• Title/Summary/Keyword: 시스템 상호작용

Search Result 2,734, Processing Time 0.036 seconds

A Study of Power Perception between Supplier and Retail Buyer of Agricultural Products (농산물공급자와 대형소매업체 바이어간의 상호 파워 인식에 대한 연구)

  • 서성무;이은정
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2003.02a
    • /
    • pp.123-166
    • /
    • 2003
  • Marketing channel is recognized as one of the society systems which have the character of functional organization. These organizations are related to each other for specialized and cooperative work. Channel members in distribution channel are striving to accomplish exchange through reciprocal action. Thus channel members exercise their power to take better position in exchange. There will be struggling between members about satisfaction and conflict during this power exercise. Now a days, buyers use more harsh power as large retail firms are increasing. This phenomenon is occurring in the distribution channel. However, there will be different phenomenon in case of agricultural products. Not like industrial product suppliers, agricultural product suppliers have various supply channels and many agricultural products are seasonal. It has also unstable amount supplies. There should be differentiated marketing in agricultural products. Relatively weaker powered suppliers have to strengthen comparative factors and also have to be technically specialized through assessed experience in order to establish strong product sales chain. Making a brand of agricultural product would be also a good idea to increase the product comparability. Channel members need to be recognized their specialized functions in order to make balanced distribution channel. There have to be conversion of concept of relation between suppliers and buyers from subordinate relationship to cooperative relationship.

  • PDF

Emulsion Liquid Membrane Transport of Heavy Metal Sons by Macrocyclic Carriers (거대고리 운반체에 의한 중금속이온의 에멀죤 액체막 수송)

  • 정오진
    • Journal of Environmental Science International
    • /
    • v.4 no.2
    • /
    • pp.223-232
    • /
    • 1995
  • New two macrocyclic compounds using as carriers of liquid emulsion menbrame, have been synthesized. These reuslts provide evidance for the usefulness of the theory in designing the systems. The efficiency of selective transport for heavy metal ions have been discussed from the membrane systems that make use of $SCN^-$,<>,$I^-$,CN- and $Cl^-$ ion as co-anions in source phase and make use of $S_2O_3^{2-}$ and $P_2O_7^{4-}$ ion as receiving phase, respectively. The transport rate of M(II) was highest when a maximum amount of the M(II) in the source phase was present as$Cd(SCN)_2$$(P[SCN^-]= 0.40M)$, $Hg(SCN)_2([SCN^-]=0.40M)$ and Pd(CN)$([CN^-]= 0.40M)$. The Cd(II) and Pb(II) over each competitive cations were well transprted with 0.3M-S2032- and 0.3M-P2O74-, respectively in the receiving phase. Results of this study indicate that two criteria must be met in order to have effective macrocycle-mediated transport in these emulsion system. First one must effective extraction of the $M^{n+}$ into the toluene systems. The effectiveness of this extraction is the greatest if locK for $M^{n+}$macrocycle interaction is large and if the macrocycle is very insoluble in the aqueous phase. Second, the ratio of the locK values (or Mn+-receiving phase ($S_2O_3^{2-}$- or $P_2O_7^{4-}$) to $M^{n+}$-macrocycle (($L_1$이나 $L_2$) interaction must be large enough to ensure quantitative stripping of Mn+(($Cd^{2+}$,$Pb^{2+}$)at the toluene receiving Phase interface. $L_1$(3.5-benzo-10,13,18,21-tetraoxa-1,7,diazabicyclo(8,5,5) eicosan) forms a stable ($Cd^{2+}$ and >,$Pb^{2+}$ complexes and $L_1$ is very insoluble in water and its $Cd^{2+}$ and >,$Pb^{2+}$ complex is considerably less stable than $Cd^{2+}$-(S2O3)22- and $Pd^{2+}-P_2O_7^{4-}$ complexes. On the other hand, the stability of the $Hg^{2+}$)+-$L_1$( complex exceed that of the $Hg^{2+}$- (S2O3)22- and Hg2+-P2O74-, and the distribution coefficient of $L_2$(5,8,15,18,23,26-hexaoxa-1,12- diazabicyclo-(10,8,8) octacosane) is much smaller than that of $L_1$. Therefore, the partitioning of Lr is favored by the aqueous receiving Phase, and little heavy metal ions transport is seen despite the large logK for $Hg^{2+}$+-$L_1$ and $Mn^+$($Cd^{2+}$+, $Pb^{2+}$+ and $Hg^{2+}$)-$L_2$ interactions. Key Words : macrocycles, transport, heavy metal, co-anion, source phase, receiveing, complex separation, interaction, destribution coefficient.

