• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.037 seconds

An Empirical Study on the Influence on Public Data Usage in Private Business Sectors (민간의 공공데이터 활용을 위한 이용의도에 미치는 영향에 관한 실증적 연구)

  • Cha, Young-Il;Choi, Sung-Kyou;Han, Kyeong-Seok
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.9-17
    • /
    • 2017
  • The opening of public data has been perceived as a critical factor in deciding a country's rise or fall. Since the global economic crisis, countries around the globe have expanded the supply of public data as a new growth engine to create significant economic effects. As a result, there has been a rising demand for a study on the influence of public data in the private sectors. This study attempted to achieve the following objectives. First, the effects of independent variables-system quality, information quality, information security, social influence, innovation and assistance by the public organization- on the intention to use the public data was examined. Second, the effects of the mediating variables - Perceived Ease of Use (PEU) and Perceived Usefulness (PU) - on the independent variables and intention to use (dependent variable) were investigated. Third, after selecting utilization type, frequency of public data usage and frequency of occupational & e-government service usage as moderating variables, their effects on the relationship between the independent variables and dependent variable (intention to use them in the private sector) were studied. It is expected that the study results would be useful in developing strategies aimed to utilize public data in the private sectors.

An Exploratory Study of Software Development Environment in Korean Shipbuilding and Marine Industry (조선해양산업 소프트웨어 개발환경 현황 연구)

  • Yu, Misun;Jeong, Yang-Jae;Chun, In-Geol;Kim, Byoung-Chul;Na, Gapjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.6
    • /
    • pp.221-228
    • /
    • 2018
  • With an increase in demand for the high added value of shipbuilding and marine industry based on the information and communications technology (ICT), software technology has become more important than ever in the industry. In this paper, we present the result of our preliminary investigation on the current software development environment in the shipbuilding and marine industry in order to develop reusable software component, which can enhance the competitiveness of software development. The investigation is performed based on the survey answers from 34 developers who are working in different shipbuilding and marine companies. The questionnaire is composed of items to gather the information of each company such as the number of employees and product domain, and actual software development environment such as operating system, programming languages, deployment format, obstacles for developing components, and the adoption of software development methods and tools. According to the results of the survey, the most important consideration to select their development platform was the number of available utilities and the technical supports, followed by performance, price and security problems. In addition, the requirements of various platforms supporting and the higher reliability, and the limitations of low development cost and manpower made it difficult for them to develop reusable software components. Finally, throughout the survey, we find out that only 15% of developers used software development processes and managed the quality to systematically develop their software products, therefore, shipbuilding and marine companies need more technical and institutional support to improve their ability to develop high qualified software.

The Evaluation of Effectiveness on RFID system based Logistics process (RFID 시스템 기반 물류프로세스 유효성 평가)

  • Choi, Yong-Jung;Han, Dae-Hee;Jeong, Hae-June;Han, Woo-Chul;Kim, Hyun-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.111-120
    • /
    • 2010
  • Looking at the application examples related to RFID systems around the world, it is easy to find that RFID systems are introduced in various industries, such as retail and consumer goods sectors, financial and security sectors, automotive and transport sector, leisure and sports sector, logistics, and health-related fields. This is because they can get their operational efficiency and competitiveness by means of product's visibility and transparency of information through RFID systems. However, it is required that evaluation of effectiveness on introducing RFID systems should be performed to strengthen construction willingness of RFID systems before actual introduction of the RFID systems in the process. This activity affects to introduction of RFID systems in industry-wide and then, will be able to create a synergy effect such as national industrial competitiveness improvement. The purpose of this study is to offer rational method on effectiveness analysis before and after RFID based process. Accordingly, the proposed Choquet fuzzy integral-based model will be allowed rational analysis by integrating quantitative and qualitative analysis. Through the effectiveness analysis of C company's RFID based process using the proposed evaluation model, we could identify that RFID-based logistics process was more effective than existing process.

A Study on the Blockchain based Frequency Allocation Process for Private 5G (블록체인 기반 5G 특화망 주파수 할당 프로세스 연구)

  • Won-Seok Yoo;Won-Cheol Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.24-32
    • /
    • 2023
  • The current Private 5G use procedure goes through the step of application examination, use and usage inspection, and can be divided in to application, examination step as a procedure before frequency allocation, and use, usage inspection step as a procedure after frequency allocation. Various types of documents are required to apply for a Private 5G, and due to the document screening process and radio station inspection for using Private 5G frequencies, the procedure for Private 5G applicants to use Private 5G is complicated and takes a considerable amount of time. In this paper, we proposed Frequency Allocation Process for Private 5G using a blockchain platform, which is fast and simplified than the current procedure. Through the use of a blockchain platform and NFT (Non-Fungible Token), reliability and integrity of the data required in the frequency allocation process were secured, and security of frequency usage information was maintained and a reliable Private 5G frequency allocation process was established. Also by applying the RPA system that minimizes human intervention, fairness was secured in the process of allocating Private 5G. Finally, the frequency allocation process of Private 5G based on the Ethereum blockchain was performed though a simulation.

Empirical Analysis on Bitcoin Price Change by Consumer, Industry and Macro-Economy Variables (비트코인 가격 변화에 관한 실증분석: 소비자, 산업, 그리고 거시변수를 중심으로)

  • Lee, Junsik;Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.195-220
    • /
    • 2018
  • In this study, we conducted an empirical analysis of the factors that affect the change of Bitcoin Closing Price. Previous studies have focused on the security of the block chain system, the economic ripple effects caused by the cryptocurrency, legal implications and the acceptance to consumer about cryptocurrency. In various area, cryptocurrency was studied and many researcher and people including government, regardless of country, try to utilize cryptocurrency and applicate to its technology. Despite of rapid and dramatic change of cryptocurrencies' price and growth of its effects, empirical study of the factors affecting the price change of cryptocurrency was lack. There were only a few limited studies, business reports and short working paper. Therefore, it is necessary to determine what factors effect on the change of closing Bitcoin price. For analysis, hypotheses were constructed from three dimensions of consumer, industry, and macroeconomics for analysis, and time series data were collected for variables of each dimension. Consumer variables consist of search traffic of Bitcoin, search traffic of bitcoin ban, search traffic of ransomware and search traffic of war. Industry variables were composed GPU vendors' stock price and memory vendors' stock price. Macro-economy variables were contemplated such as U.S. dollar index futures, FOMC policy interest rates, WTI crude oil price. Using above variables, we did times series regression analysis to find relationship between those variables and change of Bitcoin Closing Price. Before the regression analysis to confirm the relationship between change of Bitcoin Closing Price and the other variables, we performed the Unit-root test to verifying the stationary of time series data to avoid spurious regression. Then, using a stationary data, we did the regression analysis. As a result of the analysis, we found that the change of Bitcoin Closing Price has negative effects with search traffic of 'Bitcoin Ban' and US dollar index futures, while change of GPU vendors' stock price and change of WTI crude oil price showed positive effects. In case of 'Bitcoin Ban', it is directly determining the maintenance or abolition of Bitcoin trade, that's why consumer reacted sensitively and effected on change of Bitcoin Closing Price. GPU is raw material of Bitcoin mining. Generally, increasing of companies' stock price means the growth of the sales of those companies' products and services. GPU's demands increases are indirectly reflected to the GPU vendors' stock price. Making an interpretation, a rise in prices of GPU has put a crimp on the mining of Bitcoin. Consequently, GPU vendors' stock price effects on change of Bitcoin Closing Price. And we confirmed U.S. dollar index futures moved in the opposite direction with change of Bitcoin Closing Price. It moved like Gold. Gold was considered as a safe asset to consumers and it means consumer think that Bitcoin is a safe asset. On the other hand, WTI oil price went Bitcoin Closing Price's way. It implies that Bitcoin are regarded to investment asset like raw materials market's product. The variables that were not significant in the analysis were search traffic of bitcoin, search traffic of ransomware, search traffic of war, memory vendor's stock price, FOMC policy interest rates. In search traffic of bitcoin, we judged that interest in Bitcoin did not lead to purchase of Bitcoin. It means search traffic of Bitcoin didn't reflect all of Bitcoin's demand. So, it implies there are some factors that regulate and mediate the Bitcoin purchase. In search traffic of ransomware, it is hard to say concern of ransomware determined the whole Bitcoin demand. Because only a few people damaged by ransomware and the percentage of hackers requiring Bitcoins was low. Also, its information security problem is events not continuous issues. Search traffic of war was not significant. Like stock market, generally it has negative in relation to war, but exceptional case like Gulf war, it moves stakeholders' profits and environment. We think that this is the same case. In memory vendor stock price, this is because memory vendors' flagship products were not VRAM which is essential for Bitcoin supply. In FOMC policy interest rates, when the interest rate is low, the surplus capital is invested in securities such as stocks. But Bitcoin' price fluctuation was large so it is not recognized as an attractive commodity to the consumers. In addition, unlike the stock market, Bitcoin doesn't have any safety policy such as Circuit breakers and Sidecar. Through this study, we verified what factors effect on change of Bitcoin Closing Price, and interpreted why such change happened. In addition, establishing the characteristics of Bitcoin as a safe asset and investment asset, we provide a guide how consumer, financial institution and government organization approach to the cryptocurrency. Moreover, corroborating the factors affecting change of Bitcoin Closing Price, researcher will get some clue and qualification which factors have to be considered in hereafter cryptocurrency study.

