• Title/Summary/Keyword: Enterprise network

Search Result 434, Processing Time 0.023 seconds

A Study on Marketing Activation of Franchise Enterprise Utilizing Social Network Service(SNS) (SNS(Social Network Service)를 활용한 프랜차이즈 업체의 마케팅 활성화에 관한 연구)

  • Han, Sun-Ho;Kim, Hyun-Jun;Choi, Kul-Yong;Han, Kyu-Chul
    • The Korean Journal of Franchise Management
    • /
    • v.2 no.2
    • /
    • pp.24-44
    • /
    • 2011
  • Many companies are increasingly using social network service(SNS) as an online marketing tool, and its marketing activation has been in the limelight as a differentiation strategy most recently. The purpose of this study is to analyze online marketing cases utilizing SNS and to apply it in Franchise Enterprise in order to activate its marketing activities. This study is more concerned with the cases of facebook, twitter, and blog among social network services and suggests some ways of utilizing them in Franchise Enterprise as follows: Based on the examples of facebook, firstly, we set up the role as a homepage in individul, Franchise Enterprise, and other organizations. Secondly, we also set up the role as an organizing tool in communities, and thirdly, setting up the role as a location map tool. Regarding some applications in marketing tool of Franchise Enterprise, we suggest the role as a public relation tool of the company and brand, and also propose the role of brand planning and development. Finally, we suggest a way of overcoming the limitation in offline operations.

Active Enterprise Security Management System for Intrusion Prevension (침입 방지를 위한 능동형 통합 보안 관리 시스템)

  • Park, Jae-Sung;Park, Jae-Pyo;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.427-434
    • /
    • 2004
  • Attacks such as hacking, a virus intimidating a system and a network are increasing recently. However, the existing system security or network management system(NMS) cannot be safe on various threats. Therefore, Firewall, IDS, VPN, LAS(Log Analysis System) establishes security system and has defended a system and a network against a threat. But mutual linkage between security systems was short and cannot prepare an effective correspondence system, and inefficiency was indicated with duplication of security. Therefore, an active security and an Enterprise Security Management came to need. An effective security network was established recently by Enterprise Security Management, Intrusion Tracking, Intrustion Induction. But an internetworking is hard for an enterprise security systems, and a correspondence method cannot be systematic, and it is responded later. Therefore, we proposes the active enterprise security management module that can manage a network safely in this paper.

  • PDF

Efficiency Management of the Enterprises Activity Based on the Principles of Innovative Development

  • Chernoivanova, Hanna;Kozlova, Inna;Kryvobok, Kateryna;Nemashkalo, Karina;Yermolenko, Oleksii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.328-334
    • /
    • 2021
  • The article examines the economic essence and approaches to determining the efficiency of the enterprise. The author in the study considers the effectiveness and from the standpoint of qualitative analysis of the effectiveness of change and implementation of enterprise development goals. It is established that the tool for ensuring qualitative impacts on the efficiency of the enterprise is the innovative development of the economic space of the enterprise. The article considers the dominant innovations that have influenced the means and methods of production. An organizational and economic mechanism has been recommended to coordinate the costs of innovation activities in order to ensure the efficiency of enterprises. The object of management in the organizational and economic mechanism is the innovation process in the enterprise: from the design of strategic goals of innovation, search and commercialization of innovations, to building and implementing innovation potential. The efficiency of the enterprise under the condition of realization of innovative potential will be characterized by steady competitive advantages and strategically-oriented behavior in the market.

Research on the Identification of Network Access Type of End-Hosts for Effective Network Management (효율적인 네트워크 자원 관리를 위한 호스트의 접속 유형 판별에 관한 연구)

  • Hur, Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.965-974
    • /
    • 2012
  • As the use of smart devices has become popular, the number of smart devices connected to network has increased and the amount of traffic from them has grown rapidly. The management of mobile traffic and IP address for smart devices in an enterprise network is crucial problem for efficient operation of network. The information about connection type of a terminal host to the network will be very useful for stable and efficient management of an enterprise network. Also, this information might be used to identify NAT device. In this paper, we propose a methodology to identify the connection type of a terminal host using RTT (Round-Trip-Time) value extracted from captured packets. We prove the feasibility of our proposed method in a target campus network.

Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management (대규모 네트워크 환경에서의 보안관리를 위한 보안평가 시스템 설계)

  • 이재승;김상춘
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.776-786
    • /
    • 2003
  • Security Evaluation System is a system that evaluates the security of the entire enterprise network domain which consists of various components and that supports a security manager or a Security Management System in making decisions about security management of the enterprise network based on the evaluation. It helps the security manager or the security management system to make a decision about how to change the configuration of the network to prevent the attack due to the security vulnerabilities of the network. Security Evaluation System checks the “current status” of the network, predicts the possible intrusion and supports decision-making about security management to prevent the intrusion in advance. In this paper we analyze the requirements of the Security Evaluation System that automates the security evaluation of the enterprise network which consists of various components and that supports decision-making about security management to prevent the intrusion, and we propose a design for it which satisfies the requirements.