  • PDF

홍삼 유래 성분들의 면역조절 효능

  • Jo, Jae-Yeol
    • Food preservation and processing industry
    • /
    • v.8 no.2
    • /
    • pp.6-12
    • /
    • 2009
  • 면역반응은 외부 감염원으로부터 신체를 보호하고 외부감염원을 제거하고자 하는 주요항상성 유지기전의 하나이다. 이들 반응은 골수에서 생성되고 비장, 흉선 및 임파절 등에서 성숙되는 면역세포들에 의해 매개된다. 보통 태어나면서부터 얻어진 선천성 면역반응을 매개하는 대식세포, 수지상 세포 등과, 오랜기간 동안 감염된 다양한 면역원에 대한 경험을 토대로 얻어진 획득성 면역을 담당하는 T 임파구 등이 대표적인 면역세포로 알려져 있다. 다양한 면역질환이 최근 주요 사망률의 원인이 되고 있다. 최근, 암, 당뇨 및 뇌혈관질환 등이 생체에서 발생되는 급 만성염증에 의해 발생된다고 보고됨에 따라 면역세포 매개성 염증질환에 대한 치료제 개발을 서두르고 있다. 또한 암환자의 급격한 증가는 암발생의 주요 방어기전인 면역력 증강에 대한 요구들을 가중시키고 있다. 예로부터 사용되어 오던 고려인삼과 홍삼은 기를 보호하고 원기를 회복하는 명약으로 알려진 대표적인 우리나라 천연생약이다. 특별히, 홍삼은 단백질과 핵산의 합성을 촉진시키고, 조혈작용, 간기능 회복, 혈당강하, 운동수행 능력증대, 기억력 개선, 항피로작용 및 면역력 증대에 매우 효과가 좋은 것으로 보고되고 있다. 홍삼에 관한 많은 연구에 비해, 현재까지 홍삼이 면역력 증강에 미치는 효과에 대한 분자적 수준에서의 연구는 매우 미미한 것으로 확인되어져 있다. 홍삼의 투여는 NK 세포나 대식세포의 활성이 증가하고 항암제의 암세포 사멸을 증가시키는 것으로 확인되어졌다. 현재까지 알려진 주요 면역증강 성분은 산성다당류로 보고되었다. 또 한편으로 일부 진세노사이드류에서 항염증 효능이 확인되어졌으며, 이를 통해 피부염증 반응과 관절염에 대한 치료 효과가 있는 것으로 추측되고 있다 [본 연구는 KT&G 연구출연금 (2009-2010) 지원을 받아 이루어졌기에 이에 감사드린다]. 면역반응은 외부 감염물질의 침입으로 유도된 질병환경을 제거하고 수복하는 중요한 생체적 방어작용의 하나이다. 이들 과정은 체내로 유입된 미생물이나 미세화학물질들과 같은 독성물질을 소거하거나 파괴하는 것을 주요 역할로 한다. 외부로 부터 인체에 들어온 이물질에 대한 방어기전은 현재 두 가지 종류의 면역반응으로 구분해서 설명한다. 즉, 선천성 면역 반응 (innate immunity)과 후천성 면역 반응 (adaptive immunity)이 그것이다. 선천성 면역반응은 1) 피부나 점막의 표면과 같은 해부학적인 보호벽 구조와 2) 체온과 낮은 pH 및 chemical mediator (리소자임, collectin류) 등과 같은 생리적 방어구조, 3) phagocyte류 (대식세포, 수지상세포 및 호중구 등)에 의한 phagocytic/endocytic 방어, 그리고 4) 마지막으로 염증반응을 통한 감염에 저항하는 면역반응 등으로 구분된다. 후천성 면역반응은 획득성면역이라고도 불리고 특이성, 다양성, 기억 및 자기/비자기의 인식이라는 네 가지의 특징을 가지고 있으며, 외부 유입물질을 제거하는 반응에 따라 체액성 면역 반응 (humoral immune response)과 세포성 면역반응 (cell-mediated immune response)으로 구분된다. 