• Title/Summary/Keyword: Security Benefit

Search Result 264, Processing Time 0.023 seconds

An Analysis of Factors Affecting Fintech Payment Service Acceptance Using Logistic Regression (로지스틱 회귀분석을 이용한 핀테크 결제 서비스 수용 요인 분석)

  • Hwang, Sin-Hae;Kim, Jeoung Kun
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.51-60
    • /
    • 2018
  • This study aims to understand crucial factors affecting user's Fintech payment service adoption. On the basis of innovation diffusion theory and prior Fintech literature, this study classifies the influence factors of users' adoption of Fintech payment service into two dimensions - service dimension containing complexity, perceived benefit, trust in service provider and user dimension containing personal innovativeness and security breach experience. The data analysis results using binary logistic regression shows the negative direct effects of perceived risk, complexity, security accident experience on user's service adoption are statistically significant. Personal innovativeness has a positive effect on user's Fintech payment service adoption. The moderation effect of security accident experience is also significant at p<0.05.

Distributed System Cryptocurrency and Data Transfer

  • Alotaibi, Leena;Alnfiai, Mrim;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.77-83
    • /
    • 2021
  • The dependency on technology has increased with the increase in population. Technology plays a crucial role in facilitating, organizing and securing people's life nowadays. The Internet has penetrated every face of present-day lifestyles. Yet another ubiquitous use of digital technology today is evident in transferring money and speeding cross border payments that are done through digital transactions. This paper investigates transferring money and data through banks and companies by using the Blockchain concept through decentralized distributed system. The present research also peruses several contexts in which this technology has already been implemented successfully and demonstrates the advantages of replacing the paper money with digital money. Using cryptocurrency will facilitate people's life by reducing time, securing the process of money transfer, and increasing data integrity. The primary benefit of this content analysis is that it addresses an innovative subject, in a new light and using timely recent research references drawn from 2018-2020. Thus, our study is a contemporary and conclusive source for all present and future endeavours being undertaken in the domain of using blockchain for e-transactions.

A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications

  • Mohammad Y. Khanafseh;Ola M. Surakhi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.79-88
    • /
    • 2024
  • The information retrieval domain deals with the retrieval of unstructured data such as text documents. Searching documents is a main component of the modern information retrieval system. Locality Sensitive Hashing (LSH) is one of the most popular methods used in searching for documents in a high-dimensional space. The main benefit of LSH is its theoretical guarantee of query accuracy in a multi-dimensional space. More enhancement can be achieved to LSH by adding a bit to its steps. In this paper, a new Dynamic Locality Sensitive Hashing (DLSH) algorithm is proposed as an improved version of the LSH algorithm, which relies on employing the hierarchal selection of LSH parameters (number of bands, number of shingles, and number of permutation lists) based on the similarity achieved by the algorithm to optimize searching accuracy and increasing its score. Using several tampered file structures, the technique was applied, and the performance is evaluated. In some circumstances, the accuracy of matching with DLSH exceeds 95% with the optimal parameter value selected for the number of bands, the number of shingles, and the number of permutations lists of the DLSH algorithm. The result makes DLSH algorithm suitable to be applied in many critical applications that depend on accurate searching such as forensics technology.

A Study on the Specialization of Private Security Industry in Korea through the Japanese Private Security Certification System (일본 민간경비원 검정제도 연구를 통한 한국 민간경비산업 전문화 방안)

  • Lee, Chi Young
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.71-90
    • /
    • 2019
  • As the demand for national security and national safety is gradually increasing in accordance with the trend of the times and social environment, and the use of private areas for effective prevention and supply required for the demand for safety services, this paper analyzed the Japanese private security testing system for the introduction of the Korea security certification system as a way to secure expertise in the private security industry and drew the following conclusion. First, certificate segmentation should be carried out according to the clearly divided field and scope of the expense operation. Second, it is necessary to distinguish the qualification of the private security qualification according to the level. Third, it is necessary to utilize the combined evaluation method through the departmental and practical tests. Fourth, an assessment should be made through the link between departments and practical subjects. Fifth, the diversity of the acquisition methods should be placed to ensure the gainer's accessibility. Finally, the use of professional and visible use of professional personnel should be achieved through benefit assessment for those who are qualified for

An Economic Analysis of Alternative Mechanisms for Optimal IT Security Provision within a Firm (기업 내 최적 정보기술보안 제공을 위한 대체 메커니즘에 대한 경제적 분석)

  • Yu, Seunghee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.107-117
    • /
    • 2013
  • The main objective of this study lies at examining economic features of IT security investment and comparing alternative mechanisms to achieve optimal provision of IT security resources within a firm. There exists a paucity of economic analysis that provide useful guidelines for making critical decisions regarding the optimal level of provision of IT security and how to share the costs among different users within a firm. As a preliminary study, this study first argues that IT security resources share some unique characteristics of pure public goods, namely nonrivalry of consumption and nonexcludability of benefit. IT security provision problem also suffers from information asymmetry problem with regard to the valuation of an individual user for IT security goods. Then, through an analytical framework, it is shown that the efficient provision condition at the overall firm level is not necessarily satisfied by individual utility maximizing behavior. That is, an individual provision results in a suboptimal solution, especially an underprovision of the IT security good. This problem is mainly due to the nonexcludability property of pure public goods, and is also known as a free-riding problem. The fundamental problem of collective decision-making is to design mechanisms that both induce the revelation of the true information and choose an 'optimal' level of the IT security good within this framework of information asymmetry. This study examines and compares three alternative demand-revealing mechanisms within the IT security resource provision context, namely the Clarke-Groves mechanism, the expected utility maximizing mechanism and the Groves-Ledyard mechanism. The main features of each mechanism are discussed along with its strengths, weaknesses, and different applicability in practice. Finally, the limitations of the study and future research are discussed.

  • PDF

A study of social welfare officials' recognition about improving 'National Basic Livelihood Security Program' (국민기초생활보장제도 개선에 대한 사회복지전담공무원의 인식 연구)

  • Jeon, Hee Jeong;Im, Ran;Park, Jung In
    • Korean Journal of Social Welfare Studies
    • /
    • v.43 no.1
    • /
    • pp.229-247
    • /
    • 2012
  • This research has analyzed the options of improving 'National Basic Livelihood Security Program' and factors influencing on them, focusing on the 345 social welfare officials' recognition and assessment of the program. As a result of the analysis, some difference has been identified in the assessment of respective options in accordance with how social welfare officials recognize and assess the program and its recipients. The assessments as to the options of improving restrictions on the able-bodied poors, implementation of the individual benefit method, and so forth were shown differently according to the age; years of service; amount of work; rationality of the criteria for selecting recipients; levels of payment by the 'National Basic Livelihood Security Program'; possibility of the recipients' exit from poverty; achievements of the self-supporting program; and evaluation of the program improvement efforts of the government. Based on this result of analysis, key tasks and improvement options for the 'National Basic Livelihood Security Program' have been explored on the occasion of the 10th anniversary of the program.

The Analysis on the Soongrae-Mun fire and it's improvement measure (경비업무적 관점에서의 숭례문화재사고 분석과 대책)

  • Chung, Tae-Hwang;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.321-338
    • /
    • 2008
  • Soongrae-Mun Fire shows safety problem in Korea intimately. People have pressed for the responsibility of persons in charge and have asked for improvement measure whenever Fire accident occur, but similar accidents occur again without any improvement. This research is to provide improvement. measure on the base of the analysis of the cause of Soongrae-Mun fire to prevent similar accident, also to help private security company do effective security job. This research is approached from a security point of view. A lot of accidents occur by direct cause such as people's unsafe action and unsafe condition. but it is very difficult to remove the facts of direct cause, so the facts of indirect cause should be analyzed together. Drew-up of security related legislation should be included when the establishment of fire fighting related legislation is examined, also technical improvement should be examined with legislation. security company should be concerned about securing of expertise and reinvestment for the improvement of expertise to overcome limitations of private security such as job boundary, capability and responsibility. Also private security company should try to service for public benefit and to examine practical compensation for loss occurred by mistake of security company.

  • PDF

The Economic Impact of Maritime Piracy in the Gulf of Aden: challenges and implications

  • D'agostini, Enrico;Ryoo, Dong-Keun;Jo, So-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.39 no.5
    • /
    • pp.431-438
    • /
    • 2015
  • The purpose of this paper is to analyze maritime piracy and its economic implications with particular attention to attacks registered in the Gulf of Aden, The paper also aims to investigate how the International community, along with Sovereign States, should allocate resources in order to make the seas a safer place and describe how closely inter-related maritime piracy, preventive and punitive measures put in place by Governments are. Elements of economics and ergonomics are taken into account in order to properly investigate the major legal issues relating to maritime security. The paper proposes a cost-benefit analysis in order to investigate in theory what is the rationale behind engaging in criminal behavior and recommend some solutions to the issue to be undertaken by the International community. It is concluded that in order to cost effectively fight piracy, a mix of more coordinated National and International laws, standardized and increased punishment levels among jurisdictions and extended patrol controls are needed.

A Study of TRM and ATC Determination for Electricity Market Restructuring (전력산업 구조개편에 대비한 적정 TRM 및 ATC 결정에 관한 연구)

  • 이효상;최진규;신동준;김진오
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.3
    • /
    • pp.129-134
    • /
    • 2004
  • The Available Transfer Capability (ATC) is defined as the measure of the transfer capability remaining in the physical transmission network for further commercial activity above already committed uses. The ATC determination s related with Total Transfer Capability (TTC) and two reliability margins-Transmission Reliability Capability (TRM) and Capacity Benefit Margin(CBM) The TRM is the component of ATC that accounts for uncertainties and safety margins. Also the TRM is the amount of transmission capability necessary to ensure that the interconnected network is secure under a reasonable range of uncertainties in system conditions. The CBM is the translation of generator capacity reserve margin determined by the Load Serving Entities. This paper describes a method for determining the TTC and TRM to calculate the ATC in the Bulk power system (HL II). TTC and TRM are calculated using Power Transfer Distribution Factor (PTDF). PTDF is implemented to find generation quantifies without violating system security and to identify the most limiting facilities in determining the network’s TTC. Reactive power is also considered to more accurate TTC calculation. TRM is calculated by alternative cases. CBM is calculated by LOLE. This paper compares ATC and TRM using suggested PTDF with using CPF. The method is illustrated using the IEEE 24 bus RTS (MRTS) in case study.

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.