• Title/Summary/Keyword: cyber electronic

Search Result 305, Processing Time 0.03 seconds

A Study on the Status Quo and the Improvements of Blue Tourism Websites in the Context of Electronic Commerce (해양관광 사이트의 전자상거래 지원지능에 대한 실태 및 개선방안)

  • 김진백
    • The Journal of Fisheries Business Administration
    • /
    • v.35 no.1
    • /
    • pp.57-85
    • /
    • 2004
  • To develop an blue tourism website(BTW) for electronic commerce(EC), information requirements of BTW are defined firstly. We defined information requirements of BTW from two aspects, i.e., front office and back office. Information requirements for front office were derived by consumer purchasing decision process. And information requirements for back office were derived by tourism value chain. Total 29 functions are identified as critical EC related functions of BTW. Among them, 25 functions were investigated into BTW. BTWs were searched by search engines - Yahoo and Empas - to Korean websites. There are 12 specialized BTWs, except one cyber museum website. For 12 websites, 25 functions were probed. By the results, in need recognition stage of blue tourism, only weather information was provided in most websites. In information search stage of blue tourism, package recommendation and various contents were provided in most websites. In consumption stage of blue tourism, traffic information were provided in most websites. And in after - sales service stage of blue tourism, bulletin board function was implemented in most websites. The rest of the functions were scarcely implemented. On the whole, it was concluded that most EC related functions of BTW in Korea were not implemented properly. To improve the status quo, it is expected in the dimension of individual website, that marketing planning, customized service, intelligent service, reinforcing purchasing assistance functions, customer relationship management, and escrow service etc. need to be implemented. And it is expected in the dimension of blue tourism industry, that standardizing product catalog, security assistance policy, information sharing by industrial database, finding referral model of BTW, elevating information mind, revising related laws etc. are needed.

  • PDF

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

A Performance Comparison of Routing Protocols for Mobile Ad hoc Networks using the NS-3 (NS-3를 사용한 이동 애드혹 네트워크용 라우팅 프로토콜 성능 비교)

  • Jang, Jaeshin;Ngo, Van-Vuong;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.308-316
    • /
    • 2015
  • In this paper, we carried out performance comparison of four routing protocols that had been proposed for mobile ad hoc networks using the NS-3 network simulator. Those four routing protocols consist of two proactive routing protocols, DSDV(destination-sequenced distance vector) and OLSR(optimized link state routing), and two reactive routing protocols, AODV(ad-hoc on-demand distance vector) and DSR(dynamic source routing). Two performance metrics, system throughput and packet delivery ratio, are adopted and performance evaluation was carried out in a square communication area where each communicating mobile node moves independently. Numerical results show that the AODV routing protocol provides the best performance among those four routing protocols.

Study on the Localization Concordance of Video and Audio (시선에 따른 영상 음향 정위 일치에 관한 연구)

  • Lee, Kyou-Won;Choi, Hae-Geun;Park, So-Youn;Park, Goo-Man;Kim, Seong-Kweon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1293-1300
    • /
    • 2018
  • The $360^{\circ}$ video has a lot of image information and usefulness; however, the position of the audio source judged by hearing is different from the position on the screen. Therefore, human feels tired, the immersion decrease and user cant watch the video for Moreer time. In this paper, the concordance rate of the video and the audio localization is defined. The rate is expressed in a percentage. It means how much the system makes the sound localization real according to the position of the source on the screen. With this rate, the audio localization performance of immersive audio producing and playing system can be evaluated. It will be helpful for developers to make the higher performance system and expected to contribute to make makinguality system with reality.

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Cybertrap : Unknown Attack Detection System based on Virtual Honeynet (Cybertrap : 가상 허니넷 기반 신종공격 탐지시스템)

  • Kang, Dae-Kwon;Hyun, Mu-Yong;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.863-871
    • /
    • 2013
  • Recently application of open protocols and external network linkage to the national critical infrastructure has been growing with the development of information and communication technologies. This trend could mean that the national critical infrastructure is exposed to cyber attacks and can be seriously jeopardized when it gets remotely operated or controlled by viruses, crackers, or cyber terrorists. In this paper virtual Honeynet model which can reduce installation and operation resource problems of Honeynet system is proposed. It maintains the merits of Honeynet system and adapts the virtualization technology. Also, virtual Honeynet model that can minimize operating cost is proposed with data analysis and collecting technique based on the verification of attack intention and focus-oriented analysis technique. With the proposed model, new type of attack detection system based on virtual Honeynet, that is Cybertrap, is designed and implemented with the host and data collecting technique based on the verification of attack intention and the network attack pattern visualization technique. To test proposed system we establish test-bed and evaluate the functionality and performance through series of experiments.

A Heat Shock Simulation System for Testing Performance of EWP (EWP 성능 검사를 위한 열 충격 모사시스템)

  • Yoo, Nam-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.3
    • /
    • pp.553-558
    • /
    • 2019
  • Global auto parts companies are making efforts to develop EWP(: Electric Water Pump) which is one of the core parts of environment friendly car. In eco-friendly automobiles, an independent cooling system is used rather than a cooling system that is linked to an internal combustion engine. Therefore, the research and development of the water pump operating separately from the engine and the related production system are being actively carried out. In order to overcome the shortcoming of EWP of PPS material suitable for injection system, G company which is a global parts company that researches and develops EWP around SUS and is in the process of developing robot-based production equipment for mass production. In this paper, a heat shock simulation system is designed and implemented that works with the robot-based production system to test the performance of the produced EWP. By using this system, it is possible to test the EWP in an virtual environment similar to the actual environment, thereby reducing the defect rate of the product. At the same time, all the data produced during the entire process for testing can be stored, which can be utilized in the future development of CPS(: Cyber Physical System) of EWP system based on big data.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

A Study on Consumer Purchase Intention Using a Flow (Flow를 이용한 소비자 구매의도에 관한 연구)

  • Park, Jong-Won;Yoon, Sung-Jun;Choi, Dong-Choon
    • Journal of Global Scholars of Marketing Science
    • /
    • v.12
    • /
    • pp.59-75
    • /
    • 2003
  • In order for electronic commerce to be successful, it must have a theoretical framework that considers the characteristics of the internet user who are consumers in the cyber space and impacts their purchase intentions. We were able to obtain participation of 350 people from across the country using 316 responses(34 responses removed), we derived statistics by means of SPSS/PC version 10.0 and AMOS 4.0 statistics package. We found that, the higher the degree of skill and the sense of challenge, the level of involvement and perceived service quality increased. And the degree of skill has a negative influence on awareness of perceived risk than the sense of challenge. Perceived service quality, perceived risk and involvement has a influence on purchase intentions.

  • PDF