• Title/Summary/Keyword: 인텔리전스

Search Result 110, Processing Time 0.022 seconds

The Success Factors for Self-Service Business Intelligence System: Cases of Korean Companies (사용자 주도 비즈니스 인텔리전스 성공요인 고찰: 한국 기업 사례를 중심으로)

  • JungIm Lee;Soyoung Yoo;Ingoo Han
    • Knowledge Management Research
    • /
    • v.24 no.3
    • /
    • pp.127-148
    • /
    • 2023
  • Traditional Business Intelligence environment is limited to support the rapidly changing businesses and the exponential growth of data in both volume and complexity of data. Companies should shift their business intelligence environment into Self-Service Business Intelligence (SSBI) environment in order to make smarter and faster decisions. However, firms seem to face various challenges in implementing and leveraging the effective business intelligence system, and academics do not provide sufficient studies related including the success factors of SSBI. This study analyzes the three cases of Korean companies in depth, their development process and the assessment of business intelligence, based on the theoretical model on the key success factors of business intelligence systems. The comparative analysis of the three cases including project managers' interviews and performance evaluations provide rich implications for the successful adoption and the use of business intelligence systems of firms. The study is expected to provide useful references for firms to fully leverage the effects of business intelligence systems and upgrade towards self-service business intelligence systems.

Study on The Factors Influencing The Utilization of Next Generation Business Intelligence (차세대 비즈니스 인텔리전스도입을 위한 영향요인에 관한 연구)

  • Kim, Keun-Hyung;Kim, Jeong-Yun;Hyun, Jung-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1527-1538
    • /
    • 2008
  • There are growing needs of introducing Next Generation Business Intelligence into firm to strengthen competencies. Recently, Next Generation Business Intelligence appeared in the spotlight because it could support to connect the strategies establishment with enforcing the strategies. In this parer, we analyze the factors and build the theoretical model of influencing the utilization of Next Generation Business Intelligence. The practical implications were also discussed.

A Workflow-based Social Network Intelligence Discovery Algorithm (워크플로우 소셜네트워크 인텔리전스 발견 알고리즘)

  • Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.73-86
    • /
    • 2012
  • This paper theoretically derives an algorithm to discover a new type of social networks from workflow models, which is termed workflow-based social network intelligence. In general, workflow intelligence (or business process intelligence) technology consists of four types of techniques that discover, analyze, monitor and control, and predict from workflow models and their execution histories. So, this paper proposes an algorithm, which is termed ICN-based workflow-based social network intelligence discovery algorithm, to be classified into the type of discovery techniques, which are able to discover workflow-based social network intelligence that are formed among workflow performers through a series of workflow models and their executions, In order particularly to prove the correctness and feasibility of the proposed algorithm, this paper tries to apply the algorithm to a specific workflow model and to show that it is able to generate its corresponding workflow-based social network intelligence.

Topic Automatic Extraction Model based on Unstructured Security Intelligence Report (비정형 보안 인텔리전스 보고서 기반 토픽 자동 추출 모델)

  • Hur, YunA;Lee, Chanhee;Kim, Gyeongmin;Lim, HeuiSeok
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.33-39
    • /
    • 2019
  • As cyber attack methods are becoming more intelligent, incidents such as security breaches and international crimes are increasing. In order to predict and respond to these cyber attacks, the characteristics, methods, and types of attack techniques should be identified. To this end, many security companies are publishing security intelligence reports to quickly identify various attack patterns and prevent further damage. However, the reports that each company distributes are not structured, yet, the number of published intelligence reports are ever-increasing. In this paper, we propose a method to extract structured data from unstructured security intelligence reports. We also propose an automatic intelligence report analysis system that divides a large volume of reports into sub-groups based on their topics, making the report analysis process more effective and efficient.

BPAF2.0: Extended Business Process Analytics Format for Mining Process-driven Social Networks (BPAF2.0: 프로세스기반 소셜 네트워크 마이닝을 위한 비즈니스 프로세스 분석로그 포맷의 확장 표준)

  • Jeon, Myung-Hoon;Ahn, Hyun;Kim, Kwang-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1509-1521
    • /
    • 2011
  • WfMC, which is one of the international standardization organizations leading the business process and workflow technologies, has been officially released the BPAF1.0 that is a standard format to record process instances' event logs according as the business process intelligence mining technologies have recently issued in the business process and workflow literature. The business process mining technologies consist of two groups of algorithms and their analysis techniques; one is to rediscover flow-oriented process-intelligence, such as control-flow, data-flow, role-flow, and actor-flow intelligence, from process instances' event logs, and the other has something to do with rediscovering relation-oriented process-intelligence like process-driven social networks and process-driven affiliation networks from the event logs. The current standardized format of BPAF1.0 aims at only supporting the control-flow oriented process-intelligence mining techniques, and so it is unable to properly support the relation-oriented process-intelligence mining techniques. Therefore, this paper tries to extend the BPAF1.0 so as to reasonably support the relation-oriented process-intelligence mining techniques, and the extended BPAF is termed BPAF2.0. Particularly, we have a plan to standardize the extended BPAF2.0 as not only the national standard specifications through the e-Business project group of TTA, but also the international standard specifications of WfMC.

