• Title/Summary/Keyword: Information Application

Search Result 20,424, Processing Time 0.042 seconds

ISM Application Tool, A Contribution to Address the Barrier of Information Security Management System Implementation

  • Chandra, Nungky Awang;Sadikin, Mujiono
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.39-48
    • /
    • 2020
  • Information-security management systems (ISMSs) are becoming very important, even for micro, small, and medium enterprises (MSMEs). However, implementing an ISMS is not an easy task. Many obstacles must be overcome, e.g., complexity, document tracking, competency management, and even changing cultures. The objective of our study is to provide ISMS application tools, based on ISO 27001:2013 ISM frameworks. The application was developed on the Odoo Open Enterprise Resource Planning platform. To validate its feasibility for future improvement, the application was implemented by an MSME company. For this implementation, information-security-related users gave their feedback through a questionnaire. The distributed feedback questionnaire consists of nine assessment parameters, covering topics from the application's technical aspects to users' experiences. Based on the questionnaire feedback, all users of the application were satisfied with its performance.

A Study on Implementation of Safety Navigation Mobile Application Converging Marine Environment Information and Location-Based Service

  • Jeon, Joong-Sung
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.289-295
    • /
    • 2019
  • In this paper, we implemented a safety navigation mobile application that converged AtoN information and location-based services. When application user uses the smartphone's GPS sensor to transmit the user's vessel location data to the data server, the user receives information of which its providing range is considered, such as stored AtoN data, neighboring vessels information, danger area, and weather information in the server. Providing information is sorted based on the smartphone's direction and inclination and it will be also delivered via wireless network (5G, LTE, 3G, WiFi). Additionally the application is available to implement other functions such as information provision through voice and text alarming service when the user's vessel is either approaching or entering the danger area, and an expanded information provision service that is available in shadow area linking with data-storing methods; other linkable data such as weather and other neighboring vessels will be applied based on the lasted-saved data perceived from the non-shadow area.

The Effect of Information Protection Control Activities on Organizational Effectiveness : Mediating Effects of Information Application (정보보호 통제활동이 조직유효성에 미치는 영향 : 정보활용의 조절효과를 중심으로)

  • Jeong, Gu-Heon;Jeong, Seung-Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.71-90
    • /
    • 2011
  • This study was designed to empirically analyze the effect of control activities(physical, managerial and technical securities) of information protection on organizational effectiveness and the mediating effects of information application. The result was summarized as follows. First, the effect of control activities(physical, technical and managerial securities) of information protection on organizational effectiveness showed that the physical, technical and managerial security factors have a significant positive effect on the organizational effectiveness(p < .01). Second, the effect of control activities(physical, technical and managerial securities) of information protection on information application showed that the technical and managerial security factors have a significant positive effect on the information application(p < .01). Third, the explanatory power of models, which additionally put the information protection control activities(physical, technical and managerial securities) and the interaction variables of information application to verify how the information protection control activities( physical, technical and managerial security controls) affecting the organizational effectiveness are mediated by the information application, was 50.6%~4.1% additional increase. And the interaction factor(${\beta}$ = .148, p < .01) of physical security and information application, and interaction factor(${\beta}$ = .196, p < .01) of physical security and information application among additionally-put interaction variables, were statistically significant(p < .01), indicating the information application has mediated the relationship between physical security and managerial security factors of control activities, and organizational effectiveness. As for results stated above, it was proven that physical, technical and managerial factors as internal control activities for information protection are main mechanisms affecting the organizational effectiveness very significantly by information application. In information protection control activities, the more all physical, technical and managerial security factors were efficiently well performed, the higher information application, and the more information application was efficiently controlled and mediated, which it was proven that all these three factors are variables for useful information application. It suggested that they have acted as promotion mechanisms showing a very significant result on the internal customer satisfaction of employees, the efficiency of information management and the reduction of risk in the organizational effectiveness for information protection by the mediating or difficulty of proved information application.

