• Title/Summary/Keyword: Public Financial Security

Search Result 151, Processing Time 0.028 seconds

A Study on the Implementation of the Privacy Impact Assessment Management System for Enterprise (기업을 위한 개인정보영향평가 관리 시스템의 구현에 관한 연구)

  • Sun, Jae Hoon;Kim, Yong Ho
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.57-63
    • /
    • 2015
  • Development of IT technology, the rapid computerization of society has accelerated the digitization of the world's information. Then, the activation of the e-commerce is the collection of a number of sensitive information, storage, operational increased rapidly. Currently, the public sector, financial sector, the private sector has utilized a number of privacy. Accidents caused by leakage of information is a tendency to increase day by day. For a review of the problems of security and protection for such sensitive information, the need for easier support system it is required. This thesis suggests E-PIAMS(Enterprise-Privacy Impact Assessment Management System) applicable effectively in private sectors.

Automatic Malware Detection Rule Generation and Verification System (악성코드 침입탐지시스템 탐지규칙 자동생성 및 검증시스템)

  • Kim, Sungho;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.9-19
    • /
    • 2019
  • Service and users over the Internet are increasing rapidly. Cyber attacks are also increasing. As a result, information leakage and financial damage are occurring. Government, public agencies, and companies are using security systems that use signature-based detection rules to respond to known malicious codes. However, it takes a long time to generate and validate signature-based detection rules. In this paper, we propose and develop signature based detection rule generation and verification systems using the signature extraction scheme developed based on the LDA(latent Dirichlet allocation) algorithm and the traffic analysis technique. Experimental results show that detection rules are generated and verified much more quickly than before.

Forecasting the Occurrence of Voice Phishing using the ARIMA Model (ARIMA 모형을 이용한 보이스피싱 발생 추이 예측)

  • Jung-Ho Choo;Yong-Hwi Joo;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.79-86
    • /
    • 2022
  • Voice phishing is a cyber crime in which fake financial institutions, the Public Prosecutor's Office, and the National Police Agency are impersonated to find out an individual's Certification number and credit card number or withdraw a deposit. Recently, voice phishing has been carried out in a subtle and secret way. Analyzing the trend of voice phishing that occurred in '18~'21, it was found that there is a seasonality that occurs rapidly at a time when the movement of money is intensifying in the trend of voice phishing, giving ambiguity to time series analysis. In this research, we adjusted seasonality using the X-12 seasonality adjustment methodology for accurate prediction of voice phishing occurrence trends, and predicted the occurrence of voice phishing in 2022 using the ARIMA model.

Impact of Work Motivation on Satisfaction and Turnover of Public Universities Lecturers

  • PHAM, Chinh D.;HOANG, Thao P.D.;NGUYEN, Yen T.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.1135-1146
    • /
    • 2021
  • The paper aims to examine the relationship between various types of motivation and satisfaction as well as turnover intentions of public university lecturers. Intrinsic motivation is found to affect both satisfaction and turnover, while for extrinsic motivation, only one type has a significant effect on satisfaction. The web-based questionnaire with convenience sampling was chosen to approach target respondents. Data was collected by sending a link of the questionnaire to the lecturers' email. There were 700 questionnaires collected. Of which 681 valid responses, after screening out unusual questionnaires. In order to fulfill these aims, the authors employed structural equation modeling with maximum likelihood method supported by AMOS software with 681 valid samples. The evidence confirms the high correlation between intrinsic motivation and satisfaction for university lecturers which has been shown in previous studies. With regard to extrinsic motivation, extrinsic regulation (material) is found to have a positive influence on satisfaction, meaning financial rewards and job security will lead to his contentment while introjected regulation is a source of dissatisfaction. The results also demonstrate that intrinsic motivation is negatively correlated with turnover intentions. A person who is interested in the job itself is less likely to leave his or her job due to a keen passion for it.

A Study on Enhancing Security Management of IT Outsourcing for Information System Establishment and Operation (정보시스템 구축·운영을 위한 IT 외주용역기반 보안관리 강화에 관한 연구)

  • Lee, Eun-Sub;Kim, Sin-Ryeong;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.27-34
    • /
    • 2017
  • In recent years, major security data such as research data and confidential documents have been leaked to the outside due to the carelessness of the companies and research institutes performing IT related services such as information technology projects and research and development of financial institutions, companies and public institutions is. Leakage cases are caused by leakage of personal information due to lack of security management of information system maintenance companies, such as unauthorized leakage or storage of related materials in outsourcing service process. In this paper, we analyzed the types and management status of service business through the environmental survey of corporate informatization business and analyzed the problems in development and maintenance using external service companies. Furthermore, in this paper, we provide an information system service that focuses on the business activities based on the items considered, and at the same time, it provides the informatization service for companies that can prevent infiltration of viruses and hacking from the outside. This paper presents a methodology for enhancing security for the system construction.

Women's Employment in Industries and Risk of Preeclampsia and Gestational Diabetes: A National Population Study of Republic of Korea

  • Jeong-Won Oh;Seyoung Kim;Jung-won Yoon;Taemi Kim;Myoung-Hee Kim;Jia Ryu;Seung-Ah Choe
    • Safety and Health at Work
    • /
    • v.14 no.3
    • /
    • pp.272-278
    • /
    • 2023
  • Background: Some working conditions may pose a higher physical or psychological demand to pregnant women leading to increased risks of pregnancy complications. Objectives: We assessed the association of woman's employment status and the industrial classification with obstetric complications. Methods: We conducted a national population study using the National Health Information Service database of Republic of Korea. Our analysis encompassed 1,316,310 women who experienced first-order live births in 2010-2019. We collected data on the employment status and the industrial classification of women, as well as their diagnoses of preeclampsia (PE) and gestational diabetes mellitus (GDM) classified as A1 (well controlled by diet) or A2 (requiring medication). We calculated odds ratios (aORs) of complications per employment, and each industrial classification was adjusted for individual risk factors. Results: Most (64.7%) were in employment during pregnancy. Manufacturing (16.4%) and the health and social (16.2%) work represented the most prevalent industries. The health and social work exhibited a higher risk of PE (aOR = 1.11, 95% confidence interval [CI]: 1.03-1.21), while the manufacturing industry demonstrated a higher risk of class A2 GDM (1.20, 95% CI: 1.03-1.41) than financial intermediation. When analyzing both classes of GDM, women who worked in public administration and defense/social security showed higher risk of class A1 GDM (1.04, 95% CI: 1.01, 1.07). When comparing high-risk industries with nonemployment, the health and social work showed a comparable risk of PE (1.02, 95% CI: 0.97, 1.07). Conclusion: Employment was associated with overall lower risks of obstetric complications. Health and social service work can counteract the healthy worker effect in relation to PE. This highlights the importance of further elucidating specific occupational risk factors within the high-risk industries.

The Impact of Block Chain Characteristics on the Intention to Use Hotel Reservation System in China (중국에서의 호텔예약 시스템의 블록체인 특성이 사용의도에 미치는 영향)

  • JIN, Peng-Ru;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.8
    • /
    • pp.33-44
    • /
    • 2019
  • Purpose - As the scope of existing digital transformation expanded to various degrees, the Fourth Industrial Revolution came into being. In 2016, Klaus Schwab, Chairman of the World Economic Forum (WEF), said that the new technologies that lead the fourth industrial revolution are AI, Block chain, IoT, Big Data, Augmented Reality, and Virtual Reality. This technology is expected to be a full-fledged fusion of digital, biological and physical boundaries. Everything in the world is connected to the online network, and the trend of 'block chain' technology is getting attention because it is a core technology for realizing a super connective society. If the block chain is commercialized at the World Knowledge Forum (WKF), it will be a platform that can be applied to the entire industry. The block chain is rapidly evolving around the financial sector, and the impact of block chains on logistics, medical services, and public services has increased beyond the financial sector. Research design, data, and methodology - Figure analysis of data and social science analytical software of IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used for all the data researched. Data were collected from hotel employees in China from 25th March to 10th May. Results - The purpose of this study is to investigate the effect of the block chain characteristics of the existing hotel reservation system on the intention to use and to examine the influence of the block chain characteristics of the hotel reservation system on the intention to use, We rearranged the variables having the same or similar meaning and analyzed the effect of these factors on the intention to use the block chain characteristic of the hotel reservation system. 339 questionnaires were used for analysis. Conclusions - There are only sample hotel workers in this study, and their ages are in their 20s and 30s. In future studies, samples should be constructed in various layers and studied. In this study, the block chain characteristics are set as five variables as security, reliability, economical efficiency, availability, and diversity. Among them, Security and reliability made positive effects on the perceived usefulness. Also, security and economics did on the perceived ease. Availability and diversity did on both perceived usefulness and perceived ease. Perceived ease did on perceived usefulness. And perceived ease and perceived usefulness did on user intent. But security and economics did not on the perceived usefulness

Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network (스마트 제조 산업용 네트워크에 적합한 Snort IDS에서의 전처리기 구현)

  • Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1313-1322
    • /
    • 2016
  • Recently, many virus and hacking attacks on public organizations and financial institutions by internet are becoming increasingly intelligent and sophisticated. The Advanced Persistent Threat has been considered as an important cyber risk. This attack is basically accomplished by spreading malicious codes through complex networks. To detect and extract PE files in smart manufacturing industry networks, an efficient processing method which is performed before analysis procedure on malicious codes is proposed. We implement a preprocessor of open intrusion detection system Snort for fast extraction of PE files and install on a hardware sensor equipment. As a result of practical experiment, we verify that the network sensor can extract the PE files which are often suspected as a malware.

Opportunities for the Use of Blockchain Technology in the Tourism Industry

  • Ukhina, Tatiana Viktorovna;Otteva, Irina Vladimirovna;Plaksa, Julia Valerievna;Makushkin, Sergey Anatolyevich;Ryakhovsky, Dmitriy Ivanovich;Khromtsova, Lina Sergeevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.51-56
    • /
    • 2022
  • It is relevant and timely for the existence and prosperity of today's tourism to build up a stock of new abilities and a set of innovations. At present, the tourism industry is experiencing a new stage in its digital transformation. The newest technologies, which are now spreading en masse and one of which is rightfully considered to be blockchain technology, enable tourists to receive tourist services directly from the producers, which not only gives the consumer the opportunity to enjoy higher quality and inexpensive products but also increases the responsibility of the producer. The article analyzes research literature on the possibility of using blockchain technology in the tourism industry. Based on an expert survey, the main problems, prospects, and advantages of the implementation of blockchain technology in the tourism industry are identified. The paper proposes and analyzes an option for the use of blockchain technology on the basis of a blockchain project with a mobile app for users and a dedicated website and public API for travel service providers.

An Extended Benefit-Cost Analysis of Land Consolidation and On-farm Development Project -With Respect to Jigok Land Consolidation and On-farm Development Project in Seosan, Chungnam Province, Korea- (경지정리사업의 확장편익-비용분석 - 충남서산시 지곡지구를 중심으로 -)

  • Lim, Jae-Hwan;Lee, Min-Soo
    • Korean Journal of Agricultural Science
    • /
    • v.29 no.1
    • /
    • pp.66-83
    • /
    • 2002
  • The economic feasibility analysis including benefit-cost ratio and internal rate of return of a land consolidation and on-farm development project was mainly depended upon the direct benefits and costs arising during project life. Therefore the projects were neglected in allocating the government's financial funds and loans on account of the low economic rate of return of the project. Accordingly the extended benefit-cost analysis method should be introduced and adapted to cover not only the benefit s such as non-market values of environmental and food security fun ct ions of the project but also market values of the project outputs. The main purposes of this study are (1) to prepare a guide line for economic feasibility analysis based on the IBRD and ADB guidelines, (2) to estimate the benefits from productivity increase, labor saving, savings of O&M cost of farm mechanization and project facilities, savings of farmer's burden for their public health, increasing environmental and public functional value of paddy fields, improving food security condition and formation of peaceful and uncontroversial rural society by implementing the land consolidation and on-farm development, (3) to introduce the newly adapted analytical method as the extended benefit cost analysis which could make possible to be included the values of non-market goods such as the food security and the environmental public function of paddy fields. To carry out this study, the existing publications on the guidelines for economic agricultural projects were reviewed and consultation was made with a For the post evaluation study of the land consolidation and on-farm development project, field survey in Jigok and other comparative area were made to get available information. According to the project completion report, Jigok land consolidation and on-farm development project has 55ha of benefit area out of 69ha of gross area. The project was started in November 11th, 2000 and completed october 30th, 2001. The total project costs were amounted to 2,548 million won and the annual project benefits were estimated at 335million won evaluated by domestic market prices. The ERR(Economic Rate of Return) and SRR(Social Rate of Return) of the project based on the shadow pricing system were estimated at 4.4% and 16% respectively. On the other hand, the ERR and SRR based on the domestic market value system were amounted to 6.37% and 14.62%. In conclusion, Korean land consolidation and on-farm development projects have not carried out from the view point of economic rate of return under shadow pricing system but from the view point of domestic pricing system. For the future feasibility studies on land consolidation projects have to be carried out including the non-market values as environmental and food security function of the projects.

  • PDF