• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.027 seconds

Design and Implementation for Card Holder Initiated Card Payment System Using the Mobile Devices (모바일 기기를 활용한 고객 개시 카드결제 시스템 설계 및 구현)

  • Seo, Moon Seog
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.245-254
    • /
    • 2014
  • Payment system is defined as the various contracts and operating facilities for the transfer of monetary value to clear the relationship between credit and debt. Payment systems essentially require the efficient and reliable operations. Card-based payment systems are developed practically and creatively in accordance with the progress of ICT. Especially in mobile environment with intelligent mobile devices such as smart-phones and tablets, a variety of payment services are provided. Existing card-based payment services are configured by the payment transaction initiated by the merchants card acceptance and then swiping into the CAT (Card Authorization Terminal) to begin the transaction. The merchant initiated payment services are now applied to the Wireless CAT (W-CAT) for mobile environment. That kind of payment services cause many problems such the illegal card information leaks and the lingering threat of W-CAT theft. Also, the use of many W-CATs increased cost to the merchant. In this paper, we propose the card holder initiated card payment system using the intelligent mobile devices in mobile environment for solving problems of the existing merchant initiated card payment system and coping effectively with the activation of a wireless data network and changes of information technology.

Development of Remote Vehicle Information Storage System Using Wireless Communication (무선통신을 이용한 원격 차량운행정보 저장시스템 개발)

  • 이중현;고국원;최병욱;고경철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.576-579
    • /
    • 2004
  • Recently, using GPS and equipment that recognizes the position of the car such a computer system inside the car are very universalized. Specially, the technique that diagnoses troubles and prevents troubles through scanning engine ECU is very popularized also. However, because these data have to be directly transferred and received from the car, in cases of traffic accident such as serious damage or car theft, it is impossible to receive the data at the time of accident. In order to receive and preserve the data safely regardless of these situations, it is possible to provide data for analyzing reasons of accident and prevent accidents from occurring by using wireless communication to receive the transferred information of the car, then saving into a Database system DB, or grasping the situation of the car and the driving pattern of drivers through analyzing stored data. Moreover, due to developing some related services such as providing the information about the real time of the accident, diagnoses of the car and alarms, etc. It is expected to contribute to creating added values.

  • PDF

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.

Moving Object Tracking System for Dock Safety Monitoring (선착장 안전 모니터링을 위한 이동 객체 추적 시스템)

  • Park, Mi-Jeong;Hong, Seong-Il;Yoo, Seung-Hyeok;Kim, Kyeong-Og;Song, Jong-Nam;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.8
    • /
    • pp.867-874
    • /
    • 2015
  • Hoist have been installed at wharfs or seashore in the center of fishing village fraternities. A Hoist is used in harbor loading and unloading fishing gear or seafoods and is a device to refloat fishing boats into a breakwater or land in case of typhoon or bad weather. In this paper, we propose image perception and moving objects tracking system that detects boat's damage, theft and trespassing occurred at the wharf. This system detects objects' motion in real time by using the motion templet and tracks to concentrate on a moving object(person, boat, etc.) by using a PTZ camera.

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

A study on preventative measures for school violence in foreign countries (외국의 학교폭력 근절 대책에 관한 고찰)

  • Park, yong soo
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.129-140
    • /
    • 2015
  • The school violence is at a critical level today even though it occurred continuously from the past. This issue is not only limited to Korea but it could become a greater issue overseas where possession of firearms is legal. Therefore, introduction of preventative measures in Korean schools should be reviewed by studying how different policies are being applied in countries worldwide to eradicate school violence. Furthermore, the society should continuously make an effort to eradicate school violence. The attitude of regional community who reports instead of spectating and their interest towards school violence are considered very important in addition to the police activities carried out by an organization of the society.

Anslysis of Relationship between Reasons for Mereorological Change and Crime (기상변화요인과 범죄발생의 관계분석)

  • Kim, JongMin;Kim, MinSu;Yoo, SeungJae;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.107-113
    • /
    • 2012
  • This study examined relationship between the major five crimes(murder, robbery, rape, theft and violence) and elements of meteorological change(weather, temperature, precipitation, wind velocity and humidity). Elements of meteoro logical change corresponding to the date recorded by a meteorological office and the number of occurrences from January $1^{st}$ 2010 to October $19^{th}$ 2012 collected from major portal sites were used for this study. Based on this data, SPSS 12.0 was utilized to analyze relationship between crimes and elements of meteorological change, allowing us to find out relationship between crimes and elements of meteorological change. This analysis finding is sure to pave the way for research of this field.

A Study on the coverage of e-commerce insurance (전자상거래 보험의 담보범위에 관한 고찰)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

Children's Understanding of the Effect of Emotion on Moral Transgressions (도덕적 위반 행동의 결과에 대한 아동의 정서 이해)

  • Kim, Seong Min
    • Korean Journal of Child Studies
    • /
    • v.14 no.2
    • /
    • pp.95-114
    • /
    • 1993
  • The purpose of this study was to examine developmental trends in children's understanding of the effect of emotion on moral transgressions. The subjects were 120 children, 15 boys and 15 girls each at 4, 6, 8, and 10 years of age. The subjects listened to the moral transgression stories which were revised by this investigator based on Arsenio and Kramer's(1992) study. They reported their emotional attribution, justification, and emotional intensity about the story children engaged in moral transgression. The data of the present study were analyzed by ${\chi}^2$ and 2-way ANOVA for repeated measures. The results showed that (1) most of the children expected victimizers to feel happy. While happy responses decreased with age, fear responses increased with age. Most of the four-year-olds expected victims to feel sad, but 6-, 8-, and 10-year-olds expected anger. (2) Most children justified victimizers' emotions in terms of the outcome produced by victimization. This outcome-focused justification decreased with age, but morality-focused justification increased with age. In contrast, most children justified victims' emotion in terms of the victimization. This victimization-focused justification decreased with age, but morality-focused justification increased with age. (3) Most children viewed physical harm more negatively than theft on the part of victims.

  • PDF