• 제목/요약/키워드: USER MANAGEMENT

검색결과 6,203건 처리시간 0.033초

Developing User Interfaces of Mobile PMIS Modules Based on Technology Demand Analysis (국내·외 사용자 기술수요 분석에 따른 모바일 PMIS UI개발)

  • Park, Kyung-Mo;Lee, Hyun Woo;Kim, Chang-Duk
    • Journal of the Korea Institute of Building Construction
    • /
    • 제14권3호
    • /
    • pp.244-251
    • /
    • 2014
  • Project Management Information System (PMIS) has not yet fully met needs of the construction industry. Based on the deficiency of the current system, the present study performed a survey to identify a need for mobile PMIS in the industry. The survey revealed that most respondents expect the development of mobile PMIS would contribute to improving the productivity and efficiency of field operations. Based on the survey findings, this study proposes a suite of modules for mobile PMIS, which are focused on construction management, document management, schedule management, and field information management. Mobile PMIS would allow to access from the field through mobile devices by using tablet computers and smart-phones. The study also suggests that the effectiveness of the system can be enhanced by user interfaces that are customized for each module.

PosCFS+: A Self-Managed File Service in Personal Area Network

  • Lee, Woo-Joong;Kim, Shi-Ne;Park, Chan-Ik
    • ETRI Journal
    • /
    • 제29권3호
    • /
    • pp.281-291
    • /
    • 2007
  • Wearable computers consisting of various small devices such as smart phones, digital cameras, MP3 players and specialized I/O devices in personal area networks will play an important role in future ubiquitous computing. In this environment, accessing user data is quite complex due to the dynamic and heterogeneous characteristics of the underlying networks. Moreover, since the amount of user data increases rapidly, automatic data backup management is also critical. To overcome these challenges, several studies have been conducted including our previously proposed file service system, PosCFS, which could be adapted to the requirements with a virtualization technique allowing per-user global namespace for managing and accessing data stored on physical storage spaces detected in PAN. In this paper, we present a smart file service framework, PosCFS+ which is an improved and extended version of our previous work. Performance improvement is made possible by redesigning the metadata management scheme based on database and keywords rather than ontology. In addition, the automatic data replication management is newly designed based on the OSD protocol.

  • PDF

Analyzing the Differential Views between the Designers and the Users on Certification Assessment Criteria of the G-SEED System - Focused on Certification Assessment Criteria for Apartment Buildings - (녹색건축 인증제도 평가항목에 대한 설계 실무자 및 사용자 의식 차이 분석 - 공동주택 인증 평가항목을 중심으로 -)

  • Choi, Yeo-Jin
    • KIEAE Journal
    • /
    • 제15권6호
    • /
    • pp.87-92
    • /
    • 2015
  • Purpose: The green building certification system in Korea was introduced in 2002 and developed as an improvement version of the G-SEED(Green Standard for Energy and Environmental Design) system in 2013. This study conducts surveys targeting architectural designers and users on significance of certification assessment criteria for apartment buildings on the G-SEED system and examines the differential views between the two groups on assessment criteria. Method: First, The AHP(Analytic Hierarchy Process) method was used to find importance of assessment criteria and then the importances were compared with weighted points on the certification standard. Second, the t-test was used to investigate differential views between designer and user groups on certification assessment criteria based on drawn importances. Result: (1) While designer group considered land use and transportation, energy and environmental pollution, and water circulation management as more important, user group did material and resource, maintenance management, ecological environment, and indoor environment as more important. (2) Based on t-test results, sustainable energy, water circulation system, site management, habitat, acoustical environment, and light environment were found to be different on importance between the two groups.

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • 제26권1호
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제13권1호
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

정보 시스템 최종 사용자의 피드백 탐색 행위와 합목적적 정보 시스템 활용;중소기업을 대상으로 한 실증적 연구

  • Sin, Yeong-Mi;Lee, Ju-Ryang;Lee, Ho-Geun
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.527-535
    • /
    • 2007
  • The number of SMEs taking up information systems such as Enterprise Resource Planning has been growing rapidly, and many of those organizations have stepped into the stage of ongoing use at this point. Thus, research which takes into account idiosyncratic nature of SME environment is more important than before. Through an empirical study using survey method, we tried to examine the importance of end user's feedback seeking behavior in SMEs and how environmental factors affecting such behavior reinforce and interact with the feedback seeking behavior itself. The result shows that end user's active role as a voluntary feedback seeker is important in utilizing information systems in accordance with the initial design intention in ongoing use environment. Furthermore, in order to facilitate such feedback seeking behavior in SME environment, it is essential that management's involvement and communicating to its employees the importance of effectively utilizing the information systems as well as the support of peer IT champ.

  • PDF

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • 제9권3호
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

정보 시스템 통제 아키텍처를 이용한 정보자원 관리에 관한 실증적 연구

  • Kim, Jeong-Uk
    • Journal of Korean Society for Quality Management
    • /
    • 제28권4호
    • /
    • pp.29-46
    • /
    • 2000
  • Advent of the distributed computing has contributed to the rapid distribution of information technology throughout the organization. While powerful and user-friendly information technology are more available to end users, managing the distributed, heterogeneous IT environment has become a serious problem for corporate IT managers. Integrated Control Architecture (ICA) enables the monitoring and controlling of the dispersed information resources for effective enterprise-wide information resource management. This paper empirically examines the propositions that the level of information resource control is positively related to IS effectiveness measured in user satisfaction. Measures are developed and validated for the control of information resource object such as data, application, platform, and control of relationships among such objects. Results from a study of 130 organizations support that the organizations with high information resource control exhibit user satisfaction.

  • PDF

Operation Status and Needs Analysis for the Improvement of KESLI Consortium (KESLI 컨소시엄 활성화를 위한 운영현황 및 요구분석)

  • Lee, Yong-Gu;Park, Sungjae;Kim, Jeonghwan
    • Journal of the Korean Society for information Management
    • /
    • 제30권1호
    • /
    • pp.221-236
    • /
    • 2013
  • The purpose of this study is to improve the KESLI consortium by analyzing the status of participant organizations and their needs. A survey questionnaire including questions on consortium selection, management, and evaluation was distributed. The findings from the 179 responses indicate that the needs of the participants include issues related to the collection development policy, the cataloging of e-journals, user education, and evaluation. Therefore, KESLI should provide the following: (1) examples of collection development policy used for reference, (2) system development for e-journal cataloging, (3) materials and program guidelines for user education, and (4) education related to evaluation techniques for e-journal usages.

Analysis of the Hashing and Encryption Algorithms Applied to the Linux (리눅스에 적용된 해시 및 암호화 알고리즘 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae;Soh, Wooyoung
    • Journal of Advanced Navigation Technology
    • /
    • 제20권1호
    • /
    • pp.72-78
    • /
    • 2016
  • MD-5 has been the hash algorithm to encrypt the user's password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.