• Title/Summary/Keyword: credit card companies

Search Result 82, Processing Time 0.027 seconds

Service Design for Utilizing Government Information -Focusing on the Case of Gov3.0 Design Group for East North Statistics- (정부 정보의 활용을 위한 서비스디자인 -동북지방통계청의 국민디자인단 사례를 중심으로-)

  • Lee, Yun-Ju;Baek, Su-hyun;Kim, Sun-Ah
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.335-341
    • /
    • 2018
  • This study is to innovate policy service development by utilizing beneficiary - centered service design to public information and public data and services that citizens can experience. The Gov 3.0 Design Group operated by the Dongbuk Regional Bureau of Statistics in Daegu in 2015, proposed a 'start-up decision support service' for pre-founders, using data mining on the GIS spatial information held by the Statistical Office and real-time settlement information of credit card companies. For this, service design process and methodology were adopted and participation of various stakeholders. This study suggests that national design activity based on service design is effective in transforming public service based on government information disclosure. It is also worthwhile as an approach that can be considered when the government wants to release or open information or public data in useful form to the public.

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

Analysis on Mobile Forensic of Smishing Hacking Attack (Smishing 사고에 대한 Mobile Forensic 분석)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2878-2884
    • /
    • 2014
  • The Smishing attacks are caused using smartphone since 2013. Smishing hacking attacks are increasing due to the approximately 104 million private information leakage incidents by the 3 domestic credit card companies occurred in January 2014. The Smishing attack occurred in conjunction with hacking illegal leakage of personal information and direct financial damage. In this paper, i am analyze real-world case studies in the lab and study accident on Smishing Mobile Forensic analysis. I am study of a real case Smishing hacking attacks. And studying evidence for a Mobile Forensic analysis of the technical principles of Smishing attacks. The study for the Mobile Forensic evidence proved the Smishing hacking attacks using Mobile Forensic technic and create Mobile Forensic reports. Through this paper, the research will be safe for the people living in the smartphone can be used safely and conveniently, with the development of Mobile Forensic technology, to study the extraction of Smishing accident evidences from the court.

A Study on the Analysis of Regional Tourism in Uijeongbu Using Big Data (빅 데이터를 활용한 의정부 지역 관광 분석 연구)

  • Lee, Jong-Yong;Jung, Kye-Dong;Ryu, Ki-hwan;Park, SeaYoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.413-418
    • /
    • 2020
  • The travel pattern of tourists for the development of the tourist course is designed to collect and analyze tourist information based on the big data of the carrier to improve the quality of the tourist course. In particular, the analyzed data is used to derive empirical data that can estimate the effect of tourists' inflow into tourism, and to utilize the information as basic data for the development of the tourist course. In addition, the travel pattern of tourists for the development of regional tourism courses is to collect and analyze information on the route and duration of tourists' travel based on big data collected by telecom operators, credit card companies and other data to improve the quality of tourist course development, and to derive empirical data to estimate the effect of tourist inflow through the analyzed data, based on the characteristics of the tourism course and the data needed for the development of new tourist courses in the future.

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario (단일 정보유출 시나리오를 이용한 개별 보안솔루션 로그 분석 방법)

  • Park, Jang-Su;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2015
  • According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.

Real-Time Fraud Detection using Data Quality Diagnosis Techniques for R&D Grant (데이터 품질진단 기법을 이용한 연구개발비 이상거래 실시간 탐지)

  • Jang, Ki-Man;kim, Chang-Su;Jung, Hoe-kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2609-2614
    • /
    • 2015
  • National research and development projects institutions have implemented various measures in order to prevent R&D expenses abuse and negate enforcement. but it reveals a limit to prevent abuse of R&D expenses[1,2]. In this paper, to prevent abuses resulting from the R & D for the unusual trading post caught collecting information from the R & D phase implementation plan to detect unusual transactions. The results are subjective and research institutions, and specialized agencies to take advantage of shared, real-time cross-linkage between the credit card companies. Studies of data quality diagnostic techniques developed for this purpose related regulations and manuals, Q & A, FAQ, Outside-in business rules that derive from a variety of information, such as personnel interviews (Outside-In) was used for analysis.

