• Title/Summary/Keyword: Information Security Economics

Search Result 142, Processing Time 0.025 seconds

A Study of Comparison between Internet Banking and Mobile Banking by Extending the TAM (기술수용모형을 이용한 인터넷 뱅킹과 모바일 뱅킹 이용의 차이에 관한 연구)

  • Lee Dong-Hyun;Kwak Soo-Hwan;Hwang Kyu-Seung
    • Journal of Technology Innovation
    • /
    • v.14 no.1
    • /
    • pp.201-225
    • /
    • 2006
  • Technology Acceptance Model (TAM) considers perceived ease of use and perceived usefulness as the important determinants of user behavior regarding information technology. As an extension of TAM, this research examines perceived security as an additional determining variable to explain an individual's acceptance and use of mobile banking as well as internet banking. The results show that perceived ease of use does not affect the individual's attitude toward the use of mobile or internet banking, while perceived usefulness does. Furthermore, perceived security affects perceived usefulness in mobile banking, but not in internet banking. In addition, in mobile banking, perceived security is positively related to perceived usefulness, though perceived security is negatively related to attitude. Finally, the average scores of surveyed data for Internet banking are higher and significantly different than those for mobile banking.

  • PDF

Perceived Ease of Use, Perceived Usefulness, Perceived Security and Intention to Use E-Filing: The Role of Technology Readiness

  • TAHAR, Afrizal;RIYADH, Hosam Alden;SOFYANI, Hafiez;PURNOMO, Wahyu Eko
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.537-547
    • /
    • 2020
  • This study aimed to analyze evidence of the effect of perceived ease-of-use, perceived usefulness, and perceived security on the citizen's intention to use e-Filing with information technology readiness as an intervening variable. This study used primary data collected from Civil Servants Taxpayers, Indonesian National Armed Forces, and State Police of the Republic of Indonesia in Semarang City. One hundred fifty questionnaires were distributed, and 126 were processed and analyzed. The multiple linear regression and path analysis were employed to test the hypotheses. The results indicated that perceived ease-of-use and perceived security had a positive effect on the use of e-Filing, while perceived usefulness has no effect on the use of e-Filing. In addition, readiness of information technology did not mediate the relationships among the perceived ease-of-use, perceived usefulness, and perceived security on the use of e-Filing. This study implies that Directorate General of Taxes, as a provider of e-Filing services, may improve the quality of e-Filing, especially in terms of ease and security. It is because, based on the results of this study, both aspects have been empirically proven to be able to increase intention to use e-Filing in reporting the annual notification letter.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

Information Technologies In Teaching: The Basis Of Students' Knowledge

  • Morska, Nataliia;Fedorenko, Olena;Davydova, Olha;Andreev, Vitaly;Bohatyryova, Galina;Shcherbakova, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.44-53
    • /
    • 2021
  • The paper proposes to consider information technologies and their application in the educational process as a preparation of presentation material for students of higher educational institutions. The definition and place of information technologies in the educational space are considered. The object of research of this work is the pedagogical technology of presentation of educational information, which substantiates the pedagogical technology of visualization of educational information in higher education, as well as determine its composition and structure. The practical side of pedagogical technology of educational information presentation is considered.

An Evaluation Methodology of Information Systems in Business Contingency Planning (업무연속성 계획 수립을 위한 정보시스템 평가 연구)

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.1
    • /
    • pp.119-128
    • /
    • 2016
  • Growing threats from environments and natural disasters cause information systems to suspend the operation of business. To assure the continuity of business, information systems should not halt in the emergency. This paper suggests an evaluation method for importance of information systems and verifies the method in a real organization. The results to the study can be utilized for establishing business continuity of organizations.

Modelling of Public Financial Security and Budget Policy Effects

  • Zaichko, Iryna;Vysotska, Maryna;Miakyshevska, Olena;Kosmidailo, Inna;Osadchuk, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.239-246
    • /
    • 2021
  • This article substantiates the scientific provisions for modelling the level of Ukraine's public financial security taking into account the impact of budget policy, in the process of which identified indicators of budget policy that significantly affect the public financial security and the factors of budget policy based on regression analysis do not interact closely with each other. A seven-factor regression equation is constructed, which is statistically significant, reliable, economically logical, and devoid of autocorrelation. The objective function of maximizing the level of public financial security is constructed and strategic guidelines of budget policy in the context of Ukraine's public financial security are developed, in particular: optimization of the structure of budget revenues through the expansion of the resource base; reduction of the budget deficit while ensuring faster growth rates of state and local budget revenues compared to their expenditures; optimization of debt serviced from the budget through raising funds from the sale of domestic government bonds, mainly on a long-term basis; minimization of budgetary risks and existing threats to the public financial security by ensuring long-term stability of budgets etc.

The Analysis of Economic Impact for Information Security Industry using Inter-Industry Analysis (산업연관분석을 이용한 정보보호 산업의 경제 파급효과 분석)

  • Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.72-80
    • /
    • 2020
  • The information security industry is increasing in importance and market size due to the development of the fourth industry such as artificial intelligence, IoT and etc. This paper was analyzed the impact of the increasing information security industry on the domestic economy by using the Input-Output table. It was classified industrial sectors into information security products and information security services industries, and then reclassified the Input-Output table into 35 industries. And it was estimated the production inducement coefficient, the value-added inducement coefficient, employment inducement coefficient, and etc. The production inducement coefficients of the information security product and service industry are each 1.571, 1.802, and the value-added inducement coefficients of them are each 0.632, 0.997, and the employment inducement coefficients of them are each 2.494, 7.361. Only the value-added inducement coefficient of the information security service industry is slightly higher than the total industry, and the remaining inducement coefficients are all lower than the total industry. In addition, the information security product industry has no the forward and backward linkage effect, and the information security service industry has no the backward linkage effect. But it has the forward linkage effect. As a result of analyzing the economic ripple effect of the information security industry, the production inducement amounted to 359.9 trillion won, value-added inducement amounted to 164.8 trillion won, and employment inducement amounted to 803 thousand people.

Web contents deformation detection method by BHO (BHO 이용한 웹 컨텐츠 변조 탐지 방법)

  • Mo, Jeong-Hoon;Chung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.655-663
    • /
    • 2011
  • Recently, with improvement of internet service technology, web service has been affecting the environment for computing user. Not only current events, economics, game, entertainment, but also personal financial system is processed by web pages through internet. When data transmission is implemented on the internet, webpage acquire text form code and transform them to DOM information, and then shows processed display to user by web browser. However, those information are not only easily accessed by diversified route, but also easily deformed by intentional purpose. Furthermore, it is also possible to acquire logon information of users and certification information by detouring security mechanism. Therefore, this dissertation propose the method to verify integrity of web contents by using BHO which is one of the Add-On program based on MS Internet Explorer platform which is one of major web browser program designed by MicroSoft to detect any action of webpage deformation.

Directions of the Activation of the Development of a Small Innovative Enterprise

  • Antypenko, Nadiia;Dongcheng, Wang;Lysenko, Zhanna;Krasnonosova, Olena;Grynevych, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.495-502
    • /
    • 2021
  • The study is devoted to substantiation of directions of intensification of development of small innovative enterprise, which has a significant impact on the overall innovation activity of the country and promotes innovative development, transition to more advanced technological systems. The outlined role of small business in innovative development in the direction of intensifying innovation in the economy, improving organization and production, as well as in the form of direct participation in the innovation process, production of science-intensive products, stimulating demand for innovation. A group of factors hindering the development of small innovative entrepreneurship was identified, including: financial aspects of the activity, shortcomings of organizational and communicative nature, underdeveloped technology market, information plan problems, internal production problems of small business, market problems. The directions of intensification of the development of small innovative entrepreneurship are substantiated, namely: financial and credit support of small innovative entrepreneurship; introduction of tax incentives; material and technical support; nationwide intensification of innovation activity; information support; development of innovation infrastructure. The involvement of the outlined directions of intensification of small innovative entrepreneurship will help to obtain a synergistic effect of innovative development of both small innovative business structures and the economy as a whole.

C-Engineering Based Industry 4.0 Innovation Networks Sustainable Development

  • Omelyanenko, Vitaliy;Braslavska, Oksana;Biloshkurska, Nataliia;Biloshkurskyi, Mykola;Kliasen, Natalia;Omelyanenko, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.267-274
    • /
    • 2021
  • The article deals with problems of innovation development on a network basis, which require effective mechanisms of innovation communications. In research the organizational aspects of ICT infrastructure development for innovation networks sustainable development based on cooperative marketing principles is considered. The proposed research idea is based on the idea that ICT implementation is based not only on the operational approach for innovation management as a factor of efficiency of internal communications, but also on knowledge economy and post-industrial economy trends. Therefore, the purpose of study is to develop an ICT model of innovation infrastructure to improve its effectiveness (strategic character) and efficiency (operative character) through increasing the efficiency of network communication interactions. Creation of information space and communication tools to support innovation network sustainable development and cooperation activities in research is proposed to be solved with the help of specialized ICT platform. It is shown, that ICT platform of innovation cooperation innovation network is important tool for common work of participants. ICT platform is considered as an integrated information system designed to automate business processes related to the sustainable development of innovation network, segment management and integration with HEI information systems and industrial cooperation. The main factors that determine the need to use a special ICT platform for innovation network cooperation were considered. The main issues of concurrent engineering (C-technology) application in high-technology industries and innovation cooperation for integrated product development were studied.