• Title/Summary/Keyword: 기업간 네트워크

Search Result 647, Processing Time 0.03 seconds

Blockchain-based Important Information Management Techniques for IoT Environment (IoT 환경을 위한 블록체인 기반의 중요 정보 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.30-36
    • /
    • 2024
  • Recently, the Internet of Things (IoT), which has been applied to various industrial fields, is constantly evolving in the process of automation and digitization. However, in the network where IoT devices are built, research on IoT critical information-related data sharing, personal information protection, and data integrity among intermediate nodes is still being actively studied. In this study, we propose a blockchain-based IoT critical information management technique that is easy to implement without burdening the intermediate node in the network environment where IoT is built. The proposed technique allocates a random value of a random size to the IoT critical information arriving at the intermediate node and manages it to become a decentralized P2P blockchain. In addition, the proposed technique makes it easier to manage IoT critical data by creating licenses such as time limit and device limitation according to the weight condition of IoT critical information. Performance evaluation and proposed techniques have improved delay time and processing time by 7.6% and 10.1% on average compared to existing techniques.

Implement of High Available Replicate Systems Based on Cloud Computing (클라우드 컴퓨팅 기반의 고가용성 복제시스템의 구현)

  • Park, Sung-Won;Lee, Moon-Goo;Lee, Nam-Yong
    • 전자공학회논문지 IE
    • /
    • v.48 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • As business management has a high level of dependence on Informational Technology (IT), protecting assets of a company from disaster is one of the most important thing that IT operating managers should consider. Because data or information is a major source of operation of the company, data security is the first priority as an aspect of continuity of business management. Therefore, this paper will realize disaster recovery system, which is suspended because of disaster, based on cloud computing system. Realized High Available Replicate System applied a method of multi thread target database to improve Replicate performance, and real time synchronize technology can improve efficiency of network. From Active to Active operation, it maximizes use of backup system, and it has a effect to disperse load of source database system. Also, High Available Replicate System realized consistency verification mechanism and monitoring technique. For Performance evaluation, High Available Replicate System used multi thread method, which shows more than threefold of replicate performance than single thread method.

Educational Development Plans to Strengthen the Competitiveness of Small Business (소상공인 경쟁력 강화를 위한 교육 발전 방안)

  • Lee, In-Hoi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5576-5585
    • /
    • 2013
  • The purpose of this study was to suggest educational development plans that should provide better small business education by solidifying it and maximizing its effectiveness in order to reinforce the competitiveness of small business. As the results of the analysis, 15 essential tasks were suggested. The conclusions drawn from the study were as follows: First, SEDA should establish a practical road map in a long-term basis, and precede small business education by coping with social changes. Second, SEDA should expand the inclusive capacity that builds comprehensively and nationally the network with EHRD, its local branches and Small Business Centers. Third, it was quite suggestive that SEDA should follow up one of major strategies, that is optimizing curriculum, by developing proper curriculum based on small business life cycle and approaching it in a systematic way.

A Comparison of Determinant Factors of the Entrepreneurial Intention among Korean and Chinese Students (한국과 중국 대학생의 창업의지 결정요인 비교분석)

  • Lee, Ji Seok;Xu, Da Peng
    • Asia-Pacific Journal of Business
    • /
    • v.1 no.2
    • /
    • pp.65-81
    • /
    • 2010
  • This paper examines factors like career orientation, social & cultural perception and self-efficacy that influence on entrepreneurial intention of college students, and also comparison of determinant factors of the entrepreneurial intention among Korean and Chinese students. First, in terms of technical competence orientation, security orientation, autonomy orientation, Korean students showed higher than Chinese students, while Korean students showed lower entrepreneurial creativity orientation. In terms of corporate image and entrepreneurial intention, Korean students showed lower than Chinese students. Second, entrepreneurial creativity orientation out of career orientation among Korean and Chinese Students had significant positive effects on entrepreneurial intention, while security orientation had marginally negative effects on entrepreneurial intention. Entrepreneurial self-efficacy and corporate image had the positive effects on entrepreneurial intention together. The Chinese students, however, had the positive effects in network environment for analysis in this study only.

  • PDF

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

Research On The Influence of We-Chat Applet On Improving User Experience

  • Liao, Kai;Wang, Junlin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.221-227
    • /
    • 2021
  • Since there are almost no scales for measuring the size of We-Chat applets, and most of the existing We-Chat applets are grafted through the original APP application, At present, the application scope of We-chat applets which is mainly in /shopping/life/food application. Thus, the purpose of this research is to focus on the iPhone app store, collect data on the top five of APP-STORE through users' comments and The high-frequency words will be obtained for statistics, and the variables of this study will be set up. Last, develop relevant Empirical research on the size and measurement scale of the We-Chat applet. Therefore, how to use We-Chat applets to improve user experience, we can create their own user private domain traffic for We-Chat applets and achieve long-term market competitiveness.

Suggestion of Platform Valuation Method for Establishment of Platform Regulatory Standards (플랫폼 규제 기준 선정을 위한 플랫폼 가치 평가 방법 제언)

  • Lee, Chang-hyun;Park, Un-chan;Lee, Sang-myung
    • Journal of Venture Innovation
    • /
    • v.5 no.2
    • /
    • pp.101-110
    • /
    • 2022
  • It is easy for first movers of platform business model to monopolize the market due to the platform's own characteristics such as network effect and flywheel strategy. Accordingly, the regulations on platform operators are constantly being discussed in the recent monopoly regulation arguments, but the concrete regulations have not been settled worldwide. This is because there is no clear consensus on the valuation method which can objectively identify dominant platform firms from the others. This study suggested a platform valuation method based on the Tobin's Q theory, by measuring the moderating effect of the existence of specific scale of platform on the relationship between replacement cost and market valuation. Our method can not only be a standard for settling monopoly regulation by converging the regulation targets, but also contribute to active investment on the new platform firms by evaluating their potential growths quantitatively.

A Study on Energy Saving and Safety Improvement through IoT Sensor Monitoring in Smart Factory (스마트공장의 IoT 센서 모니터링을 통한 에너지절감 및 안전성 향상 연구)

  • Woohyoung Choi;Incheol Kang;Changsoo Kim
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.117-127
    • /
    • 2024
  • Purpose: The purpose is to conduct basic research to save energy and improve the safety of manufacturing plant infrastructure by comprehensively monitoring energy management, temperature, humidity, dust and gas, air quality, and machine operation status in small and medium-sized manufacturing plants. Method: To this end, energy-related data and environmental information were collected in real time through digital power meters and IoT sensors, and research was conducted to disseminate and respond to situations for energy saving through monitoring and analysis based on the collected information. Result: We presented an application plan that takes into account energy management, cost reduction, and safety improvement, which are key indicators of ESG management activities. Conclusion: This study utilized various sensor devices and related devices in a smart factory as a practical case study in a company. Based on the information collected through research, a basic system for energy saving and safety improvement was presented.

A Case Study on the Internal and External Use of Information Sharing Network: A Qualitative Approach (정보공유 네트워크의 조직 내외부 활용에 관한 사례 연구: 질적 연구를 바탕으로)

  • Kim, Jonghyuk;Kim, Suk-Chul
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.205-226
    • /
    • 2016
  • As knowledge workers have increased and information interchanges become more diverse, only the resources of internal enterprise is not longer useful, and the practical use of external information through information public sharing network is even more crucial. But, few studies that use both internal and external information sharing systems together have been conducted. In this research, we carried on the depth interview to analyze the main factors that intend to utilize outside information as well as to share inside information voluntarily. In conclusion, sharing internal information is directly involved with the performance of their job exchanging simple data, past documents, and technical materials. On the other hand, using the external information belonged to several other organizations is mostly caused by the voluntary participants' satisfaction sharing their individual experience through the network systems. Based on the study, we propose the idea that can activate both internal and external information sharing network through the system with user feedback function regarding the customized information, and with the space expansion where people can freely raise their private opinion. We also introduce the plan of the construction of communication systems with various experts, and the development of compatible devices with diverse interfaces.

  • PDF