• Title/Summary/Keyword: The Private Security

Search Result 1,401, Processing Time 0.027 seconds

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

Relationship Between Organization Culture of Devotion Organization on Private Security Guards (민간경비원의 조직문화와 조직몰입의 관계)

  • Kim, chan-sun;Jo, byung-hae;Lee, kyong-hwa
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.203-204
    • /
    • 2011
  • 이 연구의 목적은 민간경비원의 조직문화와 직무스트레스 및 조직몰입의 관계를 규명하는데 있다. 이 연구는 2011년 수도권소재(인천) 공항에서 재직하고 있는 민간경비원들을 모집단으로 설정한 후 유의표집법을 이용하여 최종분석에 이용된 사례 수는 총 203명이다. 연구에 사용된 설문지는 총 56문항으로 구성되었다. 분석방법은 SPSSWIN 18.0을 이용하여 빈도분석, 요인분석, 신뢰도분석, 회귀분석 등을 실시하였다. 설문지의 신뢰도는 Cronbach's ${\alpha}$값이 .671이상으로 나타났다. 결론은 다음과 같다. 첫째, 민간경비원의 조직문화는 직무스트레스에 영향을 미친다. 즉, 개발적, 위계적 문화가 형성 되지 않는다면, 보상경력개발에 대한 직무스트레스는 증가한다. 반면, 개발적, 합의적 문화가 형성 되면, 직무특성, 인간관계, 역할과 관련된 직무스트레스는 감소한다. 둘째, 민간경비원의 조직문화는 조직몰입에 영향을 미친다. 즉, 개발적, 위계적 문화가 형성 되면, 정서적, 근속적, 규범적 몰입은 높아진다. 셋째, 민간경비원의 직무스트레스는 조직몰입에 영향을 미친다. 즉, 보상경력개발이 불공정하게 이루어질수록 정서적, 근속적 규범적 몰입은 낮아진다. 반면, 현재 자신의 직무가 능동적으로 이루어진다면, 정서적, 근속적, 규범적 몰입은 높아진다.

  • PDF

Relationship Between Impact of Event on Job Stress Private Security Guards (민간경비원의 사건충격과 직무스트레스의 관계)

  • Kim, chan-sun;Lee, ji-eun;Noh, young-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.205-206
    • /
    • 2011
  • 이 연구의 목적은 민간경비원의 사건충격과 직무스트레스 및 대처능력의 관계를 규명하는데 있다. 이 연구는 2011년 인천소재 공항에서 재직하고 있는 민간경비원들을 모집단으로 설정한 후 판단표집법을 이용하여 최종분석에 이용된 사례 수는 총 239명이다. 연구에 사용된 설문지는 총 67문항으로 구성되었으며, SPSSWIN 18.0을 이용하여 빈도분석, 요인분석, 신뢰도분석, 회귀분석 등을 실시하였다. 설문지의 신뢰도는 Cronbach's ${\alpha}$값이 .779이상으로 나타났다. 결론은 다음과 같다. 첫째, 민간경비원의 사건충격은 직무스트레스에 영향을 미친다. 즉, 침습이 자주 반복될수록 인간관계에 대한 스트레스는 증가한다. 또한, 과각성이 자주 반복될수록 역할에 대한 스트레스는 증가한다. 둘째, 민간경비원의 사건충격은 대처능력에 영향을 미친다. 즉, 과각성이 자주 반복될수록 문제중심적 대처능력은 감소한다. 반면, 회피성향이 지속적으로 작용할수록 문제중심적 대처능력은 증가한다. 셋째, 민간경비원의 직무스트레스는 대처능력에 영향을 미친다. 즉, 직무특성에 대한 무력감이 작용할수록 문제중심적 대처능력은 증가한다. 반면, 역할에 대한 모호성이 높게 작용할수록 문제중심적 대처능력, 사회적지지 추구능력은 감소한다.

