• Title/Summary/Keyword: 내부통제시스템

Search Result 141, Processing Time 0.04 seconds

Emergency Rescue Guidance Scheme Using Wireless Sensor Networks (재난 상황 시 센서 네트워크 기반 구조자 진입 경로 탐색 방안)

  • Joo, Yang-Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1248-1253
    • /
    • 2019
  • Using current evacuation methods, a crew describes the physical location of an accident and guides evacuation using alarms and emergency guide lights. However, in case of an accident on a large and complex building, an intelligent and effective emergency evacuation system is required to ensure the safety of evacuees. Therefore, several studies have been performed on intelligent path finding and emergency evacuation algorithms which are centralized guidance methods using gathered data from distributed sensor nodes. However, another important aspect is effective rescue guidance in an emergency situation. So far, there has been no consideration on the efficient rescue guidance scheme. Therefore, this paper proposes the genetic algorithm based emergency rescue guidance method using distributed wireless sensor networks. Performance evaluation using a computer simulation shows that the proposed scheme guarantees efficient path finding. The fitness converges to the minimum value in reasonable time. The density of each exit node is remarkably decreased as well.

Simulation-Based Analysis of C System in C3 System of Systems Via Machine-Learning Based Abstraction of C2 System (머신러닝 기반의 C2 시스템 추상화를 통한 C3 복합체계에서의 시뮬레이션 기반 통신 시스템 분석)

  • Kang, Bong Gu;Seo, Kyung Min;Kim, Byeong Soo;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.61-73
    • /
    • 2018
  • In the defense modeling and simulation, for the detailed analysis of the communication system, many studies have carried out the analysis under the C3 SoS(system of systems) which consists of C2(command and control) and C(communication). However, it requires time and space constraints of the C2 system. To solve this problem, this paper proposes a communication analysis method in the standalone system environment which is combined with the C system after abstracting the C2 system. In the abstraction process, we hypothesize the traffic model and mobility model for C system analysis and learn the parameters in the model based on machine learning. Through the proposed method, it is possible to construct traffic and mobility model with different output according to the battlefield. This case study shows how the process can be applied to the C3 SoS and the enhanced accuracy than the existing method. We expect that it is possible to carry out the efficient communication analysis against many experimental scenarios with various communication parameters.

An Analytical Comparative Study on Information Systems of the Door-To-Door Service Companies (택배 정보시스템 비교분석에 관한 사례연구 -국내 4사(社)를 중심으로-)

  • Lee, Seok-Yong;Jung, Lee-Sang
    • Management & Information Systems Review
    • /
    • v.28 no.1
    • /
    • pp.1-24
    • /
    • 2009
  • Electronic commerce markets have been increasing rapidly, which has resulted in parallel growth in the door-to-door delivery service industry. The door-to-door delivery service industry is projected to be more competitive, due to the large amount of companies that are already established and the fact that several leading multinational logistics companies are rushing into the domestic market. This is a critical period for the companies which are attempting to obtain a competitive advantage. Previous research on door-to-door delivery services has been undertaken, in relation to strategic exploration, political proposals, and user satisfaction. However, there is a lack of practical studies focused on the information systems of door-to-door service companies and its decisive roles have been undertaken. This study aims to investigate, compare, and analyze the information systems of door-to-door delivery service companies. Also, the study proposes developmental direction of how the information systems should be improved. In order to accomplish the purpose of this study, first, we examined previous research on door-to-door delivery services and their information systems. Second, we investigated and analyzed the information systems of four leading domestic companies by conducting interviews. Third, we compared and identified factors of the information systems that could be improved. Finally, we proposed its developmental direction. As a result of the study, the information systems of door-to-door delivery service companies required to provide classified services using diverse tools and develop the optimized routing model to reduce logistics costs.

  • PDF

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Chemical/Biological/Radiological Protective Facility Entering Time Estimation Simulation with Procedure Analysis (화생방 방호시설의 행동 절차 분석을 통한 진입 소요시간 예측 시뮬레이션)

  • Park, Sun Ho;Lee, Hyun-Soo;Park, Moonseo;Kim, Sooyoung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.5
    • /
    • pp.40-48
    • /
    • 2014
  • As CBR(Chemical, Biological, and Radiological) attack increases, the importance of CBR protective facilities is being emphasized. When CBR warfare emerges, a task force team, who exist outside of CBR protective facility, should enter the CBR protective facility through neutralizing process in CCA(Contamination Control Area) and TFA(Toxic Free Area). If a bottleneck occurs in the process or zones, the task force team cannot enter the CBR protective facility efficiently and may cause inefficiency in its operation performance or result in casualties. The current design criteria of the CBR protective facility is only limited to ventilation system and it does not consider how much time it takes to enter the facility. Therefore, this research aims to propose the entering time estimation model with discrete event simulation. To make the simulation model, the procedure performed through CCA and TFA is defined and segmented. The actual time of the procedure are measured and adapted for the simulation model. After running the simulation model, variables effecting the entering time are selected for alternatives with adjustments. This entering time estimation model for CBR protective facility is expected to help take time into consideration during the designing phase of CBR protective facility and help CBR protective facility managers to plan facility operation in a more realistic approach.

Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment (망분리 환경에서 파일형식 변환을 통한 안전한 파일 전송 및 포렌식 준비도 구축 연구)

  • Han, Jaehyeok;Yoon, Youngin;Hur, Gimin;Lee, Jaeyeon;Choi, Jeongin;Hong, SeokJun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.859-866
    • /
    • 2019
  • Cybersecurity attack targeting a specific user is rising in number, even enterprises are trying to strengthen their cybersecurity. Network segmentation environment where public network and private network are separated could block information coming from the outside, however, it is unable to control outside information for business efficiency and productivity. Even if enterprises try to enhance security policies and introduce the network segmentation system and a solution incorporating CDR technology to remove unnecessary data contained in files, it is still exposed to security threats. Therefore, we suggest a system that uses file format conversion to transmit a secure file in the network separation environment. The secure file is converted into an image file from a document, as it reflects attack patterns of inserting malicious code into the document file. Additionally, this paper proposes a system in the environment which functions that a document file can keep information for incident response, considering forensic readiness.

The Impact of Internal Control on Accounting Information Systems Bying Path-analysis method (경로분석에 의한 내부통제가 회계정보시스템에 미친 효과분석)

  • Lee, Jang-Hyeong
    • Asia pacific journal of information systems
    • /
    • v.5 no.2
    • /
    • pp.79-100
    • /
    • 1995
  • Internal Control(IC) comprises the plan of organization and all of the coordinating methods and measures adopted in a business to safeguard its assets, check the accuracy and reliability of its accounting data, promote operational efficiency and encourage adherence to the prescribed managerial policies. If an organization's IC is not adequate, Accounting Information System (AIS) will be vulnerable to accomplish the organizations successes. Therefore, an effective and efficient IC is essential to its successes. The purpose of this study is to analyze the impact of EDP IC on the perceived usefulness of AIS. Do the general controls indirectively affect to the usefulness of AIS through th application controls? To solve these problems, a research model and a set of hypotheses were established and empirically tested. 60 financial institutions (banks, insurance companies, security companies) agreed to participate in the study. Data were gathered through structured interviews with 60 information systems managers and 537 users of accounting information of each company. Survey forms were designed and collected from financial institutions in Seoul. Information systems' managers of financial institutions responded to questionnaire(1) which consists of a series of 70 questions related to practice and perceived importance. Questionnaire (2) was received from 537 users, who responded to series of 17 questions related to the perceived usefulness. The results of analysis are summarized below. Effects of general controls are more direct on AIS's usefulness than those of application controls. Whereas, indirect effects of application controls are geater than those of general controls. Therefore, the greater the effects of application controls on general controls, the higher the perceived usefulness of AIS. In conclusion, this study supports that the perceived usefulness of AIS is affected by IC which are composed of general controls and application controls. The results of this study has significant implication to financial institution as computer fraud potential increases. Because of global competitions, financial institutions should restructure to IC and AIS in order to take advantage of the technological progress in Information System.

  • PDF

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

A Smart River Management Plan for Eco-Delta City (에코델타시티 스마트 하천관리 방안)

