• Title/Summary/Keyword: online identification

Search Result 233, Processing Time 0.022 seconds

A Method of Risk Assessment for Multi-Factor Authentication

  • Kim, Jae-Jung;Hong, Seng-Phil
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.187-198
    • /
    • 2011
  • User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication methods being used in various online environments, such as web portals, electronic transactions, financial services and e-government, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. The results of our method are confirmed through a risk assessment and we verify its safety using the testing method presented in OWASP and NIST SP800-63.

Security Risk Assessment in Conducting Online Exam

  • Danah AlDossary;Danah AlQuaamiz;Fai AlSadlan;Dana AlSharari;Lujain AlOthman;Raghad AlThukair;Ezaz Aldahasi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.77-83
    • /
    • 2023
  • This research is conducted to minimize the potential security risks of conducting online exams to an acceptable level as vulnerabilities and threats to this type of exam are presented. This paper provides a general structure for the risk management process and some recommendations for increasing the level of security.

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

Adaptive-Predictive Controller based on Continuous-Time Poisson-Laguerre Models for Induction Motor Speed Control Improvement

  • Boulghasoul, Z.;El Bahir, L.;Elbacha, A.;Elwarraki, E.
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.3
    • /
    • pp.908-925
    • /
    • 2014
  • Induction Motor (IM) has several desirable features for high performance adjustablespeed operation. This paper presents the design of a robust controller for vector control induction motor drive performances improvement. Proposed predictive speed controller, which is aimed to guarantee the stability of the closed loop, is based on the Poisson-Laguerre (PL) models for the association vector control drive and the induction motor; without necessity of any mechanical parameter, and requires only two control parameters to ensure implicitly the integrator effect on the steady state error, load torque disturbances rejection and anti-windup effect. In order to improve robustness, insensitivity against external disturbances and preserve desired performance, adaptive control is added with the aim to ensure an online identification of controller parameters through an online PL models identification. The proposed control is compared with the conventional approach using PI controller. Simulation with MATLAB/SIMULINK software and experimental results for a 1kW induction motor using a dSPACE system with DS1104 controller board are carried out to show the improvement performance.

A Study on the Experience of ICT Startups with an Online Export and Trade Consultation Platform in the COVID-19 Situation (코로나 19 상황에서 ICT 스타트업의 비대면 수출 및 무역 상담 플랫폼 경험 사례에 관한 연구)

  • Jong-hyun Lee;Ji-song Kim;Seung-yong Shin
    • Korea Trade Review
    • /
    • v.48 no.4
    • /
    • pp.321-342
    • /
    • 2023
  • This study aims to derive policy implications by analyzing the experiences of Korean ICT startups that participated in the government's online export and trade consultation platform, designed to support ICT startups' overseas expansion during the COVID-19 pandemic. The research methodology involved the analysis of semi-structured, in-depth interviews with six startups who participated in an online export and trade consultation platform, using Giorgi's phenomenological methodology. The analysis resulted in the identification of ten subcategories, including two subcategories for each of the five categories. These categories and subcategories offer a comprehensive understanding of the experiences of ICT startups in navigating the online export and trade counseling platforms. The findings suggest that online export and trade consultation platforms for ICT startups offer efficiency benefits by reducing time and space constraints, but they also reveal limitations in terms of practical business continuity. This study holds academic and practical significance by providing insights into how ICT startups navigate online export and trade counseling platforms during the pandemic.

A Load Identification Method for ICPT System Utilizing Harmonics

  • Xia, Chen-Yang;Zhu, Wen-Ting;Ma, Nian;Jia, Ren-Hai;Yu, Qiang
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2178-2186
    • /
    • 2018
  • Online identification of load parameters is the premise of establishing a stable and highly-efficient ICPT (Inductive Coupled Power Transfer) system. However, compared with pure resistive load, precise identification of composite load, such as resistor-inductance load and resistance-capacitance load, is more difficult. This paper proposes a method for detecting the composite load parameters of ICPT system utilizing harmonics. In this system, the fundamental and harmonic wave channel are connected to the high frequency inverter jointly. The load parameter values can be obtained by setting the load equation based on the induced voltage of secondary-side network, the fundamental wave current, as well as the third harmonic current effective value received by the secondary-side current via Fourier decomposition. This method can achieve precise identification of all kinds of load types without interfering the normal energy transmission and it can not only increase the output power, but also obtain higher efficiency compared with the fundamental wave channel alone. The experimental results with the full-bridge LCCL-S type voltage-fed ICPT system have shown that this method is accurate and reliable.

Application of recursive SSA as data pre-processing filter for stochastic subspace identification

  • Loh, Chin-Hsiung;Liu, Yi-Cheng
    • Smart Structures and Systems
    • /
    • v.11 no.1
    • /
    • pp.19-34
    • /
    • 2013
  • The objective of this paper is to develop on-line system parameter estimation and damage detection technique from the response measurements through using the Recursive Covariance-Driven Stochastic Subspace identification (RSSI-COV) approach. To reduce the effect of noise on the results of identification, discussion on the pre-processing of data using recursive singular spectrum analysis (rSSA) is presented to remove the noise contaminant measurements so as to enhance the stability of data analysis. Through the application of rSSA-SSI-COV to the vibration measurement of bridge during scouring experiment, the ability of the proposed algorithm was proved to be robust to the noise perturbations and offers a very good online tracking capability. The accuracy and robustness offered by rSSA-SSI-COV provides a key to obtain the evidence of imminent bridge settlement and a very stable modal frequency tracking which makes it possible for early warning. The peak values of the identified $1^{st}$ mode shape slope ratio has shown to be a good indicator for damage location, meanwhile, the drastic movements of the peak of $2^{nd}$ mode slope ratio could be used as another feature to indicate imminent pier settlement.

An Identification and Feature Search System for Scanned Comics (스캔 만화도서 식별 및 특징 검색 시스템)

  • Lee, Sang-Hoon;Choi, Nakyeon;Lee, Sanghoon
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.199-208
    • /
    • 2014
  • In this paper, we represent a system of identification and feature search for scanned comics in consideration of their content characteristics. For creating the feature of the scanned comics, we utilize a method of hierarchical symmetry fingerprinting. Proposed identification and search system is designed to give online service provider, such as Webhard, an immediate identification result under conditions of huge volume of the scanned comics. In simulation part, we analyze the robustness of the identification of the fingerprint to image modification such as rotation and translation. Also, we represent a structure of database for fast matching in feature point database, and compare search performance between other existing searching methods such as full-search and most significant feature search.

A Study on Improvement for Identification of Original Authors in Online Academic Information Service (온라인 학술정보 서비스 상 원저작자 식별 개선 방안 연구)

  • Jung-Wan Yeom;Song-Hwa Hong;Sang-Hyun Joo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.133-138
    • /
    • 2024
  • In the modern academic research environment, the advancement of digital technology provides researchers with increasingly diverse and rich access to information, but at the same time, the issue of author identification has emerged as a new challenge. The problem of author identification is a major factor that undermines the transparency and accuracy of academic communication, potentially causing confusion in the accurate attribution of research results and the construction of research networks. In response, identifier systems such as the International Standard Name Identifier (ISNI) and Open Researcher and Contributor ID (ORCID) have been introduced, but still face limitations due to low participation by authors and inaccurate entry of information. This study focuses on researching information management methods for identification from the moment author information is first entered into the system, proposing ways to improve the accuracy of author identification and maximize the efficiency of academic information services. Through this, it aims to renew awareness of the issue of author identification within the academic community and present concrete measures that related institutions and researchers can take to solve this problem.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.