• Title/Summary/Keyword: IT 비즈니스 네트워크

Search Result 223, Processing Time 0.029 seconds

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

Development of component architecture to support IoT management (IoT 및 네트워크 관리 지원을 위한 컴포넌트 아키텍처 개발)

  • Seo, Hee Kyoung
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.42-49
    • /
    • 2017
  • It is important to realize automation services by communicating in IoT with humans, objects & objects, and forming a common network. People used web like the most powerful network way to sharing things and communication. Therefore the efficiency method communication between each device and the web in IoT could be different from ones. The best method for high quality software product in web applications is software reuse ; Modules, classes, patterns, frameworks, and business components are reusable elements of various perspectives. Components is plugged with others through well-defined interfaces, which can overcome the operation and complexity of application development. A web-based distributed environment for IoT applications is a standard architecture use information collected from various devices for developing and using applications. For that reason, the network management which manages the constituent resources for the best service control in IoT application is required as a sub-layer support service in most applications as well as individual applications. In this paper, we measure to develop a network management system based not only by components but on heterogeneous internetworks. For procedure this, we clarify a component architecture for classifying and classify also the component needed in the IOT and network domain or order the type of real network management system.

Development of a Framework for Certification and Audit of ASP (ASP 인증ㆍ감리를 위한 프레임워크 개발)

  • 안재근;양정환;임춘성
    • Proceedings of the CALSEC Conference
    • /
    • 2000.08a
    • /
    • pp.255-263
    • /
    • 2000
  • 네트워크를 통해 어플리케이션을 임대해주는 정보시스템 서비스 모델인 ASP 모델이 IT 시장에서 새로운 비즈니스 모델로 등장하였다. 그러나 ASP 모델은 기존의 정보시스템 모델에 비해 특정 서비스에 많은 서비스제공자가 임시적으로 결합되고, 정보자산이 공중망과 데이터센터에 위치하는 특징을 가지고 있다. 그러므로 ASP 서비스를 성공적인 수행하기 위해서는 ASP 사업자가 서비스의 제공능력이 있는지에 대한 인증활동과 ASP 서비스 도입 및 운영과정이 적절하게 이루어지고 있는가에 대한 감리활동이 요구된다. 따라서 본 연구는 ASP의 특징을 분석하고, ASP 인증ㆍ감리 프레임워크를 설계를 수행하고자 한다. 이를 위해, 기존연구를 바탕으로, 분류기준을 기술적 계층, 수명주기, 공급자/고객의 관점이라는 세 가지 차원에서 정의하며, 각각의 세부항목 및 내용을 정의하고자 한다.

  • PDF

프로슈밍 플랫폼으로서 웹2.0의 네트워크 경제학

  • Kim, Do-Hun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.402-407
    • /
    • 2007
  • 웹2.0이라는 개념과 트랜드는, 개방성, 사용자 참여, 집단 지성, 인간중심의 IT 서비스 등을 키워드로 하는, 플랫폼 기반 비즈니스 모델을 통칭한다. 전세계적 블로그 열풍이나, Googlization으로 불리기도하는 주요 웹포탈의 성장은 이러한 현상을 뒷받침하는 증거이며, 미래 인터넷 시장을 개척하는 엔진으로 자리잡고 있다. 그런데 웹2.0을 기술적으로(descriptive) 소개하거나 관련된 요소기술에 대한 문헌은 많음에도 불구하고, 이러한 현상을 경영/경제학적 시각에서 체계적으로 분석한 연구는 의외로 많지 않다. 본 논문에서는 기존의 웹(웹1.0)과 웹2.0 서비스 모형을 경영 경제학적 관점에서 구조화하고, 이들 서비스 모형을 Stakelberg 게임의 관점에서 분석한다. 특히 본 연구에서는 웹2.0의 다양한 국면 중에서 프로슈밍(prosuming)에 초점을 맞춘다. 분석 결과, 웹2.0에서 사용자 후생이 웹1.0에 비해 크게 증가한다는 것을 확인할 수 있었다. 또한 사용자 스스로 맞춤화된 정보를 창출하는 노력과 한계편익간의 비율을 나타내는 ${\delta}_c$('고객화 요소'로 부름) 분포의 범위(파라미터 ${\delta}$)가 사회후생에 중요한 역할을 함을 발견하였다. 이는 고객화 요구의 다양성이 커짐에 따라 사용자 후생을 비롯한 사회후생도 증진됨을 의미한다.

  • PDF

A Study on Efficient Transmission of MultiMedia Contents based on CDN Infrastructure (CDN 인프라를 기반으로 한 멀티미디어 컨텐츠의 효율적인 전송 방안에 관한 연구)

  • 김선호;김기영;신용태
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1025-1033
    • /
    • 2003
  • The CDN is proposed as a solution of network bottleneck problem resulting from the rapid growth of Internet user and multimedia contents on the Internet. This paper suggests MDC and path diversity between CDN Edge server and end-user, and multicast transmission among CDN servers based on CDN infrastructure. It may be a solution for reliable and fast transmission of rich multimedia contents. These research will support to solve the unreliable transmission problem of multicasting and to create the new business models in the field of web contents.