Application Traffic Classification using PSS Signature

  • Ham, Jae-Hyun;An, Hyun-Min;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2261-2280
    • /
    • 2014
  • Recently, network traffic has become more complex and diverse due to the emergence of new applications and services. Therefore, the importance of application-level traffic classification is increasing rapidly, and it has become a very popular research area. Although a lot of methods for traffic classification have been introduced in literature, they have some limitations to achieve an acceptable level of performance in real-time application-level traffic classification. In this paper, we propose a novel application-level traffic classification method using payload size sequence (PSS) signature. The proposed method generates unique PSS signatures for each application using packet order, direction and payload size of the first N packets in a flow, and uses them to classify application traffic. The evaluation shows that this method can classify application traffic easily and quickly with high accuracy rates, over 99.97%. Furthermore, the method can also classify application traffic that uses the same application protocol or is encrypted.

A Study on the Automated Design of Business Card for Personal Information Leakage Prevention Using IT-based Convergent Service

  • Park, Jong-Youel
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.25-30
    • /
    • 2018
  • When producing a business card, there is always a risk for exposing personal information as the information from the business card application is saved in the computer of the printing agency. The information that goes into the business card application file, such as name, mobile phone number, and e-mail address is not encrypted, which makes it easy to access. This study was conducted in order to find a way to automatize the business card application process by encrypting the information entered into the business card application file, simplifying the business card application process, minimizing the workload and by directly linking to the print shop to remove the print file after completing the printing of the business card.

Development of A Pilot Android Application for Location-based Mobile Agricultural Information System (위치기반 모바일 농업정보시스템 구축을 위한 안드로이드 애플리케이션 시험 개발)

  • Kim, Sang Min;Jang, Min-Won
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.4
    • /
    • pp.277-284
    • /
    • 2014
  • Recently the use of smart phones and mobile devices is increasing rapidly, data search and retrieval in the mobile environments are generalized. There are only few mobile applications available in the area of agriculture while huge amount of new applications are developed and uploaded. The purpose of this study was to develop the android based mobile application for providing agricultural infrastructure and disaster information. The mobile application was designed through the database establishment and management system, server management system, and mobile application development. The database is composed of weather data, agricultural infrastructure data, and agricultural disaster data. By developing the mobile application which provides agricultural infrastructure information, it is expected to improve the accessibility to agricultural information and mitigate the agricultural disaster damages.

Web Based Collaborative Application Form Agent System

  • Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.1 no.1
    • /
    • pp.35-39
    • /
    • 2005
  • This research employs the intelligent application form agent to help people to locate the information they would want from Internet quickly. Based on Internet GUI environment, this user-friendly online application form program uses the agent concept to provide the customized, individual information to the users who registered their application form answers, to the extent of increasing the interest and participation of users. The system helps along with the decision making process, by quickening the information gathering process.

  • PDF

An Application Design for Disaster Information Alert based on GIS using Iphone (아이폰을 이용한 GIS 기반 방재 정보 어플리케이션)

  • Zhang, Ming;Ban, Ga-Un;Kim, Chang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.380-382
    • /
    • 2012
  • In recently, we are utilizing the Smart phone in a lot of fields. Thus the personal developers and companies developed the smart phone application and utilize it for disaster information system and disaster alert service. Utilization of Iphone applications as disaster information alert is currently not popular. And, the existing Iphone application only has very few features. So, a powerful iphone application of disaster information collection and service based on GIS is very necessary for users.

  • PDF

Use of Software Agent Technology in Management Information System: A Literature Review and Classification

  • Hamirahanim Abdul Rahman;Jinsoo Park;Jihae Suh
    • Asia pacific journal of information systems
    • /
    • v.29 no.1
    • /
    • pp.65-82
    • /
    • 2019
  • Technological innovations over the years have accentuated the workings in corporate- connected organizations and different application platforms. Hence, a unified management information system (MIS) that can utilize the Web and propel programming developments is required. Software agents, the latest developments in computer software technology, can be utilized to rapidly and effortlessly build integrated information systems. Consequently, 59 research papers on the use of software agents in MIS were identified from top 40 MIS journals published between 2007 and 2017. Then, we reviewed and classified all the research papers according to two categories: application fields and application categories. The application fields consisted of eight sub-groups: manufacturing, telecommunication systems, traffic and transportation management, information filtering and gathering, electronic commerce, business process management, entertainment, and medical care; whereas the application categories consisted of three sub-groups: multi-agent systems, personal assistants, and multi-agent simulation. The research papers were further divided into journal and year of publication, and journal and application field. The objective of our research was to understand the trend of the use software agent technology in MIS by examining the published research paper beside to add knowledge and content to the information system academic discipline.