• Title/Summary/Keyword: 운영조직

Search Result 1,671, Processing Time 0.031 seconds

Studies on the effect of information security investment executive (정보보호의 투자 집행 효과에 관한 연구)

  • Jeong, Seong-Hoon;Yoon, Joon-Sub;Lim, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1271-1284
    • /
    • 2014
  • This paper classifies technical, administrative and physical areas of defects and advices made by an external audit (ISO27001) and internal audit (performed by a security team) in a company which has the management system of information security. With the classified data it finds the correlation between the budget and investment of information security, and analyze the correlation. As a result of the analysis, it has been found that as time goes on there is a consistent correlation between a administrative area and technical area of security. Specially, it has been confirmed that the relation between the scale of the budget which is not executed and the number of the defects and advices made by the audit is in direct proportion. Therefore, in this paper, so as to provide a model that can be used for validating the effectiveness of the protective investment information by statistically calculating the similarity based on the results of correlation analysis. This research is intended to help that a company makes a precise decision when it establishes a policy of information security and systematic methodology of the investment in information security.

The Study on the Strategy for the Formation of the Innovation Clusters - Focused on the Scenario Planning of the 'Pankyo TechnoValley'- (기술혁신 클러스터 구축의 전략방향 설정에 관한 연구 - '판교 테크노밸리' 시나라오 플래닝을 중심으로 -)

  • Lee, Won-Il;Yim, Deok-Soon;Lee, Yeon-Hee;Jung, Eui-Jeong
    • Journal of Korea Technology Innovation Society
    • /
    • v.14 no.2
    • /
    • pp.301-319
    • /
    • 2011
  • This research focused on the strategy consulting of the 'Pankyo Technovalley' for the formation of the innovation clusters The study was performed based on both theoretical study and related qualitative study approaches. Particularly, 'scenario planning' as a foresight method was used for the strategy formulation of the innovation clusters. The major determinants for the success of the formation of the innovation clusters can be summarized as follows; the enhancement of the service of the host institution of clusters, the alignment of the national cluster policy with the strategy of the host institution and the networks of the clusters. In terms of the needs of times, this study regarding the strategy for the formation of the innovation clusters is anticipated to be a good reference for the R&D organizations and technology cluster participants in coming years.

  • PDF

P2P-based Collaboration Framework: Openwar (P2P기반 협업 프레임워크: 오픈웨어)

  • Song, Jin-Su;Park, Chung-Sik;Kim, Yun-Sang;Gwon, Sun-Beom
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.453-460
    • /
    • 2005
  • P2P(Peer to Peer) 기술은 잠재적 능력에도 불구하고 컨텐츠의 저작권문제와 보안문제 등으로 인하여 많은 사람들이 충분히 활용하지 못하고 있다. 본 연구는 인터넷 사용자(개인)와 소규모 서버를 운영하는 조직들이 정보 제공, 분배, 공유의 정보시스템 구조를 자신들의 목적에 맞게 자유롭게 만들 수 있는 프레임워크인 오픈웨어 (Openware)의 개발에 관한 것이다. 오픈웨어는 P2P기반 시스템으로 다음과 같은 특징올 갖는다. 1) 다수의 서버와 클라이언트로 이루어지는 구조로, 사용자의 목적에 맞게 집중형 혹은 분산형 구조를 자유롭게 혼합하여 정보시스템을 구성 할 수 있다. 이러한 정보 구조의 유연성은 다양한 형태의 협업(개인과 개인, 개인과 그룹, 그룹과 그룹)이 요구되는 응용 시스템의 기반을 제공한다. 2) 데이터 관점에서 오픈웨어는 개인이 데이터베이스를 손쉽게 생성, 관리 할 수 있고, 자신의, 데이터 혹은 데이터베이스 구조를 다른 사람이나 그룹과 공유 하거나 통합 할 수 있다. 3) 데이터 통신면에서 오픈웨어는 HTTP(HyperText Transfer Protocol) 프로토콜만을 사용하는 웹 기반 시스템으로 인터넷에 연결 되어있는 누구와도 오픈웨어를 통해 협업이 가능하다. 4) 소프트웨어 이름에서 알 수 있듯이 오픈웨어는 Java, JSP, Apache, Resin등 공개소프트어로 만들어져 있고, 오픈웨어 자체도 공개소프트웨어이다. 오픈웨어는 개인과 그룹의 흠페이지 생성과 관리, 파일 공유 기능이 구현 되어있고, 데이터베이스 공유, 통합 기능을 이용하여 개인이나 그룹의 주소록관리, 일정관리 등이 가능하다. 오픈웨어는 사용자 흑은 개발자가 다양한 형태의 응용컴포넌트를 자유롭게 등록하여 기능을 추가 할 수 있는 확장성올 제공하고 있어서, 앞으로 e-메일, 매신저, 전자결재, 지식관리시스템, 인터넷 방송 시스템의 기반 구조 역할을 할 수 있다. 현재 오픈웨어에 적용하기 위한 P2P 기반의 지능형 BPM(Business Process Management)에 관한 연구와 X인터넷 기술을 이용한 RIA (Rich Internet Application) 기반 웹인터페이스 연구를 진행하고 있다.

