• 제목/요약/키워드: "information governance"

검색결과 610건 처리시간 0.031초

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

목적인지를 반영한 협업 분류 모델 제안 (Proposing Collaboration Classification Model considering Collaboration Purpose Recognition)

  • 주정은;구상회
    • 디지털산업정보학회논문지
    • /
    • 제10권2호
    • /
    • pp.203-211
    • /
    • 2014
  • In recent highly competitive business environment, collaboration has become one of the important business strategies for companies to survive and/or prosper. There are many different types of collaboration strategies, and it is crucial for companies to select the right ones according to the types of collaboration they require. To select the right type of collaboration options for business, in the past research, there have been two important criteria to classify collaboration types, namely governance (who makes key decisions - one kingpin participant or all players?) and membership (can anyone participate, or just select players?). In this research, we add a new classification criterion, recognition of collaboration purpose, which means whether collaborators know or do not know the purpose of collaboration in advance. Recently, we see many cases in which social media data are used in many unknown purposes a priori. In this research, we add such cases to develop new classification model.

Relationship between SOA Adoption and Performance of IT Organizations

  • Niknejad, Naghmeh;Ghani, Imran;Hussin, Ab Razak Che;Jeong, Seung Ryul
    • 인터넷정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.173-180
    • /
    • 2016
  • SOA has been adopted by enormous number of organizations world-wide. This study has investigated significant factors which affect SOA adoption in positive and negative manner. Unlike the previous similar studies, where they focused on qualitative analysis for SOA adoption, this study conducted a quantitative analysis to investigate the relationship between the adoption of SOA and the performance of IT organizations. In order to conduct the research, an online questionnaire was created and distributed among SOA experts through the social networking platform of professionals, LinkedIn. Total one hundred and four (104) respondents from thirty (30) different countries participated in this study. The results of this study indicate that there are both positive and negative influences upon SOA adoption. The positive influences includes: governance, strategy, culture and communication, business and IT alignment and ROI; whereas complexity, security concerns, and costs have negatively affected SOA adoption.

중국 물류네트워크의 생산성과 한국의 글로벌통상전략 (Productivity on the Chinese Logistics Network and Korean Economic Strategy)

  • 최용록
    • 통상정보연구
    • /
    • 제9권1호
    • /
    • pp.259-274
    • /
    • 2007
  • The paradigm of the global logistics network has been rapidly changing from traditional concept of productivity in cost terms, toward the new characteristics of innovative productivity in terms of economies of scale, economies of scope, and economies of network. As the ship or airplane becomes larger and speedier, the less logistics hub required. The more diverse logistics parties integrate each other horizontally or vertically, the higher synergy effects they get. The more systematic concurrent engineering available for global supply chain management such as Korean manufacturers in China, the higher productivity they get. The paper analyzes these three paradigms of logistics into the application for the Korean manufacturers in China and concludes that the Korean government, the companies in China should be more focused on the governance of the logistics and the intermediary such as the 4th party logistics(4PL) is definitely developed its role and functions based on three paradigms above mentioned.

  • PDF

정보보호관리 통제를 위한 프레임워크 개발 (A Conceptual Framework for InfoSec Management Governance)

  • 김정덕;나태준
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2001년도 종합학술발표회논문집
    • /
    • pp.331-334
    • /
    • 2001
  • 본 논문에서는 현재 그 중요성이 증가하고 있는 정보보호관리체계에 대하여 기존의 국내·외 정보보호관리체계 지침이나 표준 문서들이 단지 일반적인 가이드라인을 제공 할 뿐, 평가나 측정, 혹은 인증을 위해 필요한 상세하고 객관적인 지표가 없다는 점을 파악하고, 이러한 주요 지표들을 개발하기 위한 프레임워크를 제시하고자 한다. 이 프레임워크는 정보보호관리 국제 표준인 ISO/IEC TR 13335 GMITS에서 정의하고 있는 정보보호관리 프로세스를 기준으로 적절한 정보보호관리 프로세스를 도출한 다음, 현재 정보기술 통제 기준으로 사용중인 COBIT의 각 주요 지표들을 위에서 도출된 프로세스별로 적용시키는 것이다. 즉 정보보호관리 프로세스별 주요목표지표(KGI - Key Goal Indicator), 주요성과지표(KPI - Key Performance Indicator), 그리고 핵심성공요소(CSF - Critical Success Factor)들을 개발하여 정보보호관리체계에 대한 상세하고 객관적인 평가와 측정을 가능하게 하고 이를 통해 총체적인 정보보호관리 통제 이룩하고자 한다.

