• Title/Summary/Keyword: Perceived Information Security

Search Result 244, Processing Time 0.029 seconds

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

A Study on Industrial Technology Leakage and Effective Industrial Security Measures through analysis of domestic portal article data (국내 포털 기사자료 분석을 통한 산업기술유출 사례와 산업보안 강화 방안 연구)

  • Yang, Hyun Jung;Lee, Chang Moo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.3-13
    • /
    • 2017
  • In the knowledge-information society, many domestic companies put lots of investment in technical development to possess core technologies and intellectual property. However, in the results of passive investment in security to protect their technologies compared to the active investment in technical development, the technology leaks from many companies and research institutes are rapidly increasing. Such increase of technology leaks not only causes damage to companies, but also has harmful effects on national economy directly and indirectly. Even though it has been perceived that a lot of industrial technology leak crimes are committed by former/current workers of small and medium-sized businesses, it is hard to find researches that mainly compare and analyze them. Therefore, this study aimed to understand the actual status of industrial technology leaks by analyzing cases of industrial technology leaks from 2014 to 2016 based on the type of victimized companies, corporate internal leakers' positions, matter of complicity, tools used for technology leaks, and motivation for technology leaks. Through the analysis in each type, the patterns and characteristics of industrial technology leaks were researched, and also the exploratory research on industrial security for the prevention of industrial technology leaks was conducted.

Certificate-Based Encryption Scheme without Pairing

  • Yao, Ji;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1480-1491
    • /
    • 2013
  • Certificate-based cryptography is a new cryptographic primitive which eliminates the necessity of certificates in the traditional public key cryptography and simultaneously overcomes the inherent key escrow problem suffered in identity-based cryptography. However, to the best of our knowledge, all existed constructions of certificate-based encryption so far have to be based on the bilinear pairings. The pairing calculation is perceived to be expensive compared with normal operations such as modular exponentiations in finite fields. The costly pairing computation prevents it from wide application, especially for the computation limited wireless sensor networks. In order to improve efficiency, we propose a new certificate-based encryption scheme that does not depend on the pairing computation. Based on the decision Diffie-Hellman problem assumption, the scheme's security is proved to be against the chosen ciphertext attack in the random oracle. Performance comparisons show that our scheme outperforms the existing schemes.

Content Modeling Based on Social Network Community Activity

  • Kim, Kyung-Rog;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.271-282
    • /
    • 2014
  • The advancement of knowledge society has enabled the social network community (SNC) to be perceived as another space for learning where individuals produce, share, and apply content in self-directed ways. The content generated within social networks provides information of value for the participants in real time. Thus, this study proposes the social network community activity-based content model (SoACo Model), which takes SNC-based activities and embodies them within learning objects. The SoACo Model consists of content objects, aggregation levels, and information models. Content objects are composed of relationship-building elements, including real-time, changeable activities such as making friends, and participation-activity elements such as "Liking" specific content. Aggregation levels apply one of three granularity levels considering the reusability of elements: activity assets, real-time, changeable learning objects, and content. The SoACo Model is meaningful because it transforms SNC-based activities into learning objects for learning and teaching activities and applies to learning management systems since they organize activities -- such as tweets from Twitter -- depending on the teacher's intention.

Risk Perceptions and Risk-reduction Strategies in Internet Apparel Shopping

  • Lee, Mi-Young
    • Journal of Fashion Business
    • /
    • v.9 no.3
    • /
    • pp.134-149
    • /
    • 2005
  • Although Internet retailing is becoming a viable channel for apparel retailing, consumers are still reluctant to use Internet for apparel purchasing because at their concerns at Internet security and the difficulties at virtual shopping in unfamiliar shopping environment. The purpose at this study is to examine the nature at perceived risk associated with Internet apparel shopping and risk-reduction strategies used by Internet apparel shoppers. The data were collected via an online survey by a online research company. A total at 4,254 Internet users participated in this survey. Among these Internet users, 1,146 respondents had previous shopping experience in Internet shopping. Within this group, 195 were Internet apparel information seekers, and 589 were Internet apparel purchasers. Descriptive statistics, analysis of variance, and t-test were used to analyze the data. The perceived risks and risk-reduction strategies used by Internet apparel no-interest shoppers, Internet apparel information seekers (browsers), moderate Internet apparel purchasers, heavy Internet apparel purchasers were examined and compared. The results indicated that these tour groups were significantly different in apparel related risk, performance risk, and privacy risk. Internet purchasers tend to perceive more apparel-related, performance, and privacy risks than others. The results also indicated that these tour groups were significantly different in their opinions of risk-reduction strategies.

A Cross-National Study on the Determinants of Trust in Internet Shopping Mall : Focusing on Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 국가 간 비교 연구 : 한국.중국 이용자를 대상으로)

  • Jung, Chul-Ho;Chung, Young-Su
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.321-349
    • /
    • 2007
  • The objective of this study is to investigate factors influencing trust on internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on the literature reviews, this study employs six factors in two groups of influencing factors, web-site characteristics and individual characteristics as key determinants of trust in internet shopping mall. Analysis of 470 responses (Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following: In terms of the relationship between web-site characteristics factors and the trust, the results showed clear differences between Korean and Chinese samples. For the Korean samples, transaction security and interactivity were the only significant influencing factors. For the Chinese samples, perceived reputation and perceived size were the only significant factors. In terms of individual characteristics factors, the influencing factors were found identical for the samples. Both propensity to trust and familiarity were significant factors in both Korean and Chinese samples. Based on the findings, managerial implications are discussed in building user trust in internet shopping mall in Korean and Chinese market.

  • PDF

Identifying the Dynamic Structure of Mobile Banking Market: The System Dynamics Perspective (모바일 뱅킹 시장의 동태적 구조 분석: 시스템 다이내믹스 관점)

  • Kim, Hyo-Gun;Yun, Sun-Hee;Suh, Hyun-Ju
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.99-124
    • /
    • 2006
  • The development of IT has made it possible to use various terminal systems for financial transaction and demands for financial survices are getting more and more diversified at the same time. Among others, mobile banking service market based on IC chips has been expanded its service areas and the number of mobile banking users has been increased. The study analyzes and tests the dynamic effects of the inflow of potential customers on mobile banking market condition by using system dynamics methodology to identify the dynamic structure of mobile banking market. The simulation model is designed to track the variation in the number of subscribers of mobile banking servides according to two scenarios, and the results are as follows; First the effect of word of mouth by customers who have used the service already is significant. The satisfactory level of early adopters is reflected in WOM, and as a test result shows, increase in word-of-mouth causes the growth of potential customers' demands for mobile banking service. Second, perceived attractiveness of mobile banking service market is another important construct. Factors such as convenience, mobility, time saving, security, and various services explain the construct perceived attractiveness of the service, and it makes the potential customers adopt the service, causing the increase of demands.

  • PDF

Empirical Analyses of the Factors Influencing on the Intention to Use Smart Home Services (스마트 홈 서비스 이용의도에 대한 영향요인에 관한 실증적 분석)

  • Lee, Il-Gu;Kim, Sang-Hoon
    • Journal of Service Research and Studies
    • /
    • v.9 no.2
    • /
    • pp.55-76
    • /
    • 2019
  • This study conducted empirical analyses to investigate the factors affecting the intention to use smart home services. Based on the previous relevant studies, the characteristics of smart home service were found to influence on the intention to use smart home service, and four variables(ubiquitous connectivity, reliability, context awareness, and security) concerning the service characteristics could be derived. And referring to the technology acceptance model(TAM), the updated TAM, IS success model, and the theory of reasoned action(TRA), three variables such as perceived ease of use, perceived usefulness and subjective norm were also likely to affect the intention to use smart home service, and the user innovativeness was inferred to play a role of moderating variable. In order to examine the research model and the hypotheses which could describe the relationship of the above mentioned variables, this study surveyed 447 people who were currently using or would use the smart home services, and then tested the hypotheses for 436 valid responses. The results of hypotheses testing showed that reliability, context awareness, and security have a significant effect on perceived usefulness and on perceived ease of use. However, it was found that ubiquitous connectivity significantly affected perceived usefulness but did not affect perceived ease of use. And perceived ease of use, perceived usefulness and subjective norm had significant effect on the intention to use smart home services. Also, user innovativeness as moderating variable was found to significantly influence on the magnitude of the relationship between ubiquitous connectivity and perceived usefulness and on that between reliability and perceived ease of use. This can be interpreted as the findings implying that innovative smart home-service users are likely to feel the smart home-services more useful than ordinary users when the degree of ubiquitous connectivity is higher, and are likely to perceive the use of smart home-services to be easier than ordinary ones when the degree of reliability is higher.

An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service (개인용 클라우드 서비스에 대한 중국 사용자의 지속적 사용의도에 관한 실증 연구)

  • Yu, Hexin;Sura, Suaini;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.79-93
    • /
    • 2015
  • With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.