• Title/Summary/Keyword: User Management System

Search Result 3,222, Processing Time 0.027 seconds

A Study on the Design of System Access Control Software For the Improvement of the Stability and Survivability of Naval Combat Management System

  • Jong-Hyeon Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.137-145
    • /
    • 2023
  • In this paper, we propose system access control software that improves the survivability of the naval combat system while maintaining security and stability. The software was improved by improving the operating environment configuration and user authentication process of the system access control software that constitutes the naval combat system, defining the operating environment classification of the naval combat system, and applying a software parallel execution process considering the load rate. Through this, the waiting time required to configure the environment is shortened, providing rapid operation to the operator, and improving the fact that the naval combat system cannot be operated unless the environment configuration is completed even in emergency situations. In order to test the performance, a test environment was created by simulating the existing naval combat system, and the execution time for each operation category was measured and compared. Compared to the existing naval combat system, the execution time of the basic combat system was reduced by about 69.3%, the execution time of the combat system was reduced by about 54.9%, and the execution time of the integrated combat system was confirmed to be reduced by about 8.4%.

Design and Implementation of a Smartphone-based User-Convenance Home Network Control System using Gesture (제스처를 이용한 스마트폰 기반 사용자 편의 홈 네트워크 제어 시스템의 설계 및 구현)

  • Jeon, Byoungchan;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.113-120
    • /
    • 2015
  • Under the penetration of smartphones equipped with a variety of features grows globally, the efficient using of a variety of functions of smartphones has been increased. In accordance with this trend, a lot of researches on the remote control method using the smart phone for consumer products in home networks. Input methods of the current smpartphoes are typically button-based inputs through touching. The button input methods are inconvenient for people who are not familiar touch. Therefore, the researches on the different input schemes to replace the touch methods are required. In this paper, we propose a gesture based input method to replace the touch-sensitive input that of the existing smartphone applications, and a way to apply it to home networks. The proposed method uses three-axis acceleration sensor which is built into smatphones, and it also defines six kinds of gestures patterns that may be applied to home network systems by measuring the recognition rates.

Influences of Enneagram Personality Types on OPAC Searching and Satisfaction (에니어그램 성격 유형에 따른 OPAC 탐색 성향과 만족도)

  • Jung, Young-Mi
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.169-186
    • /
    • 2012
  • This study examined the relation between personality types and users' searching trait and satisfaction when interacting with OPAC system. In this study, personality type was measured by the KEPTI Enneagram tools. Data was collected through four questionnaires, pre-test, TaskA, TaskB, and post-test survey. The results indicated that there was a statistically significant difference in perceptions on the expected ease of search, completion time, adequacy of search time, usefulness of search results, and performed ease of search within the Three Triads of Enneagram. Also a statistically significant difference was found on familiarity and interest in the selected queries within the Hornivian group.

Study on a Secure Active network Architecture (안전한 액티브 네트워크 구조에 관한 연구)

  • Hong, Sung-Sik;Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.17-24
    • /
    • 2005
  • The existing passive networks have the only data-storing and transmission functions. On the other hand, the active network which can do operation jobs on the transmitting packets was introduced at 1990's. However, the advantages of activating processing are obviously more complex than traditional networks and raise considerable security issues. In this paper, we propose the safer structure in Active Networks that is based on the discrete approach which resolves the weak point of the Active Network. The proposed system provides the node management and user management in the Active Networks, and improves the security of Packet transmission with packet cryptography and the session.

Balancing Efficiency and Flexibility in Software Project: The Role of Team Collective Improvisation, behavioral integration, and member diversity

  • Lee, Young-Joo;Lee, Jung-Hoon;Ham, Kyung Sun
    • Journal of Contemporary Eastern Asia
    • /
    • v.16 no.1
    • /
    • pp.22-45
    • /
    • 2017
  • The successful management of software (SW) projects is a continuous concern to managers, which is attributed to the contradictory demands that most projects are facing; meeting user requirements within time and budget limit while flexibly dealing risks during the progress of the projects. The present study asserts project performance and risk mitigation are not tradeoff but to be achieved simultaneously, which is called SW project ambidexterity. Drawing on the literature on organizational behavior, hypotheses are developed speculating the relation among project performance, risk mitigation, team collective improvisation, team behavioral integration, and team diversity. Using empirical data collected from 102 SW project teams of 507 team members in South Korea, empirical analysis indicates team collective improvisation is a significant antecedent to SW project ambidexterity, playing a pivotal role to balance the contradictory demands. Furthermore, team behavioral integration positively influences the degree of team collective improvisation, and the magnitude of the relation is partially contingent on the team members' age and major diversity. The present study advances theory by providing a context specific explanation about the SW project ambidexterity and its precedents.

