• Title/Summary/Keyword: 자산관리 시스템

Search Result 386, Processing Time 0.026 seconds

A Case Study of Knowledge Management based on SECI (SECI기반 지식관리실증연구)

  • Chang, Woo-Kwon;Kim, Hyun-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.4 s.50
    • /
    • pp.277-301
    • /
    • 2003
  • Knowledge Management is presented as the management method having the survival and competition of enterprise under variously changing management environment. Knowledge Management is introduced recently as successful survival strategy of advanced enterprise. Scientifically, however, the definition. study model and propulsion method of KM leave much to be desired, and now it has become the subjects of active study among scholars. To creation of the competitive power of the company have to be important knowledge based continuous innovation. That is to say, the knowledge management means a lot to knowledge assets included knowledge, knowledge creating, sharing, and acting This study aims to propose models on the research result based a case study of the financial industry in knowledge creating processes(SECI) and deriving knowledge management styles in the flied works of the bank.

Fault-Free Process for IT System with TRM(Technical Reference Model) based Fault Check Point and Event Rule Engine (기술분류체계 기반의 장애 점검포인트와 이벤트 룰엔진을 적용한 무장애체계 구현)

  • Hyun, Byeong-Tag;Kim, Tae-Woo;Um, Chang-Sup;Seo, Jong-Hyen
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.1-17
    • /
    • 2010
  • IT Systems based on Global Single Instance (GSI) can manage a corporation's internal information, resources and assets effectively and raise business efficiency through consolidation of their business process and productivity. But, It has also dangerous factor that IT system fault failure can cause a state of paralysis of a business itself, followed by huge loss of money. Many of studies have been conducted about fault-tolerance based on using redundant component. The concept of fault tolerance is rather simple but, designing and adopting fault-tolerance system is not easy due to uncertainty of a type and frequency of faults. So, Operational fault management that working after developed IT system is important more and more along with technical fault management. This study proposes the fault management process that including a pre-estimation method using TRM (Technical Reference Model) check point and event rule engine. And also proposes a effect of fault-free process through built fault management system to representative company of Hi-tech industry. After adopting fault-free process, a number of failure decreased by 46%, a failure time decreased by 56% and the Opportunity loss costs decreased by 77%.

Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management (국방정보시스템에서의 랜섬웨어 위협 대응방안: 정보보안 위험관리 관점에서)

  • Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.75-80
    • /
    • 2020
  • Damage caused by ransomware has continued to increase since last year, but cyber operations are managed without any separate classification of ransomware types in the military's guidelines for carrying out cyber operations. However, unlike other malware, ransomware is a threat that could paralyze all defense operations in one moment, and the military should reevaluate ransomware and take countermeasures. Accordingly, this paper aims to analyze the assets, vulnerabilities, and threats related to defense information service based on information security risk management, and propose alternatives to ensure continuity of defense work from ransomware threats.

A Study on Possible Construction of Big Data Analysis System Applied to the Offline Market (오프라인 마켓에 적용 가능한 빅데이터 분석 시스템 구축 방안에 관한 연구)

  • Lee, Hoo-Young;Park, Koo-Rack;Kim, Dong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.317-323
    • /
    • 2016
  • Big Data is now seen as a major asset in the company's competitiveness, its influence in the future is expected to grow. Companies that recognize the importance are already actively engaged with Big Data in product development and marketing, which are increasingly applied across sectors of society, including politics, sports. However, lack of knowledge of the system implementation and high costs are still a big obstacles to the introduction of Big Data and systems. It is an objective in this study to build a Big Data system, which is based on open source Hadoop and Hive among Big Data systems, utilizing POS sales data of small and medium-sized offline markets. This approach of convergence is expected to improve existing sales systems that have been simply focusing on profit and loss analysis. It will also be able to use it as the basis for the decisions of the executive to enable prediction of the consumption patterns of customer preference and demand in advance.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

A Study on Relationships Between Information Systems Risk and Password Characteristics (정보 시스템 위험과 패스워드 특성간의 관계에 대한 연구)

  • 오창규;김종기;심윤주
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.62-74
    • /
    • 2003
  • Information security becomes a critical attribute to corporate information systems as increased strategic an operational reliance on information systems. Current proliferation of password requires more attention on information security because its nature of external connection with password user makes information systems more vulnerable from various threats are an important element of information systems management. This study focused on two issues : (1) the relationships between risk management factors(asset, threat, vulnerability) and risk level affected by threat, (2) the relationships between risk level and key password characteristics(length, composition, lifetime, selection method).

