• Title/Summary/Keyword: Enterprise Information Security

Search Result 274, Processing Time 0.021 seconds

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

An Empirical Study on the Competition Factor Electronic Logistics Information and International Logistics Management (국제물류관리와 전자적물류정보의 경쟁요인에 관한 실증연구)

  • Kwak, Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.257-283
    • /
    • 2007
  • As Global industrial structure is diversified, multinational corporations accomplished fast internationalization to introduction of new management policy by development of an IT technology. Enterprise' business environment is changing transcending border. To overcome raging waves of change accident and to be secured enterprise's future, the logistics is recognized the third profit source joining in curtailment of sale enlargement, production cost. To seek cost saving or reform in logistics class that is last area of pursuit of profits within ancient city life in the fast lane from these viewpoint, importance of study that integrates and manages international logistics bases supply neck walk is emphasized. Specially, to meet on in terms of competitive power security regarding curtailment of logistics cost is available through link between logistics bases, various consumer's request, merchandise and service logistics management that supply fixed quantity as is reliable in right place at good season was embossed by point game plan of business management, and SCM efficiency anger of mortification international logistics activity importance of study that see at that dominate competitive advantage point bring. This study analyzes interrelation and presents model for integration of international logistics bases supply network with supply network habit at factor and supply chain, and supply network activity in integration of supply chain process and production. Also, it establishes following method of study to achieve study purpose for actual proof analysis for integration sequence of international logistics bases supply network. Specially, immersion of network and supply network, very high interrelation appeared by thing which is with international logistics base supply network integration. The integration of international logistics base supply network means that the enterprises which give trust and sincerity deal with market environment change positively and can decide proceeding of various cooperative work. Also, it means the possibility by necessity of cooperative relation and interdependence to continuous immersion and normative immersion, for the maintain of long business relations.

  • PDF

Mobile Material Management Through Real Time Connection with ERP System (모바일을 활용한 실시간 ERP시스템 연동 모형의 구축: 자재관리 고도화 사례 중심으로)

  • Lee, Chae-Eun;Lee, Dong-Man;Yoo, Ji-Young
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.285-305
    • /
    • 2004
  • This study is based on providing core infrastructure to make or extend an ERP strategy to make the proper model to cope effectively with various customer requirements and market changes through ERP improvement. The purpose of this study is to support making a competitive advantage by raising productivity and reducing costs as a result of making and applying the "mobile real time connection to ERP"model which is accessible anywhere and anytime using PDA and wireless LAN on the basis of mobile business concept. The model is implemented as the "mobile Material Management System" on the area of material management of ERP in the enterprise which already implemented ERP system. This model is also applied into other divisions of the enterprise. This case study shows that the proper application of ERP reduces costs by reducing business process lead time, increase productivity and customer satisfaction through mobility and instant connectivity and easiness of the system. It is recommended to apply this model into the ERP system which is used in most enterprise, to make a competitive advantage. To sum up, the model in this study can be applied into the enterprise which wants to reduce costs, increase productivity and customer satisfaction through ERP improvement.

Multiple Method Authentication System Using Embedded Device (임베디드 기기를 활용한 다중 방식 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.7-14
    • /
    • 2019
  • Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

Design of Web Service by Using OPC XML-DA and OPC Complex Data for Automation and Control Systems

  • Tan Vu Van;Yoo Dae-Sung;Yi Myeong-Jae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.250-252
    • /
    • 2006
  • Web technologies are gaining increased importance in automation and control systems. However, the choice of Web technologies depends on the use cases in the application environment. In industrial systems, the data can be got not only from many different field systems and devices but also from different OPC (OLE for Process Control) Servers. Current OPC Client might be able to read simple data from OPC Server, but there are some problems to get structured data and to exchange structured information between collaborating applications. Therefore, OPC Foundation has defined interfaces to OPC XML-DA (OPC XML Data Access) and OPC Complex Data that aim to solve those problems. The OPC XML-DA can facilitate the exchange of plant data across the internet, and upwards into the enterprise domain. In addition, the OPC Complex Data will extend the OPC DA specification to allow the OPC Client to read and decode any type of data from measurement and control systems on the plant floor. This paper will describe the concept of OPC XML-DA and OPC Complex Data. And then it proposes a mechanism to implement the OPC Complex Data into OPC XML-DA Server. Additionally, the paper also discusses the security aspects.

  • PDF

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

A Study on Utilization Effect and Implementation Model of Directory Service Based Information Resource Management System (디렉터리 서비스 기반 정보자원 관리시스템의 활용 효과 및 구축 모델에 대한 연구)

  • Lee, Sung-Jun;Kim, Hyuk;Lee, Kwang Soo;Kim, Minsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.427-439
    • /
    • 2014
  • Introduction of new information systems due to continuous progress of ICT has made the enterprise IT environment into a mixed pot of various IT resources. Rapidly changing business situation has emphasized the integration of organizational IT resources as one of key competitive advantages. Those distributed IT resources are now demanding to solve the problems not only on their own effective management but also on security and control issues against unauthorized infiltration and information leakages. Under the situation that the number of IT resources is constantly increasing, it is needed to study a management model and its implementation that integrally solves above all problems. In this paper, it is revealed that a directory service can be used to integrally manage distributed IT resources and a directory service based system model for distributed IT resource management is suggested. By implementing an HR solution over active directory service, it is demonstrated that our integrated management model for distributed resources is applicable to real business cases. It is expected that for small and medium sized enterprises with limited IT investments, directory service based IT resource management system can be a cost-effective solution for increasing security threats and lack of governance.

A Study on the Importance Analysis of Reliability, Security, Economic Efficiency Factors that Companies Should Determine When Adopting Cloud Computing Services (클라우드 컴퓨팅 서비스 채택 시 기업이 판단해야 하는 신뢰성, 보안성, 경제성 요인의 중요도 분석)

  • Kang, Da-Yeon
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.75-81
    • /
    • 2021
  • The purpose of this research is to derive and evaluate priorities for critical factors that must be determined before an enterprise adopts a cloud computing service. AHP analysis techniques were used to reflect decisions made by experts as research methods. AHP is a decision-making technique that expresses complex decision-making problems hierarchically and derives the best alternatives through pairwise comparison between the items of the hierarchy. Compared to the existing statistical decision making techniques, the decision making process is systematic and simple, making it easy to understand. In addition, the procedure is also reasonable by providing an indicator to determine the consistency of the decision maker in the analysis process. The analysis results of this research showed that security was the first priority, reliability was the second priority, and economic efficiency was the third priority. Among the factors in the first-priority security items, the access control rights and the safety factors of external threats are the most important factors. Research results can be used as a guideline in future practice, and it is necessary to evaluate, compare and analyze the satisfaction of companies that have adopted cloud computing services in the future.

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.