• Title/Summary/Keyword: SMB Information System

Search Result 337, Processing Time 0.025 seconds

The effect of information asymmetry between accounting information provider and users on information user decision (회계정보 공급자와 회계정보이용자간의 정보비대칭이 정보이용자 의사결정에 미치는 영향)

  • Joung, Jae-Woo;Lee, Seong-Hyo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.125-130
    • /
    • 2017
  • In the business environment of the modern society, it is not possible for the company, which is a producer of accounting information, to provide accounting information to the users of accounting information because it can not satisfy the information demand of the accounting information users due to the problem of information asymmetry. Therefore, the purpose of this study is to find out what information should be provided for satisfying the information needs of users of accounting information. This study investigates the qualitative characteristics of accounting information based on K-IFRS in the provision of accounting information and conducts empirical studies based on the users of accounting information of listed companies and unlisted companies. And how to improve the satisfaction. As a result of empirical research, it was confirmed that the accounting information satisfying the qualitative characteristics is useful for meeting the information needs of users of accounting information.

Cultural Differences impact on the ERP System Implementation (문화 차이가 ERP 시스템 구현에 미치는 영향)

  • Kim, Kyung-Ihl;Park, Ji-Young
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.1-9
    • /
    • 2016
  • In the modern business environment, ERP System is a tool for efficient use of the resources of the company. Implementation of the ERP System is not a simple introduction of the unit system. The changes and innovation of the company will be made through the BPR. And then, the BPR is made based on the system design and implementation. Cultural difference creates a difference in the attitudes and relationships of members of company. and, Cultural difference produce differences in organizational culture and operating principles. Cultural differences can mention the differences in the cultures of East and West, and can mention the difference between each country within the same culture. In the paper, we determine the impact of cultural differences on the implementation of the ERP System. Cultural differences affect the implementation process and the decision-making process, user interface.

A study on developing a Learning material Screening system for improving foreign language learning efficiency (외국어학습능률 개선방안을 위한 학습자료 선별 시스템 구축에 관한 연구)

  • Yi, Jae-Il;Han, Jung Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.87-92
    • /
    • 2017
  • This paper discusses the possibility of enhancing the efficiency in Second Language Learning with the help of an educational information and content search system that utilizes a Cloud system based Big Data. The proposed system plays a role in tracing the exact information that user request considering the interest, level, and aptitude of each individual. Also, the system screen outs unnecessary learning materials if they do not correspond to the user level which in result is one of the key factor in the proposed system. Since it requires multiple steps of verification in providing the extracted results finding out a way to reduce the steps to shorten the time of process.

A Three-dimensional Numerical Weather Model using Power Output Predict of Distributed Power Source (3차원 기상 수치 모델을 이용한 분산형 전원의 출력 예)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.93-98
    • /
    • 2016
  • Recently, the project related to the smart grid are being actively studied around the developed world. In particular, the long-term stabilization measures distributed power supply problem has been highlighted. In this paper, we propose a three-dimensional numerical weather prediction models to compare the error rate information which combined with the physical models and statistical models to predict the output of distributed power. Proposed model can predict the system for a stable power grid-can improve the prediction information of the distributed power. In performance evaluation, proposed model was a generation forecasting accuracy improved by 4.6%, temperature compensated prediction accuracy was improved by 3.5%. Finally, the solar radiation correction accuracy is improved by 1.1%.

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

Anonymity Personal Information Secure Method in Big Data environment (빅데이터 환경에서 개인정보 익명화를 통한 보호 방안)

  • Hong, Sunghyuck;Park, Sang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.179-185
    • /
    • 2018
  • Big Data is strictly positioning one of method to deal with problems faced with mankind, not an icon of revolution in future anymore. Application of Big Data and protection of personal information have contradictoriness. When we weight more to usage of Big Data, someone's privacy is necessarily invaded. otherwise, we care more about keeping safe of individual information, only low-level of research using Big Data can be used to accomplish public purpose. In this study, we propose a method to anonymize Big Data collected in order to investigate the problems of personal information infringement and utilize Big Data and protect personal. This will solve the problem of personal information infringement as well as utilizing Big Data.

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

Acceleration sensor, and embedded system using location-aware

  • He, Wei;Nayel, Mohamed
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2013
  • In this paper, fuzzy entropy and similarity measure to measure the uncertainty and similarity of data as real value were introduced. Design of fuzzy entropy and similarity measure were illustrated and proved. Obtained measures were applied to the calculating process and discussed. Extension of data quantification results such as decision making and fuzzy game theory were also discussed.

  • PDF

Design of the Personalized User Authentication Systems (개인 맞춤형 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.143-148
    • /
    • 2018
  • In this paper, we propose a personalized user authentication system (PUAS) that can be used in multiple stages in user authentication by customizing the password keyword to be used in user authentication. The proposal concept is that the user oneself defines the password keyword to be used in user authentication so as to cope with a passive retransmission attack which reuses the password obtained when the server system is accessed in user authentication. The authentication phase is also designed so that it can be expanded in multiple stages in a single step. Also, it is designed to store user-defined password related information in an arbitrary encrypted place in the system, thereby designing to disable the illegal access of the network. Therefore, even if an intruder accesses the system using the proposed system, it is possible to generate personal authentication information by generating a password keyword through unique personal information possessed only by an individual and not know the place where the generated authentication information is stored, It has a strong security characteristic.

Design of Caching Scheme for Mobile Underground Geospatial Information Map System (모바일용 지하공간정보지도 관리 시스템에서 응답속도 향상을 위한 캐싱 기법)

  • Kim, Yong-Tae;Kouh, Hoon-Joon
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.7-14
    • /
    • 2022
  • Unlike general maps, the underground geospatial Information is a system made to view underground information in a 3D shape. This system is managed by a tile maps to lighten the data. But there are various underground structures in the basement, and the structures are made of 3D data, so the data size is large. Therefore, when a client mobile program requests a tile map, the service server fetches the requested tile map from the DB server and transmits ti to the client, but there is a transmission delay time problem. In this paper, we design the tile cache method to improve the request response speed for the tile map data provided to the client in the mobile underground geospatial information system. We propose a method in which a service server predicts and prefetchs the next tile map while the client is viewing tile map, and stores the prefetching data in the memory of client mobile terminal. Then, the transmission delay time problem can be solved.