• Title/Summary/Keyword: Integration Security management

Search Result 146, Processing Time 0.027 seconds

Efficiency of Innovative Development Management: Interstate Assessment of the Economic Competitiveness in the Context of European Integration and Economic Security

  • Khodakivska, Olga;Ramos, Olena Ribeiro;Nechyporenko, Oleksandr;Tsiutsiupa, Svitlana;Krasnoshtan, Olexander;Mayovets, Yaryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.67-72
    • /
    • 2021
  • The article identifies areas for effective management of innovative development. The competitiveness of the economy in the context of European integration and economic security is assessed. The level of innovative economy of some countries of the world is analyzed. The issue of attracting foreign investors to stimulate innovative production in Ukraine is raised. It is identified the need for the formation of an updated state policy capable of providing innovative development and improving the competitive position of the state in international rankings. Emphasis is placed on the need to form a critical mass of managers-civil servants capable of developing, implementing and monitoring the policy of innovative development of entrepreneurship.

Difficulties in ERP integration in Umm Al Qura University: A Case Study

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.35-43
    • /
    • 2024
  • The development and integration of Enterprise Resource Planning (ERP) systems have consistently attracted attention from software engineering researchers. Many studies have examined the factors that influence successful ERP integration, while others have focused on introducing integration models that address issues and challenges that affect the successful integration of ERP. However, it is crucial to recognize that the key player in successful integration is the individual involved. This paper aims to investigate how individuals based on departmental attachments and experiences have viewed the factors that affected the success of ERP integration. A case study was conducted at one large organization namely Umm Al Qura University, Saudi Arabia. Five departments were involved namely: Financial management, purchasing management, warehouse management, human resources management, and the Deanship of Information Technology. The results of 78 participants were collected and analyzed. Furthermore, it was different how individuals from different departments involved in the ERP integration viewed the factors that affected the success of integration. In addition, it was noticed that individuals with different experiences have various views on the factors. Moreover, it was evident that departmental attachments and individual experience might play a role in the successful integration of ERP.

A Study on Integration Security Management Model in Cloud Environment (클라우드 환경에서의 통합 보안관제 모델 연구)

  • Byun, Yun Sang;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.407-415
    • /
    • 2013
  • Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

Improvement of Physical security System Operation (물리적 보안시스템 운용수준 분석)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.282-286
    • /
    • 2014
  • This study is to present an improvement of physical security system operation by survey on the install and operation of physical security system of 90 facilities. The level of CCTV operation is higher than Access Control system and Intrusion Detection System. But the level of maintenance and management of physical security system is low. The rate of install of X-ray Inspection device show the concern on material detection, although the rate is low. The level of install and operation for the Integration of physical security system is low, so integration of security personnel and security system is necessary for the effective operation. For reinforcement of access control management, security gate and preparing of some obstacles are required with RFID.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

A Study on the Development of Convergence Security with the Changes in Security Environments (시큐리티 환경변화에 따른 융합보안의 대두와 물리보안업체의 대응)

  • Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.31-40
    • /
    • 2011
  • As new technologies emerge and threats become increasingly complex and unpredictable, security professionals who are living in the age of information face an increasingly complex array of challenges. In recent, virtually all organizations with physical and IT assets protect those assets in a variety of methods. There are physical systems to protect facilities and their contents from unlawful trespassing. It is important to note that the integration of physical and IT security is to be required: When done correctly, the integration starts with laws, strategies, policies and procedures. Integration of physical and IT security systems is done not for its own sake but in support of security policies and procedures. Significant security improvements can be made by integrating physical and IT security management without necessarily integrating physical and logical electronic security systems. Up to now, the private security industries of the Republic of Korea have been operated and developed by the separation of physical security and industrial security. However, considering the fast changing security environments, physical security companies should turn their attention to security convergence field to cope with the new trends in the security matters. At the same time, governmental supports on the improvement of various laws, regulations and policies in such a way to meet the realistic needs of the industries should be followed.

Extenuating Food Integrity Risk through Supply Chain Integration: The Case of Halal Food

  • Ali, Mohd Helmi;Tan, Kim Hua;Pawar, Kulwant;Makhbul, Zafir Mohd
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.2
    • /
    • pp.154-162
    • /
    • 2014
  • Effects of food scandals on religious belief, human health and even on causes of death indicate that firms and consumers are vulnerable to integrity risks in the global supply chain. Mitigating the integrity risk and maintaining the credence quality products like halal food is very challenging, if not impossible. Our aim in this research is to show that supply chain integration can mitigate the halal food integrity risk. To illustrate this idea, we have conducted case studies and interviews in seven Malaysian chicken supply chain focal firms. We unpack the halal integrity risks along the supply chain, such as production risk, raw material risk, food security risk, outsourcing practices risk, service risk, and logistics risk. The research argues that supply chain integration, such as internal integration and external integration practices, could minimize the halal integrity risk. The advantages of supply chain integration in mitigating the halal integrity risk are also highlighted in this paper.

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.