• Title/Summary/Keyword: Ministry of Information and Communication

Search Result 322, Processing Time 0.025 seconds

The Formation of Information Technology Clusters in Kazakhstan: System and Structured Approaches

  • Kireyeva, Anel A.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.3 no.2
    • /
    • pp.51-57
    • /
    • 2016
  • The aim of this study is to examine of the cluster approach to ensure high rates of innovation, information and communication enterprises of information technology cluster in order to enhance the competitiveness of regions. Keeping with the previous literature, the present research determined that the novelty of the problem, concerning of the creation IT clusters as drivers of new generation, i.e. a kind of platform of "startup accelerators" through the creation of previously not existing in the country high-tech industries and sectors of the economy. The study employs system approach involves to determine prospective directions of the formation of clusters of IT industry, also applies structured approach to shows relationships between elements of cluster systems (participants of cluster), as well as focusing on some aspects of cluster development such as networking. Based on this analysis we have proposed to create clusters in regions, which can play the role of translator's innovations at the periphery of the country. This research shows that formation of IT clusters is one of the most successful tools to avoid of dependence of Kazakhstan from raw materials.

A Polynomial Complexity Optimal Multiuser Detection Algorithm Based on Monotonicity Properties

  • Quan, Qingyi
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.479-481
    • /
    • 2010
  • An optimal multiuser detection algorithm with a computational complexity of O(K log K) is proposed for the class of linear multiple-access systems which have constant cross-correlation values. Here the optimal multiuser detection is implemented by searching for a monotone sequence with maximum likelihood, under the ranking of sufficient statistics. The proposed algorithm is intuitive and concise. It is carried out in just two steps, and at each step only one kind of operation is performed. Also, the proposed algorithm can be extended to more complex systems having more than a single cross-correlation value.

IPTV Contents Protection Technology (IPTV 방송 콘텐츠의 보호 기술)

  • Lee Wan-Bok;Roh Chang-Hyun;Woo Je-Hak
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.101-106
    • /
    • 2005
  • According to the IT839 strategy which was announced by the Ministry of Information and Communication(MIC) in 2004, the convergence trend of the broadcasting and the communication would be much more promoted. Thus, the methods for protecting the broadcasting contents will be indispensible elements for the successful IPTV service achievement. This paper describes the characteristics of IPTV and the related contents protection techniques. To evaluate several security issues, we suggest a security model for IPTV, and speculate the most widespread, two security technologies for IPTV such as CAS and DRM.

  • PDF

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

Analysis of Chinese ASP Market and Implications for Korean Firm's Chinese Market Entry Strategy (중국 ASP 시장 분석과 한국 기업의 진입 전략에 대한 시사점)

  • Kim Dae-Ho;Kwon Sun-Dong
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.1
    • /
    • pp.95-116
    • /
    • 2006
  • Many SMEs have adopted ASP models which have brought various benefits to SMEs such as decreasing the total cost, using new IT technology, enhancing the maintenance, and implementing the information systems rapidly. Ministry of Information and Communication had implemented the ASP diffusion project for the ASP venders and SMEs between 2001 and 2003. As results of this project, various industries adopted the ASP applications of which the performance was enhanced, and then the competitiveness of the ASP vendors in Korea was increased. The purpose of this study is to make a strategy of the penetration into China market for ASP services which have competitive advantages. This study uses various research methods such as questionnaire survey, visiting SMEs in china and making interviews. This study shows the current status of Chines ASP market, the several cases of using ASP services, and questionnaire analyses(service recognition, service requirement and factors and infrastructure, business environment and supporting organizations etc) of ASP demand. And finally this study proposes several strategic considerations in entering China market and suggests several support policies for supporting Korean ASPs.

  • PDF

The Study for Establishment of Security Threat Measures for Secure NFC Service (안전한 NFC 서비스 활용 활성화를 위한 보안 위협 대책 마련을 위한 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.219-228
    • /
    • 2018
  • The utilization of NFC has been continuously increasing due to the spread of smart phones and the development of short-range wireless communication networks. However, it has been suggested that stability and security of convenient NFC short-range wireless communications can be unstable and problematic. The unstable causes for NFC are the lack of security technologies for NFC, the controversy about personal information infringement, and the lack of social awareness on security breach against data settlement. NFC service can be conveniently used by simply touching other NFC devices and NFC tags through the NFC device. This thesis analyzes that NFC authentication technology, which is convenient for user are one of the unstable causes of security of NFC. This thesis suggest that ministry should research countermeasures and promote how users can use NFC safely. It also suggests that users should have awareness when they use payment and authentication service through NFC to prevent from security threat.

A Study on the Crisis Management Standard Manual for Large-scale Human Accident at Workplace for Efficiency of Disaster Response (재난대응 효율화를 위한 사업장 대규모 인적사고 위기관리 표준매뉴얼 개정방안 연구)

  • Woo Sub Shim;Sang Beam Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.656-664
    • /
    • 2023
  • Purpose: The Ministry of Employment and Labor manages disasters based on the standard manual for risk management of large-scale human accidents in workplaces when large-scale disasters such as fires and collapses occur in workplaces. We are going to check the standard manual currently in operation and suggest improvement plans for the insufficient items. Method: Accordingly, the standard manual was checked together with internal and external experts in the disaster management manual and disaster management staff at headquarters and local government offices, and items to be improved were identified with priority. Result: In case of a collapse accident, it is necessary for the Ministry of Public Administration and Security to accurately present the selection criteria in order to eliminate the controversy over the selection of the disaster management department. In addition, it seems necessary to supplement the details of the disaster safety communication network operation and evacuation guidelines. Conclusion: In the future, in order to improve the disaster management system that meets the public's eye level, it is expected to prepare a standard manual for risk management of large-scale human accidents in workplaces that guarantees the lives and safety of workers through the collection of opinions from experts in the relevant field, disaster management personnel, and the general public.

Handling Of Sensitive Data With The Use Of 3G In Vehicular Ad-Hoc Networks

  • Mallick, Manish;Shakya, Subarna;Shrestha, Surendra;Shrestha, Bhanu;Cho, Seongsoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.49-54
    • /
    • 2016
  • Data delivery is very challenging in VANETs because of its unique characteristics, such as fast topology change, frequent disruptions, and rare contact opportunities. This paper tries to explore the scope of 3G-assisted data delivery in a VANET within a budget constraint of 3G traffic. It is started from the simple S_Random (Srand) and finally reached the 3GSDD, i.e., the proposed algorithm. The performance evaluation of different algorithms is done through the two metrics delivery ratio and average delay. A third function utility is created to reflect the above two metrics and is used to find out the best algorithm. A packet can either be delivered via multihop transmissions in the VANET or via 3G. The main challenge is to decide which set of packets should be selected for 3G transmissions and when to deliver them via 3G. The aim is to select and send those packets through 3G that are most sensitive and requiring immediate attention. Through appropriate communication mechanism, these sensitive information are delivered via VANET for 3G transmissions. This way the sensitive information which could not be transmitted through normal VANET will certainly find its destination through 3G transmission unconditionally and with top priority. The delivery ratio of the packets can also be maximized by this system.

A Case Study on Efficiency Evaluation of DMUs Performances for Digital Pioneer Project by Data Envelopment Analysis Model (DEA를 활용한 차세대첨단콘텐츠육성사업 참여 DMU의 효율성 평가에 관한 사례 연구)

  • Shin, Jae-Shig;Yang, Hae-Sool
    • Journal of Information Technology Services
    • /
    • v.6 no.1
    • /
    • pp.65-81
    • /
    • 2007
  • Recently, the affiliates of the Ministry of Information and Communication have been conducting a performance evaluation study on IT policy projects, based on the performance evaluation model of the U.S. Office of Management and Budgets, with regard to investment in computerization. The performance evaluation model for the policy project could provide the objective information required for the planning, development, and operation of the policy project. However, the performance of the most policy project is likely to be evaluated using the subjective evaluation criteria of evaluators. Therefore, this case study evaluates the relative efficiency using DEA (Data Envelopment Analysis) in order to improve the performance evaluation method of the digital pioneer' project implemented by the Korea IT Industry Promotion Agency. The improvement value of inefficient Decision Making Units (DMUs) was measured by a static efficiency analysis. The measured value will suggest a objective viewpoint of the performance between DMUs to evaluators. In doing so, it will show an appropriate direction for the policy project to be evaluated successfully.

Critical Success Factors for the Implementation of e-Government: From the e-Government Officials' Perspective (국내 전자정부 담당자의 시각에서 본 전자정부 구현의 주요 성공요소)

  • Jeong, Seung-Ryul;Kim, Kyung-Sup
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.241-256
    • /
    • 2005
  • This study first identifies the critical factors for the successful e-government implementation. Then, it examines how these factors are emphasized and recognized during our e-government implementation process. Finally, it analyzes the relationship between the critical factors and the e-government performance and provides the way in which our e-government is successfully developed.