체액성 면역은 침입한 항원의 구조 특이적으로 생성된 B cell 유래 항체와의 반응과 간이나 대식세포 등에서 합성되어 분비된 혈청내 보체 등에 의해 매개되는 반응으로 구성되어 있다. 세포성 면역반응은 T helper cell (CD4+), cytotoxic T cell (CD8+), B cell 및antigen presenting cell 중개를 통한 세포간 상호 작용에 의해 발생되는 면역반응이다. 선천성 면역반응의 하나인 염증은 우리 몸에서 가장 빈번히 발생되고 있는 방어작용의 하나이다. 예를 들면 감기에 걸렸을 경우, 환자의 편도선내 대식세포나 수지상세포류는 감염된 바이러스 단독 혹은 동시에 감염된 박테리아를 상대로 다양한 염증성 반응을 유도하게 된다. 또한, 상처가 생겼을 경우에도 감염원을 통해 유입된 병원성 세균과 주위조직내 선천성 면역담당 세포들 간의 면역학적 전투가 발생되게 된다. 이들 과정을 통해, 주위 세포나 조직이 손상되면, 즉각적으로 이들 면역세포들 (주로 phagocytes류)은 신속하게 손상을 극소화하고 더 나가서 손상된 부위를 원상으로 회복시키려는 일련의 염증반응을 유도하게 된다. 이들 반응은 우리가 흔히 알고 있는 발적 (redness), 부종 (swelling), 발열 (heat), 통증 (pain) 등의 증상으로 나타나게 된다. 즉, 손상된 부위 주변에 존재하는 모세혈관에 흐르는 혈류의 양이 증가하면서 혈관의 직경이 늘어나게 되고, 이로 인한 조직의 홍반과, 부어 오른 혈관에 의해 발열과 부종이 초래되는 것이다. 확장된 모세혈관의 투과성 증가는 체액과 세포들이 혈관에서 조직으로 이동하게 하는 원동력이 되고, 이를 통해 축적된 삼출물들은 단백질의 농도를 높여, 최종적으로 혈관에 존재하는 체액들이 조직으로 더 많이 이동되도록 유도하여 부종을 형성시킨다. 마지막으로 혈관 내 존재하는 면역세포들은 혈판 내벽에 점착되고 (margination), 혈관벽의 간극을 넓히는 역할을 하는 히스타민 (histamine)이나 일산화질소(nitric oxide : NO), 프로스타그린딘 (prostagladins : PGE2) 및 류코트리엔 (leukotriens) 등과 같은 chemical mediator의 도움으로 인해 혈관벽 사이로 삼출하게 되어 (extravasation), 손상된 부위로 이동하여 직접적인 외부 침입 물질의 파괴나 다른 면역세포들을 모으기 위한 cytokine (tumor necrosis factor [TNF]-$\alpha$, interleukin [IL]-1, IL-6 등) 혹은 chemokine (MIP-l, IL-8, MCP-l등)의 분비 등을 수행함으로써 염증반응을 매개하게 된다. 염증과정시 발생되는 여러 mediator 중 PGE2나 NO 및 TNF-$\alpha$ 등은 실험적 평가가 용이하여 이들 mediator 자체나 생성관련효소 (cyclooxygenase [COX] 및 nitric oxide synthase [NOS] 등)들은 현재항염증 치료제의 개발 연구시 주요 표적으로 연구되고 있다. 염증 반응은 지속기간에 따라 크게 급성염증과 만성염증으로 나뉘며, 삼출물의 종류에 따라서는 장액성, 섬유소성, 화농성 및 출혈성 염증 등으로 구분된다. 급성 염증 (acute inflammation)반응은 수일 내지 수주간 지속되는 일반적인 염증반응이라고 볼 수 있다. 국소반응은 기본징후인 발열과 발적, 부종, 통증 및 기능 상실이 특징적이며, 현미경적 소견으로는 혈관성 변화와 삼출물 형성이 주 작용이므로 일명 삼출성 염증이라고 한다. 만성 염증 (chronic inflammation)은, 급성 염증으로부터 이행되거나 만성으로 시작된다. 염증지속 기간은 보통 4주 이상 장기화 된다. 