  • Yeo, Hong Koo;Kang, Jungu;Shim, Kyu Cheoul;Hong, Il
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.3-3
    • /
    • 2022
  • 부산 에코델타시티는 세종 5-1 생활권과 더불어 스마트시티 국가시범도시이며, 사업대상지역은 평강천이 관류하여 맥도강, 서낙동강 본류로 흐르는 세물머리지역이 그 중심에 위치하고 있다. 하천을 중심으로 스마트시티가 조성되고 있으나 하천관리는 유역내 홍수관리, 수질관리 등등에 관한 정부주체 상위계획에 종속성이 강한 공공분야로서 단위사업에서 스마트시티에 걸맞는 하천관리계획을 수립하고 시행하는 것은 많은 어려움이 존재한다. 하천관리의 주 관심 대상은 이수를 제외하면 치수, 하천환경, 친수, 하천시설물로 대별할 수 있으며, 스마트 하천관리란 이들에 대한 현황 정보구축 및 지속적인 현행화, 그리고 이들 실제 정보를 토대로 한 합리적 운영과 실시간 연계운영 실현으로 공공서비스를 제공하는 것이라 할 수 있을 것이다. 본 연구는 국가연구개발사업에서 연구한 각 분야별 하천관리기법을 에코델타시티에 시범적용하여 스마트하천관리를 구현할 수 있는 방법을 제시하고자 하였다. 에코델타시티 조성사업의 진행수준으로 인해 취득하기 어려운 정보들은 수립된 계획을 참조하여 적용하였다. 유역내 주 대상 하천들은 델타지역에서 수문으로 통제되므로 일반적인 하천과 달리 정수역에 가까운 특이한 수리특성을 보이고 있지만, 우선 스마트 하천관리를 위한 일반적인 과정들을 시범적용 해보고 필요에 따라 특성 고려 방안을 찾고자 하였다. 유역내 정량적 홍수위험도 평가, 하천환경 평가 적용방안, 하천시설물 관리방안, 주요 지점의 실시간 모니터링 방안 등이 에코델타시티 조성사업 진행단계를 고려하여 수행되고 있다. 사용편의성과 지속가능성을 담보하기 위한 하천연계플랫폼을 구축하여, 개발된 기법들을 각각 내부 모듈로 장착하거나 완성도에 따라 외부모듈로 연계할 수 있도록 하였다. 현재 개발된 기법들의 시스템화 완성 및 관련 정보들의 데이터베이스 확대를 위한 노력이 진행되고 있으며, 향후 하천관리연계플랫폼의 실제 운영을 통하여 완성도를 높여갈 계획이다.

  • PDF

The Relation of Accounting Information System User Satisfaction, Internal Controls and Quality (내부통제 및 정보품질과 회계정보시스템의 사용자 만족도와의 관계)

  • 이장형;김광집
    • The Journal of Information Systems
    • /
    • v.11 no.2
    • /
    • pp.1-25
    • /
    • 2002
  • This study is for the purpose of understanding User Satisfaction of Accounting Information System more closely by means of perceiving relations between Internal Controls and Quality. That is, this study is to assess Internal Controls and Quality and to connect those with User Satisfaction. This thesis is for the substantial study on whether Information Quality, System Quality, and Service Quality influenced by Internal Controls of Accounting Information System have an effect on User Satisfaction, when Internal Controls of Accounting Information System is good, The following hypothesis was made to achieve this purpose. First, Internal Controls will have an positive influence on Quality. Second, Qualify will positively affect User Satisfaction. Third, Internal Controls will positively Influence User Satisfaction. Fourth, Internal Controls will have a positive effect on User Satisfaction through Quality For the survey sample, this study gathered data on someone engaged in companies or organizations which have computer offices, and groups were differentiated between general staff and someone in charge of the computer office, and each group had different questions. In general, 622 of questions were distributed and 200 of the final valid samples were used for the substantial analysis. As the result of the study, the relations between Internal Controls and Quality are statistically significant. The relations between Quality and User Satisfaction ire also statistically significant. But the relations between Internal Controls and User Satisfaction are not statistically significant. Path Analysis was implemented to analyze the hypothesis on whether Internal Controls have an influence on User Satisfaction through Quality. When the result of analysis with Lisrel 8.5 was examined, index numbers(GFI, AGFI, RMR) representing the suitability of the model were enough to be taken and it is showed that there is the suitability of the model. Internal Controls of Accounting Information System can't have an influence on User Satisfaction with Quality. As the above hypothesis was rejected, Through Path Analysis, this study examined the influence which relations between Internal Controls and Quality, factors of User Satisfaction, have on User Satisfaction, and is very meaningful in terms of the first trial. And on the point of time when there are little studies on the effect analyses between Internal Controls and Quality, this study would be the promoter for the future. The limitation on this study is to analyze only mutual effects between factors by choosing Internal Controls, Quality, and User Satisfaction as survey variables. The study which measure items with precision which are related to each variable and understand measurement factors clearly should be implemented.

  • PDF