• Title/Summary/Keyword: Information Systems Audit

Search Result 166, Processing Time 0.026 seconds

Implementation of Surveillance System using Motion Tracking Method based on Mobile (모바일 기반의 동작 추적 기법을 이용한 감시 시스템의 구현)

  • Kim, Hyeng-Gyun;Kim, Yong-Ho;Guen, Bae-Yong
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.164-169
    • /
    • 2008
  • This paper is using motion tracking by image segmentation to monitor intruders and to confirm based on mobile the relevant information. First, detect frame in animation that film fixed area, and make use of image subtraction between two frame that adjoin, segment fixed backing and target who move. Segmental foreground object to the edge detecting the location specified by the edge of the median estimate extracted by analyzing the motion of the intruders to monitor. When a motion is detected, the detected image is transmitted by using the W AP pull basis image transmission method on the mobile client data terminal.

  • PDF

A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System

  • Song, Kyoung-Tack;Kim, Shee-Ihn;Kim, Seung-Hee
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.301-317
    • /
    • 2020
  • An enterprise patch-management system (PMS) typically supplies a single point of failure (SPOF) of centralization structure. However, a Blockchain system offers features of decentralization, transaction integrity, user certification, and a smart chaincode. This study proposes a Hyperledger Fabric Blockchain-based distributed patch-management system and verifies its technological feasibility through prototyping, so that all participating users can be protected from various threats. In particular, by adopting a private chain for patch file set management, it is designed as a Blockchain system that can enhance security, log management, latest status supervision and monitoring functions. In addition, it uses a Hyperledger Fabric that owns a practical Byzantine fault tolerant consensus algorithm, and implements the functions of upload patch file set, download patch file set, and audit patch file history, which are major features of PMS, as a smart contract (chaincode), and verified this operation. The distributed ledger structure of Blockchain-based PMS can be a solution for distributor and client authentication and forgery problems, SPOF problem, and distribution record reliability problem. It not only presents an alternative to dealing with central management server loads and failures, but it also provides a higher level of security and availability.

A Collaborative decision making for distributed detection system (분산 탐지 시스템을 위한 협업적 의사 결정)

  • Farooqi, Ashfaq Hussain;Jin, Wang;Khan, Farrukh Aslam;Lee, Sung-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.115-117
    • /
    • 2011
  • Intrusion detection systems (IDS) are supposed to be an efficient safety measure against inside attacks. In purely distributed IDS approach, IDS agent is installed in every node. It checks abnormal behavior of neighboring nodes locally. It collects the data that it receives from nodes in its radio range. Sensor nodes audit that data and generate alerts for abnormal activity. Here, there are two ways of taking decision. First, it can take decision individually and second, it can communicate with its neighbor to find the status of the claimed compromised nodes. In this paper, we propose a collaborative decision making scheme for purely distributed detection system. The proposed scheme is light weight compared to consensus based validation methodology. It provides a better scheme to find intrusions by interacting with other nodes.

A Study on Implementation of Information Management System for Library (정보화경영시스템의 도서관 적용에 관한 연구)

  • 박재용;조윤희
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.115-134
    • /
    • 2002
  • According to increase share ratio of information on library be unable bring to maintain knowledge and information resource management for information audit and control on management vision in non-profit organization. Application of information management system was necessary to the systems integration and total management activity in total management system of organization. Library must be to investigate knowledge and information promotion and management innovation needs to consider to gather into a bundle problems to include social and economic requirements. This research be able to adaption all library standardization rule review adapt ability of information management system through the analysis compared to various developed performance indicator for library and level evaluation indicator for information management system. Library will be expanse efficiency of organization, satisfaction of users and level up the National competition through the adaptation of information management system.

Correlation Analysis in Information Security Checklist Based on Knowledge Network (지식 네트워크에 근거한 정보보호 점검기준 관계분석)

  • Jin, Chang Young;Kim, Ae Chan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.2
    • /
    • pp.109-124
    • /
    • 2014
  • As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, 'FSS', 'FISS', 'G') are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, 'FSS', 'FISS'and 'G'.

A Study on The Security Measures of Insurance Crimes (보험범죄의 보안대책에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.53-60
    • /
    • 2016
  • Security measures for the current insurance crime has focused on the capture oriented and reactive response in the screening stage of insurance payments. However, since leaving the damages that can not be healed by post-punishment, it is necessary to take measures to prevent the insurance crimes in advance. In this paper, I would like to try to identify problems through analyzing the characteristics and cases of the insurance crimes, and to present alternatives to it. The problems with the current insurance system that causes the insurance crimes are, First, When signing the insurance contract, it is too inattentive to confirm about the credit status of the policyholder, duplicate join or not, whether voluntarily sign up etc. Second, a thorough investigation or criminal charges in case of insurance accident is not being done properly. Third, information exchange and management to malicious policyholders is not being done properly. Therefore, in order to guard people from insurance crimes, First, it should strengthen the audit of such credit conditions, accident experiences in the insurance contract at the policyholders. Second, we need to block insurance crimes in advance through the continuous upgrades of insurance fraud analysis systems and social network. Third, it is necessary to strengthen the surveillance systems for the insurance crimes by the information sharing.

The effect of Internal control over financial reporting on probability of firm failure (내부회계관리제도가 기업실패가능성에 미치는 영향)

  • Kim, Hyun-Jin
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.173-190
    • /
    • 2014
  • According to COSO(2013) "Internal control is a process that is designed to provide reasonable assurance that a firm can achieve its objectives, where differing aspects of internal control can be partitioned into operating objectives, reporting objectives, and compliance objectives." Internal control over financial reporting(ICFR) is focus on reporting objectives and includes that provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition of the company's assets that could have a material effect on the financial statements. Thus, firms with weak ICFR have negative a effect on Firm value because those firms are great likelihood of misappropriation and inefficiency decision. In this regard, this study investigates the association of ICFR with the likelihood of firm failure. Specially, I measure the characteristic of ICFR as disclosures of material weaknesses and operating personnel of ICFR. I identify the likelihood of firm failure as going-concern opinion issued in audit report. As result, I find that a higher probability of firm failure is positively associated with the material weakness in ICFR also I find that a higher probability of firm failure is negatively associated with experience and qualified CPA of personnel in ICFR.

  • PDF

An Exploratory Study on Buyer-Supplier Relationship in B2B with Internet (기업간 인터넷 전자상거래에서 구매자와 공급자간의 관계 형성에 관한 탐색적 연구: 건설부문 사례를 중심으로)

  • Kim, Hyo-Gun;Cho, Hyung-Seung;Choi, In-Young
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.169-182
    • /
    • 2003
  • The growth of electronic commerce make business to business electronic commerce market grow dramatically due to dramatic decrease of transaction cost and increase of productivity. It also influences the way of building transaction relationship between buyers and suppliers. This study tends to prove electronic market theory for Internet based 13213 commerce. We observe and analyze the implementation and usage patterns of procurement system of I company. The result shows that even through Internet enable many buyers and suppliers to participate and transact each other, the transaction pattern is different according to asset specificity and uncertainty as follows. First, with adoption of internet, the product with the higher asset specificity rather than lower asset specificity can be easily purchased. Second, Internet doesn't make any significant influence on the transaction of the product with higher uncertainty. But, organization's pre-audit process can indirectly influence on the decrease of the transaction uncertainty.

Impact of Corporate Governance Mechanisms on Corporate Social Responsibility Disclosure of Publicly-Listed Banks in Bangladesh

  • JAHID, Md. Abu;RASHID, Md. Harun Ur;HOSSAIN, Syed Zabid;HARYONO, Siswoyo;JATMIKO, Bambang
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.6
    • /
    • pp.61-71
    • /
    • 2020
  • The study examines the impact of corporate governance mechanisms, such as board characteristics on corporate social responsibility disclosure (CSRD). The data on CSRD items and board characteristics have been collected by content analysis of the annual reports of 30 publicly-listed banks in Bangladesh covering six years, from 2013 to 2018. More specifically, the directors' report, the chairman's statement, notes to the financial statement and CSR disclosure reports included in annual reports were used to collect the CSRD data. The empirical analysis applies the ordinary least square and the generalized method of moments. The results of the study have revealed that board size, board independence, female board member, and foreign directors have a significant positive impact on CSRD. By contrast, political directors and audit committee size have a negative impact on CSRD. Interestingly, accounting experts on boards ensure more CSRD as they curb the influence of politicians on the board. Thus, it is better to increase accounting experts and decrease politicians on the board. These findings provide valuable insights into the process of forming a suitable CSR policy by connecting the efforts of the board, government, and regulatory bodies to enhance the performance of banks to CSR as well as to CSRD.

An integrated approach for identity and access management for efficient administrative work (행정업무 능률향상을 위한 통합 계정 및 접근 관리 방안)

  • Park, Byung-Eon;Yang, Jaesoo;Cho, Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.165-172
    • /
    • 2015
  • Recently large amounts of customer information has leaked ranging from public institutions to the large-scale of portals, and similar information leakage incidents owing to the absence of personal information management have subsequently occurred. Therefore, the security infrastructure in which leakage of internal data can be blocked fundamentally is emerging as a key issue. An integrated identity and access management architecture which performs user access and its rights management, authentication and audit of the business systems is more important to improve the efficiency of business. In addition, this approach is emerging as a safe and effective ways for identity and access rights management. In this paper, we analyze how an integrated approach for identity and access management to improve the efficiency of the computational work and to strengthen the security in local government administration should be constructed, and proposed the preferred solution.