보통 염증의 경우에는 염증 생성 cytokine인 Th1 cytokine (IL-2, interferone [IFN]-$\gamma$ 및 TNF-$\alpha$ 등)의 생성 후, 거의 즉각적으로 항 염증성 cytokine인 Th2 cytokine(IL-4, IL-6, IL-10 및 transforming growth factor [TGF]-$\beta$ 등)이 생성되어 정상반응으로 회복된다. 그러나, 어떤 원인에서든 면역세포에 의한 염증원 제거 반응이 문제가 되면, 만성염증으로 진행된다. 이 반응에 주로 작용을 하는 염증세포로는 단핵구와 대식세포, 림프구, 형질세포 등이 있다. 암은 전세계적으로 사망률 1위의 원인이 되는 면역질환의 하나이다. 산화적 스트레스나 자외선 조사 혹은 암유발 물질들에 의해 염색체내 protooncogene, tumor-suppressor gene 혹은 DNA repairing gene의 일부 DNA의 돌연변이 혹은 결손 등이 발행되면 정상세포는 암화과정을 시작하게 된다. 양성세포 수준에서 약 5에서 10여년 후 악성수준의 암세포가 생성되게 되면 이들 세포는 새로운 환경을 찾아 전이하게 되는데 이를 통해 암환자들은 다양한 장기에 동인 오리진의 암세포들이 생성한 종양들을 가지게 된다. 이들 종양세포는 정상 장기의 기능을 손상시켜며 결국 생명을 잃게 만든다. 이들 염색체 수준에서의 돌연변이 유래 암세포는 거의 대부분이 체내 면역시스템에 의해 사멸되는 것으로 알려져 있다. 그러나 계속되는 스트레스나 암유발 물질의 노출은 체내 면역체계를 파괴하면서 최후의 방어선을 무너뜨리면서 암발생에 무방비 상태를 만들게 된다. 이런 이유로 체내 면역시스템의 정상적 가동 및 증강을 유도하게 하는 전략이 암예방시 매우 중요한 표적으로 인식되면서 다양한 형태의 면역증강 물질 개발을 시도하고 있다. 인삼은 두릅나무과의 여러해살이 풀로써, 오랜동안 한방 및 민간에서 원기를 회복시키고, 각종 질병을 치료할 수단으로 사용되고 있는 대표적인 전통생약이다. 예로부터 불로(不老), 장생(長生), 익기(益氣), 경신(經身)의 명약으로 구전되어졌는데, 이는 약 2천년 전 중국의 신농본초경(神農本草經)에서 "인삼은 오장(五腸)을 보하고, 정신을 안정시키고, 혼백을 고정하며 경계를 멈추게 하고, 외부로부터 침입하는 병사를 제거하여주며, 눈을 밝게 하고 마음을 열어 더욱 지혜롭게 하고 오랫동안 복용하면 몸이 가벼워지고 장수한다" 라고 기술되어있는 데에서 유래한 것이다. 다양한 연구를 통해 우리나라에서 생산되는 고려인삼 (Panax ginseng)이 효능 면에서 가장 탁월한 것으로 알려져 있으며 특별이 고려인삼으로부터 제조된 고려홍삼은 전세계적으로도 그 효능이 우수한 것으로 보고되어 있다. 대부분의 홍삼 약효는 dammarane계열의 triterpenoid인 ginsenosides라고 불리는 인삼 saponin에 의해 기인된 것으로 알려져 있다. 이들 화합물군의 기본 골격에 따라, protopanaxadiol (PD)계 (22종) 및 protopanaxatriol (PT)계 (10종)으로 구분되고 있다 (표 1). 실험적 접근을 통해 인삼의 약리작용 이해를 위한 다양한 노력들이 경주되고 있으나, 여전히 많은 부분에서 충분히 이해되고 있지 않다. 그러나, 현재까지 연구된 인삼의 약리작용 관련 연구들은 심혈관, 당뇨, 항암 및 항스트레스 등과 같은 분야에서 인삼효능이 우수한 것으로 보고하고 있다. 그러나 면역조절 및 염증현상과 관련된 최근 연구결과들은 많지 않으나, 향후 다양하게 연구될 효능부분으로 인식되고 있다.

