• 제목/요약/키워드: Security System Modeling

검색결과 266건 처리시간 0.024초

The Impact of Service Quality and Loyalty on Adoption and Use of Mobile Banking Services: Empirical Evidence from Central Asian Context

  • IVANOVA, Aisena;NOH, Grimm
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권5호
    • /
    • pp.75-86
    • /
    • 2022
  • The service industry has been acknowledged as a critical part of mobile banking services in recent years. This study examines the impact of e-service quality and loyalty on the intention to use and use behavior of mobile banking services in Mongolia, a Central Asian country. As a result, based on past research, a conceptual model was suggested. This study comprises 209 completed questionnaires from young Mongolians who own a bank account and a smartphone. The data was collected based on convenience sampling, and it was analyzed with SmartPLS software using a partial least squares-structural equation modeling (PLS-SEM) technique. The findings indicate that system quality, interface design, and security assurance have a significant positive impact on service quality; service quality has a positive impact on loyalty. Moreover, the results reveal that service quality and loyalty have a significant influence on the intention to use mobile banking services. The findings of this study suggest that local or international banks and financial institutions in Mongolia should consider system quality, interface design, and security concerns as key successors to building perceived security quality to retain current mobile banking users and attract new customers.

상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구 (A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System)

  • 엄익채
    • 융합정보논문지
    • /
    • 제9권8호
    • /
    • pp.35-44
    • /
    • 2019
  • 본 연구는 즉시 패치가 어려운 상용 운영체제 기반의 계측제어시스템의 취약점 평가 방안 및 시간의 경과에 따른 위험의 크기를 정량적으로 파악하는 것이다. 연구 대상은 상용 OS가 탑재된 계측제어시스템의 취약점 발견과 영향의 크기이다. 연구에서는 즉각 취약점 조치가 힘든 디지털 계측제어시스템의 취약점 분석 및 조치방법을 연구함으로써, 계측제어시스템이 존재하는 핵심기반시설의 전체적인 사이버보안 위험과 취약점을 정량적으로 파악하는 것이다. 본 연구에서 제안한 확률론적 취약점 평가 방안은 즉각적인 취약점 패치가 어려운 상용 운영체제 기반의 계측제어시스템에서 취약점 패치 우선 순위 및 패치가 불 가능시 수용 가능한 취약점의 임계값 설정, 공격 경로에 대한 파악을 가능하게 하는 모델링 방안을 제시한다.

Text Mining in Online Social Networks: A Systematic Review

  • Alhazmi, Huda N
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.396-404
    • /
    • 2022
  • Online social networks contain a large amount of data that can be converted into valuable and insightful information. Text mining approaches allow exploring large-scale data efficiently. Therefore, this study reviews the recent literature on text mining in online social networks in a way that produces valid and valuable knowledge for further research. The review identifies text mining techniques used in social networking, the data used, tools, and the challenges. Research questions were formulated, then search strategy and selection criteria were defined, followed by the analysis of each paper to extract the data relevant to the research questions. The result shows that the most social media platforms used as a source of the data are Twitter and Facebook. The most common text mining technique were sentiment analysis and topic modeling. Classification and clustering were the most common approaches applied by the studies. The challenges include the need for processing with huge volumes of data, the noise, and the dynamic of the data. The study explores the recent development in text mining approaches in social networking by providing state and general view of work done in this research area.

웹 응용 보안을 위한 객체지향 분석·설계 방법론 (An Object-Oriented Analysis and Design Methodology for Security of Web Applications)

  • 주경수;우정웅
    • 인터넷정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.35-42
    • /
    • 2013
  • 요즘 웹을 이용하여 많은 일들이 처리되고 있다. 이에 따라 다양하고 복잡한 기능을 가진 웹 기반의 응용 시스템들이 요구되고 있다. 이러한 웹 기반의 응용 시스템들을 효율적으로 개발하기 위하여 객체지향 분석 설계 방법론을 사용하고 있으며, 그 구현을 위하여 Java EE(Java Platform, Enterprise Edition) 기반의 기술들이 사용되기도 한다. 이렇게 개발된 웹 기반의 응용 시스템을 통해 많은 일들을 처리하면서 점차 보안과 관련된 이슈들이 중요해졌다. 이를 위하여 Java EE는 보안과 관련된 메커니즘을 제공하고 있지만, 효율적인 웹 응용 시스템을 개발하기 위한 객체지향 분석 설계 방법론과의 상호 연관성은 제공하지 못하고 있다. 이에 따라 Java EE 메커니즘에 따른 보안 방안은 개발 마지막 단계에서 비로소 구현되기 때문에, 요구사항 분석부터 구현에 이르기까지 시스템 개발 전 주기에 따른 일관된 보안 적용은 어려운 실정이다. 따라서 본 논문에서는 요구사항 분석부터 구현에 이르기까지, 보안이 강조된 '안전한 웹 응용 시스템을 위한 객체지향 분석 설계 방법론'을 제안한다. 제안한 객체지향 분석 설계 방법론은 보안에 관한 요구사항 분석과 시스템 분석 및 설계를 위하여 보안이 강조된 모델링 언어인 UMLsec을 사용하고, 그 구현을 위해서 Java EE 기반 기술 중 서블릿의 역할기반 접근제어(RBAC: Role Based Access Control)를 이용한다. 아울러 본 '웹 응용 보안을 위한 객체지향 분석 설계 방법론'을 온라인 뱅킹 시스템 개발에 적용하여 그 효율성을 확인하였다.

변형된 상태분할 알고리즘을 이용한 원격 HMI 시스템 제어 (The Remote HMI System Control Using the Transformed Successive State Splitting Algorithm)

  • 이종욱;이정배;황영섭;남지은
    • 융합보안논문지
    • /
    • 제8권4호
    • /
    • pp.135-143
    • /
    • 2008
  • 일반적인 HMI system은 원격 감시제어를 네트워크를 통하여 하고 있으나 기능이 제한 적이다. 본 논문에서는 산업용 HMI 시스템을 변형된 상태분할 알고리즘을 적용 하였다. 이 방법은, 미리 예상되는 질의어에 대한 데이터들을 갖고 모델링을 하였다. 그 결과, 모델링하는데 많은 시간이 절약되었고, 시스템을 안정적이고 정밀하게 구성하여 98.15%의 높은 인식률을 나타냈다. 음성 HMI 시스템을 산업용에 적용하여 인간이 직접적으로 활동할 수 없는 작업 환경에서도 산업용 기기들을 안정적으로 구동시킬 수 있다. HMI 시스템 엔진의 성능을 최적화하였다.

  • PDF

UML-ITS Usability Evaluation of Intelligent Tutoring System

  • Sehrish Abrejo;Amber Baig;Mutee U Rahman;Adnan Asghar Ali
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.123-129
    • /
    • 2023
  • The most effective tutoring method is one-on-one, face-to-face in-person human tutoring. However, due to the limited availability of human tutors, computer-based alternatives have been developed. These software based alternatives are called Intelligent Tutoring Systems (ITS) which are used to tutor students in different domains. Although ITS performance is inferior to that of human teachers, the field is growing and has recently become very popular. User interfaces play key role in usability perspective of ITS. Even though ITS research has advanced, the majority of the work has concentrated on learning sciences while mostly disregarding user interfaces. Because of this, the present ITS includes effective learning modules but a less effective interface design. Usability is one approach to gauge a software's performance, while "ease of use" is one way to assess a software's quality. This paper measures the usability effectiveness of an ITS which is designed to teach Object-Oriented (OO) analysis and design concepts using Unified Modeling Language (UML). Computer Supported Usability Questionnaire (CSUQ) survey was conducted for usability evaluation of UML-ITS. According to participants' responses to the system's usability survey, all responses lie between 1 to 3 scale points which indicate that the participants were satisfied and comfortable with most of the system's interface features.

빅데이터 연구동향 분석: 토픽 모델링을 중심으로 (Research Trends Analysis of Big Data: Focused on the Topic Modeling)

  • 박종순;김창식
    • 디지털산업정보학회논문지
    • /
    • 제15권1호
    • /
    • pp.1-7
    • /
    • 2019
  • The objective of this study is to examine the trends in big data. Research abstracts were extracted from 4,019 articles, published between 1995 and 2018, on Web of Science and were analyzed using topic modeling and time series analysis. The 20 single-term topics that appeared most frequently were as follows: model, technology, algorithm, problem, performance, network, framework, analytics, management, process, value, user, knowledge, dataset, resource, service, cloud, storage, business, and health. The 20 multi-term topics were as follows: sense technology architecture (T10), decision system (T18), classification algorithm (T03), data analytics (T17), system performance (T09), data science (T06), distribution method (T20), service dataset (T19), network communication (T05), customer & business (T16), cloud computing (T02), health care (T14), smart city (T11), patient & disease (T04), privacy & security (T08), research design (T01), social media (T12), student & education (T13), energy consumption (T07), supply chain management (T15). The time series data indicated that the 40 single-term topics and multi-term topics were hot topics. This study provides suggestions for future research.