Study on Mitigation of Negative Damping Phenomenon and Improvement of Power Performance of a Floating Offshore Wind System Using Peak Shaving Control (피크쉐이빙 제어를 적용한 부유식 해상풍력시스템의 네거티브 댐핑 현상 완화 및 출력 성능 개선 연구)

  • Jungtae Kim;Jaehoon Son;Kwansu Kim;Hyeokjun Koh;Jongpo Park
    • Journal of Wind Energy
    • /
    • v.13 no.2
    • /
    • pp.13-22
    • /
    • 2022
  • In this study, the resonant motion of a floating offshore wind system due to negative damping was mitigated by peak shaving algorithms of the NREL ROSCO controller, and the decreased gains of the blade pitch controller by the gain detuning method for the floating system was increased to the gains of onshore baseline controller to improve the power performance of the turbine. To check the performance of the controller, the dynamic responses between the existing gain-detuned pitch controller and the ROSCO controller with peak shaving control for an OC4 floating offshore wind system were compared. As a result of DLC1.1 at near-rated wind speed, when peak shaving was applied, the average generator power decreased by 1.9%, but it was confirmed that the standard deviation was reduced and stability was improved with fast pitch regulation. In addition, since peak shaving reduces the maximum thrust of the rotor, was confirmed that not only are the loads of the blades and tower reduced, but the surge motion of the floater is also reduced, and the tension of the mooring lines is reduced.

사이버 위협 인텔리전스를 위한 TLS Fingerprinting 동향

  • Roh, Heejun
    • Review of KIISC
    • /
    • v.31 no.5
    • /
    • pp.13-19
    • /
    • 2021
  • 사이버 공격이 점점 복잡해지고 빠르게 진화하면서, 기존에 알려졌거나 향후 예견되는 위협에 대한 근거를 바탕으로 한 지식인 사이버 위협 인텔리전스(CTI)를 구축하고 공유하려는 노력이 최근 주목을 받고 있다. 특히, Transport Layer Security(TLS)와 같은 암호화 프로토콜을 활용해 암호화된 인터넷 트래픽이 증가하면서 패킷 페이로드(payload)의 분석이 어려워짐에 따라, 암호화된 네트워크 트래픽을 핑거프린팅(fingerprinting)하고 이 정보를 공유해 위협의 근거로 활용하고자 하는 시도들이 등장하고 있다. 본 논문에서는 최근에 제안된 주요 TLS 핑거프린팅 기법 및 이를 사이버 위협 인텔리전스 구축을 위해 데이터베이스화 하는 사례를 소개한다.

A Study on Automatic Detection and Extraction of Unstructured Security Threat Information using Deep Learning (딥러닝 기술을 이용한 비정형 보안 위협정보 자동 탐지 및 추출 기술 연구)

  • Hur, YunA;Kim, Gyeongmin;Lee, Chanhee;Lim, HeuiSeok
    • Annual Conference on Human and Language Technology
    • /
    • 2018.10a
    • /
    • pp.584-586
    • /
    • 2018
  • 사이버 공격 기법이 다양해지고 지능화됨에 따라 침해사고 발생이 증가하고 있으며, 그에 따른 피해도 확산되고 있다. 이에 따라 보안 기업들은 다양한 침해사고를 파악하고 빠르게 대처하기 위하여 위협정보를 정리한 인텔리전스 리포트를 배포하고 있다. 하지만 인텔리전스 리포트의 형식이 정형화되어 있지 않고 점점 증가하고 있어, 인텔리전스 리포트를 수작업을 통해 분류하기 힘들다는 문제점이 있다. 이와 같은 문제를 해결하기 위해 본 논문에서는 개체명 인식 시스템을 활용하여 비정형 인텔리전스 리포트에서 위협정보를 자동으로 탐지하고 추출할 수 있는 모델을 제안한다.

  • PDF

A Study on Data Quality Management in Business Intelligence Environments (비즈니스 인텔리전스 환경에서 변환 관리를 이용한 데이터 품질 향상에 대한 연구)

  • Lee, Choon-Yeul
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.65-77
    • /
    • 2004
  • Business intelligence assumes an integrated and inter-connected information resources. To manage an integrated database, we need to trace data transformation processes from its outset. For this purpose, this study proposes an extended Information Structure Graph that models data transformation steps in addition to data transformation structures. Using the graph, we can identify relationship among data entities and assign data quality measures to each nodes or arcs of a graph, thus eases management of data and enhancing their quality.

Does Cultural Intelligence enhance Export SME's Capability for Utilizing Foreign Market Informations? (문화 인텔리전스는 수출중소기업의 해외시장정보 활용능력을 키우는가?)

  • Hong, Songhon
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.127-152
    • /
    • 2017
  • One of the biggest challenges in export activities of SME is the increasingly cultural diversity that requires especially export managers to adapt their doing business in many different kinds of cross-cultural situations effectively. A relative newly developed concept 'Cultural Intelligence' has been evaluated as a key element for the success in international business activities. This study aims to investigate empirically the role of Cultural Intelligence(CQ), one component of cultural competence, on export marketing adaptation. The statistical method used to test the hypotheses was Structural Equation Modeling using PLS. The results of this study are follows. The moderating role of Cultural Intelligence between information seeking and information using abilities is more stronger in marketing rather than relationship adaptation. Cultural Intelligence moderates between them. Critical factors affecting Cultural Intelligence are also discussed; foreign language fluency, business travels in abroad, characteristics of the business travels, multi-lingual ability, pre-education related cultural subjects, and visit experience in foreign countries. Especially, export managers' foreign language ability leads to much stronger influence on cultural intelligence. The result of the empirical study provides important implications for export SME and export supporting organizations. Export firms and supporting organizations must expand programs widely in multi cultural training and education to help managers gain a better understanding in a various export environment.

  • PDF