• Title/Summary/Keyword: SMB Information System

Search Result 337, Processing Time 0.019 seconds

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

Design and Implementation of Interactive Search Service based on Deep Learning and Morpheme Analysis in NTIS System (NTIS 시스템에서 딥러닝과 형태소 분석 기반의 대화형 검색 서비스 설계 및 구현)

  • Lee, Jong-Won;Kim, Tae-Hyun;Choi, Kwang-Nam
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.9-14
    • /
    • 2020
  • Currently, NTIS (National Technology Information Service) is building an interactive search service based on artificial intelligence technology. In order to understand users' search intentions and provide R&D information, an interactive search service is built based on deep learning models and morpheme analyzers. The deep learning model learns based on the log data loaded when using NTIS and interactive search services and understands the user's search intention. And it provides task information through step-by-step search. Understanding the search intent makes exception handling easier, and step-by-step search makes it easier and faster to obtain the desired information than integrated search. For future research, it is necessary to expand the range of information provided to users.

A Study on Improvement Plans of SMEs Support Policy for Information Security in Korea (국내 중소기업 정보보호 지원 정책 개선 방안에 관한 연구)

  • Jang, Sang-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.332-339
    • /
    • 2020
  • This study aims to analyze problems and deduce improvement plans for information security support policies for SMEs in Korea. To this end, an effective support policy necessary for reinforcing cyber safety nets to enhance the level of information security of domestic SMEs based on the analysis results by analyzing the status and problems of the previous research review and analysis, the current status of information security of SMEs and the information security support policies of major SMEs at home and abroad. I would like to suggest improvement measures. Reinforcement of awareness, legal basis, voluntary capacity building, joint response system, professional manpower and budget support, cyber security construction, untact era support, and regional strategic industry security internalization were suggested. This can be used as the government's information security support policy to raise the level of information security of SMEs in preparation for the post Covid19.

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.

A Study on G2 Risk and Export Diversification: Focusing on Export Support System for SMEs (수출다변화를 통한 G2 리스크 극복 방안에 관한 연구: 중소기업 수출지원 정책을 중심으로)

  • Choi, Don-Seung;Khoe, Kyung-Il
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.48-55
    • /
    • 2019
  • This study argued problems and improvement of export support system for SMEs in the uncertain world global trade environment with G2(US-China) risk. In SMEs export support system, The authorities needs stronger control tower to promote consistent export support policies. There is also another problem of repetitious work that export support system has been operated by individual project. In order to overcome these problems, first, the authorities set clearly organization to control various export support policies. Second, export support system needs the efficient operation based on long term road map. Third, the authorities defines clear roles and responsibilities of supporting units, and enhances cooperation between the different organizations. Finally, the system should arrange performance evaluation index and feedback system to build the desirable export support system.

An Empirical Study on the factors for Information Protection Policy of Employee's Compliance Intention (정보보호정책 준수의도에 미치는 요인에 관한 경험적 연구)

  • Kwon, Jang-Kee;Lee, Joon-Taik
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.7-13
    • /
    • 2014
  • In recent years, according to the increasing of information security compliance, information security management system's requirements is not a matter of choice but an essential problem. In this respect, this research have an invention to survey what it will affect employees in compliance with the privacy policy antecedents and how to apply this information for the future, and to suggest ways to improve the employees' information security policy compliance intentions. In this paper, To investigate the factors affecting the degree of information security policy compliance using the structural equation of least squares (PLS Partial Least Square) in the confumatory level (confirmatory), the factor analysis of the primary factor analysis and secondary last. The results is that almost of influencing factors affect to the compliance with information security policies directly, but not affect self-efficacy.

  • PDF

Open-source robot platform providing offline personalized advertisements (오프라인 맞춤형 광고 제공을 위한 오픈소스 로봇 플랫폼)

  • Kim, Young-Gi;Ryu, Geon-Hee;Hwang, Eui-Song;Lee, Byeong-Ho;Yoo, Jeong-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.4
    • /
    • pp.1-10
    • /
    • 2020
  • The performance of the personalized product recommendation system for offline shopping malls is poor compared with the one using online environment information since it is difficult to obtain visitors' characteristic information. In this paper, a mobile robot platform is suggested capable of recommending personalized advertisement using customers' sex and age information provided by Face API of MS Azure Cloud service. The performance of the developed robot is verified through locomotion experiments, and the performance of API used for our robot is tested using sampled images from open Asian FAce Dataset (AFAD). The developed robot could be effective in marketing by providing personalized advertisements at offline shopping malls.

Extraction of Crime Vulnerable Areas Using Crime Statistics and Spatial Big Data (공간 빅데이터와 범죄통계자료를 이용한 범죄취약지 추출)

  • Park, So-Rang;Park, Jae-Kook
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.161-171
    • /
    • 2018
  • This study set out to identify crime vulnerable areas with the GIS spatial analysis technique for the prediction of crimes. Crime vulnerable areas were extracted from the statistics of crimes with the GIS hotspot analysis technique and the inverse distance weighted(IDW) method applied to different crimes according to places and use districts. The scope of surveillance and weight were calculated for each of CPTED surveillance elements including CCTV, streetlamp, patrol division, and police substation. Maps of crime vulnerable areas were overlapped one after another to make a CPTED-based one expressed in four grades(safety, attention, warning, and risk).

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.

A Study on the Smart Healthcare health management System (스마트 헬스케어 건강관리 시스템에 관한 연구)

  • Han, Jeong-Ah;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.8-13
    • /
    • 2020
  • In this paper, we study smart healthcare devices that enable active health care by building health care system with acquaintances or family members rather than single health care. The company develops health care services for families regardless of age and gender through intuitive UI design as a target for young users who serve elderly parents. Automated collection of health information and real-time feedback are available, and data can be aggregated and analyzed through repeaters. It can also utilize structured databases in the form of big data. The services offered can be used to prevent diseases and reduce medical expenses through health care, while automatic management can maximize users' convenience and increase demand. By reducing the development period of products that are based on this technology, reducing the development period of products and strengthening competitiveness, the company has the advantage of inducing generation-to-generation communication in an era when it is becoming a nuclear family.