• Title/Summary/Keyword: Enterprise Information Security

Search Result 277, Processing Time 0.023 seconds

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

Research on the Direction of Building an Integrated Smart Platform at Construction Sites (건설현장 통합 스마트플랫폼 구축방향에 대한 연구)

  • Yeon Cheol Shin;Yu Mi Moon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.620-634
    • /
    • 2024
  • Purpose: This study aims to strengthen the linkage between the construction site and the headquarters, suggest the direction of building an integrated smart platform that can actually be operated and utilized in the field, and effectively implement safety management. Method: Agile methodologies were applied to build a flexible and scalable system through cloud-based and three-tier architectures. Functional requirements were set through an on-site survey, and design and construction were carried out by reflecting personal information protection and legal requirements. Result: The integrated smart platform proposed in this study strengthens the connection between the site and the headquarters to maximize the effect of safety accident prevention and safety management. This system has improved the safety awareness of workers and managers, and has realized more efficient safety management through a unified communication system. Conclusion: In the establishment of an integrated smart platform, it is essential to reflect the characteristics of the site when selecting the development method and establishing the function plan. In the basic design and detailed design stages, it is necessary to establish security measures, design mobile functions, and review device expansion, and consider enterprise-wide safety management, user convenience, and scalability. It is also important to maintain and improve the system, reflect legal requirements, and support the elderly and foreign workers. By strengthening personal information and CCTV security and continuously improving it by reflecting user opinions, it can be expected to activate an integrated smart platform.

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

The Influence of Exhibitions as a Marketing Tool on Business Performance - An Illustration from a Defence Industry - (전시회 참가활동이 기업의 경영성과에 미치는 영향 - 방위산업체를 중심으로 -)

  • Han, Jung-Han;Jeon, In-Oh
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.223-243
    • /
    • 2009
  • In the early 1990's internation al security environment bring on the change. So each countries should have renewed the defence policy. The developed countries make efforts to keep the superiority of military industry with an high technology and huge capital. One of the efforts is the defence industry exhibitions for the management performance regarded as the marketing strategic principal method. The result of the opening exhibitions has been studied by research papers and treatises. A exhibitions' goal is different from an it's characteristic, type, industry, participator, institution and participating nation. An enterprise's management performance is runs as follows. First, an exhibitions participation activation has an effect re-participation following the satisfaction. Second, an exhibitions participation activation contributes to be on sale promotion, The result of the exhibitions participation is classified with sale performance and non-sale performance. The third, an exhibitions participation activation contributes to the effective company management. The huge fund advertisement is a financial burden, but a exhibitions takes effect one-fifth economical retrenchment. Accordingly, this study researched the exhibition participation choice properties, an exhibitions participation activation properties and investigated the Korea defence industry's income statement, balance sheet, growth ratios, profitability ratios, productivity ratios, stability ratios which were substitute for the enterprise's management performance through the exhibitions participation costs and the number of times.

  • PDF

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.

A Study on the Enhancement Process of the Telecommunication Network Management using Big Data Analysis (Big Data 분석을 활용한 통신망 관리 시스템의 개선방안에 관한 연구)

  • Koo, Sung-Hwan;Shin, Min-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6060-6070
    • /
    • 2012
  • Real-Time Enterprise (RTE)'s key requirement is that it should respond and adapt fast to the change of the firms' internal and external situations including the change of market and customers' needs. Recently, the big data processing technology to support the speedy change of the firms is spotlighted. Under the circumstances that wire and wireless communication networks are evolving with an accelerated rate, it is especially critical to provide a strong security monitoring function and stable services through a real-time processing of massive communication data traffic. By applying the big data processing technology based on a cloud computing architecture, this paper solves the managerial problems of telecommunication service providers and discusses how to operate the network management system effectively.

A Connection Management Protocol for Stateful Inspection Firewalls in Multi-Homed Networks

  • Kim, Jin-Ho;Lee, Hee-Jo;Bahk, Sae-Woong
    • Journal of Communications and Networks
    • /
    • v.10 no.4
    • /
    • pp.455-464
    • /
    • 2008
  • To provide network services consistently under various network failures, enterprise networks increasingly utilize path diversity through multi-homing. As a result, multi-homed non-transit autonomous systems become to surpass single-homed networks in number. In this paper, we address an inevitable problem that occurs when networks with multiple entry points deploy firewalls in their borders. The majority of today's firewalls use stateful inspection that exploits connection state for fine-grained control. However, stateful inspection has a topological restriction such that outgoing and incoming traffic of a connection should pass through a single firewall to execute desired packet filtering operation. Multi-homed networking environments suffer from this restriction and BGP policies provide only coarse control over communication paths. Due to these features and the characteristics of datagram routing, there exists a real possibility of asymmetric routing. This mismatch between the exit and entry firewalls for a connection causes connection establishment failures. In this paper, we formulate this phenomenon into a state-sharing problem among multiple fire walls under asymmetric routing condition. To solve this problem, we propose a stateful inspection protocol that requires very low processing and messaging overhead. Our protocol consists of the following two phases: 1) Generation of a TCP SYN cookie marked with the firewall identification number upon a SYN packet arrival, and 2) state sharing triggered by a SYN/ACK packet arrival in the absence of the trail of its initial SYN packet. We demonstrate that our protocol is scalable, robust, and simple enough to be deployed for high speed networks. It also transparently works under any client-server configurations. Last but not least, we present experimental results through a prototype implementation.

A Study on the Co-Relation of Organizational Culture and Organizational Commitment Among Startup Companies Employees (신생기업 임직원들의 조직문화와 조직몰입의 상관관계에 관한 연구)

  • Bokhari, Syed Asad Abbas;Aftab, Muhammad;Shahid, Manzoor
    • Industry Promotion Research
    • /
    • v.6 no.4
    • /
    • pp.95-103
    • /
    • 2021
  • Startup enterprises are expanding at an alarming rate in both industrialized and developing countries simultaneously. Many difficulties confront young entrepreneurs in terms of organizational and human resource management. As a result, it is critical to research startup enterprises because they have received little attention from the scientific community. In this study, we solely considered new startup enterprises operating at the small and medium-sized enterprise (SME) level in a developing country (Pakistan). The information was gathered through a survey method from ten businesses located in the metropolitan metropolis of Lahore. The correlation analysis was conducted to determine whether or not the hypothesized relationship between research variables was true. We discovered a positive and statistically significant association between all of the proposed hypotheses. The findings of this study have significant implications for industry, academics, and policymakers.