• Title/Summary/Keyword: 엔터프라이즈 아키텍처

Search Result 174, Processing Time 0.019 seconds

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

Developing Self-awareness Through Cyber Study and Cyber Reading Activities: A Case Study with the Electronic Library 'Booktoby' (사이버 학습을 활용한 학생의 자아정체성 확인에 관한 연구: 북토비 사례를 중심으로)

  • Kang, Hyon-Sook
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.485-494
    • /
    • 2014
  • This study has been conducted with $1^{st}$ grade elementary students where the purpose was to develop students' interest in themselves and to cultivate their self-awareness as the first step toward establishing a suitable course and career for their start-up features. Students have conducted the cyber study through "Incheon e-School" and cyber reading "Booktoby" and recorded three types of outcomes - affective self-awareness, social self-awareness and intelligence self-awareness - on each side of the Pyramid, thus constructing their own self-awareness pyramids of the system. According to the results, after such activities were undertaken during the $1^{st}$ semester, their opinion toward their self-control and study ability has improved as much as about 67% compared to that of the beginning of the last semester. Regarding the effects of cyber reading, their interest, spontaneity and understanding toward reading books have also improved as much as 54% and 50%, 33% respectively along with positive answers of as much as 75% with regard to self-awareness. When it comes to the results of the SCI-II test (used to evaluate self-awareness), the total average has improved by as much as 3 points and the three components of self-awareness - affective, social, and intelligence - have improved by as much as 4points, 1point, and 5points, respectively.

A Study on Utilization Effect and Implementation Model of Directory Service Based Information Resource Management System (디렉터리 서비스 기반 정보자원 관리시스템의 활용 효과 및 구축 모델에 대한 연구)

  • Lee, Sung-Jun;Kim, Hyuk;Lee, Kwang Soo;Kim, Minsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.427-439
    • /
    • 2014
  • Introduction of new information systems due to continuous progress of ICT has made the enterprise IT environment into a mixed pot of various IT resources. Rapidly changing business situation has emphasized the integration of organizational IT resources as one of key competitive advantages. Those distributed IT resources are now demanding to solve the problems not only on their own effective management but also on security and control issues against unauthorized infiltration and information leakages. Under the situation that the number of IT resources is constantly increasing, it is needed to study a management model and its implementation that integrally solves above all problems. In this paper, it is revealed that a directory service can be used to integrally manage distributed IT resources and a directory service based system model for distributed IT resource management is suggested. By implementing an HR solution over active directory service, it is demonstrated that our integrated management model for distributed resources is applicable to real business cases. It is expected that for small and medium sized enterprises with limited IT investments, directory service based IT resource management system can be a cost-effective solution for increasing security threats and lack of governance.

A Study on the Service and Performance factors of Public EA (공공부문 EA 서비스요인과 성과에 관한 연구)

  • Shin, Daul;Park, Joo-Seok;Park, JaeHong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.409-426
    • /
    • 2014
  • Korea has won 3 times in a row in the evaluation of e-government services in 2014. And the last year, the government-EA has been awarded the UN Public Service Award. Because of the development and execution of personalized integrated services based on the government-EA, Korea has won the two award from the UN. EA has been selected and proceeded as one of the 31 e-Government projects in early period, in 2005 the law which public sector must adopt the EA for efficient informatization had been enacted. Many public agencies in which actively utilized to derive such as internal and external performance through the EA. On the other hand, in the last 10 years, some public agencies have still been as recognized level of management in the EA. In this study, the main purpose is that to find out what is a major factor for successful use and result of EA, what is the EA success Model and how to examine it. To do that, this study will study the related prior research such as EA services, information systems success factors, performance measures, and develop the success model for EA and then examine the model. This study will contribute great implications in practical and theoretical in EA success model because this is the nation's first research that SERVQUAL model and the IS Success Model(DeLone & McLean 2003) has been combined and examined.

On the Epistemology of the National Informatization Policy - A Critical Review of the $5^{th}$ National Informatization Policy Plan (2013-2017) - (국가정보화 정책 인식구조에 대한 고찰 - 박근혜 정부 제 5차 국가정보화 기본계획 (2013-2017) 중심으로 -)

  • Juhn, Sung Hyun
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.393-407
    • /
    • 2014
  • The Government Informatization Policy Plan represents the government's technology policy vision and a set of ICT policy agenda and initiatives for the tenure of the government. The Policy Plan, however, normally produces an excess of disconcerted and superfluous ICT policy proposals from various policy units in the government. To cope with the superficiality of the ICT policy set in the Policy Plan, this paper proposes an analysis of the epistemology of the policy set. A policy is constructed as an argument and the structure of the policy argument is analysed using a model of argumentation. The findings show that the present informatization policy is driven by three epistemological motives - the production, consumption, and performance of the ICT Technology. The various assumptions and premises that underlie and direct the generation of ICT policy arguments with different motives are idenfied and then are exposed to strong rebuttal arguments to evaluate their epistemological tenability. The policy implications of the epistemological analysis are discussed in the end.

Multi-Dimensional Keyword Search and Analysis of Hotel Review Data Using Multi-Dimensional Text Cubes (다차원 텍스트 큐브를 이용한 호텔 리뷰 데이터의 다차원 키워드 검색 및 분석)

  • Kim, Namsoo;Lee, Suan;Jo, Sunhwa;Kim, Jinho
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.63-73
    • /
    • 2014
  • As the advance of WWW, unstructured data including texts are taking users' interests more and more. These unstructured data created by WWW users represent users' subjective opinions thus we can get very useful information such as users' personal tastes or perspectives from them if we analyze appropriately. In this paper, we provide various analysis efficiently for unstructured text documents by taking advantage of OLAP (On-Line Analytical Processing) multidimensional cube technology. OLAP cubes have been widely used for the multidimensional analysis for structured data such as simple alphabetic and numberic data but they didn't have used for unstructured data consisting of long texts. In order to provide multidimensional analysis for unstructured text data, however, Text Cube model has been proposed precently. It incorporates term frequency and inverted index as measurements to search and analyze text databases which play key roles in information retrieval. The primary goal of this paper is to apply this text cube model to a real data set from in an Internet site sharing hotel information and to provide multidimensional analysis for users' reviews on hotels written in texts. To achieve this goal, we first build text cubes for the hotel review data. By using the text cubes, we design and implement the system which provides multidimensional keyword search features to search and to analyze review texts on various dimensions. This system will be able to help users to get valuable guest-subjective summary information easily. Furthermore, this paper evaluats the proposed systems through various experiments and it reveals the effectiveness of the system.

A Research for Methodology of Culture Semiotics for Smart Healing Contents (스마트 힐링콘텐츠의 문화기호학적 방법론 연구)

  • Baik, Seung-Kuk;Yoon, En-Ho
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.3
    • /
    • pp.347-357
    • /
    • 2014
  • This research aims to suggest the possibility of functional culture contents based on interdisciplinary methodologies, especially for people who have Autism Spectrum Conditions, or those who have disabilities on express and receive gamsung (emotions). Recently, the development of application technologies in smartphones and tablet computers needs of functional culture contents, which are connected with the gamsung system. Moreover, the potential of marketplace of functional culture contents is emerging, as can be seen from the success of Augmentative and Alternative Communications (AAC) applications. Therefore, with the development of more applications that prevent and resolve Gamsung Disabilities anticipatively, there will be a positive economic effect of reducing back on intervention expenses as well as the construction of new contents ecosystem. So, in this research, we will attempt to make an approach of using the cultural semiotics methodology in finding attributes and features of applications that help to keep mental stability and balance for people with gamsung Disabilities. Particularly, this research will suggest an interdisciplinary theory on healing contents making methodology, using contents analysis; user interface (UI) analysis; and user experience (UX) analysis on existing smart healing applications.

