• Title/Summary/Keyword: Internal Network Information

Search Result 504, Processing Time 0.03 seconds

Correlation Analysis between Internal Transactions and Efficiency of Chaebol Affiliates Using Social Network Analysis (사회연결망분석을 이용한 대기업집단 내부거래와 효율성의 상관분석)

  • Na, Gi Joo;Cho, Nam Wook
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.49-65
    • /
    • 2015
  • As South Korean large business groups, also known as Chaebol, have broadened their influence in the domestic economy, it is important to analyze the influence of internal transactions among Chaebol affiliates on their performance. In this paper, relationship between internal transactions and efficiency of Chaebol affiliates has been analyzed. Top five Chaebol groups in South Korea are selected; they include Samsung, Hyundai Motors, LG, SK, and Lotte group. Based on internal transactions among affiliates, social networks are constructed for each Chaebol group to analyze centrality, network structures and cliques. Data Envelopment Analysis (DEA) was conducted to examine the efficiency of the Chaebol affiliates. Then, correlations between the degree centrality and the efficiency of Chaebol affiliates were analyzed, and the network structures of Chaebol groups are presented. The result shows that positive correlations between degree centrality and efficiency are observed among four Chaebol Groups. This paper shows that the Social Network Analysis (SNA) techniques can be used in the empirical research for the analysis of internal transactions of Chaebol groups.

Evaluation of VSN(Virtual Switch Network) Characteristics in the Call Process of IMT-2000 Switching System (IMT-2000 교환시스템에서 호 처리에 의한 VSN(Virtual Switch Network)의 특성 평가)

  • 김대식;한치문류근호
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.265-268
    • /
    • 1998
  • This paper evaluates the VSN(Virtual switch Network) characteristics in the internal call processing of IMT-2000 switching system, which is composed of VSN instead of ATM switch network. In results, internal call establishment delay is increased approximately 5.4msec than the conventional ATM switching system. The evaluated condition is the load 0.8, and the 100km distance between VSNs. It is confirmed that the VSN has the potentiality in the practical implementation.

  • PDF

Using The Internet As A Tool For The Illicit Sale Of Drugs And Potent Substances

  • Manzhai, Oleksandr;Cherevko, Kyrylo;Chycha, Ruslan;Burlaka, Iryna;Piadyshev, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.246-250
    • /
    • 2022
  • The article analyzes the regulations of current criminal law and current issues, combating drug crime on the Internet, as well as measures to combat drug crime in the field of modern information technology. In connection with the growth of crimes in the field of drug trafficking committed with the use of information and telecommunications technologies, the urgent task of the state is to find effective ways to reduce drug crime. The article considers criminologically significant aspects of the mechanism of illicit drug trafficking, which is carried out with the use of information and telecommunication technologies and means of remote communication.

Network 2-Factor Access Control system based on RFID security control system (RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템)

  • Choi, Kyong-Ho;Kim, Jong-Min;Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.53-58
    • /
    • 2012
  • Network Access Control System that is one of the efforts to protect the information of internal applies to effectively control of insider and automatic network management and security. However, it has some problems : spoofing the authorized PC or mobile devices, connect to the internal network using a system that authorized users are away. In addition, information leakage due to malicious code in the same system. So in this paper, Network 2-Factor Access Control System based on RFID security control system is proposed for safety communication environment that performing a two-factor authentication using authorized user and devices to connect to the internal network.

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Development of a Monitoring System Based on the Cooperation of Image and Sensor Information (영상 정보와 센서 정보의 협업에 의한 모니터링시스템 개발)

  • Kwon, Cha-Uk;Cha, Kyung-Ae;Kim, Joo-Sung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.2
    • /
    • pp.46-56
    • /
    • 2010
  • This study proposes a monitoring system by cooperating the image information and the sensor information in a sensor network system. The monitoring system proposed in this study is divided into internal spaces, such as offices and laboratories, and external spaces including other various spaces. In the internal spaces, motions in objects are detected through cameras while some peripherals like lights are controlled by analyzing some temperature, humidity, and illuminance data detected by sensor nodes. In the external spaces, it is to watch certain intruders to the internal spaces through the interested region for exceptional time by installing cameras, motion detectors, and body detectors in such interested regions. In the results of the test that was applied to a practically limited environment by implementing some interfaces for the proposed system, it was considered that it is possible to watch surroundings effectively using the image information obtained from cameras and sensor information acquisited from sensor nodes.

A Case Study on the Internal and External Use of Information Sharing Network: A Qualitative Approach (정보공유 네트워크의 조직 내외부 활용에 관한 사례 연구: 질적 연구를 바탕으로)

  • Kim, Jonghyuk;Kim, Suk-Chul
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.205-226
    • /
    • 2016
  • As knowledge workers have increased and information interchanges become more diverse, only the resources of internal enterprise is not longer useful, and the practical use of external information through information public sharing network is even more crucial. But, few studies that use both internal and external information sharing systems together have been conducted. In this research, we carried on the depth interview to analyze the main factors that intend to utilize outside information as well as to share inside information voluntarily. In conclusion, sharing internal information is directly involved with the performance of their job exchanging simple data, past documents, and technical materials. On the other hand, using the external information belonged to several other organizations is mostly caused by the voluntary participants' satisfaction sharing their individual experience through the network systems. Based on the study, we propose the idea that can activate both internal and external information sharing network through the system with user feedback function regarding the customized information, and with the space expansion where people can freely raise their private opinion. We also introduce the plan of the construction of communication systems with various experts, and the development of compatible devices with diverse interfaces.

  • PDF

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

Generation of Internet Server Profile Using Packet Mining (패킷 마이닝 기법을 사용한 인터넷 서버 프로파일의 자동생성 연구)

  • Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.39-41
    • /
    • 2002
  • Management of internal Internet servers is increasingly becoming an important task. According to meet this requirement, they use service log analysis tools and network monitoring tools. But these are not enough to produce advanced management information considering contents of Internet services. Therefor we propose a system and let it detect Internet server systems existing in internal network and individuate those systems with providing profile. Internet server profile includes system's basic information, network traffic information, and Internet service usage information.

  • PDF

Design and Implementation of Internal Network and VPN-based NVR System (내부망 및 VPN 기반 NVR 시스템 설계 및 구현)

  • Byeong-Seon Park;Hee-Kwon Lee;Dong-Hwan Hwang;Yong-Kab Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.1-6
    • /
    • 2024
  • In this paper, we designed and implemented the security network NVR system that can flexibly use the internal network and VPN network. In general, the NVR systems that only use internal networks cannot be access from the outside, which has the disadvantage of unnecessary inspections and inability to access from the outside. External access has made possible using the VPN security network, and a NVR system software was designed and implemented so that the existing internal network could be used. We compared with the NVR system usage environment in the internal network through the client and the NVR system. It also has implemented usage environment with the VPN network through the mobile APP, and confirmed that the same NVR was operating normally with the same functions. We also studied on IP based NVR for flexible access with closed loop network based on VPN system.