  • PDF

Analysis and Design of IP Traceback for Intrusion Response (침입대응을 위한 IP 역추적 시스템 분석 및 설계)

  • 이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.412-415
    • /
    • 2004
  • As computers and networks become popular, corporation or country organization composes security network including various kinds information protection system to protect informations and resources from internet and is operating system and network. But current firewall and IDS(Intrusion Detection System) of the network level suffers from many vulnerabilities in internal computing informations and resources. In this paper, we design of ICMP-based Traceback System using a ICMP Traceback Message for efficiently traceback without change structure of routers. ICMP-based Traceback System. Create of ICMP message is managed by “Traceback Agent” mirroring port for router. Victim's systems that are received the message store it and “Traceback Manager” is detect a attack(like a DDoS). Using a information of this message starting a traceback and detecting a source of attacker, so response a attack.

  • PDF

Job Assignment basis on Assistant-staff for The Information security improvement of Public Institution (공공기관 정보보안수준 향상을 위한 분임담당자 중심 업무분장 개선에 관한 연구)

  • Kim, Sang-Kyoon;Kim, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2007-2013
    • /
    • 2016
  • It was found to have hacking attempts totaling 115,000 to target the public sector since 2011 to 2015. National Intelligence Service was conducting survey information security management states of a wide range of national-public institutions up to 800 including government agencies in the 2012, while instructing to complement shortcomings. However, there is still going to occur invasions, such as Korea Hydro & Nuclear Power hacking. Even though KHNP's security personnel was only 53 people, in the total 20,000 workforces, got the almost perfect score in the 2013 and 2014 related to information security personnel. Through them, we can confirm that between the organizational response to information security incidents and something theoretical is very far. In this paper, we suggest solutions not using the professional staff management but the non-professional staff management to upgrade the level of public agencies information security.

Agent Based Process Management Environment (에이전트 기반의 프로세스 관리 환경에 관한 연구)

  • Kim, Jeong-Ah;Choi, Seung-Young;Choi, Sung-Woon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.691-698
    • /
    • 2006
  • The companies need the enterprise-wide support environment to build the competency to gather VOM(Voice of Market) in the process of preparing and implementing the strategy and to help establishing and managing the business process in order to secure the continuous competitive edge The enterprise-wide support environment to establish, operate, improve and evaluate the business process must be carried out. In this paper we define the method to define process and business rule in order to enable accurate execution of the process. Furthermore, collection and refection of accurate data concerning the competency of individuals, the subjects of the process execution, allows prevention of weakness of the process execution result and is the basis for identifying the areas of improvement. Therefore, high visibility can be attained through the work knowledge and processes presented in rules, and it can help firmly establish the process centered work culture (or system) in the organization by process improvement strictly based on data.

Trends in standards of low voltage circuit breaker and activities of IEC SC17B, SC17D (저압차단기 규격동향 및 IEC SC17B, SC17D 활동에 관한 고찰)

  • Lee, Dong-Jun;Roh, Chang-Il;Jung, Heung-Soo;Kim, Sun-Koo;Kim, Won-Man;Kim, Sun-Ho;Kim, Chul-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.951-952
    • /
    • 2007
  • International Electrotechnical Commission (IEC)은 국제 규격을 제 개정하는 단체로서, 1906년에 설립된 조직이다. 2006년 말 기준으로 67개국의 회원 국가를 보유하고 있으며 총 5,613개의 규격을 제 개정하고 있다. IEC는 많은 수의 규격을 제 개정하기 위하여 100개의 Technical Committee (TC)와, 각 TC 산하에 Subcommittees(SC)를 두고 있다. SC는 다시 산하에 Working group(WG)을 두어 실제적으로 해당 국제규격의 제 개정은 바로 이 WG에서 작업을 하게 된다. 본 논문에서는 IEC TC17내의 SC17B와 SC17D의 구성, 현황 및 활동과 현재 진행되고 있는 저압차단기의 규격동향에 대하여 고찰하였다. IEC TC17은 차단기, 개폐기(스위치), 단로기, 버스관로 및 배전반등과 관련된 IEC 규격의 제 개정을 담당하고 있다. TC17 산하의 SC17B는 저압 차단기, SC17D는 저압배전반제품과 관련된 규격을 관리하고 있다. 한국은 SC17B와 SC 17D의 P-member(Participant)로서 투표권을 갖고 있으며, 한국전기연구원이 운영간사를 맡고 있다. 현재 국내기업체 전문가와 연구원들의 의견을 수렴하여 국가의견으로서 IEC에 제출하고 있지만 앞으로 더 많은 전문가들의 참여가 시급한 실정이다.

  • PDF

A Study on the Factors Influencing on the Intention to Continuously Use a Smart Factory (스마트 팩토리 지속사용의도에 영향을 미치는 요인에 관한 연구)

  • Kim, Hyun-gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.2
    • /
    • pp.73-85
    • /
    • 2020
  • While Korea became one of manufacturing powers in the world through a fast-follower strategy as well as implementing the approach of advancing manufacturing business focused on quantitative input, The advent of the fourth industrial revolution and demand becoming more complicated than ever both require a system that quickly detects the change of markets in advance and reflects it in the manufacturing strategy. Accordingly, the introduction of a smart factory is not optional but mandatory in order to strengthen the competitiveness of manufacturing business using ICT. This paper aims to investigate key factors having influence on the intention to continuously use a smart factory, the innovative IT device, on the basis of the technology acceptance model. This paper analyzed the influence of the leadership of CEO, organizational learning and perceived switching costs on the intention to continuously use a smart factory by the parameters of perceived ease of use and usefulness, the major belief valuables of the IT acceptance model.

Design and Verification of Connected Data Architecture Concept employing DataLake Framework over Abyss Storage Cluster (Abyss Storage Cluster 기반 DataLake Framework의 Connected Data Architecture 개념 설계 및 검증)

  • Cha, ByungRae;Cha, Yun-Seok;Park, Sun;Shin, Byeong-Chun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.7 no.3
    • /
    • pp.57-63
    • /
    • 2018
  • With many types of data generated in the shift of business environment as a result of growth of an organization or enterprise, there is a need to improve the data-processing efficiency in smarter means with a single domain model such as Data Lake. In particular, creating a logical single domain model from physical partitioned multi-site data by the finite resources of nature and shared economy is very important in terms of efficient operation of computing resources. Based on the advantages of the existing Data Lake framework, we define the CDA-Concept (connected data architecture concept) and functions of Data Lake Framework over Abyss Storage for integrating multiple sites in various application domains and managing the data lifecycle. Also, it performs the interface design and validation verification for Interface #2 & #3 of the connected data architecture-concept.

Alternatives to Promote the Sport Cooperatives of Korea (한국 스포츠 협동조합의 활성화 방안)

  • Kim, Jung-Dong;Lee, Jong-Kil;Lee, Moon-Sook
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.469-478
    • /
    • 2019
  • This study tried to analyse the factors to promote sport cooperatives as the solutions to overcome those problems of present sports industry. The results of this study By Using the priorities of AHP on promoting factors of sport cooperative in Korea, could be suggested as follows. In advance, the basic directions were suggested in order of economical, social, cultural, and institutional factors. And next, the promoting strategies were suggested as follows: 1st, setting directions on the essentials of cooperative. 2nd, securement of the finance by business management development and organization ability improvement. 3rd, acquaintance with the basic laws of cooperative and securement of administrative support. 4th, social contribution through cooperation and interaction among cooperatives. 5th, making local communities through constructing networks among cooperatives. 6th, development of business models with membership systematizing and efficiency pursuit.