• Title/Summary/Keyword: 기업정보 센터

Search Result 510, Processing Time 0.028 seconds

Study on the Model Construction and Route Re-arrange for Logistics Cost Reduction - Case Study of P company - (물류원가절감을 위한 모델구축과 경로 재설치에 관한 연구 - p사의 사례연구를 중심으로 -)

  • Lee, Jeong-Eun;Park, Sang-Bong
    • Management & Information Systems Review
    • /
    • v.33 no.4
    • /
    • pp.39-48
    • /
    • 2014
  • In order that a company may reduce expense, according to companies' income statement, the largest amount of money is set to total sales amount, and the next is the sales cost. The method of reducing the sales cost is the common and it is important to take down a unit price at the time of purchase, or to reduce inventory cost. In this research, the cost reduction model for logistics cost reduction is built using the real data of P company, and in order to verify the validity of a model, logistics cost is calculated through a simulation. A real logistics cost is compared with the logistics cost through logistics route rearrange of the proposal model. It will become an opportunity which analyzes the logistics expense of P company through this research, and can be solved in search of the problem of logistics system.

  • PDF

A Study of the Priority of the Local-Logistics Policy in the Incheon Metropolitan City (인천광역시 지역물류정책의 우선순위에 관한 연구)

  • Roh, Kyoung-Joon;Song, Sang Hwa
    • Journal of Korea Port Economic Association
    • /
    • v.32 no.1
    • /
    • pp.59-77
    • /
    • 2016
  • This paper reviews the current local logistics policy of the Incheon Metropolitan City and prioritizes policy agenda based on fuzzy AHP and IPA (Importance Performance Analysis). The analysis recommends that the city needs to keep up the current good works at the policy agenda such as early expansion of the international logistics hub and improvement of the provincial highway network.The policy agenda including the logistics parks, the transport networks and the hinterland activities are evaluated as overkilled agenda. Revitalization of the logistics database, establishment of an integrated business support center, modal shift, and public logistics support were classified as low-priority policy agenda. The policy agenda of urgent concentration includes development of new logistics business and air cargo industry.

A Study on Improvement of Cyber Security Framework for Security Operations Center (보안관제 조직을 위한 사이버보안 프레임워크 개선에 관한 연구)

  • Cho, Changseob;Shin, Yongtae
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.111-120
    • /
    • 2019
  • As cyber-attacks become more intelligent and sophisticated, the importance of Security Operations Center(SOC) has increased and the number of SOC has been increasing. In order to cope with cyber threats, institutions and organizations use a variety of cyber security standards to create business procedures. However, SOC often need to be improved in accordance with the SOC environment because they collaborate with managed security service specialists rather than their own personnel. The NIST cyber security framework, information security management system, and managed security service companies were compared and analyzed. As a result, it was found that the NIST CSF is a framework that is easy to apply to managed security service, The content was judged to be insufficient. Therefore, in this study, NIST CSF was used as a reference model to derive the management items required for SOC environment, and the necessity, importance and ease of each item were confirmed through an Delphi technique and an improved cyber security framework was proposed.

The Composition and Analytical Classification of Cyber Incident based Hierarchical Cyber Observables (계층적 침해자원 기반의 침해사고 구성 및 유형분석)

  • Kim, Young Soo;Mun, Hyung-Jin;Cho, Hyeisun;Kim, Byungik;Lee, Jin Hae;Lee, Jin Woo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.139-153
    • /
    • 2016
  • Cyber incident collected from cyber-threat-intelligence sharing Center is growing rapidly due to expanding malicious code. It is difficult for Incident analysts to extract and classify similar features due to Cyber Attacks. To solve these problems the existing Similarity Analysis Method is based on single or multiple cyber observable of similar incidents from Cyber Attacks data mining. This method reduce the workload for the analysis but still has a problem with enhancing the unreality caused by the provision of improper and ambiguous information. We propose a incident analysis model performed similarity analysis on the hierarchically classified cyber observable based on cyber incident that can enhance both availability by the provision of proper information. Appling specific cyber incident analysis model, we will develop a system which will actually perform and verify our suggested model.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

Planning Future Technology Strategies Using Patent Information Analysis and Scenario Planning: The Case of Fuel Cells (특허정보분석과 시나리오 플래닝을 이용한 미래기술전략의 수립: 연료전지의 사례를 중심으로)

  • Yoon, Jang-Hyeok;Choi, Sung-Chul
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.169-197
    • /
    • 2012
  • Patents are an up-to-date and reliable source of technological knowledge, and thus patent analysis has been considered to be a necessary step for identifying evolving technological trends and planning technology strategies. Although there exist many research papers and technical reports concerning patent analysis, few empirical studies on planning technology strategies for uncertain futures from a national or company perspective have been rarely conducted. Therefore, this paper aims presenting a procedure and its practical case of planning future technology strategies by incorporating patent analysis and scenario planning. Using patents related to polymer electrolyte membrane fuel cells, this paper developed technology strategies corresponding to future scenarios. We expect that the proposed method and case study can assist knowledge services of experts in the long-term technology strategy planning process.

