• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.025 seconds

Behavioral Factors Affecting Tourists' Smartphone Usage: Focus on Mobile Banking Service (관광객의 스마트폰 이용 행위 요인: 모바일 뱅킹 서비스 중심)

  • Qu, Xiaoqian;Kim, Mincheol
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.127-134
    • /
    • 2019
  • The purpose of this study was to investigate the factors affecting the behavior intention of smartphone mobile banking service among tourists. Currently, due to the development of mobile Internet technology and the spread of smartphone all over the world, interest and spread of smart phone based mobile banking is popularized. Thus, we analyzed the relationship among performance expectancy, social influence, facilitating conditions, perceived financial cost, perceived habit, perceived security level, and user's behavioral intention as a dependent variable. In this study, 203 respondents were interviewed about Chinese tourists at Jeju International Airport, and the influence of independent variables was determined by Smartpls 3.0. The results showed that the perceived security level and habit had a positive effect on the behavior intention. Especially, perceived security is a major issue of smartphone-based mobile banking in recent years. This study is meaningful in that it is an analysis of behavior factors of smartphone-based mobile banking service for tourists.

A Study on the Trend Analysis Based on Personal Information Threats Using Text Mining (텍스트 마이닝을 활용한 개인정보 위협기반의 트렌드 분석 연구)

  • Kim, Young-Hee;Lee, Taek-Hyun;Kim, Jong-Myoung;Park, Won-Hyung;Koo, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • For that reason, trend research has been actively conducted to identify and analyze the key topics in large amounts of data and information. Also personal information protection field is increasing activities in order to identify prospects and trends in advance for preemptive response. However, only research based on technology such as trends in information security field and personal information protection solution is broadly taking place. In this study, threat-based trends in personal information protection field is analyzed through text mining method. This will be the key to deduct undiscovered issues and provide visibility of current and future trends. Policy formulation is possible for companies handling personal information and for that reason, it is expected to be used for searching direction of strategy establishment for effective response.

Methodology for Computer Security Incident Response Teams into IoT Strategy

  • Bernal, Alejandro Enciso;Monterrubio, Sergio Mauricio Martinez;Fuente, Javier Parra;Crespo, Ruben Gonzalez;Verdu, Elena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1909-1928
    • /
    • 2021
  • At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agro-industrial, among others) or government agencies that use this methodology.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Functional Requirements of Data Repository for DMP Support and CoreTrustSeal Authentication

  • Kim, Sun-Tae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.7-20
    • /
    • 2020
  • For research data to be shared without legal, financial and technical barriers in the Open Science era, data repositories must have the functional requirements asked by DMP and CoreTrustSeal. In order to derive functional requirements for the data repository, this study analyzed the Data Management Plan (DMP) and CoreTrustSeal, the criteria for certification of research data repositories. Deposit, Ethics, License, Discovery, Identification, Reuse, Security, Preservation, Accessibility, Availability, and (Meta) Data Quality, commonly required by DMP and CoreTrustSeal, were derived as functional requirements that should be implemented first in implementing data repositories. Confidentiality, Integrity, Reliability, Archiving, Technical Infrastructure, Documented Storage Procedure, Organizational Infrastructure, (Meta) Data Evaluation, and Policy functions were further derived from CoreTrustSeal. The functional requirements of the data repository derived from this study may be required as a key function when developing the repository. It is also believed that it could be used as a key item to introduce repository functions to researchers for depositing data.

A Study on the Policy Advice of Integrated CCTV Control Center

  • Chung, ChoongSik
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.46-55
    • /
    • 2017
  • In recent years, public area CCTV has also begun to become more popular in the Korea. 2011, Korea's Ministry of Public Administration and Security has recommended that other local governments set up an integrated CCTV control center in each of their districts. The ministry was planning to make it compulsory for local governments to install an integrated CCTV control center by 2015. More than 570,000 public cameras are managed by public agencies and local government offices. Currently, the integrated CCTV control center is playing a very positive role in fighting crimes in the district particularly through its liaison with the district police. The CCTVs were operated by a several different agencies and departments in the district, resulting in considerable redundancy in public service, inefficiency and delays in response to crimes, and other emergency situations. Therefore, Control Center should be operated lawfully and efficiently. CCTV Control Center will be managed by three ways: (1) IT Governance through cooperation with civil areas (2) by regulated with proper laws and (3) managed by proper guideline and personal training.

