• Title/Summary/Keyword: Enterprise Information System

Search Result 1,169, Processing Time 0.027 seconds

Control Variables of Remote Joint Analysis Realization on the M2M Case

  • Lim, Sung-Ryel;Choi, Bo-Yun;Lee, Hong-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.98-115
    • /
    • 2012
  • New trend called ubiquitous leads the recent business by standardization and integration. It should be the main issue how to guarantee the integration and accountability on each business, especially in mission critical system which is mainly supported by M2M (Machine to Machine) control mechanism. This study is from the analysis of digital forensics case study that is from the M2M Sensing Control Mechanism problem of the "Imjin River" case in 2009, where a group of family is swept away to death by water due to M2M control error. The ubiquitous surroundings bring the changes in the field of criminal investigation to real time controls such as M2M systems. The needs of digital forensics on M2M control are increasing on every crime scene but we suffer from the lack of control metrics to get this done efficiently. The court asks for more accurately analyzed results accounting high quality product development design. Investigators in the crime scene need real-time analysis against the crime caused by poor quality of mission critical systems. It seems to be every need of Real-Time-Enterprise, so called ubiquitous society on the case. We try to find the efficiency and productivity in discovering non-functional design defects in M2M convergence products focusing on three metrics in study model with quick implementation. Digital forensics system in present status depends on know-how of each investigator and is hard to expect professional analysis on every field. This study set up a hypothesis "Co-working of professional investigators on each field will qualify Performance and Integrity" especially in mission critical system such as M2M and suggests "Online co-work analysis model" to efficiently detect and prevent mission critical errors in advance. At the conclusion, this study proved the statistical research that was surveyed by digital forensics specialists around M2M crime scene cases with quick implementation of dash board.

Intelligent Production Management System with the Enhanced PathTree (개선된 패스트리를 이용한 지능형 생산관리 시스템)

  • Kwon, Kyung-Lag;Ryu, Jae-Hwan;Sohn, Jong-Soo;Chung, In-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.621-630
    • /
    • 2009
  • In recent years, there have been many attempts to connect the latest RFID (Radio Frequency Identification) technology with EIS (Enterprise Information System) and utilize them. However, in most cases the focus is only on the simultaneous multiple reading capability of the RFID technology neglecting the management of massive data created from the reader. As a result, it is difficult to obtain time-related information such as flow prediction and analysis in process control. In this paper, we suggest a new method called 'procedure tree', an enhanced and complementary version of PathTree which is one of RFID data mining techniques, to manage massive RFID data sets effectively and to perform a real-time process control efficiently. We will evaluate efficiency of the proposed system after applying real-time process management system connected with the RFID-based EIS. Through the suggested method, we are able to perform such tasks as prediction or tracking of process flow for real-time process control and inventory management efficiently which the existing RFID-based production system could not have done.

A Security Evaluation Criteria for Korean Cloud Computing Service (한국형 클라우드를 위한 정보보호 관리체계 평가 기준)

  • Kim, Kichul;Heo, Ok;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.251-265
    • /
    • 2013
  • Cloud computing provided as a service type by sharing IT resources cannot be activated unless the issue of information security is solved. The enterprise attempts to maximize the efficiency of information and communication resources by introducing cloud computing services. In comparison to the United States and Japan, however, cloud computing service in korea has not been activated because of a lack of confidence in the security. This paper suggests core evaluation criteria and added evaluation criteria which is removed the redundancy of the security controls from existing ISMS for Korean cloud computing through a comparative analysis between domestic and foreign security controls of cloud certification scheme and guidelines and information security management system. A cloud service provider certified ISMS can minimize redundant and unnecessary certification assessment work by considering added evaluation criteria.

Method of Generating Information Signals in the System Industrial Internet of Things

  • Aleksandr Serkov;Nina Kuchuk;Bogdan Lazurenko;Alla Horiuskina
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.206-210
    • /
    • 2024
  • Industrial facilities that use modern IT technologies require the ensured reliability and security of information in automated enterprise management. Concurrently, so as to ensure a high quality of communication, it is necessary to expand the bandwidth of communication channels, which are limited by the physical parameters of the radio frequency spectrum. In order to overcome this contradiction, we propose the application of technology fundamental to ultra-wideband signals, in which the ratio between the bandwidth and its central part is greater than "one". For this reason, the information signal is emitted without a carrier frequency - simultaneously within the entire frequency band - provided that the signal level is lower than the noise level. For the transmission of information content, the method of positional-time coding is used, in which each information bit is encoded by hundreds of ultrashort pulses that arrive within a certain sequence. Mathematical models of signals and values observed in wireless communication systems with autocorrelation reception of modulated ultra-wideband signals are furthermore recommended. These assist in identifying features of the dependence of the error probability on the normalized signal-to-noise ratio and the signal base. Comparative analysis has shown that the best noise immunity of the systems considered in this paper is the communication system, which uses the time separation of the reference and information signals. During the first half of the bit interval, the switch closes the output of the transmitter directly to the generator of the ultra-wideband signal - forming a reference signal. In the middle of the bit interval, the switch alternates the output to one of two possible positions depending on the encoding signal - "zero" or "one", forming the information part of the ultra-wideband signal. It should also be noted that systems with autocorrelation reception and separate transmission of reference and information signals, provide a high level of structural signal secrecy. Furthermore, they provide the reliable transmission of digital information, especially in interference conditions.

