• 제목/요약/키워드: Security systems

검색결과 4,965건 처리시간 0.029초

인터넷 뱅킹 사용자의 보안의도에 영향을 마치는 요인에 관한 연구 (A Study on Factors Influencing User's Security Intention for Internet Banking)

  • 김종기;강다연;전진환
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제18권2호
    • /
    • pp.1-18
    • /
    • 2009
  • Recently, internet banking is growing rapidly. Moot banks in Korea provide internet banking services. Internet banking becomes a major trend in the financial marketplace. With advanced computer technology and declining communication costs, many customers prefer online alternatives such as internet banking, mobile banking or phone banking rather than going to banks by themselves. The number of customers using those alternatives is skyrocketing and domestic commercial banks encourage them of the use. As the internet is highly developed, customers demand higher quality services and banks develop and provide diverse services in order to respond to them. However, internet banking service users are still afraid of their personal and financial information being exposed on the internet. The purpose of this research is to empirically analyze the influence that appropriate internet banking affect user's security intention. The research model proposed in this study includes user's security intention which is influenced by self-efficacy, security trust, Internet banking attitude, perceived security and security intention. According to the result of this study, self-efficacy and security trust are related to the security attitude. There is a significant relationship between security attitude and perceived security. Also, user's security attitude and perceived security is significantly affected by security intention.

국제항공화물 공급망 보안 강화를 위한 보안과 세관의 협조체계 구축방안에 관한 연구 (A Study on the Establishment of a Security and Customs Cooperation System for Reinforcement of the International Air Cargo Supply Chain Security)

  • 박만희;황호원
    • 한국항공운항학회지
    • /
    • 제29권4호
    • /
    • pp.142-152
    • /
    • 2021
  • The International Civil Aviation Organization (ICAO) and the World Customs Organization (WCO) emphasize securing supply chain security through mutual cooperation between aviation security and customs by establishing a standardized security system by regulations, procedures and practices of international air cargo. Accordingly, in accordance with the Aviation Security Act, the known consignors system aims to secure cargo security before loading air cargo into the aircraft, while the customs AEO system is a public-private cooperation program that focuses on simplification of customs clearance procedures. These systems basically have the same purpose of effectively identifying high-risk cargo through a risk-based approach in international air cargo transportation and preventing risks in advance, and the content that a common basic standard for cargo security must be established is also similar. Therefore, it is necessary to establish a cooperation system by simplifying problems such as cumbersome and redundant authentication procedures and on-site verification through coordination of security requirements for mutual recognition between the two systems. As a result, it is necessary to establish a process for coordinating security and customs' supply chain security program and maximize the effect of harmonizing supply chain security by strengthening the linkage between known consignors and AEO.

What IF Analysis Impacting CRM in Medical Sector

  • Arshi Naim;Kholood Alqahtani;Mohammad Faiz Khan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.101-108
    • /
    • 2023
  • Decision Support Systems (DSS) is an Information Systems (IS) application that aids in decision-making processes for many business concepts and Customer Relationship Management (CRM) is one of them and it depends on the firm's tasks for developing and retaining customers while achieving their satisfaction and enhancing the sense of belongingness for their products and services. Profit maximization, the process of customer value, and building strategic values for the firm are the three empirical benefits of CRM that are achieved through analytical, operational, and direction (AOD) capabilities respectively. This research focuses on the application of DSS models of what-if analysis (WIA) for CRM at (AOD) and also shows the dependence on the Information Success model (ISM). Hypothetical data are analyzed for (AOD) by three types of (WIA) to attain CRM and profit maximization and this analytical method can be used by any customer-oriented firm as a general model and for the purpose of the study we have compared the CRM between patients and hospital management.

Artificial Intelligence (AI) and Blockchain-based Online Payments in the Global World

  • Ahlam Alhalafi;Prakash Veeraraghavan;Dalal Hanna
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.1-11
    • /
    • 2024
  • Payment systems are evolving, and this study examines how blockchain and AI improve online transactional security and service quality. The study examines micro and macro payment systems, compares online, and offline methods all over the world. The study also examines how blockchain and AI affect payment system security, privacy, and efficiency globally and rapidly digitizing economy. Digital payment methods are growing all over the world with high literacy and digital engagement, but they face challenges. The research highlights cybersecurity threats and the need to balance user convenience and security. It suggests blockchain and AI improve online payment services, supporting the policies for different countries. In this extensive research survey, we compare and evaluate the strengths and weaknesses of various payment systems, their practicality, and their robustness. This study also examines how technological innovations and payment systems interact to reveal how blockchain and AI could transform the financial sector. It seeks to understand how technology-enhancing service quality can boost customer satisfaction and financial stability in the digital age. The findings should help policymakers, financial institutions, and technology developers optimize online payment systems for a more secure and efficient digital economy.

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 - (The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination -)

  • 민경은;김성준;권두순
    • 경영과정보연구
    • /
    • 제35권1호
    • /
    • pp.207-233
    • /
    • 2016
  • 최근 모바일 어플리케이션을 기반으로 하는 모바일 메신저 산업이 빠른 성장세에 있다. 그리고 단순히 메신저를 공유하던 형태를 넘어 개인에게 맞춤형 정보를 제공하는 다양한 형태의 서비스를 제공하게 되면서 혁신적인 변화를 일으키고 있다. 또한 메신저 보안이 개인화되고 지능화된 기능을 통해 더 다양한 모바일 어플리케이션의 보안에 대한 중요성이 증가되고 있다. 본 연구는 국내 모바일 메신저 이용자들이 어플리케이션 서비스 이용요인들에 대해 파악하고 이들 요인이 모바일 보안에 대한 보안인식과 보안태도를 통해 개인정보보호행동에 영향을 미치는 요인들에 인과관계를 실증 연구하고자 한다. 이를 위해 인간의 본연적인 내재적 동기를 강조한 자기결정성(SDT: Self-Determination Theory) 이론의 주요 변수들을 적용한 연구모형을 제시하였다. 본 연구의 연구모형을 실증적으로 검증하기 위해 모바일 메신저를 이용한 경험이 있는 일반인과 대학생들을 대상으로 설문조사를 실시하였다. 연구결과 첫째, 지각된 자율성은 보안인식과 보안의도에 유의한 영향을 미치는 것으로 나타났다. 둘째, 지각된 유능성은 보안의도에 유의한 영향을 미치는 것으로 나타났다. 셋째, 지각된 관계성은 보안인식과 보안의도에 유의한 영향을 미치는 것으로 나타났다. 마지막으로, 보안인식과 보안의도는 개인정보 보호행동에 유의한 영향을 미치는 것으로 나타났다. 이를 통해 개인의 메신저의 보안의 중요성을 강조하고 소비자들에게 필요한 보안지침 개발을 위한 긍정적인 역할을 하는데 기여하고자 한다.

  • PDF

정보보호 전문가의 직무수행을 위한 지식 및 기술 분석 (Analysis of Knowledge and Skill for Security Professionals)

  • 최명길;김세헌
    • Asia pacific journal of information systems
    • /
    • 제14권4호
    • /
    • pp.71-85
    • /
    • 2004
  • Due to exponentially growing threats of cyber attacks, many organizations have begun to recognize the importance of information security. There is an explosion in demand for experienced ISMs(Information Security Managers) and ISSDs(Information Security System Developers). To educate ISMs and ISSDs, identifying the specific knowledge and skill for information security professional is critical. This paper identifies 15 items of knowledge and skill for ISMs and ISSDs using a simplified Delphi technique and categories them. The results of this paper could be used in determining what kinds of knowledge and skill should be included in the curriculum of information security programs.

글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구 (A Study on the Supply Chain Security and Risk Management Strategies of Global Companies)

  • 양정호
    • 경영과정보연구
    • /
    • 제27권
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF

Exploring the Association between Board Structure and Information Security Breaches

  • Hsu, Carol;Wang, Tawei
    • Asia pacific journal of information systems
    • /
    • 제24권4호
    • /
    • pp.531-557
    • /
    • 2014
  • Although the area of information security planning and management has gained an increased attention, not much discussion was available on the role and the impact of the board members towards a firm's security management and governance decisions. In this research, we draw on corporate governance and the organizational demography literature to conduct an exploratory empirical study on the association between the board structure of a firm and the possibility of information security breaches. Our results show that the board size, the average age/tenure and the heterogeneity of age could reduce the possibility of security breaches while the proportion of independent directors and the heterogeneity of tenure could increase it. Our findings shed lights on the important role played by the board when managing information security risks in organizations.

인공지능을 적용한 전력 시스템을 위한 보안 가이드라인 (Guideline on Security Measures and Implementation of Power System Utilizing AI Technology)

  • 최인지;장민해;최문석
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제6권4호
    • /
    • pp.399-404
    • /
    • 2020
  • There are many attempts to apply AI technology to diagnose facilities or improve the work efficiency of the power industry. The emergence of new machine learning technologies, such as deep learning, is accelerating the digital transformation of the power sector. The problem is that traditional power systems face security risks when adopting state-of-the-art AI systems. This adoption has convergence characteristics and reveals new cybersecurity threats and vulnerabilities to the power system. This paper deals with the security measures and implementations of the power system using machine learning. Through building a commercial facility operations forecasting system using machine learning technology utilizing power big data, this paper identifies and addresses security vulnerabilities that must compensated to protect customer information and power system safety. Furthermore, it provides security guidelines by generalizing security measures to be considered when applying AI.