• Title/Summary/Keyword: Information Security Technology

Search Result 4,723, Processing Time 0.037 seconds

Gender Difference on Trust in Internet-Only Banks Using the Multi-Group Path Analysis (다집단 경로 분석을 통한 남녀 간 인터넷전문은행의 신뢰 차이)

  • Nam, Sang-Wook;Hong, Eun-Joo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.99-105
    • /
    • 2018
  • The purpose to this study is to analyze the difference of trust toward Internet-only bank into two groups according to the gender. We specially examined whether there is any gap in the determinant of trust. For this, we attempted to analyze the significance of the difference in the path coefficients between the gender through latent mean and path analysis. As a results, the difference of the determinant of trust between the male and the female group occurred in the factor of benefit and security. Moreover, it reconfirmed that trust are later strongly extended to relationship commitment. These findings suggest that it's very important to establish a trust with customers.

A Study on the International Recognition of the COVID-19 Vaccination Certificates (코로나19 예방접종증명서의 국제적 인정에 관한 연구)

  • Jang, Su Yun;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.45-62
    • /
    • 2021
  • After the COVID-19 outbreak in 2019, the spread of COVID-19 has not been easily caught despite preventive measures in each country. The spread of COVID-19 has hit the world, especially in the economic and tourism sectors. Countries around the world are easing restrictions on the movement of vaccinated people in preparation for the post-corona era. Under the name of "Vaccine Passport," "Vaccination Certificate," and "Digital Health Pass," vaccination measures are being implemented to allow vaccination recipients to use multi-use facilities. However, there is no international agreement on the movement of countries, and each country has its own immigration policy. In order to return to pre-corona daily life, global agreements must be reached from the movement of vaccinated people between countries, and standards and implementation methods must be determined. This study focuses on the implementation and utilization of vaccination certificates suitable for the COVID-19 era. We will look at the spread of COVID-19 and its international response policies. In the case of COVID-19, we will investigate why vaccination certificate installation should be standardized and how far the current standardization has been discussed, and discuss the characteristics of vaccination certificate installation and considerations. In order for the immunization certificate discussed in the previous chapter to be recognized internationally, institutional and technical considerations are identified and security factors that may occur in each implementation are also presented. Finally, the international recognition case of vaccination certificate is discussed, and the method of installation and utilization of vaccination certificate is proposed. This paper can be used as a policy because of its timeliness in studying the standards of vaccination certificates and considerations for international recognition to restore movement between countries in the spread of COVID-19. In addition, if other infectious diseases occur in the future or similar cases where movement between countries is restricted, it can be used as a reference to support the movement of verified people.

Exhaustion of Social Workers for Organizational Effectiveness for the Fusion Age: Mediation Effectiveness of Empowerment (융합시대를 위한 사회복지사의 소진이 조직효과성에 미치는 융합연구 : 임파워먼트의 매개효과)

  • Kim, San Yong
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.361-366
    • /
    • 2018
  • In this study, 200 social workers in Seoul and Gyeonggi area were surveyed using convenience extraction method. Data were analyzed by frequency, reliability, correlation, and regression analysis using IBM SPSS Statistics 20, and Sobel test was performed. The purpose of this study was to investigate the effects of empowerment on the relationship between exhaustion and organizational effectiveness of social workers and to provide basic data for improving organizational effectiveness. The results of the study are as follows. Empowerment was found to be mediated in the relationship between exhaustion and job satisfaction, which is a sub - area of organizational effectiveness. Empowerment was found to be mediated in the relationship between exhaustion and turnover intention, which is a sub - domain of organizational effectiveness. Therefore, it is necessary to have a resting place that gives a sense of security to the exhausted social worker rather than granting authority for the social welfare organization.

Network Configuration Study for Multi-Satellite Operations (다중위성운영을 위한 네트워크 구성 방안 연구)

  • Baek, Hyun Chul;Jang, In Sik;Lee, Sang Jeong;Kim, Byung Chul;Lee, Jae Yong
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.4
    • /
    • pp.1-9
    • /
    • 2019
  • Integration of satellites with diverse missions, such as broadcast-communication, earth, meteorologicaland marine observations, and navigation, is vulnerable. The problems of the currently constructed ground station network were analyzed by constructing the test environment. Based on this, we designed a network that was capable of operating multiple satellites by one ground station. In addition, we proposed an interface and network configuration method with domestic and foreign ground stations. The network linking the domestic and foreign ground stations was composed of KREONET (Korea Research Environment Open Network) and GLORIAD (Global Ring Network for Advanced Application Development) of the KISTI(Korea Institute of Science and Technology Information). The internal network consists of VPN (Virtual Private Network), DMZ(De-Militarized Zone), and 1-way USB and so forth. By constructing the network by using the proposed method, harmful data, such as virus inflow and infection, can be blocked.

A study on the analysis of heat flow in X-ray tube (X-ray tube 내 열유동 해석에 관한 연구)

  • Yun, Dong-Min;Seo, Byung-Suk;Jeon, Yong-Han
    • Design & Manufacturing
    • /
    • v.15 no.1
    • /
    • pp.26-31
    • /
    • 2021
  • As the aging ages, the disease also increases, and the development of AI technology and X-ray equipment used to treat patients' diseases is also progressing a lot. X-ray tube converts only 1% of electron energy into X-ray and 99% into thermal energy. Therefore, when the cooling time of the anode and the X-ray tube are frequently used in large hospitals, the amount of X-ray emission increases due to temperature rise, the image quality deteriorates due to the difference in X-ray dose, and the lifespan of the overheated X-ray tube may be shortened. Therefore, in this study, temperature rise and cooling time of 60kW, 75kW, and 90kW of X-ray tube anode input power were studied. In the X-ray Tube One shot 0.1s, the section where the temperature rises fastest is 0.03s from 0s, and it is judged that the temperature has risen by more than 50%. The section in which the temperature drop changes most rapidly at 20 seconds of cooling time for the X-ray tube is 0.1 seconds to 0.2 seconds, and it is judged that a high temperature drop of about 65% or more has occurred. After 20 seconds of cooling time from 0 seconds to 0.1 seconds of the X-ray tube, the temperature is expected to rise by more than 3.7% from the beginning. In particular, since 90kW can be damaged by thermal shock at high temperatures, it is necessary to increase the surface area of the anode or to require an efficient cooling system.

An Exploratory Study on the impact of EU Adequacy Decision on GDPR compliant companies (EU 적정성 결정이 GDPR 대상기업에 미치는 영향에 관한 탐색적 연구)

  • Kim, YoungSoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.32-41
    • /
    • 2021
  • The EU enacted a law strongly regulating the GDPR to protect the privacy of its citizens on 25 May 2018. Compliance with GDPR is an essential prerequisite for companies to enter the European market in the global economic era. In this paper, Step-by-step measures have been defined to conclude DPA agreements for the appropriate level of protection against EU personal data transfer. To explore the benefits and expected effects of determining appropriateness at the government level. As a result, enterprises benefit from simplifying processes, reducing time, and reducing costs when entering the EU. Government-level support in response to personal data breach and communication with the EU Commission will have a positive impact, However, even after the adequacy decision, the entity continues to need activities to secure personal data through compliance with GDPR principles and obligations. Major operations of companies that comply with GDPR are also maintained as important tasks that must be observed in most cases except for the Data Protection Agreement.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Economic Values and Implications of Innovation in the Korean Quarantine System on Plant Diseases and Pests

  • Son, Minsu;Kim, Brian H.S.;Park, ChangKeun
    • Asian Journal of Innovation and Policy
    • /
    • v.10 no.1
    • /
    • pp.108-131
    • /
    • 2021
  • The increase of international trade across countries and borders results in increased risks associated with the inflow of new pests and diseases. These risks are likely to be increased more rapidly due to climate change. Some countries implement strict regulations on imports to prevent these risks and protect biosecurity, food safety, and public health. However, the problems arise when the diseases and pests are found in a country where their economic structure largely depends on agricultural exports and cause ripple effects on other industries and ecosystems. Therefore, establishing an effective quarantine system is essential to protect and recover from the damage caused by non-native diseases and pests. This study's objectives are 1) analyzing the agricultural policies relate to the quarantine system on diseases and pests in Korea, 2) evaluating the Korea plant quarantine system's value, and 3) simulating plant quarantine policy strategies. We estimated the Korean quarantine system's benefits on diseases and pests to reach these objectives. The benefits are measured with a willingness to pay from respondents surveyed by the contingent valuation method (CVM). The CVM approach directly asks people how much they would willingly pay for food security. Finally, the Korean quarantine system's values are simulated with several policy scenarios and different scales of infection at the regional level. The results of this study can deliver policy implications on the quarantine system innovation in developing countries including Asia.

Implementation of a KPI Focused e-QMS: A Case Study in the Aerospace & Defense Industry (KPI 중심의 e-QMS 구현: 우주항공 및 방위 산업 사례 연구)

  • Jae Young Shin;Wan Seon Shin
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.1
    • /
    • pp.131-154
    • /
    • 2023
  • Purpose: The purpose of this paper is to design an integrated informatization system that can manage quality & KPI by integrating management systems in the aerospace and defense industry, and study the effect on KPI when applied to related companies. Methods: The 7 management systems required for integration in the AS&D industry were studied, and an empirical analysis was conducted for H company in South Korea for the application of e-QMS integrated informatization & KPI system based on security environment and open quality. Results: The results of this study were analyzed to have an effect on the improvement of customer satisfaction and the positive improvement of quality failure cost in the aerospace and defense industry. And it was analyzed that it works to continuously comply with ethical management and environmental laws and prevent safety accidents. Conclusion: The greatest significance of this study is that it attempted to build an e-QMS integrated system in the aerospace and defense industry. Considering that the case of integrated management system and integrated operation of KPI in related industries has not been introduced in the existing literature, the results of this study will be shared as a meaningful preceding study in the era of digital quality information. In addition, the fact that the open-quality quality innovation methodology emphasizing measurement(M), tracking(T), and connection(C) was actually applied in an AS&D company and its effectiveness was objectively proven. It is expected that it will be a good paper for follow-up research.

Ethereum Phishing Scam Detection based on Graph Embedding and Semi-Supervised Learning (그래프 임베딩 및 준지도 기반의 이더리움 피싱 스캠 탐지)

  • Yoo-Young Cheong;Gyoung-Tae Kim;Dong-Hyuk Im
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.165-170
    • /
    • 2023
  • With the recent rise of blockchain technology, cryptocurrency platforms using it are increasing, and currency transactions are being actively conducted. However, crimes that abuse the characteristics of cryptocurrency are also increasing, which is a problem. In particular, phishing scams account for more than a majority of Ethereum cybercrime and are considered a major security threat. Therefore, effective phishing scams detection methods are urgently needed. However, it is difficult to provide sufficient data for supervised learning due to the problem of data imbalance caused by the lack of phishing addresses labeled in the Ethereum participating account address. To address this, this paper proposes a phishing scams detection method that uses both Trans2vec, an effective graph embedding techique considering Ethereum transaction networks, and semi-supervised learning model Tri-training to make the most of not only labeled data but also unlabeled data.