• 제목/요약/키워드: cyber business

검색결과 456건 처리시간 0.025초

전자상거래 교육을 위한 시나리오 WBT (Web-Based Training)형 프로그램 개발에 관한 연구 (Development of a Scenario-based WBT System of Electronic Commerce)

  • 임춘성;김훈태;최석현;신범일
    • 한국전자거래학회지
    • /
    • 제3권2호
    • /
    • pp.37-55
    • /
    • 1998
  • This study describes the works on development of a scenario-based WBT system of electronic commerce to introduce and activate electronic commerce in our society because it is mostly required to correctly understand electronic commerce and timely educate its users and technicians for entering into global electronic commerce that binds every commercial area regardless of the borders and nationalities. This system, WBT(Web - Based Training of Electronic commerce), consists of two parts. The one part provides a general concept of EC. This is developed to meet the needs of beginner for EC. The other is a simulator for cyber shopping mall. It is designed for teaching how to shop at cyber shopping mall based on various scenarios. In addition, we can simulate ourselves for EDI, which enables trading partners to conduct routine business transaction, such as purchase orders, invoices and shopping notices with it. Our commitment to the development of this application is consistent with the objectives of being easy to learn electronic commerce and its applications in real world.

  • PDF

Trusted Third Party for Clearing Consumption Tax of Global Electronic Commerce and System Architecture of Global Electronic Tax Invoice (GETI)

  • Yeoul , Hwang-Bo;Jung, Yang-Ook
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2003년도 종합학술대회 논문집
    • /
    • pp.261-267
    • /
    • 2003
  • This study deals with controversial issues surrounding the today′s cyber-taxation and recommends feasible consumption tax system architecture titled Global Electronic Tax Invoice System (GETI). The GETI is an electronic consumption tax architecture to provide "all-in-one" tax and e-payment services through a trusted third party (TTP). GETI is designed to streamline the overall cyber-taxation process and provide simplified and transparent tax invoice services through an authorized np. To ensure information security, GETI incorporates public Key infrastructure (PKI) based digital certificates and other data encryption schemes when calculating, reporting, paying, and auditing tax in the electronic commerce environment. GETI is based on the OECD cyber-taxation agreement that was reached in January 2001, which established the taxation model for B2B and B2C electronic commerce transactions. For the value added tax systems, tax invoice is indispensable to commerce activities, since they provide documentations to prove the validity of commercial transactions. As paper-based tax invoice systems are gradually phased out and are replaced with electronic tax invoice systems, there is an increasing need to develop a reliable, efficient, transparent, and secured cyber-taxation architecture. To design such architecture, several desirable system attributes were considered -- reliability, efficiency, transparency, and security. GETI was developed with these system attributes in mind.

  • PDF

심리적 보안관점에서의 사어버범죄 프로파일링 (Profiling of Cyber-crime by Psychological View)

  • 임채호;김지영;최진혁
    • 정보보호학회논문지
    • /
    • 제19권4호
    • /
    • pp.115-124
    • /
    • 2009
  • 사이버범죄는 인터넷 가상공간이 사회 전반으로 광범위하게 확대되면서 공격 기술력을 과시하려던 의도에서 최근에는 영리와 일반적인 목적의 범죄로 변화하고 있다. 신택스(Syntax) 기반의 탐지 분석이 가능한 네트워크 및 시스템 공격이 아닌 시맨틱(Semantic) 기반으로 수동적인 탐지와 대응을 요하는 콘텐츠 이상의 공격에 의한 인터넷 사기와 명예훼손, 개인정보 침해, 저작권 침해 등이 일어나고 있다. 시맨틱 기반의 범죄는 컴퓨터 이용자, 즉 인간의 내면적인 취약성을 이용하는 심리적 요인에 근거한다. 이 논문에서는 공개된 사이버범죄를 분석 후 사회적 영향력과 기술적 영향 사이버범죄의 심리적 관점에서의 프로파일링 방안을 연구하여 사이버범죄를 그 발생 수에 의하여 분류하였고, 이를 통하여 결국 범죄의 분석과 대응에 소요되는 시간을 줄이는 계기가 될 수 있음을 보이고 있다.

Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study

  • Alanezi, Mohammed Ateeq
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.153-158
    • /
    • 2022
  • The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT is seen as the internet's future. IoT will play a critical role in the future, transforming our lifestyles, standards, and business methods. In the following years, the use of IoT in various applications is likely to rise. In the world of information technology, cyber security is critical. In today's world, protecting data has become one of the most difficult tasks. Different type of emerging cyber threats such as malicious, network based and abuse of network have been identified in the IoT. These can be done by virus, Phishing, Spam and insider abuse. This paper focuses on emerging threats, various challenges and vulnerabilities which are faced by the cyber security in the field of IoT and its applications. It focuses on the methods, ethics, and trends that are reshaping the cyber security landscape. This paper also focuses on an attempt to classify various types of threats, by analyzing and characterizing the intruders and attacks facing towards the IoT devices and its services.

Cybersecurity Development Status and AI-Based Ship Network Security Device Configuration for MASS

  • Yunja Yoo;Kyoung-Kuk Yoon;David Kwak;Jong-Woo Ahn;Sangwon Park
    • 한국항해항만학회지
    • /
    • 제47권2호
    • /
    • pp.57-65
    • /
    • 2023
  • In 2017, the International Maritime Organization (IMO) adopted MSC.428 (98), which recommends establishing a cyber-risk management system in Ship Safety Management Systems (SMSs) from January 2021. The 27th International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) also discussed prioritizing cyber-security (cyber-risk management) in developing systems to support Maritime Autonomous Surface Ship (MASS) operations (IALA guideline on developments in maritime autonomous surface ships). In response to these international discussions, Korea initiated the Korea Autonomous Surface Ship technology development project (KASS project) in 2020. Korea has been carrying out detailed tasks for cybersecurity technology development since 2021. This paper outlines the basic concept of ship network security equipment for supporting MASS ship operation in detailed task of cybersecurity technology development and defines ship network security equipment interface for MASS ship applications.