  • PDF

The Trusted Push Service Scheme of Smartphone Using Jini 2.x Standard Security Model (Jini 2.x 보안 모델을 응용한 스마트폰 응용의 안전한 푸시 서비스)

  • Ji, Hyeong-Jun;Choi, Jae-Yeong;Kim, Sung-Ki;Min, Byeong-Joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.277-280
    • /
    • 2010
  • 본 논문에서는 Jini 2.x 표준 보안 모델을 활용하여 모바일 기기의 신뢰성 있는 푸시 서비스 방안을 제안한다. Jini 시스템은 유비쿼터스 네트워크 환경에서 서버와 클라이언트를 연결하는 기술이다. 또한 안전한 시스템 구성을 위해서 Jini 2.x 표준 보안 모델을 마련하여 보안을 강화하였다. 푸시 서비스는 사용자가 서버에 서비스를 등록하면 서버에서 각 사용자의 모바일 기기에 데이터를 전송한다. 이 푸시 서비스는 앞으로 많은 비즈니스 모델을 만들 것으로 예상된다. 하지만 푸시 방식은 풀 방식에 비해 많은 보안 문제를 발생시킬 것이다. 본 논문에서는 이전의 신뢰성 있는 푸시 서비스를 위한 방안과 Jini 2.x 표준 보안 모델이 어떻게 안전한 푸시 서비스를 제공할 수 있는지 살펴본다.

  • PDF

The Impacts of Entrepreneurial Orientation and Digital Orientation on Business Network, Development of Innovative Product and Internationalization Performance - Focused on International Venture Firms - (국제기업가지향성과 디지털지향성이 비즈니스 네트워크, 혁신적인 제품개발 및 국제화 성과에 미치는 영향 - 국제신생벤처기업을 중심으로 -)

  • Mi-Jung Kim;Myung-Su Chae
    • Korea Trade Review
    • /
    • v.46 no.3
    • /
    • pp.227-245
    • /
    • 2021
  • This study aims to examine how entrepreneurs' international entrepreneurial orientation and digital orientation affect business networks, innovative product development, and internationalization performance in a digital environment. For this purpose, data were collected from the CEOs of 192 domestic start-up venture companies. The causal relationship between the variables was analyzed through confirmatory factor analysis and structural model analysis using AMOS(18.0 version) for the collected data. It was confirmed that international entrepreneurial orientation and digital orientation have a positive effect on business networks. And the business network was found to have a positive effect on innovative product development and internationalization performance

The research regarding an information system risk management process characteristics (정보시스템 위험관리 프로세스 특성에 관한 연구)

  • Kim, Tai-Dal;Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.303-310
    • /
    • 2007
  • Information system failure is various such as program test unpreparedness, physical facilities for damage prevention unpreparedness from simple software error. Although cross is trifling the result causes vast damage. Recently, became difficult by simple outside security system to solve this problem. Now, synthetic countermove establishment and suitable confrontation connected with danger came in necessary visual point about general Information Technology of enterprise. In connection with, in this paper, various informations and system and control about data that can happen information inside and outside considering integrity for IT resource, solubility, confidentiality within organization studied about special quality to model synthetic Risk Management System that can of course and cope in danger.

Process Governance Meta Model and Framework (프로세스 거버넌스 메타모델과 프레임워크)

  • Lee, JungGyu;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.63-72
    • /
    • 2019
  • As a sub-concept of corporate or organization governance, business governance and IT governance have become major research topics in academia. However, despite the importance of process as a construct for mediating the domain between business and information technology, research on process governance is relatively inadequate. Process Governance focuses on activities that link business strategy with IT system implementation and explains the creation of corporate core values. The researcher studied the basic conceptual governance models of political science, sociology, public administration, and classified governance styles into six categories. The researcher focused on the series of metamodels. For examples, the traditional Strategy Alignment Model(SAM) by Henderson and Venkatraman which is replaced by the neo-SAM model, organizational governance network model, sequential organization governance model, organization governance meta model, process governance CUBE model, COSO and process governance CUBE comparison model, and finally Process Governance Framework and etc. The Major difference between SAM and neo-SAM model is Process Governance domain inserted between Business Governance and IT Governance. Among several metamodels, Process Governance framework, the core conceptual model consists of four activity dimensions: strategic aligning, human empowering, competency enhancing, and autonomous organizing. The researcher designed five variables for each activity dimensions, totally twenty variables. Besides four activity dimensions, there are six driving forces for Process Governance cycle: De-normalizing power, micro-power, vitalizing power, self-organizing power, normalizing power and sense-making. With four activity dimensions and six driving powers, an organization can maintain the flexibility of process governance cycle to cope with internal and external environmental changes. This study aims to propose the Process Governance competency model and Process Governance variables. The situation of the industry is changing from the function-oriented organization management to the process-oriented perspective. Process Governance framework proposed by the researcher will be the contextual reference models for the further diffusion of the research on Process Governance domain and the operational definition for the development of Process Governance measurement tools in detail.

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF