• Title/Summary/Keyword: Software risk

Search Result 866, Processing Time 0.088 seconds

A Comparison Analytical Study on the B2B Electronic Trade Settlement System (B2B 전자무역대금결제시스템 비교.분석에 관한 연구)

  • Song Yong-Jong
    • Management & Information Systems Review
    • /
    • v.14
    • /
    • pp.151-180
    • /
    • 2004
  • Owing to the digital revolution, Internet Commerce and Electronic commerce, revolutionize the way of doing business and making payment. The entrance of the Internet has a prominent for spread of Electronic Commerce and those phenomenons will result in paperless trading and cashless trade. By virtue of Internet, an increasing share of business transactions occurs online. Electronic payment is essential for the smooth progress of the electronic commerce as electronic payment plays the important role in the electronic commerce, that is, the value transfer restyling from the electronic commerce. Traditionally international settlement systems such as letters of credits, remittance and documentary collections operated as important and poplar method of payment, Now, information technology has made it possible to pay for the sale of goods and services over the internet. In international trade, there are service providers (bolero, TradeCard, BeXcom) to settle payment electronically through the Internet. The purpose of this study is to Conduct comparative analysis with approach manner functional respect systematic respect, role. It is shown which the Electronic payment system is better. In this study, the author attempts to find the problems is (bolero, TradeCard, BeXcom) and solutions in switching from the documentary payment system to the electronic one. This conclusion of this study can be summarized as followings. In resoect of the law, bolero should seek to prevert the users from being treated unfairly due to multilateral agreement on Rulebook. TradeCard, BeXcom do not have the proper law that users are governed. so far as the practice problems concerned, stability of computer's operation and security of message interchange should be warranted and improved continuously. Through the standardization of the electronic document and the development of software, the examination of the shipping occuments must be done automatically. Bolero should induce more banks to take part in Bolero, and make the carrier the cost and time in managing the traditional document which will be used for the time being. In respect of information technology and security, to deduce the risk in the electronic settlement system and positively uses the global authentication guideline(Identrus).

  • PDF

A Study on the method of existing system migration for Cloud computing (클라우드 컴퓨팅 환경을 위한 기존 시스템의 이전 방안 연구)

  • Park, Sung-Hee;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.271-282
    • /
    • 2014
  • Cloud computing technology will provide application that needs many resources and various services to customers without any restriction of time and place. So, many of companies are now adopting cloud computing technology to this business and this trend is now increasing. However, cloud technology adoption rate is low because of security, compatibility, loss of control, security, data protection, performance and uptime, to the risk of vendor lock-in Cloud computing services, and compatibility with existing systems and anxiety. Now, many people are interest on the migration of existing systems but there are many study on this issue. So, more of study on this issue should be needed. This paper will show you the method that how to adopt cloud computing to their business and also show you evolution of cloud computing for existing system.

Effects of Breastfeeding Interventions on Breastfeeding Rates at 1, 3 and 6 Months Postpartum: A Systematic Review and Meta-Analysis (모유수유중재의 산후 1, 3, 6개월 모유수유율에 대한 효과: 체계적 문헌고찰 및 메타분석)

  • Park, Seol Hui;Ryu, Seang
    • Journal of Korean Academy of Nursing
    • /
    • v.47 no.6
    • /
    • pp.713-730
    • /
    • 2017
  • Purpose: This study was a systematic review and meta-analysis designed to evaluate the effects of breastfeeding intervention on breastfeeding rates. Methods: Based on the guidelines of the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA), a systematic search was conducted using eight core electronic databases and other sources including gray literature from January 9 to 19, 2017. Two reviewers independently select the studies and assessed methodological risk of bias of studies using the Cochrane criteria. The topics of breastfeeding interventions were analyzed using descriptive analysis and the effects of intervention were meta-analyzed using the Review Manager 5.2 software. Results: A total of 16 studies were included in the review and 15 were included for meta-analysis. The most frequently used intervention topics were the importance of good latch-on and frequency of feeding and determining adequate intake followed. The pooled total effect of breastfeeding intervention was 1.08 (95% CI 1.03~1.13). In the subgroup analysis, neither pre-nor post-childbirth intervention was effective on the breastfeeding rates at 1, 3, and 6 months, and neither group nor individual interventions had an effect. Only the 1 month breastfeeding rate was found to be affected by the individual intervention with the persistent strategies 1.21 (95% CI 1.04~1.40). Conclusion: Effective breastfeeding interventions are needed to help the mother to start breastfeeding after childbirth and continue for at least six months. It should be programmed such that individuals can acquire information and specific breastfeeding skills. After returning home, there should be continuous support strategies for breastfeeding as well as managing various difficulties related to childcare.

A Study on Big Data Anti-Money Laundering Systems Design through A Bank's Case Analysis (A 은행 사례 분석을 통한 빅데이터 기반 자금세탁방지 시스템 설계)

  • Kim, Sang-Wan;Hahm, Yu-Kun
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.85-94
    • /
    • 2016
  • Traditional Anti-Money Laundering (AML) software applications monitor bank customer transactions on a daily basis using customer historical information and account profile data to provide a "whole picture" to bank management. With the advent of Big Data, these applications could be benefited from size, variety, and speed of unstructured data, which have not been used in AML applications before. This study analyses the weaknesses of a bank's current AML systems and proposes an AML systems taking advantage of Big Data. For example, early warning of AML risk can be improved by exposing identities and uncovering hidden relationships through predictive and entity analytics on real-time and outside data such as SNS data.

  • PDF

Effect of Health Behaviors, Dietary Habits, and Psychological Health on Metabolic Syndrome in One-Person Households Among Korean Young Adults (1인가구 청년의 건강행태, 식습관 및 심리적 건강이 대사증후군에 미치는 영향)

  • Kim, Ahrin
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.493-509
    • /
    • 2018
  • This study was performed to compare the effects of health behaviors, dietary habits, and psychological health on metabolic syndrome (MS) between young adults living in one-person households (OPHs) and multiple-person households (MPHs). The data from the Korean National Health and Nutrition Examination Survey (KNHANES), which was conducted in 2014 and 2016 were used. The subjects were 2,682, who were 20 to 39 years old. The data were analyzed using complex sample Rao-Scott ${\chi}^2-tests$, t-tests, and multiple logistic regression using SPSS 23.0 software. Sex, age, obesity, and subjective health status were associated with MS in young adults living in either OPHs or MPHs. Breakfast consumption frequency, eating alone, food label use, stress, and depression were associated with MS only in young adults living in OPHs. Thus, these differentiated risk factors of MS should be considered, when health promotion strategies and interventions are planned for young adults living in OPHs. Also, further studies are needed to evaluate the effectiveness of the strategies or interventions.

A Study of the Autonomous Driving Path Planning for Concrete Pavement Cutting Operation (콘크리트 도로 표면절삭 작업을 위한 자율주행 진로계획 수립방안)

  • Moon, Sung-Woo;Seo, Jong-Won;Yang, Byong-Soo;Lee, Won-Sik
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.929-933
    • /
    • 2007
  • Concrete Pavement Cutting Operation have Labor-intensive features. And Cutting Operation quality and productivity is influenced by operator's experience. Moreover Workers have risk of safety concerns. Therefore we need Concrete Pavement Cutting Operation automation system and system support software development on the economics. First of all we have to develop driving Path Planning for Concrete Pavement Cutting automation system. If result of Path Planning connect with automation system, Weak points is a complement to the existing Path Planning and we can obtain effective automation system. Consequently this paper suggest method of Autonomous Driving Path Planning for Concrete Pavement Cutting Operation And the Path Planning system application.

  • PDF

Software Design of Computerized Gas Safety Control System (컴퓨터에 의한 가스안전 제어시스템 소프트웨어 설계)

  • Kim Tae-Ok;Jou Wouseok;Park Hyunmin;Lee Hern-Chang;Chang Seo-Il
    • Journal of the Korean Institute of Gas
    • /
    • v.8 no.1 s.22
    • /
    • pp.30-36
    • /
    • 2004
  • Although the usage of gas as one of the most economical energy source is ever expanding, numerous gas accidents occur as a result of negligence in safety management. The main reason behind such accident is that the current safety control system relies heavily on the manual control mechanism. This paper designed and developed a prototype of a computerized gas safety control system that automates such critical functions as the alarm sensing and the valve control. Since the system is connected through a digital network, the control can be performed remotely. Most importantly, the accidental risk or damage can be greatly reduced since the system monitors and reacts actively to gas leakage in real time.

  • PDF

A Case Study on the Application of RMF to Domestic Weapon System (국내 무기체계에 대한 RMF 적용 실 사례 연구)

  • Cho, Hyun-suk;Cha, Sung-yong;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1463-1475
    • /
    • 2019
  • Unlike the past, modern high-tech weapons systems are complex and many components are combined to form a weapons system. In addition, unlike the past, where hardware was the main component, the proportion of software is increasing every year, making the security assurance activities of weapon systems more difficult than in the past. The United States has been working to ensure the security of the weapons systems they develop since the 1960s. The findings were made to US internal standards, updated regularly, and are now being applied as RMF. In Korea, research activities have been conducted since 2010 based on the RMF of the United States. However, actual RMF application cases in the United States cannot be classified and obtained, and there are no official cases in Korea. In this paper, we apply Korean RMF research that has been studied so far to apply to the recently developed real weapon system. Thus, detailed guidelines for applying the RMF are presented.

Study about the Evaluation of Freezing Risk Based Road Surface of Solar Radiation (도로 노면 일조량에 따른 결빙 위험도 평가 방법에 관한 연구)

  • Lee, Dong-Hyun;Jeong, Won-Seok;Kim, Hong-Jin;Kim, Jiwon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.5
    • /
    • pp.130-135
    • /
    • 2013
  • Anti-icing system can reduce traffic accidents and congestion by quickly removing the frozen road surface area. there is no decision criteria for determining application of the Anti-icing system in Korea. In this study, we proposed the decision criteria for determining application of the anti-icing system based on weather and road conditions, i.e., geometric and topographic conditions. Regional climate survey, Solar Radiation analysis, and dynamic vehicle simulation considered road geometry was conducted to standardize the installation method of anti-icing system. Also, we have developed a software that can be determined an installation of anti-icing system.

Real-Time Ransomware Infection Detection System Based on Social Big Data Mining (소셜 빅데이터 마이닝 기반 실시간 랜섬웨어 전파 감지 시스템)

  • Kim, Mihui;Yun, Junhyeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.10
    • /
    • pp.251-258
    • /
    • 2018
  • Ransomware, a malicious software that requires a ransom by encrypting a file, is becoming more threatening with its rapid propagation and intelligence. Rapid detection and risk analysis are required, but real-time analysis and reporting are lacking. In this paper, we propose a ransomware infection detection system using social big data mining technology to enable real-time analysis. The system analyzes the twitter stream in real time and crawls tweets with keywords related to ransomware. It also extracts keywords related to ransomware by crawling the news server through the news feed parser and extracts news or statistical data on the servers of the security company or search engine. The collected data is analyzed by data mining algorithms. By comparing the number of related tweets, google trends (statistical information), and articles related wannacry and locky ransomware infection spreading in 2017, we show that our system has the possibility of ransomware infection detection using tweets. Moreover, the performance of proposed system is shown through entropy and chi-square analysis.