  • PDF

Assessment of Seismic Site Response at Hongseong in Korea Based on Two-dimensional Basin Modeling using Spatial Geotechnical Information (공간 지반 정보를 활용한 이차원 분지 모델링 기반의 국내 홍성 지역에서의 부지 지진 응답 평가)

  • Sun, Chang-Guk
    • The Journal of Engineering Geology
    • /
    • v.19 no.1
    • /
    • pp.15-23
    • /
    • 2009
  • The site effects relating to the amplification of ground motion under earthquake loading are strongly influenced by both the subsurface soil condition and geologic structure. In this study, the site effects at the Hongseong area in Korea were examined by both the site investigation including borehole drilling and in-situ seismic tests and the site visit for acquiring geologic information of ground surface. Subsurface of Hongseong area with a major instrumental earthquake event in 1978 is composed of weathered layers of a maximum of 45 m thickness overlying bedrock. A geotechnical information system based on GIS framework was implemented to effectively find out spatial geologic structure of study area and it indicated Hongseong is a shallow and wide shaped basin. Two-dimensional finite element (FE) analyses for a representative cross-section of the Hongseong area were performed to evaluate seismic site responses. From the results of seismic responses, it was observed that the ground motions were amplified during the propagation of shear waves through the soil layer overlying the bedrock and the duration of shaking near the basin edges was prolonged due to the surface waves generated by interactions of shear waves with basin geometry. Furthermore, one-dimensional FE seismic response analyses were additionally conducted for soil sites selected in the basin, and it gives similar results to the two-dimensional seismic responses at most locations in the basin with the exception of the locations near the basin edges, because the basin in this study is very shallow and wide.

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

The Coastal Geomorphic System of Sagye, Jeju (제주 사계해안의 지형시스템)

  • Seo, Jong-Cheol;Son, Myoung-Won
    • Journal of the Korean association of regional geographers
    • /
    • v.13 no.1
    • /
    • pp.32-42
    • /
    • 2007
  • In Sagye coast of Andeok-myeon, southwestern Jeju, shore platform of noncohesive Hamori Formation, marine terrace deposit of round gravels, coastal dune composed of shell sand and volcanic sand, and back lake are linked closely with each other. In this paper, the formation process of Sagye coastal geomorphic system analysed by using OSL dating method is as follows: Firstly, Hamori Formation is a horizontal stratum filed up of tuff reworked by submarine volcanic eruption during 3$\sim$7.6 ka BP. Hollow at the boundary between Hamori Formation' flat and Kwangheak Basalt's gentle slope become a back lake when block is appeared over the sea level by uplift. Secondly, while Hamori Formation was laid below sea level, gravels which had been broken and abraded at southwestern rocky coast composed of Kwangheak basalt or been transported through the small stream from adjacent hillslope were deposited in rapid flow environment. Thirdly, deposition of round gravels was ceased by earth uplift, and shore platform was constructed by abrasion process of energy of swash moving forward. As altitude of shore platform is equal to high tidal level of spring tide, compared it with present high tidal level of study area, earth is uplifted about 105m since shore platform was formed. Fourthly, much sandy sediments transported from offshore bottom covered shore platforms and marine terrace deposits. Lighter sediments among sandy sediments was blown to back, formed secondary sand dune since about 500 year.

