• Title/Summary/Keyword: Enterprise Information System

Search Result 1,169, Processing Time 0.024 seconds

The Empirical Analysis on the relevancy between the IT competency of the Group Enterprises, and the IT Service Firms' Management Performance (국내 대형 그룹사 IT수준 및 계열 IT서비스사 경영 성과의 관련성에 관한 실증 연구)

  • Ahn, Yeon-S.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.109-116
    • /
    • 2010
  • In this paper, we analyse empirically the relation between the IT competency of the Group enterprises, and the management performance of the subsidiary IT service firms in Korea. The 24 IT service firms and relative Group enterprises are included for analysis. The various hypotheses established are validated by t-test method statistically. The results shows that IT competency level of the Group enterprises was affected by not only their sales volumes, new investment volume of IT service, but system management(SM) and inner captive market's sales volume of subsidiary IT service firms also. Additionally the sales volume of IT service firms was affected positively by their inner-captive market's sales, system management sales volume, and the sales volume of their Group enterprise. The service competency of the subsidiary IT service firms is shown as more high in the lower intensity of outer-captive and system integration(SI) business, as well as in the upper intensity of inner-captive and SI business.

Implementation of Smartphone based Mobile Office for a Logistics Company using HTML5 (HTML5를 이용한 물류기업의 모바일 오피스 구현에 관한 연구)

  • Lim, Yongtaek;Byun, Haegwon;Yoo, Woosik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.433-442
    • /
    • 2012
  • This paper focuses on developing a smartphone-based mobile office system for a logistics company in Korea using HTML5. Mobile office is smart working environment of working out of a company office using mobile devices such as smartphones and portable computers which are connected to the company servers via WiFi or 3G/4G. Recently many companies are introducing mobile office information systems with the smartphone wave, but they are having difficulties in maintaining and updating their systems due to the transformative mobile application platform. Therefore, we need a platform-independent implementation tools for the mobile office application and HTML5 is one of the solution tools. In this paper, we develop mobile and web applications applicable to all kinds of mobile devices such as iOS, android and windows mobile etc using HTML5. The proposed mobile office system consists of groupware, marketing management, reporting module and transportation management system.

Generation of the Battlefield in Distributed Simulation System Based on Synthetic Environment Representation and Interchange Standard (SEDRIS) (분산 시뮬레이션 시스템에서 합성 환경 표현 및 교환 표준(SEDRIS) 기반의 전장 환경 구축)

  • Hwam, Won Kyoung;Kim, Jung-Hoon;Na, Young-Nam;Cheon, Sang Uk;Park, Sang C.
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.253-263
    • /
    • 2012
  • Presented in the paper is a methodology for the distributed simulation of underwater warfare based on standard synthetic environment. In the case of underwater warfare simulation, it is very important to reflect environmental data, such as salinity and temperature. For the reusability and interoperability of environmental data, this paper adopts Synthetic Environmental Data Representation and Interchange Specification (SEDRIS(ISO standard for environmental data)). Although SEDRIS provides various merits as an international standard, applying of SEDRIS has been hindered by its broadness and heaviness. To relieve the difficulties, this paper proposes an efficient procedure to utilize SEDRIS technology for the atmosphere and underwater environment. This paper identifies SEDRIS structure for the atmosphere/underwater structured dimensional grid-based and implements the proposed procedure on the High Level Architecture (HLA) / Run-Time Infrastructure (RTI) to explain the generation of the battlefield in a distributed simulation system.

Development of Smart Factory Diagnostic Model Reflecting Manufacturing Characteristics and Customized Application of Small and Medium Enterprises (제조업 특성을 반영한 스마트공장 진단모델 개발 및 중소기업 맞춤형 적용사례)

  • Kim, Hyun-Deuk;Kim, Dong-Min;Lee, Kyung-Geun;Yoon, Je-Whan;Youm, Sekyoung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.3
    • /
    • pp.25-38
    • /
    • 2019
  • This study is to develop a diagnostic model for the effective introduction of smart factories in the manufacturing industry, to diagnose SMEs that have difficulties in building their own smart factory compared to large enterprise, to identify the current level and to present directions for implementation. IT, AT, and OT experts diagnosed 18 SMEs using the "Smart Factory Capacity Diagnosis Tool" developed for smart factory level assessment of companies. They analyzed the results and assessed the level by smart factory diagnosis categories. Companies' smart factory diagnostic mean score is 322 out of 1000 points, between 1 level (check) and 2 level (monitoring). According to diagnosis category, Factory Field Basic, R&D, Production/Logistics/Quality Control, Supply Chain Management and Reference Information Standardization are high but Strategy, Facility Automation, Equipment Control, Data/Information System and Effect Analysis are low. There was little difference in smart factory level depending on whether IT system was built or not. Also, Companies with large sales amount were not necessarily advantageous to smart factories. This study will help SMEs who are interested in smart factory. In order to build smart factory, it is necessary to analyze the market trends, SW/ICT and establish a smart factory strategy suitable for the company considering the characteristics of industry and business environment.

Implementation of Key Recovery Model based on XML for B2B (B2B를 위한 XML기반의 키 복구 구현)

  • 김주한;문기영;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.53-61
    • /
    • 2002
  • In this paper, we will introduce a design of key recovery based on XML can be used in B2B environment. XML Digital Signature and XML Encryption that are defied recently as standards by W3C(World Wide Web Consortium) are deployed to sign/verify or encrypt/decrypt documents for electronic commerce and keys to store/load at/from key recovery server. The result of signature or encryption is always an XML document and all messages used in this key recovery system are also XML documents. It enables to adapt transparently this key recovery system to legacy XML applications and electronic commerce platforms based on XML. And its method for key recovery is key escrow. One of the characteristics of this key recovery is that one enterprise can recover keys of some documents for electronic commerce from external key recovery system in other enterprises related with them and also recover keys from owns.

Research of organized data extraction method for digital investigation in relational database system (데이터베이스 시스템에서 디지털 포렌식 조사를 위한 체계적인 데이터 추출 기법 연구)

  • Lee, Dong-Chan;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.565-573
    • /
    • 2012
  • To investigate the business corruption, the obtainments of the business data such as personnel, manufacture, accounting and distribution etc., is absolutely necessary. Futhermore, the investigator should have the systematic extraction solution from the business data of the enterprise database, because most company manage each business data through the distributed database system, In the general business environment, the database exists in the system with upper layer application and big size file server. Besides, original resource data which input by user are distributed and stored in one or more table following the normalized rule. The earlier researches of the database structure analysis mainly handled the table relation for database's optimization and visualization. But, in the point of the digital forensic, the data, itself analysis is more important than the table relation. This paper suggests the extraction technique from the table relation which already defined in the database. Moreover, by the systematic analysis process based on the domain knowledge, analyzes the original business data structure stored in the database and proposes the solution to extract table which is related incident.

A Design of Policy-Based Composite Web Services QoS Monitoring System (정책 기반의 합성된 웹 서비스 품질 모니터링 시스템의 설계)

  • Yeom, Gwy-Duk;Jeong, Choong-Kyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.189-197
    • /
    • 2009
  • As the web service technology matures. research is focused on the composite web services that combine individual web services within an enterprise or between enterprises. Quality of service is the critical competitiveness factor in this mature technology stage where there are many services with similar functionalities differing only in some non-functional properties. Monitoring is the key component for the service quality management of a web service. A service quality monitoring system design using a broker is presented in this paper. OWL-S is used to specify the composite service process and a service policy (inputs and outputs of each service, quality attributes and values, etc.) built by WS-Policy is applied to the composite service process. If there is any discrepancy between the service policy and the monitored data, the service provider and the user are notified of it so as to take necessary measures. We have implemented a travel reservation system as an example of the presented design and the experimental results are shown. Average response time was monitored and the timeout policy was applied in the experiment.

Design of Intelligent Big data Convergence Service to Support Non-store Founders based on Non-face-to-face (무점포 창업자 지원을 위한 비대면 기반의 지능형 빅데이터 융합 서비스 설계)

  • Hyun-Mo Koo;Ji-Yun Hong;Cheol-Soo Kang
    • Journal of Advanced Technology Convergence
    • /
    • v.2 no.2
    • /
    • pp.1-8
    • /
    • 2023
  • Due to the recent long-term economic downturn, the number of non-store and mail-order sellers is increasing as prospective entrepreneurs are concentrated due to the phenomenon of non-store start-ups with low start-up costs. In particular, in addition to unemployed young people and housewives who lack funds, many office workers who wish to have a 'two-job' are jumping into the business. Therefore, in this paper, we have moved away from provider-oriented service platforms that are dependent on specific networks, operators, and service types. In addition, we plan to design a business integration support system that can provide B2B services in the promotional material industry that contributes to business support and profit generation of wholesale and retail non-store entrepreneurs through sharing and participation. The proposed system is judged to be a business integrated operation support system applying orchestration and service management technology and enterprise business partner management technology that can provide stable operation management service.

Design of DRM System in P2P Network Environment (P2P네트워크 환경을 위한 DRM 시스템 설계)

  • Lee Jeong-Gi;Kim Kuk-Se;Lee Gwang;Ahn Seong-Soo;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.829-832
    • /
    • 2006
  • The word P2P implies significant changes in current business dynamics. The P2P service enables individuals to be connected to the Internet for the direct provision of information and even downloads from one another without the conventional method of passing through search engines. This can be utilized to extend the path of retrieving information from limited web sites to personal and enterprise databases. That is, it is now possible for individuals to manage their own information on a national or global scope, share various information with other members, form communities of users interested in sharing homogeneous information, and utilize remote conference and remote education using groupware.

  • PDF

A Conceptual Design of Knowledge-based Real-time Cyber-threat Early Warning System (지식기반 실시간 사이버위협 조기 예.경보시스템)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modem information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. As a result, there has been vigorous effort and search to develop a functional state-level cyber-threat early-warning system however, the efforts have not yielded satisfying results or created plausible alternatives to date, due to the insufficiency of the existing system and technical difficulties. The existing cyber-threat forecasting and early-warning depend on the individual experience and ability of security manager whose decision is based on the limited security data collected from ESM (Enterprise Security Management) and TMS (Threat Management System). Consequently, this could result in a disastrous warning failure against a variety of unknown and unpredictable attacks. It is, therefore, the aim of this research to offer a conceptual design for "Knowledge-based Real-Time Cyber-Threat Early-Warning System" in order to counter increasinf threat of malicious and criminal activities in cyber suace, and promote further academic researches into developing a comprehensive real-time cyber-threat early-warning system to counter a variety of potential present and future cyber-attacks.

  • PDF