• Title/Summary/Keyword: User association

Search Result 2,842, Processing Time 0.034 seconds

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

A Study on u-Care Service for the Health and Safety of the Elderly Living Alone (1인 가구 고령자의 건강과 안전을 위한 u-Care에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.59-64
    • /
    • 2017
  • Korea is experiencing a rapid increase in the number of elderly living alone accompanying the aging society problem, a nd is making efforts to solve the problem through the policy of 'living alone u-care service'. The purpose of this study is to propose a better u-Care service improvement method by applying new technology to improve the user experience of ucare service for the health and safety of the elderly living alone. First, the improvement of u-Care service for elderly livin g alone by applying IoT technology. It provides remote monitoring service using health information data measured through wearable device, and transmits personal health status to medical institution by using personal device such as smart phone, so that remote medical consultation or telemedicine can be connected in the future. Second, improvement of u-Care service through consideration of emotional stability of elderly living alone as well as simple safety and health care through applica tion of emotional service robot technology.It is expected that it will be able to help independent living of one person's elde rly person in the future by providing caring function service to existing u-care service providing service.

A Comparative Study on Characters and Effects of the On-Line Social Network in Korea & Japan (한국과 일본의 온라인 관계망의 특성과 효과에 대한 비교연구)

  • Bae, Young
    • Survey Research
    • /
    • v.10 no.3
    • /
    • pp.85-106
    • /
    • 2009
  • This study is an attempt to provide some answers to question about how characteristics and general recognition regarding internet use in Korea and Japan influence fostering and maintaining on-line social network in each of countries. Survey is used to compare Korean internet users and Japanese internet users in terms of characteristics of on-line social network, individual's propensity for internet use, including their recognition on internet. The study's main findings go as follows. First, Korean internet users tend to be more active in using internet than Japanese internet users do, thus having larger on-line social network and more intensive internet use than Japanese internet users do. However, there is a commonality that majority of internet users in both countries use internet to connect them to person with whom they have private relationship but they cannot meet frequently. Second, for Korean internet users, individual's propensity, characteristics, and recognition regarding internet use is not related to how to contact others. To the contrary, for Japanese internet users, how to contact others in on-line setting seems to vary according to whether or not they have relation-oriented internet use and how they recognize the availability of internet. Third, a commonality regarding the size of on-line social network is found between Korea and Japan that the total numbers of people enrolled as network increases if people use internet in order to get information. This confirms previous finding that relationship based on weak tie is instrumental in fostering on-line social relations and likely produces advantage in getting information. Finally, for Japanese internet users, the degree of risk recognized in on-line setting, that is the degree of interpersonal trust, appears to greatly influence overall relationship -building in on-line.

  • PDF

An Empirical Study on the Contingent Analyses on the Relationship Between the Characteristics of e-Trade and User Acceptance (전자무역의 특성과 사용자 수용간의 상황적 관계분석)

