• Title/Summary/Keyword: Standardization Design

Search Result 744, Processing Time 0.024 seconds

Formation of a Competitive Paradigm of Ensuring Economic Security of Industrial Enterprises in the Conditions of Formation of Circular Economy

  • Pohrebniak, Anna;Tkachenko, Tetiana;Arefieva, Olena;Oksana, Karpenko;Chub, Anton
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.118-124
    • /
    • 2021
  • The article examines the formation of a competitive paradigm of economic security of industrial enterprises in the formation of a circular economy. The basic laws of industrial enterprises are formed, which determined the characteristics of competitive positions and threats. The basic competitive concepts and their application at maintenance of economic safety of the industrial enterprises in the conditions of formation of circular economy are described. Thus, the technological approach to the formation of a competitive paradigm is based on production technologies, opportunities for technological modernization and development of infrastructure and intellectual competencies. The institutional concept reveals the regulatory mechanisms for ensuring competitiveness through the protectionism of national industrial enterprises, standardization and regulation of market imbalances. The innovation-investment approach within the competitive paradigm is also manifested in the creation of competitive advantages due to the presence of active innovative developments and their commercialization, knowledge and competencies of staff, capitalization of intelligence and communications, constant updating of infrastructure and technologies. Collectively, innovation and investment effects on the level of economic security allow industrial enterprises to ensure resilience to increasing competition, the emergence of new market challenges in the formation of a circular economy. A strategic approach to the application of a competitive paradigm to ensure the economic security of industrial enterprises allows you to justify the prospects for development and design behavioral models to predict and assess potential threats. The concept of system management is based on the complexity of threat analysis, the integrity of the economic security system, system-forming functions and patterns of implementation of industrial development tasks in the formation of a circular economy. The application of the described concepts is formalized by the authors through the definition of the basic patterns, directions and characteristics of their impact on the elements of the security system of industrial enterprises in the formation of a circular economy.

The Influence of Personality Traits on Airline Untact Check-in: Focusing on Mobile Check-in User

  • YANG, Jae-Pil;PARK, Sang-Beom
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.1
    • /
    • pp.15-30
    • /
    • 2021
  • Purpose: Year of 2020, COVID-19 has been changing the people's everyday life to ways never been thought of before all over the world. The IT and electronic industry, the methods of supplying goods and services have been changed from contact to un-tact environments based on un-tact systems very rapidly. COVID-19 has been striking the tourism and the travel industry, especially the airline and hotel industry of which services are provided by human. For the passenger service of airliner, automation has been propelled and un-tact style of service has become mainstreams except cabin service since 2000's. For passenger transportation, due to traffic regulations and exclusions etc., switching to new ways is not easy. However, under the new environment made by COVID-19, kiosk check-in, web check-in and mobile check-in has become more important. In this study, the characteristics of airline customers using mobile goods are investigated to find ways to raise the rate of utilizing mobile check-in and to increase the efficiency of boarding process. Research design, data, and methodology: Considering the COVID-19 environment, survey was done by online research company. The research model is designed to integrate the user characteristics and usage/purchase motive and technology acceptance theory. Especially considering infectious diseases prevention, concern of safety is adopted as one of the usage motive variable. Results: Extraversion or conscientiousness characteristics prefers counter check-in(contact service), while openness characteristics prefers mobile check-in(un-tact service). Concern of safety for infectious disease shows strong non-preference on counter check-in. Conclusions: Regarding service type regardless of type of the industry, automation and un-tact have been mainstreams due to high costs of labor, efficiency and standardization issue, etc., and COVID-19 has given impetus to them. For airliner, un-tact service including boarding process service has been more and more important. To raise the rate of un-tact service use, the characteristics of the user should be analyzed first. The study results indicate that for extraversion or conscientiousness, some kinds of methods to induce them to use un-tact service more are needed.

A Conformance Testing Method and its Implementation for XML Signature Products (XML전자서명 제품의 표준적합성 시험 방법 및 구현)

  • 김지현;이광수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.3-11
    • /
    • 2004
  • The XML has been becoming a basis of the related application and industry standards with proliferation of electronic transactions on the web, and the standardization on XML Signature, which can be applied to the digital contents including XML objects from one or more sources, is in the progress through a joint effort of W3C(World Wide Web Consortium) and IETF(Internet Engineering Task Force). Along with this trend, the development of products implementing XML Signature has been growing, and the XML Signature products are required to implement the relevant standards correctly to guarantee the interoperability among different XML Signature products. In this paper, we propose a conformance testing method for testing the XML Signature products, which includes a testing procedure and test cases. The test cases were obtained through analysis of XML Signature standards. Finally we describe the design and uses of our XML Signature conformance testing tools which implements our testing method.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

A Post-Quantum Multi-Signature Scheme (양자 컴퓨팅 환경에서 안전한 다중 서명 기법)

  • Ko, Chanyoung;Lee, Youngkyung;Lee, Kwangsu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.517-526
    • /
    • 2021
  • Recently, the acceleration of the development of quantum computers has raised the issue of the safety of factorization and discrete logarithm based digital signature schemes used in existing Internet environments. To solve the issue, several digital signature schemes are presented that are safe in post-quantum computing environments, including standardization work by the National Institute of Standards and Technology(NIST). In this paper, we design and present a multi-signature scheme based on the TACHYON announced by Behnia et al. in 2018 CCS conference, and prove the security. Multi-signature schemes are key techniques that can distribute the dependence of cryptocurrency-wallet on private keys in the cryptocurrency field, which has recently received much attention as an digital signature application, and many researchers and developers have recently been interested. The multi-signature scheme presented in this paper enables public key aggregation in a plain public key model, which does not require additional zero-knowledge proof, and can construct an effective scheme with only an aggregated public key.

Value Co-creation Modeling of DonorsChoose's Donation-based Crowdfunding (DonorsChoose의 기부형 크라우드펀딩에 기반한 가치공동창출 모델링)

  • Yoo, Hanna;Lee, Su Jin;Min, Dong Kwon
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.127-146
    • /
    • 2021
  • Donation-based crowdfunding(DBC) is conducted from voluntary participation by project operators. It requires a different operational strategy than general crowdfunding. However, there is a limited amount of research on the operational strategy of DBC. This study explores the value co-creation(VCC) strategy of DBC and analyzes the operation of DonorsChoose.org. The research questions encompass the following: First, we identify the VCC activities of DBC. Second, we uncover activities of the platform operators that facilitate the participation of project operators in VCC activities. Third, we explore how VCC activities affect project operational performance and platform performance in DBC. By adopting a single case study method on DonorsChoose.org, this study provides meaningful insight and detailed understanding into the VCC in DBC. First, VCC processes of DBC are identified(Co-ideation, Co-design, Co-funding, Co-operation, and Co-evaluation). Also, interactions between platform operators and project operators were defined at each stage. Second, this study confirmed that standardization and simplification of platform operators, support for pre- and post-activity, and high-quality information delivery activities were critical. Third, we confirm that these VCC activities improve VCC operational performance and platform performance. The theoretical significance of this study is that the concept of VCC, previously concentrated on participants with economic drivers(consumers and investors), has been applied to the context of DBC, a form of participation by participants with non-economic drivers(supporters and donors). In addition, this study practically contributes to the practice of VCC strategy among various platform operating strategies in DBC.

Comparative Analysis on ICT Supply Chain Security Standards and Framework (ICT 공급망 보안기준 및 프레임워크 비교 분석)

  • Min, Seong-hyun;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1189-1206
    • /
    • 2020
  • Recently, ICT companies do not directly design, develop, produce, operate, maintain, and dispose of products and services, but are outsourced or outsourced companies are increasingly in charge. Attacks arising from this are also increasing due to difficulties in managing vulnerabilities for products and services in the process of consignment and re-consignment. In order to respond to this, standards and systems for security risk management of ICT supply chain are being established and operated overseas, and various case studies are being conducted. In addition, research is being conducted to solve supply chain security problems such as Software Bill of Materials (SBOM). International standardization organizations such as ISO have also established standards and frameworks for security of ICT supply chain. In this paper, we presents ICT supply chain security management items suitable for domestic situation by comparing and analyzing ICT supply chain security standards and systems developed as international standards with major countries such as the United States and EU, and explains the necessity of cyber security framework for establishing ICT supply chain security system.

A Study on the Export Strategy of China to the Cosmetic Industry: Focus on Countermeasures against Tariffs and Non-Tariff Measures (화장품 산업의 대중국 수출전략에 관한 연구: 관세 및 비관세조치 대응전략 수립을 중심으로)

  • Jung, Woo-Kyung;Lee, Seo-Young;Kim, Tae-In
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.1
    • /
    • pp.145-165
    • /
    • 2020
  • Purpose - The purpose of this study is to suggest strategies and solutions for entering China in the tariff and non-tariff sectors of the cosmetic industry. Design/methodology/approach - This study analyzed the import tariff rate of cosmetics in China, and analyzed the export cost by actually interviewing the exporting companies to derive the economic effect of non-tariff measures. Findings - First, We proposed the use of the FTA business model (basic cosmetics), the use of Korea-China FTA tariffs (foam cleansing, toothpaste), and the use of APTA tariffs (perfume). Second, We proposed cooperation between the governments to facilitate customs clearance procedures and improvement of FTA awareness among corporate practitioners. Third, We proposed the expansion and support of the AEO MRA system and the expansion of Korea-China MOU conclusions regarding the certification system, and the international standardization of domestic licensing system and technical conditions. Fourth, We proposed the use of government-supported projects related to obtaining overseas certifications and overseas expansion through collaboration with the same industry. Research implications or Originality - HS3304 products excluded from the Korea-China FTA should take full advantage of the FTA business model. In addition, the non-tariff measure costs are fixed costs per year, so the ratio decreases as the number of exports and export volume increases.

Comparison of Commercial Functional Incontinence Panty

  • Cha, Su-Joung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.201-212
    • /
    • 2021
  • This study attempted to compare the pattern with the absorption layer by analyzing the pattern of commercially available urinary incontinence panty products. Through this, it tried to obtain basic data necessary for the development of functional urinary incontinence panty for active seniors. Twelve commercially available products were decomposed to analyze size and patterns, and appearance and clothing pressure were evaluated through 3D simulation. As a result of comparing the size and pattern of urinary incontinence panty, it was analyzed that the size difference between parts was large even though the product was called the same. Products from the same brand also showed a big difference depending on design and absorption. As a result of the appearance evaluation for the 3D simulation, it was found that there were significant differences between products in all items such as the front, side, and back. Product No. 9 was analyzed to be the best except for the waist fit on the side. In the evaluation of clothing pressure, most of them were marked in red except for products 1, 2, and 8 due to the nature of the panty product. In the future, it is thought that actual wearing experiments and size standardization studies on urinary incontinence pants should be conducted.