Neutral Reference Model for Engineering Change Propagation in Global Top-down Modeling Approach

  • Hwang, Jin-Sang;Mun, Du-Hwan;Han, Soon-Hung
    • International Journal of CAD/CAM
    • /
    • v.7 no.1
    • /
    • pp.81-89
    • /
    • 2007
  • As the modular production is an important issue in globalized manufacturing industries, sub modules or parts of the final product are provided by many suppliers. Some part suppliers design their own products for themselves. In some cases, part supplier may provide the same type product to multiple 1-tier companies. Because all suppliers and 1-tier companies can not use the same CAD system in general case, the engineering change in the CAD model of one company could not propagate to related CAD models of other companies directly. Although they use the same CAD system, it is hard to share their CAD model with each other because of company security policy. In this paper, the neutral reference model, which consists of the neutral skeleton model and the external reference model, is proposed to apply a global top-down modeling approach to collaborating companies.

Analysis of Technology for Secure Container with RFID (RFID를 활용한 컨테이너 보안기술의 현황분석)

  • Byeon, Eui-Seok;Byeon, Ji-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.11-16
    • /
    • 2011
  • Information of freight tracking and tracing is one of core elements in logistics point of view. We can monitor the vehicle or vessel where freights are loaded and get the in-transit data via GPS. However, security problem exists after the shipments are unloaded. RFID is well utilized for securing the container which products are stuffed into. International standard organization sets relevant specification and e-seal appears to be at issue. The paper investigates current status of corresponding technology and proposes the policy for development of logistics industry.

Progress of renewable energy in India

  • Kar, Sanjay Kumar;Gopakumar, K.
    • Advances in Energy Research
    • /
    • v.3 no.2
    • /
    • pp.97-115
    • /
    • 2015
  • Energy holds key to economic growth and prosperity of India. Currently, India has very high-energy import dependence, especially in the case of crude oil (80%) and natural gas (40%). Even coal import has been increasing over the years. Considering India's population growth, emphasis on manufacturing, production, and service industry, energy consumption is bound to increase. More fossil energy consumption means greater dependence on energy import leading to widening trade deficit and current account deficit. Therefore, exploitation of indigenous renewable energy production is necessary. The paper reviews the progress and growth of renewable energy production, distribution, and consumption in India. The paper highlights some of the enablers of renewable energy in India. The authors discuss the opportunities and challenges of increasing share of renewable energy to reduce energy import and address issues of energy security in India. The findings suggest that India is ready for a quantum leap in renewable production by 2022.

Global Value Chain in East Asia Under "New Normal": Ideology- Technology-Institution Nexus

  • Choi, Byung-il
    • East Asian Economic Review
    • /
    • v.24 no.1
    • /
    • pp.3-30
    • /
    • 2020
  • This paper analyzes how the current Global Value Chain (GVC) of East Asia has been established, and attempts to project the future trajectory of GVC under New Normal in the global trading system. For this purpose, the framework of Ideology-Technology-Institution nexus is presented with focus on the dynamics of interplay between ideology and technology, duly recognizing the dual-aspect of technology- a platform for business and also for national defense. The paper analyzes how the Information and Communication Technology (ICT) of the 1990s played a role of "facilitator" in shaping the GVC of East Asia, where China plays 'factory for final assembly' and the US plays 'the largest consumer'. Under New Normal, digital technology is likely to play the opposite role of "disrupting" the GVC of East Asia, unlike ICT. The paper explores the mechanism behind this great disruption. What is driving New Normal is the US-China power competition, seeking for dominance in East Asia and beyond. This paper argues that New Normal is not temporary shock, but will last for some time. Under this presumption, the paper presents three scenarios for the future trajectory of GVC in East Asia.