An Empirical Study on Linux I/O stack for the Lifetime of SSD Perspective (SSD 수명 관점에서 리눅스 I/O 스택에 대한 실험적 분석)

  • Jeong, Nam Ki;Han, Tae Hee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.9
    • /
    • pp.54-62
    • /
    • 2015
  • Although NAND flash-based SSD (Solid-State Drive) provides superior performance in comparison to HDD (Hard Disk Drive), it has a major drawback in write endurance. As a result, the lifetime of SSD is determined by the workload and thus it becomes a big challenge in current technology trend of such as the shifting from SLC (Single Level Cell) to MLC (Multi Level cell) and even TLC (Triple Level Cell). Most previous studies have dealt with wear-leveling or improving SSD lifetime regarding hardware architecture. In this paper, we propose the optimal configuration of host I/O stack focusing on file system, I/O scheduler, and link power management using JEDEC enterprise workloads in terms of WAF (Write Amplification Factor) which represents the efficiency perspective of SSD life time especially for host write processing into flash memory. Experimental analysis shows that the optimum configuration of I/O stack for the perspective of SSD lifetime is MinPower-Dead-XFS which prolongs the lifetime of SSD approximately 2.6 times in comparison with MaxPower-Cfq-Ext4, the best performance combination. Though the performance was reduced by 13%, this contributions demonstrates a considerable aspect of SSD lifetime in relation to I/O stack optimization.

The Study on Strategy Planning and Outcome of EA in the Public sector (공공부문 EA 추진성과와 발전방안에 관한 연구)

  • Lee, Jae Du;Kim, Eun Ju
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.155-166
    • /
    • 2012
  • Recently EA(Enterprise Architecture) has been receiving growing attentions again from the public sectors. It is because EA maturity result is reflected to the organization's informatization level and EA maturity ratio has been enlarged. There has been more participation from the Chief Information Officers of the public sectors. EA research in the public sectors has influenced IT environment since the research started in late '90, the legislation work done in '05, and the maturity model developed in '06. However, there are some remaining tasks to solve. EA policy is introduction oriented, its contribution to the consecutive the best UN e-Government rank is limited, and its user-friendly responding system is still lacking. Related research outcomes are rather microscopic focusing only on the models and maturity than implicating on the public policy in a macroscopic manner. In this respect, this study will provide the implication on how EA policy should be. Requirements derived from EA stakeholders and the tasks will be arranged in accordance with its domain, then the performance and tasks will be demonstrated. As guiding EA stake holders and information related officers to setup the EA policy with these results, this study is expected to support information the policy drivers.

Type of Subjective Perception on the Fear Message - Q-methodological analysis on the latest Report of Korean Peninsula Situation - (위협적 메시지에 대한 주관적 인식 유형 - 최근 한반도 정세 관련 보도의 Q방법론적 분석 -)

  • Lee, Soonmo
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.2
    • /
    • pp.223-236
    • /
    • 2013
  • Related to the situation on the Korean Peninsula, by North Korea's threat of war the tension escalates and serious crisis continues. The purpose of this study is to evaluate the subjective perception which the residents of South Korea feel about North Korea's threat of war through a Q methodological analysis framework. In the result of the study, for the North Korea's threat of war the South Korean's recognition type is analyzed into four type such as 'non-reactive', 'fearreactive', 'psychological anxiety' and 'cynical ignorance type'. First, the No. 1 type 'non-reactive' does not empathize with North Korea's threat of war itself, and second type 'fear-reactive' have uneasy feeling like that 'What would happen as things go' and feel a sense of crisis about the North Korea's threat of war. The third type 'psychological anxiety' is type which feels that due to North Korea's threat of war inter-Korean relations is in the crisis. Finally the fourth type 'cynical ignorance' think that North Korea's threat of war is bluffing and also North Korea is like a shepherd boy. The reason to apply Q-methodology in this study is to make it possible to a more in-depth approach to subjective perception and threat of psychological meaning for the threatening message of study participants.