  • Song, Sun-Yok
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.155-175
    • /
    • 2002
  • 본 연구는 전자무역을 혁신수용의 관점에서 기술하고 있다. 관련 문헌의 고찰을 통해 천자무역 특성요인과 수용자(무역업체) 특성요인을 도출하고, 이를 바탕으로 연구모형의 개발 및 연구가설을 설정하였다. 연구가설은 인터넷리서치를 통해 수집된 자료를 다중회귀분석기법을 이용하여 검정하였다. 그 결과를 요약하면 다음과 같다. 첫째, 전자무역의 특성변수들(지각된 유용성/편의성/위험성)이 전자무역 수용도에 미치는 영향관계를 검증한 결과, 지각된 유용성과 지각된 편의성이 높을수록 전자무역 수용도가 높은 것으로 나타났다. 둘째, 혁신 수용자로서 무역업체의 특성변수들(혁신성향, 정보인프라 성숙도)이 전자무역 수용도에 미치는 영향관계를 검증한 결과, 혁신성향과 정보인프라 성축도 모두 전자무역 수용도에 긍정적인 영향을 미치는 것으로 나타났다. 이는 혁신성향이 높을수록 그리고 정보인프라가 성숙된 업체일수록 전자무역 수용도가 높게 나타난다는 일반적인 견해와 일치되는 결과이다. 셋째, 두 특성변수들(전자무역 특성, 무역업체 특성)간의 상황적 관계에서는 혁신성향이 낮은 무역업체일수록 전자무역의 정보위험성을 높게 인식하여 천자무역 수용(현재 활용정도와 지속적 이용의도)을 거부할 가능성이 높게 나타났다. 또한 정보인프라 성숙도가 낮은 무역업체일수록 정보위험성을 높게 인식하여 전자무역 수용을 거부할 가능성이 높게 나타났다. 넷째, 전자무역을 통한 수출입 경험여부에 따른 전자무역의 향후 이용의도와의 관계를 분석한 결과 무경험업체의 경우는, 혁신성향이 높고 정보인프라가 성숙된 무역업체일수록 향후 이용의도가 높은 것으로 나타났다. 또한 정보인프라 성숙도가 낮은 무역업체일수록 전자무역의 편의성을 낮게 인식하여 전자무역 수용을 거부할 가능성이 높게 나타났다. 유경험업체의 경우는 전자무역에 대한 향후 이용의도가 높은 무역업체일수록 전자무역의 편의성을 오히려 부정적으로 평가하는 경향이 드러났는데, 이러한 현상은 유경험업체가 인식하는 편의성에 대한 기대수준이 무경험업체에 비해 높기 때문인 것으로 나타났다. 또한 혁신성향이 높은 무역 업체가 향후 전자무역을 지속적으로 이용하기 위해서는 전자무역의 편의성을 더 높게 요구하는 것으로 나타냈다. 전자무역의 수용도를 높이기 위해서는 전자무역의 특성요인들에 대한 잠재적 수용자의 태도변화를 파악하는 것도 중요하지만, 수용자 집단의 특성에 맞는 상황적 전략수립이 동시에 필요하다. 그러한 의미에서 본 논문은 전자무역 수용 촉진 전략을 수용자 집단의 특성별로 그리고 상황적으로 수립할 수 있는 기초자료를 제공할 수 있을 것으로 기대된다.

  • PDF

The government role in digital era innovation: the case of electronic authentication policy in Korea (디지털 혁신시대의 정부역할: 한국의 전자 인증정책 사례)

  • Son, Wonbae;Park, Mun-su
    • International Commerce and Information Review
    • /
    • v.19 no.4
    • /
    • pp.29-50
    • /
    • 2017
  • In emerging technologies, innovation processes are dynamic in that the government needs to regularly review its policies to resonate with rapid technological advancements, changing public needs, and evolving global trends. In the 1990s, the Internet grew at an explosive rate, but many applications were constrained due to security concerns. Public Key Infrastructure (PKI) seemed to be the fundamental technology to address these concerns by providing security functions. As of 2017, PKI is still one of the best technologies for electronic authentication in an open network, but it is used only in limited areas: for user authentications in closed networks and for server authentications within network security infrastructure like SSL/TLS. The difference between expectation and reality of PKI usage is due to the evolution of the Internet along with the global adoption of new authentication policies under the Internet governance in the early 2000s. The new Internet governance based on the cooperation between multi-stakeholders is changing the way in which a government should act with regard to its technological policies. This paper analyzes different PKI policy approaches in the United States and Korea from the perspective of path-dependence theory. Their different policy results show evidence of the rise of the Internet governance, and may have important implications for policy-makers in the current global Internet society.

  • PDF

A study on the new developmental direction for Intelligent Network Service (지능망서비스의 발전방향에 관한 연구)

  • 박민수;최수길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.43-49
    • /
    • 2000
  • That modem society is an information society, information society has placed a high value on information and knowledge. Therefore, modem civilization depends largely on information and knowlege so the most valuable sources of all intelligence activities. This paper was studied on the new developmental direction for intelligent network service. The results of this study is as follow: first, intelligent network service must be systematic development. Second, intelligent network service must be promoted, presenting the development and establishment direction in future society. Third, intelligent network service must be able to unify ail the networks. Fourth, intelligent network service must be development for customers. Fifth, the cost of intelligent network service is determined by Telecommunication Reguration Commission. Sixth, the number system of intelligent network service must be accomplished by number system for future

  • PDF

Digital Stress of Consumers in Using Digital Goods (디지털 제품 관련 소비자 스트레스에 관한 연구)

