• 제목/요약/키워드: security component

검색결과 406건 처리시간 0.023초

핀테크 지급결제 서비스 수용 저항요인 연구 : 혁신저항이론과 현상유지편향이론을 중심으로 (The Study of User Resistance to Fintech Payment Service: In the Perspective of Innovation Diffusion And Status Quo Bias Theory)

  • 황신해;김정군
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제27권1호
    • /
    • pp.133-151
    • /
    • 2018
  • Purpose Global fintech industry is proliferating. Although domestic investment in fintech service is also increasing fast, user acceptance of fintech payment service seems slower than expected. Previous fintech literature mainly focuses on overall characteristics and technical aspects of fintech including security issues and explores factors affecting the service adoption. This study aims to examine crucial factors affecting user's resistance intention to fintech payment service adoption. The research model was formulated based on innovation diffusion theory and status quo bias theory and validated empirically. Design/methodology/approach The proposed research model was empirically validated with 149 responses from college students who have used fintech payment service. The component-based SEM was employed for data analysis. Findings The significant findings are as follow. First, compatibility has significant negative effect and complexity, and perceived risk has a positive effect on user resistance. Second, institutional trust does not show a significant effect on user resistance but has an indirect effect through the mediation of trust in service provider. Finally, trust in service provider shows the significant negative effect on user resistance.

전력산업 구조개편에 대비한 적정 TRM 및 ATC 결정에 관한 연구 (A Study of TRM and ATC Determination for Electricity Market Restructuring)

  • 이효상;최진규;신동준;김진오
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제53권3호
    • /
    • pp.129-134
    • /
    • 2004
  • The Available Transfer Capability (ATC) is defined as the measure of the transfer capability remaining in the physical transmission network for further commercial activity above already committed uses. The ATC determination s related with Total Transfer Capability (TTC) and two reliability margins-Transmission Reliability Capability (TRM) and Capacity Benefit Margin(CBM) The TRM is the component of ATC that accounts for uncertainties and safety margins. Also the TRM is the amount of transmission capability necessary to ensure that the interconnected network is secure under a reasonable range of uncertainties in system conditions. The CBM is the translation of generator capacity reserve margin determined by the Load Serving Entities. This paper describes a method for determining the TTC and TRM to calculate the ATC in the Bulk power system (HL II). TTC and TRM are calculated using Power Transfer Distribution Factor (PTDF). PTDF is implemented to find generation quantifies without violating system security and to identify the most limiting facilities in determining the network’s TTC. Reactive power is also considered to more accurate TTC calculation. TRM is calculated by alternative cases. CBM is calculated by LOLE. This paper compares ATC and TRM using suggested PTDF with using CPF. The method is illustrated using the IEEE 24 bus RTS (MRTS) in case study.

A Systematic Approach to Improve Fuzzy C-Mean Method based on Genetic Algorithm

  • Ye, Xiao-Yun;Han, Myung-Mook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제13권3호
    • /
    • pp.178-185
    • /
    • 2013
  • As computer technology continues to develop, computer networks are now widely used. As a result, there are many new intrusion types appearing and information security is becoming increasingly important. Although there are many kinds of intrusion detection systems deployed to protect our modern networks, we are constantly hearing reports of hackers causing major disruptions. Since existing technologies all have some disadvantages, we utilize algorithms, such as the fuzzy C-means (FCM) and the support vector machine (SVM) algorithms to improve these technologies. Using these two algorithms alone has some disadvantages leading to a low classification accuracy rate. In the case of FCM, self-adaptability is weak, and the algorithm is sensitive to the initial value, vulnerable to the impact of noise and isolated points, and can easily converge to local extrema among other defects. These weaknesses may yield an unsatisfactory detection result with a low detection rate. We use a genetic algorithm (GA) to help resolve these problems. Our experimental results show that the combined GA and FCM algorithm's accuracy rate is approximately 30% higher than that of the standard FCM thereby demonstrating that our approach is substantially more effective.

ObjectPeerWork : 공유 객체 모델 기반의 피어투피어 어플리케이션 개발을 위한 프레임워크 (ObjectPeerWork : Framework for the Development of Peer-to-Peer Applications based on Shared Object Model)

  • 강운구;왕창종
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제7권6호
    • /
    • pp.630-640
    • /
    • 2001
  • 본 논문에서는 공유 객체 모델 기반의 P2P(Peer-to-Peer) 애플리케이션을 개발하기 위한 프레임워크인 ObjectPeerWork를 설계 및 구현한다. 공유 객체 모델은 자원 관리 기능들을 자원에 포함시킴으로써 관리를 위한 컴퓨팅 파워의 저하를 막고, 보안 문제를 개선함으로써 공유 자원에 대한 신뢰도를 향상시킬 수 있다. 또한, 공유 객체 모델은 분산 컴포넌트 기반의 요청 중계 관리자 및 모듈 컨테이너를 통하여 확장이 가능한 모델이다. 이러한 공유 객체 모델에 기만한 ObjectPeerWork는 일반적인 P2P 모델의 문제점들을 개선하여 기업 내 정보시스템 구축과 컴퓨팅 파워의 분산 및 자원의 효율적인 관리를 가능하게 하는 프레임워크이다.

