• Title/Summary/Keyword: 내부통제시스템

Search Result 140, Processing Time 0.023 seconds

IN HLA RTI Design and Implementation of FMS (Federation Management System) (HLA RTI에서의 FMS(Federation Management System)의 Design 및 Implementation)

  • 황정연;김호경;정창성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.64-66
    • /
    • 2002
  • HLA(High Level Architecture)를 기반으로 한 시뮬레이션들은 분산 환경에서 수행되는 특징을 갖는다. 이러한 시뮬레이션들은 지난 몇 년 동안 계속해서 그 규모가 커지고, 복잡해지고 있다. 이런 분산 시뮬레이션을 실행시킬 때 페더레이트(federate)들의 오동작으로 네트워크의 혼잡을 유발하는 등의 문제점이 생길 수 있다. 이러한 문제점을 효율적으로 해결하기 위해서는 이와 같은 분산 시뮬레이션을 관리 할 수 있는 수단이 필요하게 되었다. HLA 개발자들은 페더레이션(federation)의 내부를 알기 위해서 객체 모델을 개발했고, 이것을 Management Object Model(MOM) 이라고 한다. HLA MOM은 페더레이션을 모니터링과 컨트롤하며 관리 할 수 있게 한다. HLA RTI는 페더레이트간에 효율적으로 정보를 교환하게 하는 분산 운영 시스템이며 MOM을 통해서 RTI의 운영정보에 접근하고, 수행을 통제 할 수 있는 방법을 제공하고 있다. MOM을 이용할 경우 RTI 운영 정보들은 기존의 RTI 서비스를 이용해서 전달될 수 있으며, 이런 특성으로 인해 시스템 관리를 목적으로 하는 어플리케이션을 용이하게 구현 할 수 있다. 따라서 본 논문에서는 HLA MOM을 이용한 페더레이션을 관리 하는 FMS(federation Management System)을 개발하고자 한다.

  • PDF

Outsourcing strategy of SCC of Korean electronic security companies (한국 기계경비 관제업무 아웃소싱 전략)

  • Ha, Kyung-Su
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.299-300
    • /
    • 2017
  • 한국의 지역기반 소규모 기계경비업체들은 고객의 수요는 다변화되어 가는 현실에서 첨단 경비서비스 제공을 위한 시스템의 미비와 전문 인적자원의 부족으로 기업경영의 위기에 봉착했다. 이에 지역기반 소규모 기계경비업체들의 혁신적 생존전략 모색방안의 일환으로 관제업무 아웃소싱 전략이 대두되었다. 기계경비 관제업무 아웃소싱 전략은 관제업무의 일부 또는 특정부분을 전문용역업체에 위탁하는 것으로 첨단 관제시스템과 전문관제요원을 보유하고 관제업무를 대행해 주는 아웃소싱기업의 전문성을 최대한 이용할 수 있는 장점이 있으나, 통제와 보안의 문제, 비용 상승과 계약종결의 문제 및 내부 전문기술의 축적기회 상실 등의 산재한 선결과제도 있다.

  • PDF

The Effect of Information Protection Control Activities on Organizational Effectiveness : Mediating Effects of Information Application (정보보호 통제활동이 조직유효성에 미치는 영향 : 정보활용의 조절효과를 중심으로)

  • Jeong, Gu-Heon;Jeong, Seung-Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.71-90
    • /
    • 2011
  • This study was designed to empirically analyze the effect of control activities(physical, managerial and technical securities) of information protection on organizational effectiveness and the mediating effects of information application. The result was summarized as follows. First, the effect of control activities(physical, technical and managerial securities) of information protection on organizational effectiveness showed that the physical, technical and managerial security factors have a significant positive effect on the organizational effectiveness(p < .01). Second, the effect of control activities(physical, technical and managerial securities) of information protection on information application showed that the technical and managerial security factors have a significant positive effect on the information application(p < .01). Third, the explanatory power of models, which additionally put the information protection control activities(physical, technical and managerial securities) and the interaction variables of information application to verify how the information protection control activities( physical, technical and managerial security controls) affecting the organizational effectiveness are mediated by the information application, was 50.6%~4.1% additional increase. And the interaction factor(${\beta}$ = .148, p < .01) of physical security and information application, and interaction factor(${\beta}$ = .196, p < .01) of physical security and information application among additionally-put interaction variables, were statistically significant(p < .01), indicating the information application has mediated the relationship between physical security and managerial security factors of control activities, and organizational effectiveness. As for results stated above, it was proven that physical, technical and managerial factors as internal control activities for information protection are main mechanisms affecting the organizational effectiveness very significantly by information application. In information protection control activities, the more all physical, technical and managerial security factors were efficiently well performed, the higher information application, and the more information application was efficiently controlled and mediated, which it was proven that all these three factors are variables for useful information application. It suggested that they have acted as promotion mechanisms showing a very significant result on the internal customer satisfaction of employees, the efficiency of information management and the reduction of risk in the organizational effectiveness for information protection by the mediating or difficulty of proved information application.

ICAN, I3A Design Criteria for Military Defense Command & Control Facilities (국방 지휘·통제 시설을 위한 ICAN, I3A 설계기준)

  • Jo, Yun-Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.806-815
    • /
    • 2017
  • Korean Ministry of National Defense has criteria for military facilities but most were made with the focus on design criteria of facilities and especially in the case of information and communication, only overall criteria with the level of conceptual design are suggested without details. By comparing the design standards of ICAN and I3A that are applied in US Department of Defense, this study will suggest the desirable design standard of Korean military on command/control facilities and general/administrative facilities.

A Study on the Relationship between Smart Work Adoption Factors, User Innovation Resistance, and Turnover Intention: Focused on the Moderating Effect of Organizational Control (스마트워크 도입 요인과 사용자 혁신저항 및 이직의도 간의 관계에 대한 연구: 조직통제 조절효과를 중심으로)

  • Young Kwak;Minsoo Shin
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.23-43
    • /
    • 2021
  • Due to the recent transition to a non-face-to-face society, many organizations are quickly adapting to foster a smart work environment. The introduction of smart work does not simply end with incorporating ICT systems or solutions into business models since fundamental factors such as forms of employment and work styles need to be in line with the progression of technological advances. However, previous studies regarding smart work focus on improvements in productivity and efficiency from a technology acceptance perspective. Therefore, there is a lack of discussion on innovation resistance from employees and management control when ICT systems are introduced into the workplace. This study empirically analyzes the moderating effects of the organizational control method for employees and innovation resistance within a smart work environment. Additionally, this study aims to identify the structural characteristics that employees resist from an innovation resistance perspective when organizational innovation occurs. The empirical analysis of this study suggests that when smart work such as ICT technology is introduced into the workplace the level of innovation resistance decreases when there is a high level of relative advantage and self-efficacy, whereas the level of innovation resistance increases when there is a high level of use complexity. Moreover, this study revealed that the level of innovation resistance increases when the employees' behaviors were controlled. The results of this study intend to contribute to improving business management by suggesting factors worth considering when incorporating smart work into work places through a thorough case analysis.

Simulation of Optimized Production Technology System to verify the Supply Chain Management's Effectiveness (공급사슬경영의 유효성 입증을 위한 최적화생산시스템의 시뮬레이션)

  • 김종상
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.95-102
    • /
    • 2001
  • Supply Chain Management drawing attention of business management all over the world. This study has simulated OPT(Optimized Production Technology) to verify the Supply Chain Management's effectiveness The OPT system develops a detailed operating Philosophy, not just an operating procedure, and it includes many of the features of the JIT system and additional benefits as well The important OPT concepts such as. transfer batch. manufacturing process batch and batch it self served as a Pivotal role in increasing the productivity in manufacturing when they were altered. In this respect, this study develop the OPT simulation model, and this OPT model are evaluated by using a simulation study. It has proved that the performances of OPT model are excellent.

  • PDF

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

Design and Implementation of Role Assignment Protocol for Active Role Assignment and Passive Role Assignment (능동적 역할 할당과 수동적 역할 할당을 수행하는 역할 할당 프로토콜의 설계 및 구현)

  • 나상엽;김점구
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.111-117
    • /
    • 2004
  • In distributed-computing environments, there is a strong demand for the authentication and the access control of distributed-shared resources. I have presented role-based access control (RBAC) concept that is in the spotlight recently. RBAC model shows the standardized access control of complicated organization's resources. In RBAC, senior role has junior role's permission by virtue of role hierarchy. But, junior role cannot perform the permission, which is granted to the senior or other role groups. Inheritances of permissions in role hierarchies are static. In order to tackle this problem, I propose a dynamic role assignment, which classified into passive role assignment and active role assignment, and design dynamic role assignment protocol and implement role assignment server.

  • PDF