  • PDF

The Impact of Perceived Risks Upon Consumer Trust and Purchase Intentions (인지된 위험의 유형이 소비자 신뢰 및 온라인 구매의도에 미치는 영향)

  • Hong, Il-Yoo B.;Kim, Woo-Sung;Lim, Byung-Ha
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.1-25
    • /
    • 2011
  • Internet-based commerce has undergone an explosive growth over the past decade as consumers today find it more economical as well as more convenient to shop online. Nevertheless, the shift in the common mode of shopping from offline to online commerce has caused consumers to have worries over such issues as private information leakage, online fraud, discrepancy in product quality and grade, unsuccessful delivery, and so forth, Numerous studies have been undertaken to examine the role of perceived risk as a chief barrier to online purchases and to understand the theoretical relationships among perceived risk, trust and purchase intentions, However, most studies focus on empirically investigating the effects of trust on perceived risk, with little attention devoted to the effects of perceived risk on trust, While the influence trust has on perceived risk is worth studying, the influence in the opposite direction is equally important, enabling insights into the potential of perceived risk as a prohibitor of trust, According to Pavlou (2003), the primary source of the perceived risk is either the technological uncertainty of the Internet environment or the behavioral uncertainty of the transaction partner. Due to such types of uncertainty, an increase in the worries over the perceived risk may negatively affect trust, For example, if a consumer who sends sensitive transaction data over Internet is concerned that his or her private information may leak out because of the lack of security, trust may decrease (Olivero and Lunt, 2004), By the same token, if the consumer feels that the online merchant has the potential to profit by behaving in an opportunistic manner taking advantage of the remote, impersonal nature of online commerce, then it is unlikely that the merchant will be trusted, That is, the more the probable danger is likely to occur, the less trust and the greater need to control the transaction (Olivero and Lunt, 2004), In summary, a review of the related studies indicates that while some researchers looked at the influence of overall perceived risk on trust level, not much attention has been given to the effects of different types of perceived risk, In this context the present research aims at addressing the need to study how trust is affected by different types of perceived risk, We classified perceived risk into six different types based on the literature, and empirically analyzed the impact of each type of perceived risk upon consumer trust in an online merchant and further its impact upon purchase intentions. To meet our research objectives, we developed a conceptual model depicting the nomological structure of the relationships among our research variables, and also formulated a total of seven hypotheses. The model and hypotheses were tested using an empirical analysis based on a questionnaire survey of 206 college students. The reliability was evaluated via Cronbach's alphas, the minimum of which was found to be 0.73, and therefore the questionnaire items are all deemed reliable. In addition, the results of confirmatory factor analysis (CFA) designed to check the validity of the measurement model indicate that the convergent, discriminate, and nomological validities of the model are all acceptable. The structural equation modeling analysis to test the hypotheses yielded the following results. Of the first six hypotheses (H1-1 through H1-6) designed to examine the relationships between each risk type and trust, three hypotheses including H1-1 (performance risk ${\rightarrow}$ trust), H1-2 (psychological risk ${\rightarrow}$ trust) and H1-5 (online payment risk ${\rightarrow}$ trust) were supported with path coefficients of -0.30, -0.27 and -0.16 respectively. Finally, H2 (trust ${\rightarrow}$ purchase intentions) was supported with relatively high path coefficients of 0.73. Results of the empirical study offer the following findings and implications. First. it was found that it was performance risk, psychological risk and online payment risk that have a statistically significant influence upon consumer trust in an online merchant. It implies that a consumer may find an online merchant untrustworthy if either the product quality or the product grade does not match his or her expectations. For that reason, online merchants including digital storefronts and e-marketplaces are suggested to pursue a strategy focusing on identifying the target customers and offering products that they feel best meet performance and psychological needs of those customers. Thus, they should do their best to make it widely known that their products are of as good quality and grade as those purchased from offline department stores. In addition, it may be inferred that today's online consumers remain concerned about the security of the online commerce environment due to the repeated occurrences of hacking or private information leakage. Online merchants should take steps to remove potential vulnerabilities and provide online notices to emphasize that their website is secure. Second, consumer's overall trust was found to have a statistically significant influence on purchase intentions. This finding, which is consistent with the results of numerous prior studies, suggests that increased sales will become a reality only with enhanced consumer trust.

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

Improvement Measures for Enhancing Professional Safety Sheriff's Specialty (안전보안관 전문성 제고를 위한 개선방안)