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

Comparisn of ERP Platforms and its Utilization to Internet (ERP 플랫폼 비교와 인터넷 활용방안)

  • 서재학;홍계표;남인길
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.15-24
    • /
    • 1999
  • As the market economy changes rapidly, a great number of enterprises are now preparing to introduce and construct ERP systeme to keep up their competitive power. However, for the ERP information in practical use the efficiency is very low because the range of its utilization is limited only within the enterprise that it is used In this paper, the comparisons between the existing ERP system configurations already in practice based on the client-server environments and the ERP components and platforms for applying to the internet are presented And we also show the strategic approaches for utilizing internet to strengthen the business power and to create newly added values of the increased reliability on customers by taking advantage of information on the marketing, the customers, the productive capacity. and the financial structure of enterprises in the internet environments.

  • PDF

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

A Framework for Analyzing the Effectiveness of a Collaboration Support System for Small and Medium-sized Enterprises (중소제조기업 협업지원 시스템의 도입 및 활용 효과 분석 프레임워크)

  • Kim, Jeong-Yeon;Ahn, Jae-Hyung;Shin, Dong-Min;Moon, Yong-Ma
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.13-20
    • /
    • 2012
  • Recently, the collaboration among small and medium-sized enterprises(SMEs) has been recognized as an effective competitive tool. As several systems have been developed to boost the collaboration, it is necessary to analyze the effectiveness of the systems in terms of their contribution to enhance operational performance of SMEs through objective and quantitative validation. In particular, the analysis for SMEs rather than large-scaled enterprises has not received much attention due to lack of relevant information and difficulty of collecting data. This paper presents a framework for analyzing the effectiveness of the collaboration support system, called i-manufacturing hub, which has been implemented by Korean government. Identification of influential factors to the effectiveness of collaboration hub, and constructing necessary hypotheses are proposed. To overcome the difficulty in data collection only by means of surveys through subjective questionnaires, we exploit system log data that are generated while SMEs use the system. As an initial phase to analyze the effectiveness through hypothesis validation, we discuss several interesting observations and challenges in the direction of enhancing collaboration among SMEs for better operational performance improvement and more participation in the collaboration hub.

Mobile Edge Computing based Building Disaster Alert System Implementation (Mobile Edge Computing을 활용한 건물 재난 알림 시스템 구축 방안)

  • Ha, Taeyoung;Kim, Jungsung;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, a building disaster notification system with MEC (Mobile Edge Computing) technology is proposed, which informs people in a building about the disaster. The overview of MEC is presented, and the structure and characteristics of network using MEC are described. In addition, the characteristics of a enterprise integration pattern based Apache Camel is described, and how to implement MEC with Apache Camel is presented. Finally, an implementation method of building disaster notification system with Apache Camel based MEC is proposed to quickly recognize disasters through sensors and to rapidly evacuate people from buildings.

The Approach for ERP Courses into University Curriculum (대학 교과과정에서의 ERP교육 방안)

  • Yoon, Cheol-Ho;Kim, Sang-Hoon
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.39-51
    • /
    • 2004
  • Based on investigating and analyzing the cases of advanced foreign universities that have already included ERP courses in their education systems, this study proposed the ways of incorporating ERP courses into Korean universities' curriculums in terms of the following three areas: 1) development of ERP courses, 2) establishment and maintenance of ERP education environment, 3) continuous evaluation and improvement of ERP education implementation. As reasonable ERP courses, "Introduction to ERP" targeted to educating overall basic concepts in ERP system and business administration, "ERP System Implementation" for fostering business process design and system implementation skills, "ERP Programming" such as ABAP for the purpose of customizing ERP system, and "Strategic Use of ERP" dealing with ERP package selection and implementation methodologies of effective utilization of ERP systems were suggested. Regarding the establishment and maintenance of ERP education environment, single server architecture model that contained both database and application was proposed with the intention of set-up cost saving and maintenance efficiency. As for the evaluation and improvement on ERP education implementation, its methodologies were introduced through analyzing the advanced cases. Finally in addition to the above three areas, critical success factors for effectively launching ERP education in the universities were suggested through reviewing the previous case studies.