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

Directions to Fisheries Education for Achieving UN Sustainable Development Goals (SDGs) (유엔 지속가능발전 목표(SDG)를 위한 수산교육 방향)

  • KANG, Beodeul;ZHANG, Chang Ik
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.29 no.2
    • /
    • pp.453-465
    • /
    • 2017
  • UN adopted the 2030 Agenda for Sustainable Development and the Sustainable Development Goals (SDGs) in 2015, a set of 17 objectives with 169 targets expected to guide actions over the next 15 years (2016-2030). One goal expressly focuses on the oceans, that is, SDG 14 'Conserve and sustainably use the oceans, seas and marine resources for sustainable development'. More than 30% of fish stocks worldwide were classified by FAO(2016) as overfished. Globally, world capture fisheries are near the ocean's productive capacity with catches on the order of 80 million metric tons. Aquaculture production is increasing rapidly and is expected to continue to increase, but aquaculture encounters some environmental challenges, including potential pollution, competition with wild fishery resources, potential contamination of gene pools, disease problems, and loss of habitat. Accordingly, there have been a variety of world organization and conferences stressing the importance of the implementation of the ecosystem-based fisheries management(EBFM) to overcome these problems. Annual catch of Korean fisheries have shown continuously declining patterns since late 1990s. Most fish stocks are currently known to be over-exploited, and some stocks are depleted due to the increase in fishing intensity and over-capitalization of fishing fleets. Other reasons for the depletion are land reclamations and coastal pollution, which destroy spawning and nursery grounds along the coastal regions. Aquaculture production is also increasing rapidly in Korea. However, several important issues such as gene pool and interaction with capture fisheries should be considered. The EBFM approach should use the best available information coupled with a reasonable application of the precautionary approach. The EBFM has global relevance, and so the real challenge will be to develop and use reliable, robust and cost-effective means of assessing and monitoring the status of ecosystems and their resources, and rapid means of detecting any undesirable and excessive impacts that threaten sustainable use. Future fisheries education should take into account UN's SDGs, which were adopted to achieve the global 2030 agenda. However, there are some difficulties in the current fisheries education system in Korea. First, the current education organizations are limited within the old frame of traditional fisheries sciences. Second, the fisheries education is currently lack of the future-oriented education system and of customized schools or departments. Third, the on-going fisheries education has been based upon few educational policies which are sufficiently relevant to holistic SDGs of the global standard. Accordingly, directions to modern fisheries education for achieving SDGs would be, first, the transition of fisheries education structure into the future-oriented and customized education system. Second, fisheries education needs to shift to the new paradigm, which combines traditional fisheries science education with related fields such as oceanography and environmental sciences to adopt the concept of EBFM. Lastly, fisheries education should accompany relevant policies for effectively achieving SDGs.

A Study on Improvement Measures to Strengthen the Police's Ability to Respond to CBRN Terrorism at the Scene (경찰의 화생방테러 현장대응역량 강화를 위한 개선방안 연구)

  • Lee, Deok-Jae;Song, Chang Geun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.116-125
    • /
    • 2022
  • Recent aspects of terrorism varies in various ways according to means, targets, and regions. In particular, the 9/11 terrorist attacks in the United States in 2001 changed the paradigm of each country's terrorism, and the South Korea also participated in the enactment and enforcement of the Anti-Terrorism Act in 2016. Based on this, CBRN terrorism is included in general terrorism, and the National Police Agency plays the role of a control tower, and a system supported by related organizations such as the Ministry of Environment is being built and operated. However, restrictions were confirmed in the organizational system, manpower composition, and equipment and materials in operation in preparation for CBRN within the police. Based on the identified limitations, we proposed improvement plans to strengthen the capacity for CBRN terrorism: establishing a dedicated CBRN organization; creating research organization; and securing additional dedicated personnel. Based on this, as an improvement plan to strengthen the capability of CBRN, the establishment of an organization dedicated to CBRN and a research organization within the National Police Agency, and expansion of electronic equipment suitable for the characteristics of CBRN were proposed. It is expected that the police's on-site response capability system for CBRN terrorism will be strengthened via the proposed improvement measures to recover the various restrictions on the response to CBRN terrorism.