  • PDF

Study for a Efficient Mission of the Flood Control Office (홍수통제소의 효율적 임무 수행을 위한 연구)

  • Choi, Kyu-Hyun;Hong, Sung-Hun;Kim, Joung-Ho;Song, In-Kwon;Kim, Min-Sik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.1537-1540
    • /
    • 2009
  • 홍수통제소는 수문조사, 하천유량관리, 홍수예보 등 다양한 업무를 수행하고 있다. 수문조사는 물 관리를 위한 기본 자료 확보와 수자원이라는 국가의 귀중한 자산을 정량화하는 중요한 업무이다. 하천유량 관리는 하천의 물을 합리적으로 관리하여 공익을 증진하고 모든 사람들이 혜택을 고루 향유할 수 있도록 배분하는 업무이다. 홍수예보는 큰 비에 의해 유역에서 발생할 수 있는 홍수의 규모를 예측하고 그 수치를 유관기관에 제공하여 홍수를 사전에 대비토록 함으로써 홍수피해를 최소화 할 수 있도록 하는 업무이다. 상기 언급된 홍수통제소의 주요 업무들을 효율적으로 수행하기 위하여 낙동강홍수통제소에서는 전년도 시험연구과제로서 "홍수통제소 발전방안"이라는 주제로 낙동강 홍수통제소의 발전을 위한 기본적인 개선항목 중 홍수통제소 홍보동영상 제작을 통한 통제소 홍보 및 이미지 제고, 수자원 자료실의 전산화와 관측소 이력 및 기본제원 시스템화 등을 통한 업무의 효율성 증대를 위하여 연구를 수행하였다. 금년은 지난해 개선된 업무들을 토대로 업무 효율성 증대를 도모하고자 한다. 현재 낙동강홍수 통제소에서 관리되고 있는 수문관측소는 239개소(수위 및 우량, 10분 단위)으로, 이들 관측소에 대한 효율적인 관리와 정확한 자료 생성을 위해서는 해당 내용에 대한 체계적이고 합리적인 관리가 필요하다. 이를 위하여 관측소 이력관리 프로그램을 시험적으로 운영을 하여 매년 실시되는 분기별 관측소 정기점검 결과를 업로드 시켜 관련 직원들이 내용을 공유할 수 있도록 추진하고 있다. 이는 수문자료의 정확한 검보정에도 활용될 수 있을 뿐만 아니라 다양한 정보를 체계적으로 관리하여 향후 추가적인 업무 효율화를 위하여도 이용될 수 있을 것이다.

  • PDF

Systematic Development of Mobile IoT Device Power Management: Feature-based Variability Modeling and Asset Development (모바일 IoT 디바이스 파워 관리의 체계적인 개발 방법: 휘처 기반 가변성 모델링 및 자산 개발)

  • Lee, Hyesun;Lee, Kang Bok;Bang, Hyo-Chan
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.460-469
    • /
    • 2016
  • Internet of Things (IoT) is an environment where various devices are connected to each other via a wired/wireless network and where the devices gather, process, exchange, and share information. Some of the most important types of IoT devices are mobile IoT devices such as smartphones. These devices provide various high-performance services to users but cannot be supplied with power all the time; therefore, power management appropriate to a given IoT environment is necessary. Power management of mobile IoT devices involves complex relationships between various entities such as application processors (APs), HW modules inside/outside AP, Operating System (OS), platforms, and applications; a method is therefore needed to systematically analyze and manage these relationships. In addition, variabilities related to power management such as various policies, operational environments, and algorithms need to be analyzed and applied to power management development. In this paper, engineering principles and a method based on them are presented in order to address these challenges and support systematic development of IoT device power management. Power management of connected helmet systems was used to validate the feasibility of the proposed method.

Design of a Real Estate Knowledge Information System Based on Semantic Search (시맨틱 검색 기반의 부동산 지식 정보시스템 설계)

  • Cho, Jae-Hyung;Kang, Moo-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.111-124
    • /
    • 2011
  • The apartment' share of the housing has steadily increased and property assets have been valued in importance as the one of asset value. Information retrieval system using internet is particularly active in the real estate market. However, user satisfaction on real estate information system is not very high, and there is a lack of research on real estate retrieval to increasing efficiency until now. This study presents a new knowledge information system developed to consider region-related factor and individual-related factor in the real estate market. In addition it enables a real estate knowledge system to search various preferential requirements for buyers such as school district, living convenience, easy maintenance as well as price. We made a survey of the search condition preference of experts on 30 real estate agents and then analyzed the result using AHP methodology. Furthermore, this research is to build apartment ontology using semantic web technologies to standardize various terminologies of apartment information and to show how it can be used to help buyers find apartments of the interest. After designing architecture of a real estate knowledge information system, this system is applied to the Busan real estate market to estimate the solutions of retrieval through Multi-Attribute Decision Making(MADM). Based on the results of the analysis, we endowed the buyer and expert's selected factors with weights in the system. Evaluation results indicate that this new system is to raise not only the value satisfaction of user, but also make it possible to effectively search and analyze the real estate through entropy analysis of MADM. This new system is to raise not only the value satisfaction of buyer's real estate, but also make it possible to effectively search and analyze the related real estate, consequently saving the searching cost of the buyers.

A Security Level Decision Method for Multimedia System (멀티미디어 시스템 정보보호수준 결정 기법)

  • Kim, Tai-Hoon;Lee, Deok-Gyu;Yeo, Sang-Soo;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.61-67
    • /
    • 2008
  • Each organization installing and operating multimedia system, to achieve the goal of organization, should decide security level, implement security countermeasure, and manage these countermeasures to keep the effects. To decide and manage security level of multimedia system, the first, organizations must be able to decide security level, and then, organizations must establish procedures for building security countermeasures according to security level. For the next step, organizations must be able to select areas where security countermeasures should be applied, and the last, organizations must be able to evaluate and improve the effect of security countermeasures. In this paper, based on the analysis of threat to multimedia system and the consideration for multimedia assets, we propose a method for deciding security level of multimedia system.

  • PDF