• Title/Summary/Keyword: Vulnerability market

Search Result 70, Processing Time 0.03 seconds

A Study on the Supply Chain Security and Risk Management Strategies of Global Companies (글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구)

  • Yang, Jung-Ho
    • Management & Information Systems Review
    • /
    • v.27
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF

The Unequal Burden of Self-Reported Musculoskeletal Pains Among South Korean and European Employees Based on Age, Gender, and Employment Status

  • Bahk, Jinwook;Khang, Young-Ho;Lim, Sinye
    • Safety and Health at Work
    • /
    • v.12 no.1
    • /
    • pp.57-65
    • /
    • 2021
  • Background: The objective of this study was to elucidate the relationships musculoskeletal pains with combined vulnerability in terms of age, gender, and employment status Methods: The fifth European Working Conditions Survey (EWCS) in 2010 (43,816 participants aged 15 years and over) analyzed for European employees and the third Korean Working Conditions Survey (KWCS) in 2011 (50,032 participants aged 15 years and older) analyzed for Korean employees. In this study, three well known vulnerable factors to musculoskeletal pains (older age, female gender, and precarious employment status) were combined and defined as combined vulnerability. Associations of musculoskeletal pains with combined vulnerability were assessed with prevalence ratios (PRs) and 95% confidence intervals (CIs) estimated by Poisson regression models with robust estimates of variance. Results: The prevalences of musculoskeletal pains were lower but the absolute and relative differences between combined vulnerabilities were higher among Korean employees compared with the European employees. Furthermore, the increased risk of having musculoskeletal pains according to combined vulnerability was modestly explained by socioeconomic factors and exposure to ergonomic risk factors, especially in Republic of Korea. Conclusions: The results of this study showed that the labor market may be more unfavorable for female and elderly workers in Republic of Korea. Any prevention strategies to ward off musculoskeletal pains, therefore, should be found and implemented to mitigate or buffer against the most vulnerable work population, older, female, and precarious employment status, in Republic of Korea.

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

Export Behavior Analysis of Busan Port using Constant Market Share Analysis (CMS 분석을 이용한 부산항 수출행태분석)

  • Mo, Soowon
    • Journal of Korea Port Economic Association
    • /
    • v.29 no.2
    • /
    • pp.239-253
    • /
    • 2013
  • Changes of a port's market share in the exports of domestic ports result from many interrelated factors. Therefore, the analysis of the export performance of a port should be put in perspective by analysing long periods to identify trends. This paper aims to show the development of competitiveness, product and geographical structure of the Busan Port's merchandise exports from 1995 to 2012 using constant-market shares (CMS) analysis. This article is relevant for Busan port because its export market shares have been showing disappointing path. The dynamic consideration of the CMS analysis, which the static indicators have been replaced by time series, helps to track all changes in the export structure and competitiveness of the Busan port over time. The long-term trend of the indicators suggests that it may be very hard for the Busan port to maintain its market share in the global environment. The advantage in competitiveness of the Busan port has vanished and the product and geographical structure effects show negative trends after 1995, pointing to vulnerability in the Busan port's exports.

Comparison and Analysis on Mobile Payment in terms of Security : Survey (모바일 결제 기술 및 보안 측면에서의 비교분석 : 서베이)

  • Kim, Ki-Bong;Yun, Jin-Young
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.15-20
    • /
    • 2015
  • There have been consumer needs for mobile payment system due to the rapid increase in the number of smartphones and the use of them. In tum, the market has been expanding as IT companies begin to participate in the mobile payment system business. Moreover, since the system supports better services not only covering payment service but also interworking with various apps in devices, it has been maximizing the consumer convenience. Although the convenience increased due to the mobile payment system, the vulnerability in security also increased; and smartphone users have been afraid of using the mobile payment system. This study is to examine Samsung Pay and Apple Pay, to present the vulnerability, and to suggest a countermeasure.

  • PDF

Cloud Security Technology and Vulnerability Assessment (클라우드 보안 기술과 취약점 분석)

  • Kim, A-Yong;Lee, Sung-Ock;Ryu, Seung-Han;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.690-692
    • /
    • 2013
  • Cloud computing is an Internet-based technology, one of the Big Data era aspiring technology. Bring on the internet whenever you need to use multiple physical servers into one virtual server, cloud Cloud technology and large companies, such as leading U.S. IT company, Amazon, IBM, Google, Microsoft and the domestic firm Samsung, SK, KT, NHN the cloud market at home and abroad, and commercialization by investing in the future to continue to grow. The main reason for the introduction of the cloud and reduced operating costs, and to see the most problems is the leakage of personal information. In this paper, we propose a method to improve the security and vulnerability analysis of security technologies and cloud.

