성과 안전성도 중요하지만 무엇보다 가용성을 고려한 보안설계가 중요하다. 본 논문은 제한된 전력과 자원 환경에서 동작하는 수중음파통신용 MAC 프로토콜에 가용성이 부각할 수 있는 LEA 블록암호알고리즘의 적용방안을 논하고자 한다. 또한 기존의 AES(Advanced Encryption Standard)와 ARIA(Academy, Research Institute, Agency) 블록암호알고리즘과의 성능분석을 통해 LEA의 우수성과 수중음파통신에 적합성을 보이고자 한다.

Suitable searching cryptographic algorithm for under water communication (성능비교를 통한 수중통신에 적합한 암호 알고리즘 탐색)

  • Yun, Chae-won;Lee, Jae-Hoon;Yi, Okyeon;Shin, Su-Young;Park, Soo-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.847-850
    • /
    • 2015
  • 최근 환경오염에 의한 수질관리, 재난방지, 해양자원탐사 및 군사목적 등으로 수중환경에서의 음파통신에 대한 관심이 증가하고 있다. 그러나 수중네트워크는 물이라는 특수한 환경으로 인해 많은 제약사항이 존재한다. 이를 극복하기 위한 노력은 계속되고 있으며 더불어 보안의 필요성도 함께 중요시 되고 있다. 본 논문에서는 수중 음파통신 MAC계층에서 AES, ARIA, LEA 암호 알고리즘의 성능을 측정하고 LEA 암호 알고리즘의 우수성을 보이고자 한다.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Understanding User's Continuous Use of Financial Technology Products

  • Wanchao Liu;Huosong Xia;Jian Mou
    • Asia pacific journal of information systems
    • /
    • v.31 no.2
    • /
    • pp.236-256
    • /
    • 2021
  • Online financial technology products are an important consumer finance innovation. While a large body of previous research has focused on initial adoption and consumer willingness to use these products, little research explores the continued use of these products beyond the initial adoption phase. In particular, special attention should be paid to how users' trust and perceptions of privacy and security affect continued use behavior. This paper integrates the expectation confirmation model of information system continuance (ECM-ISC), the information system success model (ISSM) and the security and trust literatures to investigate continued use of online financial technology. To test the research model, we collected 398 valid questionnaires from Ant Credit Pay users. The research results show that system and service quality positively impact users' expectation confirmation, while information quality has no significant impact. Expectation confirmation and perceived usefulness positively affect user satisfaction. Moreover, the user's perception of privacy and security plays a vital role in user satisfaction. Satisfaction and perceived trust jointly promote users' continuance behaviors. Findings of this study indicates the importance of the information system success factors and security factors due to their influence on the continued use of Fintech products. This conclusion has implications for enterprises in improving the product qualities and enhancing the degree of security to meet user needs.

Implementation of Management performance Analysis System with Genetic Algorithms (Genetic Algorithm에 기반한 경영성과분석 시스템 구현)

  • An, Dong-Gyu;Jo, Seong-Hun
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.191-210
    • /
    • 2003
  • In modern dynamic management environment, there is growing recognition that information & knowledge management systems are essential for CEO's Efficient/effective decision making, As a key component to cope with this current, we suggest the management performance analysis system based on Knowledge Discovery in Database (KDD). The system measures management performance that is considered with both VA(Value-Added), which represents stakeholder's point of view and EVA(Economic Value-Added), which represents shareholder's point of view, The relationship between management performance and some 80 financial ratios is analyzed, and then important financial ratios are drawn out. In analyzing the relationship, we applied KDD process which includes such as multidimensional cube, OLAP(On -Line Analytic Process), data mining and AHP(Analytic Hierarchy Process). To demonstrate the performance of the system, we conducted a case study using financial data over the 16-years from 1981 to 1996 of Korean automobile industry which is taken from database of KISFAS(Korea Investors Services Financial Analysis System).

  • PDF

A study on improving the accuracy of machine learning models through the use of non-financial information in predicting the Closure of operator using electronic payment service (전자결제서비스 이용 사업자 폐업 예측에서 비재무정보 활용을 통한 머신러닝 모델의 정확도 향상에 관한 연구)

  • Hyunjeong Gong;Eugene Hwang;Sunghyuk Park
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.361-381
    • /
    • 2023
  • Research on corporate bankruptcy prediction has been focused on financial information. Since the company's financial information is updated quarterly, there is a problem that timeliness is insufficient in predicting the possibility of a company's business closure in real time. Evaluated companies that want to improve this need a method of judging the soundness of a company that uses information other than financial information to judge the soundness of a target company. To this end, as information technology has made it easier to collect non-financial information about companies, research has been conducted to apply additional variables and various methodologies other than financial information to predict corporate bankruptcy. It has become an important research task to determine whether it has an effect. In this study, we examined the impact of electronic payment-related information, which constitutes non-financial information, when predicting the closure of business operators using electronic payment service and examined the difference in closure prediction accuracy according to the combination of financial and non-financial information. Specifically, three research models consisting of a financial information model, a non-financial information model, and a combined model were designed, and the closure prediction accuracy was confirmed with six algorithms including the Multi Layer Perceptron (MLP) algorithm. The model combining financial and non-financial information showed the highest prediction accuracy, followed by the non-financial information model and the financial information model in order. As for the prediction accuracy of business closure by algorithm, XGBoost showed the highest prediction accuracy among the six algorithms. As a result of examining the relative importance of a total of 87 variables used to predict business closure, it was confirmed that more than 70% of the top 20 variables that had a significant impact on the prediction of business closure were non-financial information. Through this, it was confirmed that electronic payment-related information of non-financial information is an important variable in predicting business closure, and the possibility of using non-financial information as an alternative to financial information was also examined. Based on this study, the importance of collecting and utilizing non-financial information as information that can predict business closure is recognized, and a plan to utilize it for corporate decision-making is also proposed.

A Study on Improving Cyber Liability Insurance for Electronic Financial Incident in Easy Payment System (간편결제 서비스에서 전자금융사고 시 국내 사이버 배상책임보험의 한계 및 개선방안에 대한 연구)

  • Lee, Han-Jun;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • A convergence of finance and information technology brought a remarkable development in Fin-Tech industry. On the other hand, currently existing laws seemed inappropriate to address the liability of financial institutions, Fin-tech enterprises and consumers in case of financial accidents due to its ambiguity. The minimum insurance obligation by financial institutions specified under the Electronic Financial Transaction Act 2006 is not keeping with current reality, considering transaction volume, frequency of incidents, and security investments. This paper aims to lay stress on the need of cyber liability insurance by understanding the domestic financial incidents and management, and the limit of existing insurance policy.

A Study on the Improvement Measures for the Management and Utilization of Korea's Fiscal Government Data: Focusing on Fiscal Data Governance (재정데이터의 관리 및 활용을 위한 개선방안 연구: 재정데이터 거버넌스를 중심으로)

  • Song, Seok-Hyun
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.95-111
    • /
    • 2021
  • To achieve a data-driven policy decision-making system, the Ministry of Strategy and Finance has formed a marketing team and is actively building upon it. This system, currently under construction, will enable data-driven financial tasks beyond simple financial administration. The U.S. has already enacted The Foundations for Evidence-Based Policymaking Act in the process of similar pursuits. Since last year, the data-driven system administrative law has been enacted in Korea, and a legal framework has been established for data-driven administrative work. The next-generation budget accounting system to fulfill its role as a data-driven system needs public policy support to operate. Innovation and transformation are needed in various areas such as data management, legal system, and installation of related systems. Accordingly, it is very timely to analyze the financial systems and policies of advanced countries such as the U.S. and U.K., which already have established and operates such a financial system. By benchmarking and applying existing financial information systems to the next-generation budget accounting system, a better system will result. In this study, major developed countries, including the U.S., U.K., France, and Canada were benchmarked and analyzed in terms of the main elements of data governance: public policy, systems, legal framework, promotion system, and service level. It was discovered that the role and direction of the national fiscal policy system that the people favor should be able to respond quickly to the recent difficult economic crisis environment such as the digital transformation trend and COVID-19.

Evaluation Criteria of IT Business Value : The Difference Between Ex Ante and Post Implementation Evaluation (IT 비즈니스 가치 평가관점 : 사전-사후 평가시점 및 정보시스템 유형별 차이)

  • Park, So-Hyun;Lee, Kuk-Hie
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.203-224
    • /
    • 2008
  • The purpose of this study is to investigate the evaluation perspectives of IT business value and empirically analyze the differences of evaluation perspectives between ex ante evaluation and post implementation evaluation, and among various information system types. 4 evaluation perspectives which have been used in the previous studies and in the field of industry practices are financial, customer, internal process, and growth, which are based on the BSC model. Data of 98 information systems have been collected from 89 companies including manufacturers, banks, insurances, and stock trading companies. As results of multi-way MANOVA test, 3 out of 8 hypothesis have been accepted statistically. While the order of importance of 4 perspectives in ex ante evaluation is customer, financial, internal process, and growth, the order of post implementation evaluation appears to be much different : that is, internal process, customer, financial, and growth. These findings provide insights for both IT practitioners and researchers.

  • PDF