• 제목/요약/키워드: Personal Credit Information

Search Result 92, Processing Time 0.023 seconds

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Analysis of the Redemption Risk of Renters Using CoLTV (CoLTV 지표를 이용한 임대차주의 상환위험 분석)

  • Lee, Ta Ly;Song, Yon Ho;Hwang, Gwan Seok;Park, Chun Gyu
    • Korea Real Estate Review
    • /
    • v.28 no.1
    • /
    • pp.65-77
    • /
    • 2018
  • This paper analyzes the redemption risk of renters by estimating the LTV and CoLTV with finance market big data (individual credit information) and housing market big data (actual housing transaction data). The analysis showed that when using LTV, the redemption risk was higher in the case of the monthly renter than of the chonsei renter. On the other hand, when using CoLTV, the chonsei renter had a higher redemption risk than the monthly renter. This implies that there is a need to activate a guarantee system, such as risk management using the CoLTV index and the chonsei deposit return guarantee because it is possible for renters to experience losses on their chonsei deposits due to the higher redemption risk. Another implication is that the risk manager should consider the individual characteristics of renters because of the different effects of the redemption risk stemming from the characteristics of the rental contract and the personal characteristics of the renters. CoLTV was just a concept until this study calculated it using housing big data and actual housing transaction information. It helps identify the redemption risk through the characteristics of renters and their contracts.

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

A Study of Moral Development and Ethical Values of the Nurse (임상 간호사의 도덕성 발달과 윤리적 가치관에 대한 연구)

  • Kim, Mee-Jeong;Kim, Myung-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.5 no.2
    • /
    • pp.337-353
    • /
    • 1999
  • This study is to provide the basic sources to develop educational data that can establish ethical values with research on the interrelation between moral development and ethical values of nurses. The subjects of this study are the convenience sample from 111 nurses working in clinical settings from 5 general hospitals located in Pusan area. The questionnairs for this study are comprised two parts: Part 1 is SRM-SF(1995) guestionnaire, and translated by Kil, 1m Ju(1997): Part 2 is the guestion papers about the ethical values, and disigned by Jung, Hee Ja. The data were collected from June lth to 31th, 1997 and analyzed by S.A.S(Statistical Analysis System) Package for frequency, percent, and Pearson's correlation coefficient. The results of the study is as the followings: 1) According to the moral development. the nurses are in the levels of Stage3 or Transition3/4, which are generally focused on the personal relations or personality. Thus, nurses are considered to need to get the stage4 of education that helps them recognize a person as a member of society. a family as an unit of society, and human life as the values of human dignity. 2) According to the ethical values, nurses have the positive ethical values of respecting the right of the patients, providing information, keeping the secret, truth. and credit of patients. But they also experience some troubles by the patients to care and the clinical situation. Thus, to overcome the problems, nurses are considered to need to get the education that establishs the right ethical values. 3) The analysis result on the interrelation between moral development level and ethical values shows as r=0.28 and p=0.003. This indicates that the interrelation between them is low. In conclusion, it is considered that the moral development level is viewed broadly from a person and family to a society, and then it can affect to the ethical values positively.

  • PDF

The Study of the Influence of Low Cost Carriers' Web site Service Quality on Customer Loyalty (저가항공사의 웹 사이트 서비스 품질이 고객 충성도에 미치는 영향 연구)

  • Hyun, Hye-Won;Suh, Myung-Sun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.23 no.1
    • /
    • pp.103-112
    • /
    • 2015
  • In this study, a study was carried out to see what influence low-cost carrier's e-service quality has on low-cost carrier customers' perceived value and customer satisfaction and what impact the results have on customer loyalty based on the results of previous studies related to e-SERVQUAL, an e-SERVQUAL measurement model for general e-commerce. In addition, a survey of consumers who have experienced using low-cost carrier experience through web sites was conducted. For the analysis of the data collected, SPSS 18.0 was used to conduct frequency analysis, factor analysis, reliability analysis, correlation analysis, and regression analysis and thus to test a hypothesis. Research findings showed that perceived value and customer satisfaction are closely related to customer loyalty, and it was also observed that the reliability factor on the service provided on the web site acts as an important influencing factor for customer loyalty in the perceived value and security factors such as payment by credit cards and protection of personal information serve as important one in terms of customer satisfaction. This study has its limitation in that samples of users who have experienced low-cost carrier are concentrated on specific ages and professions. In the future, it is required to conduct further studies on whether difference is made on the importance of measurement factors related to e-service quality by gender, age group, occupation, and e-service quality.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Personal Financial Management Ability of College Students -A survey of D college- (대학생의 개인재무관리역량 -대구 D대학교를 중심으로-)

  • Lee, Sang-Kyung;Park, Su-Yong
    • Journal of the Korea society of information convergence
    • /
    • v.6 no.2
    • /
    • pp.23-44
    • /
    • 2013
  • First, the average scores of personal financial management ability in the college students' financial management attitude were 72.24 for male and 71.65 for female, so that male students showed a little higher score than female. College students who had an experience of opening a bank account and who kept a record of spending revealed higher scores. Those whose parents were elementary or middle school graduates unfolded the highest score, 73.67, and the lowest score, 63.35, from those whose parents had M.A. or Ph.D. The average scores of personal financial management ability in the college students' financial management knowledge indicated almost no difference with 63.26 for male and 63.35 for female. Only whether they had an experience of opening a bank account, keeping a record of spending, or a credit card revealed score differences. Depending on the students' majors, there were also score differences. Students from engineering department came up with the highest score, an average of 66.88, and students from art & physical education department with the lowest score, 53.39, in the financial management knowledge. The personal financial management ability in the college students' financial management function showed that the score of male students was a little higher than that of female, 64.26 versus 63.58. Students who kept a record of spending and whose parents' income was between three million won and four million won marked the highest score, an average of 65.26, and students whose parents' income was below two million won marked the lowest score, an average of 60.43, in the college students' financial management function. There were score differences in the college students' financial management function depending on the students' majors. Students from engineering department came up with the highest score, an average of 69.67, and students from public health department with the lowest score, 63.21.

  • PDF

Challenges and Opportunities of Small Business Management and Start-Ups in India

  • Potluri, Rajasekhara Mouly;Lee, Jung Wan;Khan, Saqib Rasool;Vali, Syed Mastan
    • Journal of Distribution Science
    • /
    • v.10 no.7
    • /
    • pp.5-11
    • /
    • 2012
  • The core objective of this research article is to investigate different challenges and opportunities in management as well as start-ups of small businesses in India. The prudence behind this research is to examine various problems in front of the small businesses and to offer vital support and cooperation to overcome those with the support of concerned institutions through consultancy and training programs. The researchers have an intention to make available the research results to the governmental agencies, concerned small business institutions and also to the educational institutions which are continually design plans, programs, policies and strategies to upgrade the managerial and technical dexterities of the small business Indian operators. After thorough revision of relevant literature on small businesses and its management, the researchers used a well structured questionnaire and in-depth personal interviews with 586small business operators selected from manufacturing, trading (retailing and wholesaling), finance, servicing/repair businesses which are located in the coastal districts of Andhra Pradesh in India. The researchers have used convenience sampling and collected data was analyzed with the support of Microsoft Excel and frequency distribution. Noticeably, majority of the small businessmen in India are facing myriad number of challenges both in management and at the time of establishment of their business operations. In particular, 72.47 percent of small businesses operators' have substantiated their strong opinion towards the challenges they are facing particularly finance, marketing and other problems while managing their businesses. The researchers also attempted to get the opinions on problems of the various categories of small businesses while starting their operations. A staggering 68percent of respondents identified the problems related to preparation of business plan, location selection, marketing and other problems like lack of proper credit facilities, skilled manpower, and other infra related problems while setting up of their businesses. On an average, 64.62 and 63.51 percent of small businesses are facing various kinds of problems both at the time of day-to-day management as well as start-up of their businesses respectively. The present research confined with the opinions of only four categories of small business operators particularly from the manufacturing, finance, trading (retailing and wholesaling), and servicing/repair which are continuing their business operations from the nine coastal districts of Andhra Pradesh in India. The present study emphatically provides concrete information required to the business community for identifying an assortment of challenges faced by different small business operators in managing and at the time of their inception. This research paper is first of its kind from this part of the world by offering extensive and credible information required for prospective entrepreneurs in facing the dynamic challenges in managing their business. Furthermore, this research presents invaluable inputs to the stakeholders like all types of governments, policy makers, practitioners, researchers, and educators' about the various impediments faced by the small business community in India.

  • PDF

International Study and Transformational Learning: What Covid-19 Has Taught Us

  • Rodgers, Steve
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1221-1221
    • /
    • 2022
  • Studying abroad in and of itself should be a unique and transformational learning experience for university students. Too often, "study abroad" is a code word for "faculty vacation" or "easy credit hours". For an international learning experience to be truly transformational it must offer an intense and directed program that maximizes the time the student spends in the accumulation of information that is new or different from what the student has "learned" previously. "Study abroad" may be a misnomer because it is not only about studying in another country or culture, that is, taking courses that usually have an attendance time of a few hours a week, but it is also about living in another country which becomes a 24/7 learning experience. Providing these programs during the Covid-19 pandemic has been a keen opportunity for institutional learning. When this immersion in foreign culture is combined with academic rigor applied to a student's chosen field of study the growth can be exponential. So, what is the relationship between academic and personal growth? The National Association for Study Abroad has found that "students who have studied abroad are better able to work with people from other countries, understand the complexity of global issues, and have greater intercultural learning. One study found that students returned from their study abroad experiences more tolerant and less fearful of other countries, but with a greater sense of nationalism-a phenomenon they called 'enlightened nationalism'." It is often said that "you only really learn to appreciate things that are important to you when they are gone, when you miss them." The international learning environment can provide this opportunity. The restrictions on various societies in the past two years due to the international Covid pandemic have provided existing study abroad programs with a true testing ground for the validity of their programs. At the end of the day, American colleges and universities are not helpless in the face of these developments. A lot depends on how a university positions itself for a future based on the uncertainties of the past. As Winston Churchill was working to form the United Nations after WWII, he famously said, "Never let a good crisis go to waste". In another context, Churchill's insight on human nature can also be applied to the coming semesters and years as studying abroad rebounds. What new strategies will be developed and maintained? Institutional commitment without fear will be necessary to assure that "studying abroad" will continue to develop as a truly unique and transformational learning experience.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.