• Title/Summary/Keyword: SMB Information System

Search Result 338, Processing Time 0.027 seconds

A Study of Successful IT Outsourcing model for SMB

  • Jeong, Seon-Phil;Kim, Yeong-Real
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.301-304
    • /
    • 2005
  • Most of the small and medium industries rather focus on immediate problems and how to properly maintain organizational matters and existing system than the strategic and operational use of Information Technology when they deal with applications and operation of Information System. This study found out that there were few studies on IT outsourcing for small and medium companies in Korea compared to large enterprises' IT outsourcing. Most preceding studies researched the problems of partnership and technical, managerial, and economical success factors for big companies. Small and medium companies have the problems of financial difficulty, organizational scale (40.3%), shortage of manpower for system operation (24.1%), and lack of practical use of managers (8.9%). SMB firms have required support of government for their Informationalization but, we found out amount of companies (41%) not be informed or don't account on government's supporting IT of SMB programs. In addition, Range and Contents of outsourcing, Reputation of Outsourcing vendor, Reliability of maintaining were selected as CSFs of SMB IT outsourcing. While large corporation staff more considered CEO's willing and inner facts of their companies.

  • PDF

A Study on the Improved Proposal of SMB Enterprises IT Supporting Policy (중소기업 정보화 A/S지원사업의 정책 개선에 관한 연구)

  • Kang Min-Shik
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.2
    • /
    • pp.133-138
    • /
    • 2005
  • The South Korean Government had supported the IT implementation of 30,000 SMB(Small and Medium-sized) enterprises from '2000 to '2003 for the purpose of the competitiveness of SMB enterprises. However, the utilization rate of If package is very low. This paper recommanded the improved suggestion of the existed policies of the following service of the SMB industry's information technology implementation. There are industry-university cooperation program, efficient on-offline integration system, the development of SMB industry's IT performance measure evaluation index and so on.

A study on the success factors in the Enterprise Information Systems introduced (기업 정보시스템 도입 시 성공 요인에 관한 연구)

  • Shin, Jong-Chang;Kim, Kyung-Ihl
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.1-8
    • /
    • 2016
  • In this study, we must investigate what the major success factors that should be considered before introducing to successfully achieve the goal of building enterprise information systems. To evaluate the factors significantly affecting among the success factors. This study is to present by analyzing the typical success factors affecting successful introduction of the system information to companies that lack sufficient information and reviews for the introduction of enterprise information systems.

Effective Countermeasure to APT Attacks using Big Data (빅데이터를 이용한 APT 공격 시도에 대한 효과적인 대응 방안)

  • Mun, Hyung-Jin;Choi, Seung-Hyeon;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.1
    • /
    • pp.17-23
    • /
    • 2016
  • Recently, Internet services via various devices including smartphone have become available. Because of the development of ICT, numerous hacking incidents have occurred and most of those attacks turned out to be APT attacks. APT attack means an attack method by which a hacker continues to collect information to achieve his goal, and analyzes the weakness of the target and infects it with malicious code, and being hidden, leaks the data in time. In this paper, we examine the information collection method the APT attackers use to invade the target system in a short time using big data, and we suggest and evaluate the countermeasure to protect against the attack method using big data.

Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey (중소기업 정보시스템의 공격예방 및 탐지를 위한 대응 : 서베이)

  • Mun, Hyung-Jin;Hwang, Yooncheol;Kim, Ho-Yeob
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.1-6
    • /
    • 2015
  • Small and medium-sized companies lack countermeasures to secure the safety of a information system. In this circumstance, they have difficulties regarding the damage to their images and legal losses, when the information is leaked. This paper examines the information leakage of the system and hacking methods including APT attacks. Especially, APT attack, Advanced Persistent Threats, means that a hacker sneaks into a target and has a latency period of time and skims all the information related to the target, and acts in the backstage and neutralize the security services without leaving traces. Because he attacks the target covering up his traces not to reveal them, the victim remains unnoticed, which increases the damage. This study examines attack methods and the process of them and seeks a countermeasure.

  • PDF

The Effects of Accounting Service Worker's Professionalism and Accounting Information System's Level on the Quality of Customer's Accounting Information (회계서비스종사자 전문성과 회계정보시스템 수준이 고객사 회계정보의 질에 미치는 영향)

  • Lee, Ji-Young;Kim, Kyung-Ihl
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.1-6
    • /
    • 2016
  • The purpose of this study is to verify mainly qualitative characteristics impact on the quality of customer's accounting information to analyze the expertise and the level of accounting system, accounting service worker. This method was conducted in empirical research by the hypothesis based on the survey after examining theoretical background founded on the literature search. As a result, by accounting information systems needed Accounting services worker's professionalism, customer to be served most satisfies faithful representation among the qualitative characteristics and it showed timeliness is low satisfaction. This study will contribute to enhance the recognition and improvement of expertise of the accounting service workers, in the future for improving the quality of accounting information system, discussion will be needed about the contents and method for education and training.

Design of a User Authentication System using the Device Constant Information (디바이스 불변 정보를 이용한 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.29-35
    • /
    • 2016
  • This paper presents the design of a user authentication system (DCIAS) using the device constant information. Defined design a new password using the access device constant information to be used for user authentication during system access on the network, and design a new concept the user authentication system so that it can cope with the threat required from passive replay attacks to re-use the password obtained in other applications offer. In addition, by storing a password defined by the design of the encrypted random locations in the server and designed to neutralize the illegal access to the system through the network. Therefore proposed using the present system, even if access to the system through any of the network can not know whether any where the password is stored, and if all right even stored information is not easy to crack's encrypted to neutralize any replay attacks on the network to that has strong security features.

Improved Integrated Monitoring System Design and Construction (개선된 통합모니터링 시스템 설계 및 구축)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.25-33
    • /
    • 2017
  • In order to prevent information leakage, companies are monitoring the information leakage by internal staff by building individual security system and integrated monitoring system of firewall and DLP function. Especially, many log data of the integrated monitoring system cause time and money, and it is difficult to detect information leak of fast malicious personnel due to system slowdown. It is necessary to speed up the system by digitizing large log data for each day and person for fast information leakage detection and there is a need to develop and manage a continuous monitoring program for the information leakage indications personnel. Therefore, we propose an improved integrated monitoring system using log data by date and individual data.

A Study on Smart Campus Information Services (스마트 캠퍼스 정보제공 서비스에 관한 연구)

  • Choi, Shin-Hyeong
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.79-83
    • /
    • 2016
  • The purpose of this study is to provide customized information to student which study and live in a university campus. In this study, we collect internal data of campus and external data on the Internet such as the blog or SNS and, then store and process them. After that, we propose a system for providing individual students one-to-one marketing by analyzing these data in detail. This system analyzes purchase history information and the attendance of the building, and then transmits the coupon and information individually according to the pattern to the student's mobile phone.

Integrated Monitoring System using Log Data (로그 데이터를 이용한 통합모니터링 시스템)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, we propose to implement an integrated monitoring system using log data to reduce the load of analysis task of information security officer and to detect information leak in advance. To do this, we developed a transmission module between different model DBMS that transmits large amount of log data generated by the individual security system (MSSQL) to the integrated monitoring system (ORACLE), and the transmitted log data is digitized by individual and individual and researches about the continuous inspection and measures against malicious users when the information leakage symptom is detected by using the numerical data.