The Selection of CRM Systems in Financial Institution Using the Analytic Hierarchy Process (AHP를 이용한 금융기관의 CRM 시스템 선정)

  • Hong, Tae-Ho;Kim, Eun-Mi;Suh, Bo-Mil
    • The Journal of Information Systems
    • /
    • v.17 no.2
    • /
    • pp.137-154
    • /
    • 2008
  • Customer Relationship Management (CRM) is indispensable for companies in recent business environment, in which the customers are recognized as more valuable asset to increase the earning power of enterprise. For gaining competitive advantage, most companies want to maintain existing customer relationships and generate more profits with customers through long-term relationships. In this study, we developed the models which are designed to select CRM systems in financial institution, which is one of competitive sectors and undergoes rapid changes due to M&A(Merger and acquisition), innovation and reengineering in Korea. The selection model of CRM systems for financial institution was developed utilizing the Analytic Hierarchy Process (AHP) and the expert's knowledge were built up of three groups; researcher group, developer group, and user group. We found that there are significant deferences for the weights of criteria in our selection model according to the kind of experts. This study provides helpful guidance on how to assign appropriate weights to each criteria in selection models when financial institution introduce the CRM systems.

The Countermeasure for Threat of Cyber Terror in Sociological Perspective (사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안)

  • Choi, Heesik;Kim, Hyunkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations

  • Bui, Quy-Anh;Lee, Wei-Bin;Lee, Jung-San;Wu, Hsiao-Ling;Liu, Jo-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.437-454
    • /
    • 2020
  • According to the privacy regulations of the health insurance portability and accountability act (HIPAA), patients' control over electronic health data is one of the major concern issues. Currently, remote access authorization is considered as the best solution to guarantee the patients' control over their health data. In this paper, a new biometric-based key management scheme is proposed to facilitate remote access authorization anytime and anywhere. First, patients and doctors can use their biometric information to verify the authenticity of communication partners through real-time video communication technology. Second, a safety channel is provided in delivering their access authorization and secret data between patient and doctor. In the designed scheme, the user's public key is authenticated by the corresponding biometric information without the help of public key infrastructure (PKI). Therefore, our proposed scheme does not have the costs of certificate storage, certificate delivery, and certificate revocation. In addition, the implementation time of our proposed system can be significantly reduced.

Fault Tree Analysis and Failure Mode Effects Analysis for Software Security Improvements in Mobile Banking Information Systems (모바일 뱅킹 정보시스템의 소프트웨어 보안성 개선을 위한 고장 트리 분석과 고장 유형 영향 분석)

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1342-1350
    • /
    • 2015
  • Due to rapid development of mobile device technologies, the mobile banking through Internet has become a major service of banking information systems as a security-critical information systems. Recently, lots of mobile banking information systems which handle personal and transaction information have been exposed to security threats in vulnerable security control and management processes, mainly software systems. Therefore, in this paper, we propose a process model for software security improvements in mobile banking information system by application of fault tree analysis(FTA) and failure modes and effects analysis(FMEA) on the most important activities such as 'user authentication' and 'access control' and 'virus detection and control' processes which security control and management of mobile banking information systems are very weak.

Design and Implementation of Adaptive Fault-Tolerant Management System over Grid (그리드 환경의 적응형 오류 극복 관리 시스템 설계 및 구현)

  • Kim, Eun-Kyung;Kim, Jeu-Young;Kim, Yoon-Hee
    • The KIPS Transactions:PartA
    • /
    • v.15A no.3
    • /
    • pp.151-154
    • /
    • 2008
  • A middleware in grid computing environment is required to support seamless on-demand services over diverse resource situations in order to meet various user requirements [1]. Since grid computing applications need situation-aware middleware services in this environment. In this paper, we propose a semantic middleware architecture to support dynamic software component reconfiguration based fault and service ontology to provide fault-tolerance in a grid computing environment. Our middleware includes autonomic management to detect faults, analyze causes of them, and plan semantically meaningful strategies to recover from the failure using pre-defined fault and service ontology trees. We implemented a referenced prototype, Web-service based Application Execution Environment(Wapee), as a proof-of-concept, and showed the efficiency in runtime recovery.