중소기업의 기업경영 환경을 고려한 사이버 보안 관리 (Cyber Security Management of Small and Medium-sized Enterprises with Consideration of Business Management Environment)

  • 전용태
    • 시큐리티연구
    • /
    • 제59호
    • /
    • pp.9-35
    • /
    • 2019
  • 지금까지 사이버보안에 대한 부분적인 연구는 많이 시도되었으나, 기업 내부적인 요인과 외부 요인의 관계를 총체적으로 분석한 연구는 국내뿐만 아니라 국외에서도 거의 없었다. 따라서, 본 연구에서는 중소기업의 내부 요소 뿐 아니라 기업경영 환경을 고려한 사이버보안 관리에 대하여 살펴보았다. 혼합적 연구방법론을 통하여 1차 질적 분석, 2차 양적 분석을 실시하였다. 질적 분석은 반구조적 인터뷰 방식을 통해 진행하였고 사이버보안 관리체계의 미비, 사이버보안에 대한 내부적인 비협조, 의사결정체계에 파생되는 문제점이라는 세 가지 주제를 발견하였다. 양적 분석은 설문 조사를 통해 확보한 데이터를 대상으로 다중회귀분석을 실시하였으며, 독립변수 중에 사이버위협에 대한 인식과 내부적인 지지가 종속변수인 사이버보안 관리체계에 (+)의 방향으로 영향을 미치며 통계적으로 유의미한 것으로 나타났다. 이 연구를 통해 중소기업의 사이버보안에 있어서는 외부적 환경 변수보다는 내부적인 변수가 사이버보안 관리체계에 인과적 영향이 있었으며, 이는 직원들의 인식 등 조직 문화와 관련되는 변수가 중요하다는 것을 말해준다. 이러한 결과는 중소기업에서 사이버보안 관리체계를 높이는데 실질적인 의의를 제공해 줄 것으로 기대된다.

국내 사이버물류정보서비스 구축 현황과 기업의 효율적 활용방안 (A Study on the Efficient Using Plans of Cyber Logistics Information Service of the Korean Companies)

  • 김종득
    • 통상정보연구
    • /
    • 제5권1호
    • /
    • pp.103-121
    • /
    • 2003
  • Nowadays, the spread of electronic commerce using internet demands a large changes doing business with company to company and give that company a change to recognize logistics. To support logistics activity, all kinds of companies are using the computer and are recognized that the efficient using of Cyber Logistics Information will mainly play a roll to strength the companies competition power. Accordingly, the purpose of this study is to suggest the following plans, the first plan is to research the companies which is offering the logistics information on the Web site based on the internet and to investigate the contents of Logistics Information, then the second plan is to give companies which is to get the logistics information on Internet, more efficient ways using internet based logistics information systems.

  • PDF

The effects of perception toward cyber identity on loyalty and purchase intention

  • Kim, Su-Yeon;Hwang, Hyun-Seok
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.135-138
    • /
    • 2005
  • Many aspects of the way we work and live in the twenty-first century will be determined by the vast web of Internet. Virtual environments open the door to new identity experiences. Having the possibility to enter in a new community, where any personal information is directly shown to others, is a possibility to experiencing different self and thus to show and build new identities. This paper aims to identify how to relate the perception of cyber identity, loyalty and purchase intention. First, we classified cyber identity into two types, personal and social, and analyzed perception of each identity type. Then we conducted a survey using pre-designed questionnaire and found out factors consisting personal and social identity. Finally we analyzed the effects of these factors on loyalty and purchase intention using Structural Equation Model.

  • PDF

인터넷 설문조사를 활용한 사이버 쇼핑몰 디자인에 관한 연구 (A Study for the Design of Cyber Shopping Mall Using Internet Survey)

  • 김광용;김기수
    • Asia pacific journal of information systems
    • /
    • 제9권2호
    • /
    • pp.133-150
    • /
    • 1999
  • With the increase of using internet in business, the gathering of customer information with real time process is emphasized more and more. This paper summarized the several characteristics of internet survey as a tool of gathering information of customer, and did empirical test for the effect of the design of cyber shopping mall on the customer's buying decision using internet survey. The survey result shows that the customer's buying decision in cyber shopping mall is affected by design factors such as multimedia and consistent framework of homepage. The survey also shows that as the intention of using cyber shopping mall is high, the more preference for navigation aid, and as the internet experience is long, the less preference for the animation and too much using of graphics.

  • PDF

비교 검색을 위한 지능형 검색 시스템 (Intelligent Search System for Comparative Searches)

  • Yangjin Seo;Sangyong Han
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2001년도 International Conference CALS/EC KOREA
    • /
    • pp.625-629
    • /
    • 2001
  • A cyber shopping mall is a place where consumers acquire product information, and make purchase decisions in the cyber space. Even though it offers many advantages over traditional malls, there are still several limitations to do shopping in an existing cyber mall. One of these limitations is the absence of an efficient shopping aid to compare multiple items from multiple malls. Existing search systems usually support a keyword search with limited conditions. Consumers spend lots of their time to compare multiple alternatives from search results. In this paper, we propose an intelligent product search system. There are two main features in our system. The first one is a full support of comparison shopping with multiple perspectives based on commercial search engines. The second one is an enhancement to the shopping aid based on a new concept of Shopping AssistanT. Our system is implemented in Visual Basic and PERL, and experimental results show a satisfactory performance.

  • PDF