• Title/Summary/Keyword: Weaknesses

Search Result 1,166, Processing Time 0.023 seconds

AUTHENTICATION PROTOCOL: METHODS REVIEW

  • Cahyo Crysdian;Abdullah, Abdul-Hanan
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.242-245
    • /
    • 2002
  • Authentication protocol as a part of security system has been growth rapidly since it was known that sending clear text password in the network is unsecured. Many protocols could be noted proposed to strengthen the authentication process. In 1985 an attempt to safeguard network services within Athena project resulting on the born of Kerberos 〔1〕〔8〕, one of the protocol that has a lot of attention from the research community. Several years later researchers were discovered some weaknesses carried by this protocol 〔2〕〔21〕. In 1992. EKE was introduced by Bellovin and Merrit. Since that time, many protocols introduced could be considered as its variant 〔5〕〔9〕〔13〕〔14〕. Some other protocols such as OKE〔5〕 and SRP〔18〕 although claimed different from EKE, they have the same basic mechanism in holding authentication process. Here, we explain the mechanism of those protocols, their strength and their weaknesses and shortcomings. Due to the limitations of the number of paper pages, only two types of authentication protocol can be explained here i.e EKE and SRP.

  • PDF

A comparative study on the regulations of civil aviation security related between South Korea and U.S.A. (${\cdot}$ 미 항공보안관련 법규의 비교 연구;국내항공법과 미연방항공법의 비교)

  • Han, K.K.;Lee, K.S.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.9 no.2
    • /
    • pp.55-62
    • /
    • 2001
  • A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Although it is not fully known at this time what actually occurred or which of the weaknesses in the nation's aviation security apparatus contributed to the terrible events of 11 September in the U.S.A., it is clear that serious weaknesses exist in our aviation security system including regulation system. Actually, defectiveness of regulations structure and contents concerned in aviation security were discussed in various studies. On this study, we have identified defectiveness in aviation security regulation system by the comparative study between 14 CFR and Korean regulations. Finally, we are to provide some suggestions and alternatives to improve aviation security regulation system in this country.

  • PDF

An Implementation Strategy of Intergrated Information Systems Through ERP : A Case of Firm A (ERP를 통한 통합정보시스템의 구현 전략 : A기업의 사례)

  • Oh, Jae-In
    • Korean Management Science Review
    • /
    • v.15 no.2
    • /
    • pp.83-90
    • /
    • 1998
  • Today, ERP becomes very popular as a vehicle of implementing an integrated information system since this package not only facilitates reengineering but also provides the function of generating consolidated financial statements. Yet a successful introduction strategy on the integrated information system needs to be set up because ERP has weaknesses as well as strengths. The strengths include the prompt reaction to environmental changes, the integrated management of information, the adoption of open systems, and the selection of modules according to functionsl However, the weaknesses of ERP include the provision of only basic functions, the development of package on international standard processes, and possible disadvantages to small and medium-sized firms. This paper is to suggest recommendations on the implementation strategy of ERP as an integrated information system. According to the case study with Firm A that has successfully implemented an ERP package, the most significant advantage of adopting ERP was that Firm A was able to implement an integrated information system for only six months. Finally, this research generates suggestions, such as the importance of the project team structure, the sufficient amount of time for education, and the minimization of the package modification.

  • PDF

Case Studies on Strengths and Weaknesses of Taguchi Method (다구치 방법의 강점 및 약점에 대한 사례 연구)

  • Kwon, Hyuck Moo;Jang, Hyeon Ae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.5
    • /
    • pp.383-392
    • /
    • 2013
  • Taguchi method is a technique widely used in industries to attain a reliable quality even under existence of various noise variables. Basically, it relies on the interactions between the controllable and the noise factors. Under insignificant interactions between the design parameters and noises, the effectiveness of Taguchi methodology will be doubtful. Furthermore, existence of strong interactions among controllable factors may undermine the power of Taguchi approach. An abundant crop may be expected by a well planned Taguchi approach. A well designed set of experiments is one of the important prerequisites for its successful result. For this, we must have a clear understanding on strengths and weaknesses of Taguchi methodology together with a sound knowledge on the applicable system. This study provides some insights on Taguchi approach based on two case examples of one successful and the other unsuccessful. Eventually, this research aims to facilitate deeper understanding and right application of Taguchi methodology in industries.

Weaknesses in the Distribution System for Korean Government Publications (우리나라 정부간행물의 배포체계에 관한 분석)

  • Kim, Mee-Jean
    • Journal of Korean Library and Information Science Society
    • /
    • v.33 no.2
    • /
    • pp.303-321
    • /
    • 2002
  • Government agency information has steadily increased as the role of government has expanded, and information provided by the government is increasingly a significant source for the public's understanding of government policy. Further, this information is an important resource for academic research oriented toward national development. However, in South Korea the distribution system for government information is far from ideal. This paper critiques that system It begins with a short history of Korean government Publishing policy, followed by a more detailed look at recent publishing trends. It then goes on to describe the legal, institutional, and technical aspects of Korean government's distribution of its information, focusing on weaknesses that prevent information from reaching those who desire or need it.

  • PDF

Return Migration in Regional Innovation Systems

  • Sternberg, Rolf;Muller, Claudia
    • Journal of Technology Innovation
    • /
    • v.13 no.2
    • /
    • pp.71-95
    • /
    • 2005
  • This study aims to explore and understand the role of return migrants in the regional innovation system of a transition economy (China) by analyzing the activities of returning entrepreneurs in two emerging high-tech industries in Shanghai. The empirical analysis is based on in-depth interviews with founders of high-tech companies and experts in Shanghai. The results of the analysis reveal that return migrants are a significant factor for the Shanghai innovation system, which is presently in a transition from a former manufacturing site to a metropolitan region comprising a range of industries (including high-tech) and services. First of all, return migrants are important for the Shanghai RIS in terms of numbers. Second, they engage in activities in the medium range of high-tech which reflects prevailing weaknesses of the framework conditions for innovation in Shanghai. However, due to their international background, returning entrepreneurs are able to overcome these weaknesses, and thus contribute to the development of high-tech industries in Shanghai and to a reduction of the technological lock-in.

  • PDF

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

Use of the Project Spectrum in Assessment of Children's Cognitive Abilities (프로젝트 스펙트럼을 적용한 유아 인지 능력 및 학습양식 평가)

  • Jung, Tae-Hee;Kim, Myung-Hee
    • Korean Journal of Child Studies
    • /
    • v.24 no.6
    • /
    • pp.47-60
    • /
    • 2003
  • This study analyzed the pattern of preschool children's abilities based on Project Spectrum and compared the relationship between intelligence domains with working styles of children. Generally, children showed both strengths and weaknesses in specific Spectrum domains, but some children had only strengths and others had only weaknesses without strengths. It appeared that working style does not relate to children's strong domains, but individual disposition was reflected by characteristics of the task. During both individual and group spectrum activities, children with strengths were more "easily engaged in activity", "confident", and "focused" than those without strong intelligence domains. During individual activities, the "reflective" domain showed children with strengths in intelligence domains are more reflective than those without strengths.

  • PDF

A Study on the Industrial SWOT Analysis and Benefits for the Successful RFID Implementation (성공적인 RFID 구현을 위한 산업별 SWOT 분석과 성과에 관한 연구)

  • Chang, Yun-Hee
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.93-122
    • /
    • 2007
  • RFID has fundamental influences on today's business management. This research seeks to formulate the opportunities and challenges, the strengths and weaknesses and the perceived benefits of RFID implementation in three industries: manufacturing, medical-service, and distribution. Ten companies of successful RFID deployment in Korea are presented. Field interview and panel discussion were used to explore the research purpose. The core challenges include RFID readability issues, lack of best practices, increasing prime cost, visible ROI, implementation cost, and employee's resistance. The strengths include IT infrastructure, system integration competency, RFID business model creation ability, executive's support. There is little weakness in Korea companies, there are many perceived benefits in three industries. The most distinctive finding is that the visible ROI was found out in the manufacturing industry, not in the distribution industry. The opportunities and challenges, the strengths and weaknesses and the perceived benefits are some different in three industries, which provide valuable guidance for Korean companies in seeking the RFID opportunities. This case study represents a pioneer research of RFID adoption in Korea.

  • PDF