  • PDF

A Study on the Corporatee Governance Structure for-Profit Hospital -Focusig specially on the outside Director in Commercial Code-

  • Jeun, Young-Ju;Lee, Hye-Seung
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권12호
    • /
    • pp.173-178
    • /
    • 2016
  • In this paper many discussions are raised regarding the outside director system in order to establish the position of the outside director within institutional organizations and to review ways to activate the outside director system in for-Profit Hospital. it seems to be more desirable in Korea for each company to establish an efficient system by itself in accordance with suggested guidelines suitable for each for-Profit Hospital management circumstances rather than to apply a unilateral outside director system to for-Profit Hospital through legalization. In this regard, while keeping the current outside director system for the time being, it is necessary to review and improve the management status of companies and the usefulness of the system, and various recommendations from lawyer associations, Hospital business associations, and academia should be allowed rather than just for-Profit Hospital recommendation by the government.

Co-creation의 개념적 고찰 및 연구과제 (Co-creation: Overview and Research Agenda)

  • 홍순구;이현미;임성배;김나랑
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제23권1호
    • /
    • pp.203-223
    • /
    • 2014
  • Co-creation is a new business strategy that creates "mutual value" for both the firm and the consumer through active collaboration among stakeholders. This includes a broader range of participants compared to the traditional environment. Co-creation is currently being applied to a wide range of fields such as marketing, manufacturing, governance, and other disciplines. With a growing interest in co-creation, it is vital to establish a clearly define concept of what co-creation is and what it encompasses. Therefore, the goal of this study is to define the concept of co-creation, to discover current research trends within this area, and to suggest a future research agenda. For this study extensive literature review on co-creation was carried out, adding this paper to the body of co-creation research as a pioneer study.

IT 거버넌스 의사결정체계 분석에 관한 사례연구 (A Case Study Analysis of Decision-making Structure on IT Governance Activities;Focused on the Korean Service Company)

  • 장덕화;이정훈
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2005년도 추계학술대회
    • /
    • pp.487-495
    • /
    • 2005
  • 최근 기업들의 IT 의존도가 커지는 동시에 시스템 간과 비즈니스 프로세스와의 연계성 및 통합의 관점이 중요해짐에 따라 다양한 IT 서비스와 자산들을 효과적으로 관리하기 위한 IT 거버넌스 활동의 중요성이 대두되고 있다. 이러한 기업자원의 일원인 정보자산의 중요성이 증대되고 있는 반면에, 국내 IT 거버넌스의 활동에 대한 연구 및 사례가 부족하여, 국내 기업환경에 기반한 IT 거버넌스 연구의 필요성이 요구되고 있다. 본 연구의 목적은 IT 거버넌스와 관련된 다양한 활동들을 체계적으로 분석함으로써, 국내기업의 성공적인 IT 거버넌스의 구현 및 운영을 위한 향후 시사점과 발전방향을 제시할 수 있는 사례분석 프레임워크를 제시하여 국내 기업의 IT 거버넌스 현황 파악에 연구목적을 두었다. 본 연구를 통해 국내 기업의 IT 거버넌스 활동 의사결정 체계와 성공적인 IT 거버넌스 수행을 위한 시사점 및 활동방안을 제시하며 향후 IT 거버넌스를 파악하고 분석하기 위한 평가척도 및 Reference 역할로 활용하는데 그 의의를 두고 있다.

  • PDF

대한민국 상장기업의 대주주 네트워크 분석 (Network Analysis of Corporate Governance using Relationship among Major Shareholders in Stock Market)

  • 문혜정;윤덕찬
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.668-671
    • /
    • 2015
  • 이 논문은 대한민국의 주식시장에 상장한 기업의 지배구조 분석을 위해 대주주가 어떠한 형태로 주식을 보유하고 있는지에 대한 네트워크 분석이다. 분석대상은 주식시장에 상장한 기업과 그 기업의 주식의 대주주 데이터를 모두 수집하였다. 이를 기업과 대주주 행위자 간에 주식을 보유하고 있는 네트워크를 분석하여 그 보유형태의 의미를 파악하였다. 분석결과 네트워크 형태는 크게 '전체분석, 산업분석, 군집분석, 상장기업분석, 대주주분석, 계열사 분석' 여섯 가지이다. 네트워크 분석결과 주식시장은 전형적인 척도 없는 네트워크 형태를 나타내었으며 반면 그룹간의 계열사 네트워크는 전형적인 계층구조로써 좁은 세상 네트워크의 사례를 나타내었다. 따라서 투자 성향이 갖거나 대주주 간의 이해관계가 있거나 투자상품들이 포트폴리오로 조합원 경우 대주주 간의 네트워크가 밀집된 것을 확인할 수 있었다.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost