• Title/Summary/Keyword: Financial communication

Search Result 574, Processing Time 0.024 seconds

Implementation of CNN-based classification model for flood risk determination (홍수 위험도 판별을 위한 CNN 기반의 분류 모델 구현)

  • Cho, Minwoo;Kim, Dongsoo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.341-346
    • /
    • 2022
  • Due to global warming and abnormal climate, the frequency and damage of floods are increasing, and the number of people exposed to flood-prone areas has increased by 25% compared to 2000. Floods cause huge financial and human losses, and in order to reduce the losses caused by floods, it is necessary to predict the flood in advance and decide to evacuate quickly. This paper proposes a flood risk determination model using a CNN-based classification model so that timely evacuation decisions can be made using rainfall and water level data, which are key data for flood prediction. By comparing the results of the CNN-based classification model proposed in this paper and the DNN-based classification model, it was confirmed that it showed better performance. Through this, it is considered that it can be used as an initial study to determine the risk of flooding, determine whether to evacuate, and make an evacuation decision at the optimal time.

Analysis of Sustainability Report Content Using GRI: Public and Private Enterprise Perspective (GRI를 이용한 지속가능보고서 구성 분석: 공,사 기업 관점으로)

  • Yun, Ji Hye;Lee, Jong Hwa
    • Knowledge Management Research
    • /
    • v.23 no.3
    • /
    • pp.153-171
    • /
    • 2022
  • With the global ESG management craze, domestic and foreign companies voluntarily declare sustainable management and actively respond by establishing strategies. The Financial Services Commission mandates the disclosure of sustainability reports representing ESG management sequentially and will expand to SMEs in the future. Information disclosure of sustainability reports is mainly done through international standards such as GRI, SASB, and TCFD, and many domestic companies use GRI Standards guidelines. This study examines the composition system of sustainability reports and compares public and private companies with GRI Standards to analyze sustainable management by type. This study revealed that public enterprises focused on social and labor, while private enterprises focused on the economy and environment through TF-IDF modeling. In addition, the electronic and information communication industries focused on product responsibility. Unlike previous studies that quantified and analyzed sustainability management according to grade, the current study analyzed sustainability reports, which are unstructured data. Therefore, the results of this study are expected to provide valuable theoretical and practical implications for researchers and supervisors interested in ESG management.

Predicting Default Risk among Young Adults with Random Forest Algorithm (랜덤포레스트 모델을 활용한 청년층 차입자의 채무 불이행 위험 연구)

  • Lee, Jonghee
    • Journal of Family Resource Management and Policy Review
    • /
    • v.26 no.3
    • /
    • pp.19-34
    • /
    • 2022
  • There are growing concerns about debt insolvency among youth and low-income households. The deterioration in household debt quality among young people is due to a combination of sluggish employment, an increase in student loan burden and an increase in high-interest loans from the secondary financial sector. The purpose of this study was to explore the possibility of household debt default among young borrowers in Korea and to predict the factors affecting this possibility. This study utilized the 2021 Household Finance and Welfare Survey and used random forest algorithm to comprehensively analyze factors related to the possibility of default risk among young adults. This study presented the importance index and partial dependence charts of major determinants. This study found that the ratio of debt to assets(DTA), medical costs, household default risk index (HDRI), communication costs, and housing costs the focal independent variables.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Development of a Deep Learning Algorithm for Anomaly Detection of Manufacturing Facility (설비 이상탐지를 위한 딥러닝 알고리즘 개발)

  • Kim, Min-Hee;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.199-206
    • /
    • 2022
  • A malfunction or breakdown of a manufacturing facility leads to product defects and the suspension of production lines, resulting in huge financial losses for manufacturers. Due to the spread of smart factory services, a large amount of data is being collected in factories, and AI-based research is being conducted to predict and diagnose manufacturing facility breakdowns or manufacturing site efficiency. However, because of the characteristics of manufacturing data, such as a severe class imbalance about abnormalities and ambiguous label information that distinguishes abnormalities, developing classification or anomaly detection models is highly difficult. In this paper, we present an deep learning algorithm for anomaly detection of a manufacturing facility using reconstruction loss of CNN-based model and ananlyze its performance. The algorithm detects anomalies by relying solely on normal data from the facility's manufacturing data in the exclusion of abnormal data.

Matrix Character Relocation Technique for Improving Data Privacy in Shard-Based Private Blockchain Environments (샤드 기반 프라이빗 블록체인 환경에서 데이터 프라이버시 개선을 위한 매트릭스 문자 재배치 기법)

  • Lee, Yeol Kook;Seo, Jung Won;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • Blockchain technology is a system in which data from users participating in blockchain networks is distributed and stored. Bitcoin and Ethereum are attracting global attention, and the utilization of blockchain is expected to be endless. However, the need for blockchain data privacy protection is emerging in various financial, medical, and real estate sectors that process personal information due to the transparency of disclosing all data in the blockchain to network participants. Although studies using smart contracts, homomorphic encryption, and cryptographic key methods have been mainly conducted to protect existing blockchain data privacy, this paper proposes data privacy using matrix character relocation techniques differentiated from existing papers. The approach proposed in this paper consists largely of two methods: how to relocate the original data to matrix characters, how to return the deployed data to the original. Through qualitative experiments, we evaluate the safety of the approach proposed in this paper, and demonstrate that matrix character relocation will be sufficiently applicable in private blockchain environments by measuring the time it takes to revert applied data to original data.

A Integrated VOC Management Schema in Large-Scale Manufacturing Companies: A Case Study on Implementation for Construction Equipment Division in 'H' Heavy Industry (대규모 제조업에서의 통합 VOC 관리 방안 및 시스템 구축: 'H' 중공업 건설장비 부문 적용 사례)

  • Jang, Gil-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.127-136
    • /
    • 2009
  • Voice of the customer(VOC) is a term used in business and information technology(IT) to describe the process of capturing a customer's requirements in enterprises or various organizations. Recently, in order to satisfy customer's needs, enterprises try to utilize VOC at recurrence prevention of problems and their improvement activities, planning and development of product/service by processing, storing, and analyzing VOC. Until now, VOC management systems are introduced around service industries such as hotel business and insurance/financial business, etc. This paper proposes an integrated management scheme of VOC which are captured by various communication channels and describes a case of implementing an integrated VOC management system on the basis of the proposed scheme for the large-scale manufacturing company. By the implemented system, VOC are stored and utilized as the important knowledge assets of enterprises.

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.

Radio and Senior Generation: Focused on Radio Program for Senior (라디오와 노인: 라디오 노인 대상 프로그램을 중심으로)

  • Hong, Myungshin
    • 한국노년학
    • /
    • v.30 no.4
    • /
    • pp.1329-1344
    • /
    • 2010
  • This study is intended to find out how production people have been creating senior radio program. For this purpose, the study set up the three research questions and employed in-depth interviews with ten production people: First, production people find out senior radio listeners who have been very royal attendance of the program for a long time. And they examined senior listeners prefer to listen about health care, information about elderly life and singing contest. They have been made para-social interaction with master of ceremonies (MC). Second, unlike other radio program, the senior radio program has concentrated on the radio station's image and public interest rather than financial profit and viewing rate. Normally, it was known that radio program for senior used carried on break of the day. But some program has been broadcasted on prime time in the afternoon. Target audience of senior radio program has been expanded over the forties and the fifties from sixties. Thirdly, in general the role of producer is critically important to produce program. However, MC and scriptwriter are far more experienced and specialized on the field than producer in radio program for senior.

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.