Innovative Technologies in Higher School Practice

  • Popovych, Oksana;Makhynia, Nataliia;Pavlyuk, Bohdan;Vytrykhovska, Oksana;Miroshnichenko, Valentina;Veremijenko, Vadym;Horvat, Marianna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.248-254
    • /
    • 2022
  • Educational innovations are first created, improved or applied educational, didactic, educative, and managerial systems and their components that significantly improve the results of educational activities. The development of pedagogical technology in the global educational space is conventionally divided into three stages. The role of innovative technologies in Higher School practice is substantiated. Factors of effectiveness of the educational process are highlighted. Technology is defined as a phenomenon and its importance is emphasized, it is indicated that it is a component of human history, a form of expression of intelligence focused on solving important problems of being, a synthesis of the mind and human abilities. The most frequently used technologies in practice are classified. Among the priority educational innovations in higher education institutions, the following are highlighted. Introduction of modular training and a rating system for knowledge control (credit-modular system) into the educational process; distance learning system; computerization of libraries using electronic catalog programs and the creation of a fund of electronic educational and methodological materials; electronic system for managing the activities of an educational institution and the educational process. In the educational process, various innovative pedagogical methods are successfully used, the basis of which is interactivity and maximum proximity to the real professional activity of the future specialist. There are simulation technologies (game and discussion forms of organization); technology "case method" (maximum proximity to reality); video training methodology (maximum proximity to reality); computer modeling; interactive technologies; technologies of collective and group training; situational modeling technologies; technologies for working out discussion issues; project technology; Information Technologies; technologies of differentiated training; text-centric training technology and others.

사이버 방어를 위한 적응형 다중계층 보호체제 (Adaptive Multi-Layer Security Approach for Cyber Defense)

  • 이성기;강태인
    • 인터넷정보학회논문지
    • /
    • 제16권5호
    • /
    • pp.1-9
    • /
    • 2015
  • 사이버 공간에서 첨예화, 복잡화되고 있는 공격을 일대일 방식으로 방어하는데 한계가 있으므로 보다 효과적인 방어 방법이 필요하다. 본 고에서는 내외부의 공격에 대해 자산을 체계적 적응적으로 방어할 수 있는 다중계층 보안체제 구축 방안을 제시한다. 방어지역(Defense Zone)을 중심으로 한 다중계층 보안체제의 구조를 고안하고, 사이버 위협분석과 방어기술 자동할당 등 구현에 필요한 기술요소들에 대해 논의한다. 또한, 다중계층 보안체제에 대한 효과와 적용성을 보인다. 향후, 제시된 방안의 구체화를 위해 방어지역에 대한 상세구조설계, 최적 방어기술 자동선택방법, 위협 탐지를 위한 정상상태 모델링 기술 등에 대한 연구가 필요하다.

Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.1119-1143
    • /
    • 2014
  • Lightweight trust mechanism with lightweight cryptographic primitives has emerged as an important mechanism in resource constraint wireless sensor based mobile devices. In this work, outlier detection in lightweight Mobile Ad-hoc NETworks (MANETs) is extended to create the space of reliable trust cycle with anomaly detection mechanism and minimum energy losses [1]. Further, system is tested against outliers through detection ratios and anomaly scores before incorporating virtual programmable nodes to increase the efficiency. Security in proposed system is verified through ProVerif automated toolkit and mathematical analysis shows that it is strong against bad mouthing and on-off attacks. Performance of proposed technique is analyzed over different MANET routing protocols with variations in number of nodes and it is observed that system provide good amount of throughput with maximum of 20% increase in delay on increase of maximum of 100 nodes. System is reflecting good amount of scalability, optimization of resources and security. Lightweight modeling and policy analysis with lightweight cryptographic primitives shows that the intruders can be detection in few milliseconds without any conflicts in access rights.