The Design Research on ICT Security Concepts and Domains (ICT기반 보안개념 정의와 범위에 관한 설계연구)

  • Minseo Jeon;Hangbae Chang
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.49-61
    • /
    • 2019
  • As the number of security incidents and damages increase steadily, interest in the security of society is growing, and the amount of academic interest and research is steadily increasing. However, despite these concerns and the quantitative increase in research, the terms 'security' and 'safety' have been mixed and studies have been conducted without the conceptual definition of various security terms being clearly defined. As a result, various forms of security concepts based on ICT environments have been misused. Therefore, we tried to derive the consensus of experts among the various security terms which are mixed in this study, and to summarize the concepts based on the analysis of domestic and foreign documents based on the concept of the terms. Through this research, we intend to contribute to the establishment of the academic identity of security by preventing related mistakes caused by the mixed use of terminology.

The Core Elements and Implementation Strategy for Adopting Smart Work (효과적 스마트워크 도입을 위한 핵심요소 및 구현 전략)

  • Lee, Un-Kon;Choi, Jeawon
    • Information Systems Review
    • /
    • v.14 no.2
    • /
    • pp.65-92
    • /
    • 2012
  • Smart work, which is defined as work performed at home, satellite offices or with the smart devices to continually collaborate with the co-workers in anytime, anywhere using IT, is attracting much attention as an alternative work way to cope with the demographical changes of the low fertility and aging. Whereas some implementation cases of smart work have been considered as the success, the other cases have been reported as the failure to implement smart work practices. Nevertheless, there are few researches to identify the reasons of successful ways to adopting smart work. This study integrated the IT-based changes with the smart work practices to identify the critical success factors of smart work in individual, organization and industry levels. As the results, we found out the expected values of introduction, core elements of implementation, and industry characteristics to efficient adoption for smart work. Also, this study compared these evidences with the incumbent smart work policies. The contributions of this study is to develop the guideline to adopting smart work, the smart work implementation strategy and the improvement on the business process.

  • PDF

Content Analysis of News Coverage on Games after the Inclusion of Gaming Disorder in ICD-11 (WHO의 게임 이용 장애 질병 코드화 이후 언론의 게임 보도에 대한 내용 분석)

  • Lee, Sook-Jung;Youk, Eun-Hee
    • Journal of Korea Game Society
    • /
    • v.21 no.3
    • /
    • pp.91-106
    • /
    • 2021
  • This study examined how news has covered games since the decision to include gaming disorder in ICD-11. Data were 694 news article on games in five major newspapers. The results indicated the following: While the proportion of reports on game industry was high, those reports were mainly straight news announcing industry status and corporate management status. Reports on game policy focused on regulations, particularly game addiction or disorder. Reports on game uses and effects showed very low rates, but they have followed the existing practices of reporting games as the cause of extreme crimes and deviant behaviors.

Does the ICT Investment of Firms Create Jobless Growth? (기업의 ICT투자가 '고용 없는 성장'을 이끄는가?)

  • Sim, Jae-yoon;Lee, Jongho;Park, Su-Ho;Jung, Woo-Jin
    • Knowledge Management Research
    • /
    • v.20 no.3
    • /
    • pp.1-16
    • /
    • 2019
  • Jobless Growth, one of the most issue keywords for Korea's economy at this moment, stands for an economic situation where the unemployment rate once edging up at the downturn does not fall sharply even after a business cycle is on the stage of its recovery. A remarkable progress of ICT has intensified the apprehension of technology displacing human labor. A remarkable progress of ICT has intensified the apprehension of technology displacing human labor historically. Nowadays, ICT as the main cause for recent jobless growth in Korea ends up with pointing out. This study is to investigate whether the ICT leads to an economic situation of jobless growth. We served an empirical analysis using firm-level panel data from 2009 to 2013 and estimated the effects of ICT on both firm's employment and productivity. A result suggests not only does the employment increase with the rise of ICT investment, but also the employment becomes a complete mediator in terms of linking ICT and firm's productivity. It turns out to be a groundless fear that the ICT rules out human labor causing jobless growth for Korea's economy according to the result revealed.