  • Kim, Jung-Eun;Yeo, Jung-Sung
    • Journal of Families and Better Life
    • /
    • v.25 no.3 s.87
    • /
    • pp.119-135
    • /
    • 2007
  • The purpose of this study is to find out the level of digital stress that people experience and to investigate the effects of socio-economic variables on that. To collect data, structured questionnaire was developed and 1,200 questionnaires were distributed through internet. There were 2 dimensions in this study to examine digital stress. First dimension was about the devices themselves: computers and the other digital goods. Second dimension was about the time digital stress occurring in consumers' decision-making process: purchasing and using. Based on Yeo&Kim(2004), sub-dimensions of purchasing and using aspects were chosen. 5 sub-dimensions in purchasing side were new technology, cost, variety of alternatives, warranty service, and informational problem 6 sub-dimensions in using field were mal(or impaired)-functioning. physical aspects, immaturity in use, pressure to use, addiction to use, and informational problem. As independent variables, sex, age, educational level, digitalization acceptability and computer usability were used. The overall level of digital stress was around the average point which was not as high as expected. Digital stress of purchasing was higher than that of using. First, in purchasing aspects, the level of digital stress was relatively high in cost, variety of alternatives and warranty service. Hence, clear communications with consumers about the distinctive aspects and cost of digital devices in market are needed. Secondly, in using side, mal-functioning and physical aspects were relatively more powerful stressors. In the other words, the more serious problems were not from the characteristics of individual consumers but from those of products. Producers should put their best efforts to reduce imperfection (defectiveness) and develop user-friendly digital devices. Also, users' individual efforts to overcome the problems that can be solved privately are necessary. Finally, it was discovered that sex and computer usability were very important variables on digital stress. To extend computer usability of consumers and get over digital illiteracy, it is essential to expand the paths to give chances for people to contact with computers and other digital goods. Still there are lots of people whore computer-illiterate or low-skilled at computers. In policies or educational programs made by government, communities, or schools, more attention should be paid to the digitally vulnerable groups.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

An Approach to Classification of Industry Life Cycle using Main Statistics Index in the Mobile Market (이동통신시장의 주요통계지표를 이용한 산업수명주기 유형화에 관한 연구)

  • Jeong Seon-Phil;Kyung Jong-Soo
    • Survey Research
    • /
    • v.7 no.1
    • /
    • pp.55-84
    • /
    • 2006
  • This study has classified development stages (Embryonic-Growth-Maturity) of mobile telecommunication industry based on Industry Life Cycle theory. There are two steps to be analyzed in this study, In the first step, cluster was investigated through cluster analysis using mobile density to categorize development stages of mobile telecommunication industry. In the second step, we compared on indexes of market structure, market efficiency and market performance to find out characteristics of each stage of development. The results are as follows. First, HHI is higher at embryonic stage than at growth and maturity stages, Second, ARPU(Average Revenue Per User) and RPM(Revenue Per Minute) are getting higher as the stages move on. Third, EBITDA margins, an index of market performance, is decreasing along the three stages. Finally, this study presents a clue to define the stage of development of mobile telecommunication industry and build a proper strategy for the market change.

  • PDF

A study on specializing the University Museum in the Perspective of Culture, Arts, and Science (문화.예술.과학의 관점에서 대학박물관의 특성화를 위한 기초연구)

  • Choe, Jong-Ho
    • KOMUNHWA
    • /
    • no.68
    • /
    • pp.25-39
    • /
    • 2006
  • This article attempts to define identity, role and functions of a university museum and to suggest specialization of the university museum in the perspective of culture, arts, and science. A university museum is defined as a center for the service of the university community and its development which acquires, researches, communicates, exhibits and educates, for purposes of eduinfotainment,29 material evidence of people and their environment. The target user of the today's university museum are not only professors, students, university workers, but also university neighbourhood such as the related professionals, patrons, parents, school children and villagers. A multi-dimensional and multi-purpose university museum can be established and managed in a real world and / or a cyber world in the perspective of culture, arts, and science. Based on a ubiquitous system30 in a cyber world vis-a-vie a real world, the university museum can be easily utilized by users anywhere, anytime and any device. In order to specialize the university museum in the perspective of culture, arts and science, it is desirable that the university museum director with the CEO of the university community promote the specialization of the university museum based on philosophy and strategies of university community management after they definitely evaluate the components and resources of the university museum such as human powers, museum collections, organizational, technological, capital, spacial and symbolic resources, The specialization of the university museum should be projected and executed in the direction of maintaining the typical scope of museum activities and managing the effective museum management. Specializing the university museum in the perspective of culture, arts, and science can contribute not only to establish the identity of the university community and to perform role and functions of the university museum but also to encourage academic development, to revaluate the brand of the university community and to promote the marketing for the university.

  • PDF