  • Park, Jeong-Hun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.175-196
    • /
    • 2019
  • The purpose of this study is to examine the role of safety sheriffs and their necessity in order to improve the activation of safety sheriff's professionalism. Seven security sheriffs were finally selected to discuss their activities and discuss ways to improve their effectiveness. We conducted semi - structured interviews and conducted in - depth interviews with limited data and inadequate prior research. The results of this study are as follows. First, the government should get the help of citizens, citizens and residents. If the state wishes to reduce the number of safety accidents and bring positive results to the public, it should not rely solely on the utilization of institutions. Second, in order to be a safe sheriff with a positive response from the local residents, the activities of the sheriff's sheriff are not only aimed at preventing risks in the environmental domain and reducing the number of accidents, Publicity should be provided to the landlord, tenant, and residents to inform them that the activity is preventive of accident prevention. Third, under the current law, it is necessary to disclose public facilities such as roads, airports, and harbors to the private sector in order to make it possible to monitor school facilities and youth training facilities. Fourth, the safety sheriff is expected to put forward the expectations and positive results of prevention through the beginning of the inspection activities, and the role of the Korean people in becoming psychological stable and efforts to be born as safety experts are required. Finally, it is necessary to establish a concrete manual, strategic safety inspection plan.

U.S. Commercial Space Regulatory Reform Policy (미국의 상업적 우주활동에 대한 규제개혁 정책)

  • Kwon, Heeseok;Lee, Jinho;Lee, Eunjung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.12
    • /
    • pp.1056-1069
    • /
    • 2018
  • In order to promote the commercial space activities of the private sector, the Trump Administration announced the commercial space regulatory reforms by issuing the Space Policy Directive-2 (SPD-2) on May 24, 2018, followed by the SPD-3 dealing with a separate issue of the space traffic management on June 18. Both executive orders, based on the recommendations prepared by the National Space Council (NSC) reconstituted in June 2017 and signed by the President, involve regulatory reform policy related to launch services, commercial remote sensing, establishment of one-stop shop office in Commerce Department, radio frequency spectrum, export control, and space traffic management, providing a strong guidance to the Federal Government. The commercial space regulatory reform policy can be seen in broader terms of the National Security Strategy earlier announced on Dec. 18, 2017, and as such, it pursues the economic growth of the U.S. and the national security as well. The U.S. law and policy prioritizing its national interests by promoting commercial space activities may lead to concerns and debate on the potential breach of the provisions of the Outer Space Treaty. Hence, it is worth noting the legal implications as derived from the U.S. space policy and domestic legislation, thereby accelerating international discussion to build on international norms as appropriate to the pr ogress of space technology and space commercialization.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.

A Study on the Liability of Information Protection for the Third Party Supply of Personal Information/Focus on Fintech Companies Using OPEN APIs (개인정보의 제3자 제공시 정보보호 관련 법상 책임에 관한 연구/OPEN API 이용 핀테크 기업을 중심으로)

  • Kim, Jo-eun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.21-38
    • /
    • 2017
  • It is actively opening the market to fintech companies through open platforms, such as financial institutions and public institutions. In this thesis, we will look at the conceptual differences between the "provision of third-party information" and "entrustment" of information protection related laws, such as the Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Data Protection Etc (Network Utilization Protection Act). In addition, the legal obligation to provide information regarding the legal rights of information is considered to be relevant, whereas the legal obligation of the private information provided by the company is excessively mitigated, whereas the legal obligation of the company to provide information is excessively mitigated. In addition, I suggest self-diagnosis checklist to help fintech companies improve their privacy levels. It was found that the level of information protection was relatively insufficient compared to the consignees based on the results of a survey conducted for 31 fintech companies. Aggressive use of the checklist is suggested to raise the level of information protection for those companies.

A Study on Analysis of Problems in Data Collection for Smart Farm Construction (스마트팜 구축을 위한 데이터수집의 문제점 분석 연구)

  • Kim Song Gang;Nam Ki Po
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.69-80
    • /
    • 2022
  • Now that climate change and food resource security are becoming issues around the world, smart farms are emerging as an alternative to solve them. In addition, changes in the production environment in the primary industry are a major concern for people engaged in all primary industries (agriculture, livestock, fishery), and the resulting food shortage problem is an important problem that we all need to solve. In order to solve this problem, in the primary industry, efforts are made to solve the food shortage problem through productivity improvement by introducing smart farms using the 4th industrial revolution such as ICT and BT and IoT big data and artificial intelligence technologies. This is done through the public and private sectors.This paper intends to consider the minimum requirements for the smart farm data collection system for the development and utilization of smart farms, the establishment of a sustainable agricultural management system, the sequential system construction method, and the purposeful, efficient and usable data collection system. In particular, we analyze and improve the problems of the data collection system for building a Korean smart farm standard model, which is facing limitations, based on in-depth investigations in the field of livestock and livestock (pig farming) and analysis of various cases, to establish an efficient and usable big data collection system. The goal is to propose a method for collecting big data.