The Effects of Internal, External Environment and Entrepreneurship on the Performance of Social Enterprise: Focused on the Network Activity (내부 및 외부 환경요인과 기업가정신이 사회적 기업의 성과에 영향을 미치는 요인: 네트워크 활동을 중심으로)

  • Jang, Sung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.4801-4811
    • /
    • 2011
  • The purpose of this study is to examine the factors influencing performance of internal, external environment and entrepreneurship in the social enterprise with network activity. This model tests various theoretical research hypotheses relating to performance of social enterprise, internal, external environment, entrepreneurship and network activity. The proposed model is analyzed to target social entrepreneurs. The results of hypothesis testing are as follows. First, organizational culture positively influence entrepreneurship. Second, environmental uncertainty positively influence entrepreneurship. Third, entrepreneurship positively influence managerial and social performance. Finally, organizational culture to entrepreneurship for high group of network activity is significantly larger than those for low group of network activity. In addition, environmental uncertainty to entrepreneurship for low group of network activity is significantly larger than those for high group of network activity.

The Mechanism of Labor Motivation as a Determinant of Economic Security of Enterprises in Competitive Conditions

  • Lagodiienko, Volodymyr;Samoilenko, Viktoria;Pasko, Maryna;Ovod, Larysa;Matsulevych, Yevgeniy
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.385-393
    • /
    • 2022
  • In the study of the mechanism of labor motivation as a determinant of economic security of the enterprise in competitive conditions, it was found that motivation is determinant in creating the conditions for production and ensuring the active functioning of the enterprise. It is substantiated that the motivational mechanism is the presence of a system of levers, incentives, measures and other elements for economic and administrative incentives for employees, which are used for incentives to work, increase productivity and safety, and more. The motivational mechanism plays an important role in ensuring the economic security of the enterprise and at the same time is a lever to increase competitiveness in the market. The functions of the mechanism of labor motivation are singled out, among which: explanatory-substantiating, regulative, communicative, socialization, regulating. The stages of occurrence of the motive for the employee are classified. The interrelation of motives and incentives in the mechanism of labor motivation as determinants of economic security of the enterprise in competitive conditions is proved. It is proved that the mechanism of labor motivation as a determinant of economic security of the enterprise in competitive conditions should be aimed at: assistance in forming and achieving goals and objectives of the enterprise and achieving balance and equilibrium of economic goals and social responsibility of the enterprise; ensuring close cooperation between management and employees of the enterprise; focus on building a flexible mechanism; transition to a democratic style of governance and involvement of employees in decision-making.

Modernization determinants by ensuring economic security of enterprises in the competitive conditions

  • Tkachenko, Tetiana;Tulchynska, Svitlana;Kostiunik, Olena;Vovk, Olha;Kovalenko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.119-126
    • /
    • 2021
  • The study develops methodological aspects for modeling the determining impact of modernization on the enterprise's economic security in development competitive conditions using the model of speed, stability and spaciousness of modernization. Modeling the determining impact of modernization on the enterprise's economic security in a competitive conditions involves: firstly, the formation of estimated modeling indicators in accordance with the speed, stability and spaciousness of the enterprise's modernization; secondly, establishing the weight of indicators in the assessment system using the tools of cognitive judgment; thirdly, the establishment of reference values of sound evaluation indicators; fourthly, the calculations of the integrated impact assessment of the modernization's determining impact modeling on the enterprise's ensuring economic security in a competitive conditions; fifthly, conducting calculations and analytical summarization of the results. To determine a comprehensive integrated indicator of the modernization changes impact on the competitiveness and economic security of enterprises, we use the correlation method of the calculated value with the reference value, as well as use weights for groups of calculations. Approbation of modeling of determining influence of modernization on maintenance of economic safety of the enterprise in competitive conditions of development by authors was carried out concerning such enterprises, as: JSC "Ukrzaliznytsia", SE "Ukraerorukh", SE IA "Boryspil", SE "Ukrposhta", KP "Kyivpastrans".

A Genetic Algorithm for Directed Graph-based Supply Network Planning in Memory Module Industry

  • Wang, Li-Chih;Cheng, Chen-Yang;Huang, Li-Pin
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2010
  • A memory module industry's supply chain usually consists of multiple manufacturing sites and multiple distribution centers. In order to fulfill the variety of demands from downstream customers, production planners need not only to decide the order allocation among multiple manufacturing sites but also to consider memory module industrial characteristics and supply chain constraints, such as multiple material substitution relationships, capacity, and transportation lead time, fluctuation of component purchasing prices and available supply quantities of critical materials (e.g., DRAM, chip), based on human experience. In this research, a directed graph-based supply network planning (DGSNP) model is developed for memory module industry. In addition to multi-site order allocation, the DGSNP model explicitly considers production planning for each manufacturing site, and purchasing planning from each supplier. First, the research formulates the supply network's structure and constraints in a directed-graph form. Then, a proposed genetic algorithm (GA) solves the matrix form which is transformed from the directed-graph model. Finally, the final matrix, with a calculated maximum profit, can be transformed back to a directed-graph based supply network plan as a reference for planners. The results of the illustrative experiments show that the DGSNP model, compared to current memory module industry practices, determines a convincing supply network planning solution, as measured by total profit.

A Study on Establishment of FMC Environment for Real Time Enterprise (Real Time Enterprise를 위한 유무선 통합 환경 구축에 관한 연구)

  • Choi, Minn-Seok
    • Journal of Information Technology Services
    • /
    • v.4 no.1
    • /
    • pp.107-115
    • /
    • 2005
  • As Real Time Enterprise (RTE) has been spotlighted since the year of 2002, some advanced companies have been implementing the paradigm of RTE to its legacy systems and the number of the companies has been growing. However, the network infrastructures mainly based on fixed telecommunications network make the results of the RTE implementations fall short of their expectations. In this paper, we propose to construct the fixed-mobile convergence (FMC) environment to achieve RTE. The convergence infrastructure will improve user accessibility to all kinds of data and will encourage the users to interact with the systems.