  • PDF

Multi-criteria analysis of five reinforcement options for Peruvian confined masonry walls

  • Tarque, Nicola;Salsavilca, Jhoselyn;Yacila, Jhair;Camata, Guido
    • Earthquakes and Structures
    • /
    • v.17 no.2
    • /
    • pp.205-219
    • /
    • 2019
  • In Peru, construction of dwellings using confined masonry walls (CM) has a high percentage of acceptance within many sectors of the population. It is estimated that only in Lima, 80% of the constructions use CM and at least 70% of these are informal constructions. This mean that they are built without proper technical advice and generally have a high seismic vulnerability. One way to reduce this vulnerability is by reinforcing the walls. However, despite the existence of some reinforcement methods in the market, not all of them can be applied massively because there are other parameters to take into account, as economical, criteria for seismic improvement, reinforcement ratio, etc. Therefore, in this paper the feasibility of using five reinforcement techniques has been studied and compared. These reinforcements are: welded mesh (WM), glass fiber reinforced polymer (GFRP), carbon fiber reinforced polymer (CFRP), steel bar wire mesh (CSM), steel reinforced grout (SRG). The Multi-Criteria Decision Making (MCDM) method can be useful to evaluate the most optimal strengthening technique for a fast, effective and massive use plan in Peru. The results of using MCDM with 10 criteria indicate that the Carbon Fiber Reinforced Polymer (CFRP) and Steel Reinforced Grout (SRG) methods are the most suitable for a massive reinforcement application in Lima.

Randomness Based Fuzzing Test Case Evaluation for Vulnerability Analysis of Industrial Control System (산업제어시스템 취약성 분석을 위한 무작위성 기반 퍼징 테스트 케이스 평가 기법)

  • Kim, SungJin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.179-186
    • /
    • 2018
  • The number of devices connect to the internet is rapidly increasing with the advent of the IoT(Internet of Things). The IoT has improved the convenience of life. However, it makes security issues such as privacy violations. Therefore cybersecurity is the most important issue to be discussed nowadays. Especially, various protocols are used for same purpose due to rapidly increase of IoT market. To deal with this security threat noble vulnerability analysis is needed. In this paper, we contribute to the IoT security by proposing a new randomness-based test case evaluation methodology using variance and entropy. The test case evaluation method proposed in this paper can evaluate the test cases at a high speed regardless of the test set size, unlike the traditional technique.

Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone (홈트레이딩 시스템의 취약점 분석과 휴대전화 인증을 이용한 대응방안 제시)

  • Choi, Min Keun;Cho, Kwan Tae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.19-32
    • /
    • 2013
  • As cyber stock trading grows rapidly, stock trading using Home Trading System have been brisk recently. Home Trading System is a heavy-weight in the stock market, and the system has shown 75% and 40% market shares for KOSPI and KOSDAQ, respectively. However, since Home Trading System focuses on the convenience and the availability, it has some security problems. In this paper, we found that the authentication information in memory remains during the stock trading and we proposed its countermeasure through two-channel authentication using a mobile device such as a cell phone.

Banknote Open Platform Security Vulnerability Analysis and Security Measures (은행권 오픈플랫폼 보안취약성 분석과 보안대책)

  • Kim, Sanggeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.107-113
    • /
    • 2017
  • Open platform technology in the banking industry is anticipated to impact the market very positively together with the activation of Fin Tech services. The domestic environment of payment services has been rapidly changing into the mobiles and multiple new payment services have been introduced from a variety of vendors. However, the convenience of payment always causes worsening the security, and the accidents on the security have been continued to occur such as leakage of personal information, hacking and so on upon the expansion of the industry and the market size. This study aims to analyze the status of Fin Tech open platforms and various problems of the related standard technologies, and to suggest the possible solutions. Upon the analysis results, it was confirmed that multiple solutions were required to improve the main security protocols of open platforms and to process the security functions diversely. In conclusion, the results of this study will be helpful to determine the direction of the solution on the security issues in the open platform environment of the current industry.