  • PDF

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

  • Li, Jiping;Ding, Yaoming;Xiong, Zenggang;Liu, Shouyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5556-5573
    • /
    • 2017
  • As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker's own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

Evaluation of Key Success Factors for Web Design in Taiwan's Bike Case Study

  • LAI, I-Sung;HUANG, Yung-Fu;SIANG, Jie-Hua;WENG, Ming-Wei
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권11호
    • /
    • pp.927-937
    • /
    • 2020
  • Global warming awareness through energy conservation is growing due to the regulatory policies issued by governments and voluntary organization that established carbon emission limits. Transportation is one of the major contributors to carbon emissions. Bike will be simultaneously saving money, getting fit and helping to reduce global warming. Web design has been identified as a key factor for the acceptance and success of the websites and electronic commerce. The purpose of this research is to investigate the effective implementation of the proposed Analytic Hierarchy Process (AHP) technique on a bike case study whose company (Bike Company) is involved in web design for a critical component in the demonstration. Survey research used a variety of data collection methods, with the most common being questionnaires and interviews of some exporters. The research results reveal that the top five key success factors are Good reputation, Transaction security, Ease of use, Promotion, and Diversified choices, which provide the guidelines and directions for decision-makers to design effective websites in the current competitive business scenario. The major findings of this study are suggesting that Internet marketing channels are securing the company's relevance, together with paving the way for methods to increase web traffic.

소프트웨어 업데이트 유형별 위협요소와 안전성 강화를 위한 화이트리스트 구성 방안 (Threats according to the Type of Software Updates and White-List Construction Scheme for Advanced Security)

  • 이대성
    • 한국정보통신학회논문지
    • /
    • 제18권6호
    • /
    • pp.1369-1374
    • /
    • 2014
  • 지능형 타깃 지속 공격에 업데이트 서버가 유포수단으로 사용되고, 업데이트 프로그램은 악성코드의 실행 또는 안티바이러스 시그니처와 같은 애플리케이션 데이터의 조작에도 취약하기 때문에 소프트웨어 업데이트 위협요소의 식별 및 방지대책이 시급하다. 본 논문에서는 국내외 SW의 업데이트 구조와 업데이트 과정의 취약성 공격 및 대응방안을 살펴보고, 국내 유명 소프트웨어의 업데이트 로그를 추출/분석하여 화이트리스트를 식별하는데 필요한 정상적인 프로그램의 업데이트 구성요소를 도출한다.

자동링크복구 기능에 따른 네트워크 비용분석 (The Cost Analysis of Network by The Function of Automatic Link Recovery)

  • 송명규
    • 한국정보전자통신기술학회논문지
    • /
    • 제8권6호
    • /
    • pp.439-444
    • /
    • 2015
  • 통신, 교통, 전력 및 물 공급 시스템과 같은 사회 인프라 시스템은 이제 구성 요소 장애, 보안 공격과 자연 재해 등을 포함하여 다양한 종류의 위협에 직면하고 있다. 이러한 바람직하지 못한 사건이 발생할 때마다, 사회 기반의 기능정지시간이 사회에 치명적인 결과를초래하기 때문에 가능한 한 빨리 시스템을 복구하는 것이 중요하다. 특히 네트워크상에서의 장애가 발생했을 때, 링크 장애를 자동적으로 복구해야 그 피해를 최소화 할 수 있다. 또한 네트워크 장애시 고객이 인식하기 전에 서비스가 복구 될 수 있게 하면 그 효과는 더 클 것이다. 본 논문에서는 네트워크에서의 자동복구성과 비용사이의 관계를 분석한다.

GF(2m) 상의 여분 표현을 이용한 낮은 지연시간의 몽고메리 AB2 곱셈기 (Low-latency Montgomery AB2 Multiplier Using Redundant Representation Over GF(2m)))

  • 김태완;김기원
    • 대한임베디드공학회논문지
    • /
    • 제12권1호
    • /
    • pp.11-18
    • /
    • 2017
  • Finite field arithmetic has been extensively used in error correcting codes and cryptography. Low-complexity and high-speed designs for finite field arithmetic are needed to meet the demands of wider bandwidth, better security and higher portability for personal communication device. In particular, cryptosystems in GF($2^m$) usually require computing exponentiation, division, and multiplicative inverse, which are very costly operations. These operations can be performed by computing modular AB multiplications or modular $AB^2$ multiplications. To compute these time-consuming operations, using $AB^2$ multiplications is more efficient than AB multiplications. Thus, there are needs for an efficient $AB^2$ multiplier architecture. In this paper, we propose a low latency Montgomery $AB^2$ multiplier using redundant representation over GF($2^m$). The proposed $AB^2$ multiplier has less space and time complexities compared to related multipliers. As compared to the corresponding existing structures, the proposed $AB^2$ multiplier saves at least 18% area, 50% time, and 59% area-time (AT) complexity. Accordingly, it is well suited for VLSI implementation and can be easily applied as a basic component for computing complex operations over finite field, such as exponentiation, division, and multiplicative inverse.

얼굴 인식 성능 향상을 위한 재분류 방법 (Re-classifying Method for Face Recognition)

  • 배경률
    • 지능정보연구
    • /
    • 제10권3호
    • /
    • pp.105-114
    • /
    • 2004
  • 최근 생체인식에 대한 관심이 증가하면서 출입 통제나 사용자 인증과 같은 보안 분야에 적용이 활발히 진행되고 있다. 특히 얼굴인식은 생체인식 기술 중 사용자 편의성과 접촉 거부감이 적어 활용성이 증대되고 있으나 타 인식기술에 비해 인식 결과의 정확성과 재시도율(Re-attempt Rate)에 취약한 단점이 있다. 본 논문에서는 이러한 단점을 보완하기 위해 데이터 분류 방법(Data Classification Algorithm)으로 인식 결과를 재분류(Re-Classification)하는 접근법에 대해서 제안하고자 한다. 본 실험을 위해서 대표적인 형상 기반(Appearance-based) 알고리즘인 PCA를 사용하였고, 200명(총 얼굴 영상 200장)을 대상으로 제안한 재분류 접근법을 적용한 결과 재인식의 경우 성능이 향상되었음을 확인하였다.

  • PDF