• Title/Summary/Keyword: security technology

Search Result 6,827, Processing Time 0.036 seconds

The Study on the Intention of the Use of Fintech Digital Sandbox (D-Testbed) (핀테크디지털샌드박스(D-테스트베드) 이용의도에 관한 연구)

  • Lee, Munrak;Lee, Won-Boo;Son, Youngdoo
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.4
    • /
    • pp.505-525
    • /
    • 2021
  • Purpose: The purpose of this study was to investigate factors influencing the intention to use Fintech Digital Sand(D-Testbed), which facilitate digital innovation in the financial sectors and allow fintech startups to simulate the PoC their innovative ideas before starting a business. Methods: This study used the Extended Technology Acceptance Model (TAM2), with independent variables such as social influence, personal innovativeness, service quality, relative advantage, and security concerns used in previous studies, for analysis. For mediator variables, the perceived usefulness and perceived ease of use were used in this study. Results: The results indicated that social influence and perceived usefulness have a positive effect on the intention to use. It was also analyzed that relative advantage has a mediating effect on perceived usefulness whereas service quality nor personal innovativeness are not statistically significant mediation. On the other hand, perceived ease of use on the intention is not statistically significant. By this, it was confirmed that the intention to use Fintech Digital Sand(D-Testbed) was to improve the business performance of fintech companies, but not because it was easy to learn and take less effort. Conclusion: The finding of the study provides valuable implications for invigorating the use of fintech digital sandbox(D-testbed) and identifying the factors that affect the perception and intention to use among employees in fintech companies in advance.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Manned-Unmanned Teaming Air-to-Air Combat Tactic Development Using Longshot Unmanned Aerial Vehicle (롱샷 무인기를 활용한 유무인 협업 공대공 전술 개발)

  • Yoo, Seunghoon;Park, Myunghwan;Hwang, Seongin;Seol, Hyeonju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.64-72
    • /
    • 2021
  • Manned-unmanned teaming can be a very promising air-to-air combat tactic since it can maximize the advantage of combining human insight with the robustness of the machine. The rapid advances in artificial intelligence and autonomous control technology will speed up the development of manned-unmanned teaming air-to-air combat system. In this paper, we introduce a manned-unmanned teaming air-to-air combat tactic which is composed of a manned aircraft and an UAV. In this tactic, a manned aircraft equipped with radar is functioning both as a sensor to detect the hostile aircraft and as a controller to direct the UAV to engage the hostile aircraft. The UAV equipped with missiles is functioning as an actor to engage the hostile aircraft. We also developed a combat scenario of executing this tactic where the manned-unmanned teaming is engaging a hostile aircraft. The hostile aircraft is equipped with both missiles and radar. To demonstrate the efficiency of the tactic, we run the simulation of the scenario of the tactic. Using the simulation, we found the optimal formation and maneuver for the manned-unmanned teaming where the manned-unmanned teaming can survive while the hostile aircraft is shot-downed. The result of this study can provide an insight to how manned aircraft can collaborate with UAV to carry out air-to-air combat missions.

A Scheme of Identity Authentication and Anomaly Detection using ECG and Beacon-based Blockchain (ECG와 비콘 기반의 블록체인을 이용한 신원 인증 및 이상징후 탐지 기법)

  • Kim, Kyung-Hee;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.69-74
    • /
    • 2021
  • With the recent development of biometric authentication technology, the user authentication techniques using biometric authentication are increasing. Various problems arised in certification techniques that use various existing methods such as ID/PW. Therefore, recently, a method of improving security by introducing biometric authentication as secondary authentication has been used. In this thesis, proposal of the user authentication system that can detect user identification and anomalies using ECGs that are extremely difficult to falsify through the electrical biometric signals from the heart among various biometric authentication devices is studied. The system detects user anomalies by comparing ECG data received from a wrist-mounted wearable device-type ECG measurement tool with identification and ECG data stored in blockchain form on the database and identifying the user's location through a beacon system.

Analysis of Domestic and Foreign Military UAV Development Trends and Suggestions for Countermeasures Against North Korea UAVs (국내외 군사용 무인기 개발 동향 분석 및 북한 무인기 대응 방안 제언)

  • Kim, Gyou-Beom;Cho, In-Je;Seo, Il-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.97-105
    • /
    • 2021
  • Countries such as the United States, Russia, and Europe are developing and operating UAVs for various purposes, including stealth UAVs. North Korea is also operating unmanned aerial vehicles, and it is presumed that it is continuously flying south of the demarcation line to obtain information on the national security zone, but it is difficult to detect and neutralize it effectively. Therefore, this paper analyzed the military UAV development trends and military radar specifications in Western countries such as the United States and communist countries such as Russia, China, and North Korea through literature research. In addition, based on the investigation of the AESA radar-based UAV response system in the country, not only general responses but also countermeasures such as direct strike and electromagnetic pulses to North Korean UAVs that cannot be jammed were suggested.