  • PDF

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

A Mathematics Tutoring Model That Supports Interactive Learning of Problem Solving Based on Domain Principles (공식원리에 기반한 대화식 문제해결 학습을 지원하는 수학교수 모형)

  • Kook, Hyung-Joon
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.429-440
    • /
    • 2001
  • To achieve a computer tutor framework with high learning effects as well as practicality, the goal of this research has been set to developing an intelligent tutor for problem-solving in mathematics domain. The maine feature of the CyberTutor, a computer tutor developed in this research, is the facilitation of a learning environment interacting in accordance with the learners differing inferential capabilities and needs. The pedagogical information, the driving force of such an interactive learning, comprises of tutoring strategies used commonly in various domains such as phvsics and mathematics, in which the main contents of learning is the comprehension and the application of principles. These tutoring strategies are those of testing learners hypotheses test, providing hints, and generating explanations. We illustrate the feasibility and the behavior of our propose framework with a sample problem-solving learning in geometry. The proposed tutorial framework is an advancement from previous works in several aspects. Firstly, it is more practical since it supports handing of a wide range of problem types, including not only proof types but also finding-unkown tpes. Secondly, it is aimed at facilitating a personal tutor environment by adapting to learners of varying capabilities. Finally, learning effects are maximized by its tutorial dialogues which are derived from real-time problem-solving inference instead of from built-in procedures.

  • PDF

Toward Developing An Enterprise Architecture Orientation Model: Mapping the Present and Future Enterprise Architecture from the Alignment and Integration Perspective (엔터프라이즈 아키텍처 지향 모델 개발: 연계와 통합 관점에서 본 엔터프라이즈 현재와 미래 아키텍처 사상)

  • Son, Jeong-Son;Juhn, Sung-Hyun
    • Information Systems Review
    • /
    • v.12 no.2
    • /
    • pp.1-23
    • /
    • 2010
  • Most enterprise information systems today are silo systems in that they are not properly aligned nor integrated with one another. Such silo systems result because enterprises lack an architectural perspective in the planning and development of the systems. This paper proposes an Enterprise Architecture Orientation Model as a framework for the analysis, planning and design of the architectural quality of enterprise information systems. The model decomposes enterprise architecture into two dimensions-alignment and integration, and specifies for each dimension the general development and evolution stages enterprises may traverse. The alignment dimension represents the vertical strategic alignment of the systems with the vision, mission, strategy and goals of the enterprise, and is analyzed in terms of the performance, capability, and strategy of the enterprise. The integration dimension, on the other hand, represents the horizontal and functional integration among the systems that span organizational functions and boundaries, and is analyzed in terms of such technological components as IT infrastructure, data, application, and business processes. The model combines the alignment and integration dimensions to form a two-dimensional conceptual space for mapping the architectural quality of the enterprise. It is proposed that an enterprise use the model to identify and understand its position now and in the future in the architectural quality of the enterprise information systems. It is also proposed that the model provides a tool for the planning and design of the transition from one stage to the next in the alignment and integration of the systems to reach an architectural maturity. At the end, the paper discusses how the model can be applied differently according to the strategic orientation of the enterprise. An example of the usage of the model is presented.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF