• 제목/요약/키워드: Security Issues

검색결과 1,617건 처리시간 0.031초

FinTech in Saudi Arabia: A User Experience Aanalysis of FinTech Platforms

  • Abdulhadi M. Eidaroos
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.177-185
    • /
    • 2023
  • The global FinTech industry has experienced significant growth, with key projects developing the financial sector. In Saudi Arabia, startups have used technology to offer FinTech services. In this area, it is important to investigate the usability of platforms that offer FinTech services. This research aims to examine the usability of samples of Saudi FinTech websites and identify design issues impacting user experience. Usability testing was conducted on the websites of two FinTech firms identified design issues, including navigation problems on the homepage and a lack of transparency in displaying investment details, negatively impacting end users. Employing usability methods can assist in enhancing the development of FinTech platforms and addressing these issues. This study contributes to a deeper understanding of FinTech usability problems and the user experience, enabling advancements in the industry.

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권6호
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

A Survey Analysis of Internet of Things Security Issues and Combined Service

  • Kim, HyunHo;Lee, HoonJae;Lee, YoungSil
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권8호
    • /
    • pp.73-79
    • /
    • 2020
  • 최근 4차 산업혁명의 시작으로 사물인터넷, 인공지능, 가상현실, 5G 등 분야의 기술이 많이 발전하고 있다. 그 중 사물인터넷의 경우 다른 기술들에 비해 현재 상용화가 많이 되어 있으며, 계속해서 사물의 연결 수는 매년 증가하고 있다. 이렇게 계속해서 증가하고 있는 사물인터넷은 사용자의 편의성과 많은 정보를 제공하는 큰 장점이 있지만, 보안은 발전 속도와 비교하면 따라가지 못하고 있다는 것으로 나타났다. 사물인터넷 서비스는 관련 기기마다 서비스를 계속해서 제공하고 있지만, 현재는 기기의 서비스를 활용하여 다른 기술과 결합해서 새로운 서비스를 제공하는 유형도 늘어가고 있는 것으로 나타났으며, 앞으로도 더욱 더 넓은 범위의 서비스가 생겨날 것으로 예상한다. 이렇게 다방면으로 빠르게 발전하고 있는 사물인터넷 기술의 발전방향을 파악하여 안전하게 사물인터넷을 사용할 수 있도록 관련된 보안연구가 필요하다. 이에 따른 연구의 결과는 하드웨어 업그레이드나 소프트웨어적인 패치로 안정성을 보장할 수 있었다. 본 논문에서는 사물인터넷에 관련된 보안 이슈와 서비스에 관한 연구를 조사하여 발전방향을 분석한 후 현재 트랜드를 알아보고 이와 관련하여 필요한 보안요소 앞으로의 보안방향 및 서비스제공이 어떠한 형태로 발전되어 나아갈지 알아본다.

Semi-trusted Collaborative Framework for Multi-party Computation

  • Wong, Kok-Seng;Kim, Myung-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권3호
    • /
    • pp.411-427
    • /
    • 2010
  • Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with their internal and external parties such as branches, clients, and service providers. When data are shared among collaborators, security and privacy concerns becoming crucial issues and cannot be avoided. Privacy is an important issue that is frequently discussed during the development of collaborative systems. It is closely related with the security issues because each of them can affect the other. The tradeoff between privacy and security is an interesting topic that we are going to address in this paper. In view of the practical problems in the existing approaches, we propose a collaborative framework which can be used to facilitate concurrent operations, single point failure problem, and overcome constraints for two-party computation. Two secure computation protocols will be discussed to demonstrate our collaborative framework.

Resolving Security Issues of Cognitive Radio Networks

  • Moon, Sangook
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.797-799
    • /
    • 2012
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, as the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because law breakers could abuse the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

국민건강보험법의 발전과정과 법정책적 과제 (Approach to History and Problems of Health Insurance through Politics of Law)

  • 조형원
    • 의료법학
    • /
    • 제8권2호
    • /
    • pp.37-68
    • /
    • 2007
  • Health insurance has gone far toward solving Korea's health related problems through thirty years. Health Insurance as social security system has a role of national system to secure national health. But there are many problems in health insurance. There is a dispute about many issues, coverage of health security, compulsory appointment of health insurance organization, coverage and level of health insurance benefit, decisionmaking right of health insurance price, examination of health insurance etc. Generally, the opinion for health insurance policy to be leaded by nation sets against the opinion to be leaded by private sector. It is necessary to study politics of law, constitute law and comparative law for rational solving these problems. If desirable setting of health law system can be made, legal system must be set during a long time and be discussed synthetically in different standpoint.

  • PDF

Authorization Model with Provisions and Obligations in XML

  • Kim Suhee;Park Jongjin
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.355-360
    • /
    • 2004
  • With the growing acceptance of XML technologies, XML will be the most common tool for all data manipulation and data transmission. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online and it is important for security to be integrated with XML solutions. Many policies require certain conditions to be satisfied and actions to be performed before or after a decision is made. Binary yes/no decision to an access request is not enough for many applications. These issues were addressed and formalized as provisions and obligations by Betti et Al. In this paper, we propose an authorization model with provisions and obligations in XML. We introduce a formal definition of authorization policy and the issues involving obligation discussed by Betti et Al. We use the formal model as a basis to develop an authorization model in XML. We develop DTDs in XML for main components such as authorization request, authorization policy and authorization decision. We plan to develop an authorization system using the model proposed.

  • PDF

초연결 지능화 인프라 보안기술 동향 -5G 시대의 이동통신 보안 중심 (Mobile Network Issues regarding 5G Security)

  • 박종근;김종현;김익균;진승헌
    • 전자통신동향분석
    • /
    • 제34권1호
    • /
    • pp.36-48
    • /
    • 2019
  • Recently, competition among global mobile operators has focused on the commercialization of 5G for the first time. Apart from protecting the privacy of subscribers and the confidentiality and integrity of communication, protecting the network against various cyber attacks is also important to ensure that high-quality mobile services operate safely. In this study, we examine the security vulnerabilities with respect to mobile communication environments using previous and current LTEs. We also investigate whether existing vulnerabilities can be effectively protected and identify security issues that need to be considered in the approaching 5G environment.

Secure Object Detection Based on Deep Learning

  • Kim, Keonhyeong;Jung, Im Young
    • Journal of Information Processing Systems
    • /
    • 제17권3호
    • /
    • pp.571-585
    • /
    • 2021
  • Applications for object detection are expanding as it is automated through artificial intelligence-based processing, such as deep learning, on a large volume of images and videos. High dependence on training data and a non-transparent way to find answers are the common characteristics of deep learning. Attacks on training data and training models have emerged, which are closely related to the nature of deep learning. Privacy, integrity, and robustness for the extracted information are important security issues because deep learning enables object recognition in images and videos. This paper summarizes the security issues that need to be addressed for future applications and analyzes the state-of-the-art security studies related to robustness, privacy, and integrity of object detection for images and videos.