• Title/Summary/Keyword: 오피스

Search Result 403, Processing Time 0.024 seconds

A Study on Analysis of each Security Threat in Mobile Office based on Cloud Computing (클라우드 컴퓨팅 기반 모바일 오피스에서의 요소별 보안위협 분석 연구)

  • Jung, Jaewook;Jeon, Huiseung;Park, Sunwoo;Won, Dongho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.445-446
    • /
    • 2012
  • 스마트폰 시장의 급격한 성장에 의해 모바일 애플리케이션의 사용이 증가함에 따라, 스마트기기들을 이용하여 기업의 업무에 사용할 수 있는 클라우드 기반의 모바일 오피스 시대가 도래하고 있다. 또한, 신속성이 동반된 효율적인 기업 업무 처리의 장점으로 인해 모바일 클라우드 시장이 매년 확대되고 있는 추세이다. 그러나 클라우드 컴퓨팅 환경은 시간과 공간의 제약 없이 광범위한 분야에 적용 가능하기 때문에 여러 위협들이 존재 할 수 있으며, 그에 따른 적합한 보안기술 연구가 필수적이다. 이에 본 논문에서는 클라우드 컴퓨팅 환경에서의 보안위협과 모바일 오피스 환경에서의 보안위협을 각각 도출하고, 이를 바탕으로 융합된 두 환경에서 존재할 수 있는 보안위협을 각 요소별로 분석한다.

  • PDF

A Study on The Risk on the Non-payment of Monthly Rent of Seoul Office Market in the Framework of Asymmetric Information (정보비대칭 관점에서 서울 오피스 시장의 월세미납리스크에 관한 연구)

  • Kim, Sung-Nam;Choi, Young-Sang;Koh, Sung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.531-543
    • /
    • 2015
  • Benjamin, Lusht, and Shilling(1998) suggested that the level of deposit can be used as a tool to resolve the problem of adverse selection by the leaseholder under the circumstance of information asymmetry. In this respect, this research aims to verify how the level of deposit and monthly rent mitigate the problem of information asymmetry existing in the office market in Seoul. So far, the analysis of the office market in Seoul has been difficult due to the fixed rate of deposit and monthly rent. This research attempts to adopt the concept of occupancy cost, a global standard indicator that would replace the default risk of monthly payment for analyzing the market. As a result of a series of empirical analysis, the lessors tend to add about 9 percent of risk premium to the occupancy cost to hedge against the default risk of monthly payment. It allows for estimating at what extent one should reflect the leaseholder's default risk of monthly payment for operating deposit and monthly rent in the office building lease market.

Design and Implementation of JPetStore Order System Based Mobile WebApp Office (모바일 웹앱 오피스 기반의 JPetStore 주문시스템의 설계 및 구현)

  • Lee, Myeong-Ho;Han, Jung-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.149-154
    • /
    • 2012
  • This paper aims to design and realize android smartphone mobile webapp office JPetStore order system based Seam framework. Currently in production until the lightweight container architecture, known commonly architecture is Seam framework. However, there is no design and implementation research of mobile webapp office with the Seam framework environment. In this study, the Seam environment based on the android mobile webapp office JPetStore order system implementation after analyzing the mobile webapp office development productivity with the objective is to provide guidance.

How IT Drives Innovations for Public Service: Mobile Office for Seoul Metropolitan Railway (IT 기반의 공공서비스 혁신: 서울도시철도공사의 모바일 오피스 사례)

  • Cho, Nam-Jae;Choi, Joung-In;Oh, Seung-Hee
    • Information Systems Review
    • /
    • v.14 no.1
    • /
    • pp.67-84
    • /
    • 2012
  • Recent increases in uncertainty and speed of market change are driving the adoption of new intelligent mobile office systems. Organizational information systems paradigm suggests that a right match between organizational characteristics and the use of technology is critical in producing desired results. Following such perspective this study developed the mobile office system case of Seoul Metropolitan Railway Transit(SMRT) in Korea. SMRT developed the mobile task-supporting environment that help the management of subway lines real-time without the restriction of time and space. They named the system as ST&F(SMRT Talk and Flash). They decided to develop the application systems in-houses they did not want to be overly dependent on external services in future changes and developments of the system. The new practice reduced the time for moving back and forth to 10% of their working time from previous 20%. The time used for paper works and administration chore also reduce to 10% of their working time from previous 30% on the average. The employees could use 80% of their time to concentrate on the completion of assigned task. The effects of this improvement resulted in the heightened efficiency of the use of human resources and the heightened level of railway safety. The case of SMRT shows that the mobile office system can be applied and extended to various business areas such as facility management and maintenance beyond such typical uses as sales and marketing support. Also, The result of case study will be a useful guideline on the construction and using of mobile office system.

  • PDF

Improved Data Concealing and Detecting Methods for OOXML Document (OOXML 문서에 대한 향상된 데이터 은닉 및 탐지 방법)

  • Hong, Kiwon;Cho, Jaehyung;Kim, Soram;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.489-499
    • /
    • 2017
  • MS office is a office software which is widely used in the world. The OOXML format has been applied to the document structure from MS office 2007 to the newest version. In this regard, the method of data concealing, which is a representative anti-forensic act has been researched and developed, so the method of detecting concealed data is very important to the digital forensic investigation. In this paper, we present an improved data concealing method bypassing the previewers detecting methods for OOXML formatted MS office documents. In addition, we show concealment of the internal data like sheets and slides for MS office 2013 Excel and PowerPoint, and suggest an improved detecting algorithm against this data concealing.

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

A Mobile Office Support System: Applying Remote Data Synchronization and Device Management Methods (모바일 오피스 지원시스템: 원격 자료동기화와 장비관리 방법 적용)

  • Pak, Ju-Geon;Park, Kee-Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.137-148
    • /
    • 2010
  • In this paper, a mobile office support. system which consists of mobile devices and servers is proposed. An efficient mobile office support system is required to study since the existing mobile office support systems may face the serious problems such as an absence of interoperability, difficulties of data synchronization and device management in the near future, especially when a company has a large number of outdoor service employees. In this paper, a mobile office support system requirements for a company with a large number of outdoor service employees is proposed. And then, the methods to satisfy the requirements using a remote data synchronization and a remote device management technologies are proposed. The mobile office support system proposed in this paper synchronizes remotely a large number of various mobile devices of employees with centralized servers located in the company. In addition, it manages the mobile devices remotely for the employees. This paper proposes a mobile office support system based on OMA(Open Mobile Alliance) DS(Data Synchronization) and DM(Device Management) protocols. As OMA DS and DM protocols are de facto international standards, the interoperability between the mobile office support systems can be guaranteed.

An Audit Model for Customer Relationship Management in Smart Mobile Environments (스마트 모바일 환경에서 고객관계관리 구축을 위한 감리 모형)

  • Chung, Woong;Kim, Dong Soo;Rhee, Hye Kyung;Kim, Hee Wan
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.187-199
    • /
    • 2013
  • Since the supply of smart phones, a change in mobile environment brought a turning point called a mobile generation. Smart mobile office is a combined form of smart phones' new mobile environment and its social media. A construction of mobile office environment using smart phones brought revitalization of the smart phone market. CRM construction also became new requirements for a customer management. However, based on the current information system audit standard, check fields or check lists are insufficient to apply to audit for CRM construction in a smart mobile office environment. Therefore, this paper proposes a model for auditing CRM system construction in smart mobile office environment. It proposes audit domain and check lists of CRM construction. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check lists correspond with the purpose of the CRM construction audit during smart mobile office environment. As the result, this study appear to have more than average satisfaction the suitability results were.

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.