For the financial institution computer system security, research (금융기관 전산시스템 보안 강화에 대한 연구)

  • Kim, Myung-Soo;Choi, Dae-Young;Seo, Won-Woo;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.67-70
    • /
    • 2014
  • Last was the main issue of financial security in the future will be more emphasis on security. Such as March 20, 2013 Computational crisis, June 25 Cyber terrorism information to credit card companies and customers due to carrier spill in Financial computational security measures 'released in 2014 and the financial authorities' customer information leakage prevention measures "were published the efforts to protect customers' information assets and ensure the stability of the financial transactions carried out by financial institutions protected status check "the information annually authorities This study business operations for the protection of information technology services for IT systems security equipment, data security operating services, security management services operations, operational management of IT systems security requirements from the point to the need for information security, IT systems administrator it would be great help.

  • PDF

Effect of the leader's behavioral integrity on the trust in leaders and voice behavior of the Members -moderating effect of phychological safety- (상사의 언행일치가 상사신뢰와 구성원의 발언행동에 미치는 영향 -심리적 안전감의 조절효과-)

  • Han, Jin-Hwan
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.235-245
    • /
    • 2022
  • This study confirmed the effects of leaders' behavioral integrity on organizational members' voice behavior. It verified whether trust in leaders mediates behavioral integrity and voice behavior and ascertained the moderating effect of members' psychological safety on trust in leaders and members' voice behavior through leaders' behavioral integrity. It targeted organizational members in the service industry, including insurance, securities, banks, consulting, and credit card companies, with a questionnaire survey carried out with 424 response copies. The study results confirmed a significant and positive effect of leaders' behavioral integrity on trust in leaders and voice behaviors. Second, trust in leaders was found to mediate between leaders' behavioral integrity and members' voice behavior. Third, members' psychological safety had a moderating effect on trust in leaders and members' voice behavior. When psychological safety was higher than average, there was a moderated mediating effect of psychological safety in the behavioral integrity on voice behavior with trust mediation in leaders. Therefore, this study has significance in that it was determined that trust in leaders and the psychological safety of the members are essential for leaders' behavioral integrity to enhance members' voice behavior.

Legal approach on uniliteral changing membership in the airlines' frequent flyer program (항공사의 상용고객우대제도 변경에 관한 법적 고찰 - 미국 연방대법원의 Northwest, Inc. v. Ginsberg사례를 중심으로 -)

  • Nam, Hyun-Sook;Choi, June-Sun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.65-94
    • /
    • 2015
  • Since American Airlines launched AAdvantage which was the first Frequent Flyer Program in 1981, many people has accumulated mileage credits, and now, frequent flyer program(FFP) is the universal marketing tool to the airlines. These days, airlines establish a strategic alliance with domestic and foreign companies of various fields ; other airlines, travel agencies, car hire firms, hotels, department stores, even credit card companies. However, more people want to use their mileage credits, more airlines reject to approve that or change frequent flyer program against their customers. Last year, Northwest, Inc. v. Ginsberg, the United State Supreme Court made a decision that the preemption provision of Airlines Deregulation Act(ADA) preempts state laws related to rates, routes and services for air carriers including implied covenant of good faith and fare dealing. Thus, the claim of Ginsberg was canceled, it means that Northwest Inc. could terminated one-sidedly his membership in the frequent flyer program. In the contrast, Korea does not have the statute like ADA. If customers file a claim on FFP like Ginsberg, the courts of Korea judge whether the clauses of standard form contract are unfair or not. Therefore, in this article, Ginsberg would be checked on legal issues and be compared briefly with the courts' ruling in Korea.