A Study on the Development of Public Digital Signage Services (공공 디지털 사이니지 서비스 개발 연구)

  • Ahn, SungHee
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.185-196
    • /
    • 2021
  • This study is based on the 'National Pilot Project on Digital Signage in Sejong Special City', one of the pilot projects initiated by the Ministry of Public Administration and Security. This project was an attempt to present the digital signage as a 'public service content platform' integrated with smart technologies. This study suggests that the planning strategy for placing public service contents on digital signage platform should focus on interests of local communities or users rather than high-tech suppliers of digital signage. In consideration of growing needs for smart technology-based public service, this study concentrates on the strategy for developing 'public digital signage services'. In addition, 'digital signage service tools' were designed to easily establish or execute the strategy. The aim of this study is developing the strategy to make digital signage a public cultural service platform as well as a digital advertisement tool. The final goal of this study is to demonstrate public value creation performance of the 'Revitalisation Project of Sejong City's Commercial Districts', which was possible thanks to the proactive involvement of citizens coupled with progressive utilization of interactive media.

A Study on the International Recognition of the COVID-19 Vaccination Certificates (코로나19 예방접종증명서의 국제적 인정에 관한 연구)

  • Jang, Su Yun;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.45-62
    • /
    • 2021
  • After the COVID-19 outbreak in 2019, the spread of COVID-19 has not been easily caught despite preventive measures in each country. The spread of COVID-19 has hit the world, especially in the economic and tourism sectors. Countries around the world are easing restrictions on the movement of vaccinated people in preparation for the post-corona era. Under the name of "Vaccine Passport," "Vaccination Certificate," and "Digital Health Pass," vaccination measures are being implemented to allow vaccination recipients to use multi-use facilities. However, there is no international agreement on the movement of countries, and each country has its own immigration policy. In order to return to pre-corona daily life, global agreements must be reached from the movement of vaccinated people between countries, and standards and implementation methods must be determined. This study focuses on the implementation and utilization of vaccination certificates suitable for the COVID-19 era. We will look at the spread of COVID-19 and its international response policies. In the case of COVID-19, we will investigate why vaccination certificate installation should be standardized and how far the current standardization has been discussed, and discuss the characteristics of vaccination certificate installation and considerations. In order for the immunization certificate discussed in the previous chapter to be recognized internationally, institutional and technical considerations are identified and security factors that may occur in each implementation are also presented. Finally, the international recognition case of vaccination certificate is discussed, and the method of installation and utilization of vaccination certificate is proposed. This paper can be used as a policy because of its timeliness in studying the standards of vaccination certificates and considerations for international recognition to restore movement between countries in the spread of COVID-19. In addition, if other infectious diseases occur in the future or similar cases where movement between countries is restricted, it can be used as a reference to support the movement of verified people.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.

Calculation of Effective Half-life of Gamma Emission Radionuclide using Bio-kinetic Model (생체역동학 모델을 이용한 감마선 방출 핵종의 유효반감기 계산)

  • Lee, Sang-Kyung;Jeong, Kyu-Hwan;Lee, Ji-Yon;Kim, Bong-Gi;Kim, Jung-Min
    • Journal of Radiation Industry
    • /
    • v.12 no.4
    • /
    • pp.277-285
    • /
    • 2018
  • Patients administered radioisotope for medical purposes are regulated by each country to quarantine them until their body's radioactivity contents decrease below release criteria. To predict the quarantine period and provide it to medical staffs and patients, it is necessary to approach the assessment of the exposure dose of persons due to patients in a realistic manner. For this purpose, a whole-body effective half-life should be applied to the dose assessment equation instead of the physical half-life. In this study, we constructed a bio-kinetic model for each nuclear species based on the ICRP publication to obtain a whole-body effective half-life of 10 unsealed gamma-ray emitting nuclei from the notification of Nuclear Safety and Security Commission, and calculated the effective half-life mathematically by simulating the distribution of the radioisotope administered in the whole body as well as each organ scale. The whole-body effective half-life of $^{198}Au$, $^{67}Ga$, $^{123}I$, $^{111}In$, $^{186}Re$, $^{99m}Tc$, and $^{201}TI$ were 1,93, 2.57, 0.295, 2.805, 1.561, 0.245, and 2.397 days respectively. However, it was found to be undesirable to offer a single value of the effective half-life of $^{125}I$, $^{131}I$, and $^{169}Yb$ because the changes in the effective half-life show no linearity. A bio-kinetic model created for the internal exposure assessment has been shown to be possible to calculate the effective half-life of radioisotopes administered in the patient's body, but subsequent studies of radiolabeled compounds are required as well.

Exhaustion of Social Workers for Organizational Effectiveness for the Fusion Age: Mediation Effectiveness of Empowerment (융합시대를 위한 사회복지사의 소진이 조직효과성에 미치는 융합연구 : 임파워먼트의 매개효과)

  • Kim, San Yong
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.361-366
    • /
    • 2018
  • In this study, 200 social workers in Seoul and Gyeonggi area were surveyed using convenience extraction method. Data were analyzed by frequency, reliability, correlation, and regression analysis using IBM SPSS Statistics 20, and Sobel test was performed. The purpose of this study was to investigate the effects of empowerment on the relationship between exhaustion and organizational effectiveness of social workers and to provide basic data for improving organizational effectiveness. The results of the study are as follows. Empowerment was found to be mediated in the relationship between exhaustion and job satisfaction, which is a sub - area of organizational effectiveness. Empowerment was found to be mediated in the relationship between exhaustion and turnover intention, which is a sub - domain of organizational effectiveness. Therefore, it is necessary to have a resting place that gives a sense of security to the exhausted social worker rather than granting authority for the social welfare organization.