• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

Evaluation of Key Success Factors for Web Design in Taiwan's Bike Case Study

  • LAI, I-Sung;HUANG, Yung-Fu;SIANG, Jie-Hua;WENG, Ming-Wei
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.927-937
    • /
    • 2020
  • Global warming awareness through energy conservation is growing due to the regulatory policies issued by governments and voluntary organization that established carbon emission limits. Transportation is one of the major contributors to carbon emissions. Bike will be simultaneously saving money, getting fit and helping to reduce global warming. Web design has been identified as a key factor for the acceptance and success of the websites and electronic commerce. The purpose of this research is to investigate the effective implementation of the proposed Analytic Hierarchy Process (AHP) technique on a bike case study whose company (Bike Company) is involved in web design for a critical component in the demonstration. Survey research used a variety of data collection methods, with the most common being questionnaires and interviews of some exporters. The research results reveal that the top five key success factors are Good reputation, Transaction security, Ease of use, Promotion, and Diversified choices, which provide the guidelines and directions for decision-makers to design effective websites in the current competitive business scenario. The major findings of this study are suggesting that Internet marketing channels are securing the company's relevance, together with paving the way for methods to increase web traffic.

Conceptual Design of Intelligent Building Automation System Using Computer-Aided Systems Engineering Approach (시스템공학 접근법을 이용한 지능형 건물 자동화 시스템의 개념설계)

  • 유일상;박영원
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.3 no.2
    • /
    • pp.166-178
    • /
    • 2000
  • As the 21st century signifies an information-oriented society, the computer integration takes place in all walks of human presence. Needs for computer and network-integrated automation present new challenges in military as well as commercial facility systems engineering. Since the first intelligent building appeared in USA in 1984, it gradually became an essential capability for the building industry requirement these days. Intelligent Building System(IBS) is evolving to be very complex because there are many subsystems such as telecommunication(TC), office automation(OA), building automation(BA), security, construction environments, etc. During the planing phase of IBS development, therefore, a disciplined systems engineering must be performed to analyze stake- holder's requirements to build an optimized system while minimizing trial-and-error expenses and risks. This paper presents a conceptual design of BAS applying systems engineering methods. The contribution of this study includes the development of IBS subsystem specification for building automation subsystem, which is a part of IBS, using the methodology of requirement analysis, functional analysis, synthesis, and verification. A computer-aided systems engineering s/w, RDD-100, was used to improve the system design efficiency and to promote the product design knowledge management for reuse in later design programs.

  • PDF

Optimal Hierarchical Design Methodology for AESA Radar Operating Modes of a Fighter (전투기 AESA 레이더 운용모드의 최적 계층구조 설계 방법론)

  • Heungseob Kim;Sungho Kim;Wooseok Jang;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.281-293
    • /
    • 2023
  • This study addresses the optimal design methodology for switching between active electronically scanned array (AESA) radar operating modes to easily select the necessary information to reduce pilots' cognitive load and physical workload in situations where diverse and complex information is continuously provided. This study presents a procedure for defining a hidden Markov chain model (HMM) for modeling operating mode changes based on time series data on the operating modes of the AESA radar used by pilots while performing mission scenarios with inherent uncertainty. Furthermore, based on a transition probability matrix (TPM) of the HMM, this study presents a mathematical programming model for proposing the optimal structural design of AESA radar operating modes considering the manipulation method of a hands on throttle-and-stick (HOTAS). Fighter pilots select and activate the menu key for an AESA radar operation mode by manipulating the HOTAS's rotary and toggle controllers. Therefore, this study presents an optimization problem to propose the optimal structural design of the menu keys so that the pilot can easily change the menu keys to suit the operational environment.

A STUDY ON DEVELOPING A DESIGN OF SUPERSONIC HUMIDIFIER FOR HOME USE. - With a focus on 3 domestic companys Household electric appliances - (가정용 초음파 가습기 디자인개발에 관한 연구 - 국내가전 3사를 중심으로 -)

  • 오성진
    • Archives of design research
    • /
    • v.6 no.1
    • /
    • pp.23-46
    • /
    • 1993
  • The development of technology in modern industrial world which grows and changes every day is shortening the cycle of life span of products, so there is a flood of products around us. It is enough to say that this phenomenon leads to further emphasis on the aspect of design for human being. It is not a new fact that to design for the rational function and the modeling from to make a combination and to satisfy consumers' desire is a short cut to gain competitive superiority in developing new products for MIS security. Therefore the design which plays a leading role in the activity of creating more convenient, more aesthetic, and more econemical products is called 'NEW CORPORATE WEAPON'. The amount of effort made for developing products is different in each company, but recently the plan to develope new products and its process arouse more interest. This thesis purports to improve objective understanding about the development of design by investigating products development research and the process of analysis and designing as a case study on developing a domestic supersonic humidifier. This thesis consists of five chapters in all. In chapter one as a preface, the purpose the method and the scope of the study is described. Chapter two contains my effort to grasp the background of study on the design and the basic structure of supersonic humidifier. Chapter three is an examination into the present conditions of supersonic humidifier used in domestic and foreign area, and the shape of design. In chapter four, a guide for the development of design is established. The idea sketch based on a fundamental shape and the drawing are added to this. In chapter five on the basis of the result of analysis in the preceding research I describe the development of design of products on the premise that marketing gives proof for them but the products oriented by manufacturer are not included in this case. In this thesis, I try to recognize the process of the develpment of design and the importance of the plan for design in developing products by examining an investigative and analytic study on the design of products.

  • PDF

A Study on the Applicability of Social Security Platform to Smart City (사회보장플랫폼과 스마트시티에의 적용가능성에 관한 연구)

  • Jang, Bong-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.321-335
    • /
    • 2020
  • Given that with the development of the 4th industry, interest and desire for smart cities are gradually increasing and related technologies are developed as a way to strengthen urban competitiveness by utilizing big data, information and communication technology, IoT, M2M, and AI, the purpose of this study is to find out how to achieve this goal on the premise of the idea of smart well fair city. In other words, the purpose is to devise a smart well-fair city in the care area, such as health care, medical care, and welfare, and see if it is feasible. With this recognition, the paper aimed to review the concept and scope of smart city, the discussions that have been made so far and the issues or limitations on its connection to social security and social welfare, and based on it, come up with the concept of welfare city. As a method of realizing the smart welfare city, the paper reviewed characteristics and features of a social security platform as well as the applicability of smart city, especially care services. Furthermore, the paper developed discussions on the standardization of the city in terms of political and institutional improvements, utilization of personal information and public data as well as ways of institutional improvement centering on social security information system. This paper highlights the importance of implementing the digitally based community care and smart welfare city that our society is seeking to achieve. With regard to the social security platform based on behavioral design and the 7 principles(6W1H method), the present paper has the limitation of dealing only with smart cities in the fields of healthcare, medicine, and welfare. Therefore, further studies are needed to investigate the effects of smart cities in other fields and to consider the application and utilization of technologies in various aspects and the corresponding impact on our society. It is expected that this paper will suggest the future course and vision not only for smart cities but also for the social security and welfare system and thereby make some contribution to improving the quality of people's lives through the requisite adjustments made in each relevant field.

Design of RFID System for User's Authentication Under Ubiquitous Surroundings

  • Kim, Dae-Yoo;Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.136-139
    • /
    • 2007
  • In this paper we will discuss a general idea about an information system which provides information a user really needs in user's authentication. We will discuss how RFID could be applied for this kind of system especially from the standpoint of using RFID as a way to collect information of personal belongings. Also we will discuss security issues of using RFID as a component of the proposed system because while RFID could provide usefulness, it could also be very dangerous for revealing private information without user's awareness.

Security Management Architecture Design for constructing the integrated computing environment (통합전산환경 구축에 따른 보안 관리 아키텍처 설계)

  • Hong, Ji-Boum
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.115-117
    • /
    • 2005
  • 범정부 통합전산센터 추진에 따라 수많은 공공기관의 통합전산환경 구축이 요구되고 있으며 이에 따른 보안 정책과 관리 대책 수립이 진행되고 있다. 일반적인 보안 개념에 유비쿼터스 개념인 언제 어디서나 제공될 수 있는 서비스에 따른 보안의 개념이 도입됨에 따라 보안 관리 대책은 관리적, 기술적, 물리적인 측면에서 검토되어야 한다. 본 논문에서는 통합전산환경의 보안 요구사항을 파악하여 보안 관리 아키텍처를 관리적, 기술적, 물리적인 측면에서 현재 진행되거나 향후 추진들 공공기관의 통합전산환경 구축의 기본적인 보안 관리 아키텍처로 제안한다.

  • PDF

Design of Security System in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 보안 시스템 설계)

  • Park Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.493-495
    • /
    • 2005
  • 유비쿼터스 네트워크는 기존의 네트워크와 같이 네트워크 인프라가 구축된 상태에서 통신을 수행하는 것이 아닌 인프라가 존재하지 않은 상태에서 각 단말들 상호간의 라우팅으로 데이터 송$\cdot$수신 등의 통신 기능을 수행할 수 있는 형태의 네트워크 구조를 가지므로 유비쿼터스 컴퓨팅 환경에서 보안성을 제공한다는 것은 많은 어려움이 따른다. 본 논문에서는 프로토콜에서 기본적으로 보안성을 제공하기 위한 2가지 형태의 패킷 형태를 제시하였고, 이러한 구조를 통한 데이터 전송은 보다 빠른 데이터 처리를 수행할 수 있다.

  • PDF

Design of Mobile Agent for Network Security Administration (네트워크 보안관리를 위한 이동에이전트 설계)

  • 정현진;마복순;송성훈;임채호;원유헌
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.527-529
    • /
    • 1998
  • 이동에이전트는 인터넷 상거래나 장도검색 등에 응용되는 최신 기술이며, 이를 컴퓨터네트워크내 컴퓨터 시스템의 보안관리을 위한 모델을 제안하고 설계하였다. 이를 위해 최근 발표되고 있는 이동 에이전트 기술에 대해 분석하고, 네트워크보안관리 기술을 연구하였으며 IBM 이 제안하고 있는 AGLET 환경에 네트워크보안관리 시스템을 탑재한 이동 에이전트 응용시스템을 설계하였다.

  • PDF

Security Protocol Design for Wireless Mobile Communication (무선 이동 통신을 위한 보안 프로토콜 설계)

  • 강형우;이수연;박창섭;이동훈;윤이중
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.541-543
    • /
    • 1998
  • 무선 이동 통신에서는 가입자의 이동성으로 인하여 가입자의 인증 프로토콜을 수행 할 때 신원이 노출되기 쉽다. 이러한 가입자의 신원 노출은 제 3자가 이동 가입자의 이동을 추적하거나 위치를 파악할 수 있게 할 수 있다. 또한 이동 가입자가 사용하는 단말기의 낮은 계산 능력으로 인하여 가입자의 단말기가 인증 프로토콜을 수행함에 있어서 적은 암호학적 연산이 요구된다. 본 논문에서는 단말기의 계산능력이 낮은 점을 고려하여 단말기에 적은 암호학적 연산이 요구되며 가입자의 위치와 행동의 노출 없이 안전하게 이동 가입자를 인증하는 프로토콜을 제안한다.

  • PDF