• Title/Summary/Keyword: 전사적 자산관리

Search Result 17, Processing Time 0.018 seconds

Study on IT security audit system for e-commerce private information protection (전자상거래 개인정보보호를 위한 IT보안감사체계 연구)

  • Lee, Eun-kyoung;Park, Byoung-woo;Jang, Seok-eun;Lee, Sang-joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.179-182
    • /
    • 2018
  • 최근 여기어때, 인터파크 등 전자상거래 기업을 대상으로 발생한 개인정보 해킹사고 사례를 보면, 사람의 취약점을 노리는 지능화지속위협(APT) 공격과 알려진 해킹 기술이 복합적으로 이루어지고 있다. 해킹사고가 발생한 기관은 한국인터넷진흥원(KISA) 정보보호관리체계(ISMS) 의무대상 기관으로써 정보보호관리체계를 유지 관리하고 있었다. 그럼에도 불구하고 대형의 개인정보 유출사고가 발생한 주요 원인은 정보보호관리체계가 적용되지 않았던 정보시스템과 인력을 대상으로 해킹이 이루어졌기 때문이다. 해킹 위협의 변화에 따라 전자상거래 보안 수준도 변화해야 하는데, 개인정보보호 관련 규제 준수도 전자상거래 기업에서는 힘든 상황이다. 고객의 개인정보 유출 사고는 일반인을 매출 기반으로 서비스하고 있는 전자상거래 기업에서는 치명적이다. 안전한 전자상거래 플랫폼 기반에서 고객에게 서비스를 제공하기 위해서는 무엇보다도 중요 자산인 고객의 개인정보보호를 위해 역량을 집중해야 한다. 한정된 예산과 자원으로 안전한 서비스를 제공하기 위해서는 기존에 구축된 정보보호관리체계를 기반으로 IT보안감사체계를 전사적으로 확대하여 지속적으로 모니터링 할 필요가 있다. 이에 본 연구에서는 최신 사이버 보안 위협 동향과 전자상거래 기업 대상으로 발생한 최근 개인정보유출사고 사례를 분석을 통해 시사점을 도출하여 전자상거래 개인정보 보호를 위한 IT보안감사체계를 제시하였다.

  • PDF

BSC Perspective of an Exploratory study of Developing CSF/KPI Pool in Korean Construction Industry (국내 건설 산업의 BSC관점의 CSF/KPI Pool 개발에 관한 연구)

  • Oh, Ic-Jin;Lee, Jung-Hoon;Lee, Choong-C
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.600-607
    • /
    • 2005
  • 최근 무형자산의 중요성과 함께 많은 선진기업들은 지속적인 가치창출을 위한 전략수립 및 수행절차를 통해 경쟁우위를 갖는데 노력하고 있다. BSC는 기업의 전략을 전사조직 차원에서 실행 시킬 수 있는 기반을 조성하며, 기업의 자원을 핵심역량에 집중시켜 전략의 실행력을 구체화하기 위한 경영기법 중 하나로 자리잡고 있으며, 이미 국내 다양한 공공 및 민간부문에서 BSC도입을 통해 기업전략과의 연계를 강화해 나가고 있는 추세이다. 그러나 특정산업에 따라 각 산업의 특성을 고려한 BSC기반의 CSF(사업핵심성공요소)와 KPI(주요성과지표) Pool에 대한 실질적인 연구는 다소 미흡한 실정이다. 국내 건설업인 경우, 관리의 복잡성으로 인해 아직까지 재무적 손익 중심의 성과측정에 주로 의존하고 있으며, 비재무적인 측면의 다양한 성과지표를 포함하지 못하고 있는 실정이다. 이에 본 연구에서는 건설산업에 적합한 BSC관점을 고려한 건설업의 CSF/KPI Pool를 제시하고 도출된 CSF가 기업의 경영성과와 어떤 상관관계를 살펴봄으로써 실제 의미가 있는지 알아보는데 목적을 두고 있다. 본 연구결과는 건설 산업에서의 성과측정의 기초자료로서 활용되어 체계적인 성과관리의 향상에 기여하고 미래 성과창출의 유인을 제공하고자 한다.

  • PDF

A Study on XMDR-DSM System Design for Cooperative (협업을 위한 XMDR-DSM 시스템 설계에 관한 연구)

  • Moon, Seok-Jae;Jung, Kye-Dong;Choi, Young-Keun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.701-714
    • /
    • 2009
  • In the enterprises the data integration based on service requires integrated data management as the change in the environment of enterprises accelerates. Cooperation among enterprises is accomplished through accessing distributed database using business process. As this approach is performed based on the global query, problems such as data heterogeneity, schema heterogeneity, and verification of validity have to be solved in advance for the interoperability among the heterogeneous system. Thus, cooperation requires dynamic and reliable construction. In this paper, we propose XMDR-DSM (eXtended MetaData Registry-Data Service Mediator) system for cooperation. XMDR-DSM, which is comprised of XMDR-DS, XMDR-DQP, and XMDR-DAI, supports the mapping between global schema and local schema and provides data access and integration service. Therefore, XMDR-DSM enables the mutual support of business operations among heterogeneous database. In addition, it can secure information as reusable asset and the standardization of interchange. Also it can manage unified information since it provides business process based on workflow; therefore, it will be able to increase the life span of information and reduce the cost.

The ISO the research also the ISMS security maturity of 27001 regarding a measurement modeling (ISO 27004 information security management measurement and metric system) (ISO 27001의 ISMS 보안성숙도 측정 모델링에 관한 연구 (ISO 27004 정보보호관리 측정 및 척도 체계))

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.153-160
    • /
    • 2007
  • Recently, the demand against the system risk analysis and security management from the enterprises or the agencies which operate a information system is increasing even from domestic. The international against the standardization trend of information protection management system it investigates from the dissertation which it sees. It analyzed and against information property information protection management system integrated it will be able to manage a danger modeling it did it proposed. Having analyzed as well as compared the matureness of security-measurement models in regard to the global standard of proposal system, the administrative presentation for various IT technology resources. which have been managed singly so far, is now well applied under the united control of the company itself, and enabled the automated management of authentication support and renewal for ISO 27001, ISO 9000, ISO 14000, resulting in much advanced operation for both material and human resources.

  • PDF

Fault-Free Process for IT System with TRM(Technical Reference Model) based Fault Check Point and Event Rule Engine (기술분류체계 기반의 장애 점검포인트와 이벤트 룰엔진을 적용한 무장애체계 구현)

  • Hyun, Byeong-Tag;Kim, Tae-Woo;Um, Chang-Sup;Seo, Jong-Hyen
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.1-17
    • /
    • 2010
  • IT Systems based on Global Single Instance (GSI) can manage a corporation's internal information, resources and assets effectively and raise business efficiency through consolidation of their business process and productivity. But, It has also dangerous factor that IT system fault failure can cause a state of paralysis of a business itself, followed by huge loss of money. Many of studies have been conducted about fault-tolerance based on using redundant component. The concept of fault tolerance is rather simple but, designing and adopting fault-tolerance system is not easy due to uncertainty of a type and frequency of faults. So, Operational fault management that working after developed IT system is important more and more along with technical fault management. This study proposes the fault management process that including a pre-estimation method using TRM (Technical Reference Model) check point and event rule engine. And also proposes a effect of fault-free process through built fault management system to representative company of Hi-tech industry. After adopting fault-free process, a number of failure decreased by 46%, a failure time decreased by 56% and the Opportunity loss costs decreased by 77%.

Difference Test of CRM Strategic Factors by university type for building customer strategy of university (대학의 고객경영전략 수립을 위한 대학유형별 CRM 전략 요소의 차별성 분석)

  • Park, Keun;Kim, Hyung-Su;Park, Chan-Wook
    • CRM연구
    • /
    • v.3 no.2
    • /
    • pp.43-68
    • /
    • 2010
  • One of the recent research trends that universities are increasingly adopting the concept of 'customer' and the customer-oriented strategy has urged us to research enterprise-wide CRM strategy adaptable to university administration. As the first step of CRM strategy for university management, we try to validate the difference of CRM strategic factors among university types. Drawing upon both CRM process and customer equity drivers, which have been recognized as core frameworks for CRM strategy, we developed those survey instruments adoptable into university industry, and validated statistically-significant difference among 12 types of university group constructed by the levels of university evaluation and the location of the universities. We collected 261 responses from 177 universities from all over the country and analyzed the data to see the levels of CRM processes consisting of customer acquisition, retention, and expansion, and customer equity drivers consisting of value equity, brand equity, and relationship equity by using multivariate ANOVA(MANOVA). The result confirms the explicit differences of the levels of CRM processes and customer equity drivers between the groups by university evaluation levels(high/middle/low). However, the analysis failed to show the significant differences of those between the group by university locations(the capital/the suburbs/the six megalopolises/other countries). More specifically, the level of activities for customer acquisition and retention of the universities in the higher-graded group are significantly different from those in the lower-graded group from the perspective of CRM process. In terms of customer equity drivers, the levels of both brand equity and relationship equity of the higher-graded group are significantly higher than those of both middle and lower-graded group. In addition, we found that the value equity between the higher and lower-graded groups, and the brand equity between the middle and lower-graded groups are different each other. This study provides an important meaning in that we tried to consider CRM strategy which has been mainly addressed in profit-making industries in terms of non-profit organization context. Our endeavors to develop and validate empirical measurements adoptable to university context could be an academic contribution. In terms of practical meaning, the processes and results of this study might be a guideline to many universities to build their own CRM strategies. According to the research results, those insights could be expressed in several messages. First, we propose to universities that they should plan their own differentiated CRM strategies according to their positions in terms of university evaluation. For example, although it is acceptable that a university in lower-level group might follow the CRM process strategy of the middle-level group universities, it is not a good idea to imitate the customer acquisition and retention activities of the higher-level group universities. Moreover, since this study reported that the level of universities' brand equity is just correlated with the level of university evaluation, it might be pointless for the middle or lower-leveled universities if they just copy their brand equity strategies from those of higher-leveled ones even though such activities are seemingly attractive. Meanwhile, the difference of CRM strategy by university position might provide universities with the direction where they should go for their CRM strategies. For instance, our study implies that the lower-positioned universities should improve all of the customer equity drivers with concerted efforts because their value, brand, and relationship equities are inferior compared with the higher and middle-positioned universities' ones. This also means that they should focus on customer acquisition and expansion initiatives rather than those for customer retention because all of the customer equity drivers could be influenced by the two kinds of CRM processes (KIm and Lee, 2010). Surely specific and detailed action plans for enhancing customer equity drivers should be developed after grasping their customer migration patterns illustrated by the rates of acquisition, retention, upgrade, downgrade, and defection for each customer segment.

  • PDF

A study on the systematic operation of the innovative patent strategy framework and the application plan of patent big data to secure competitive advantage (혁신특허전략 프레임워크의 체계적 운영 및 경쟁우위확보를 위한 특허빅테이터 활용방안에 관한 연구)

  • Kim, Hyun Ah;Cha, Wan Kyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.351-357
    • /
    • 2021
  • At the time when interest in the use of big data is rising in the face of the technological paradigm shift of the 4th industrial revolution, interest in the use of patented big data is increasing, especially as the proportion of intangible assets of companies increases. In addition to quantitative information, patent data contains various information such as unstructured text such as title, abstract, claim, citation and citation relations, drawings, and technology classification. It is judged that the use of treatment is important. Therefore, in this study, in order to systematically operate the innovative patent strategy framework and to secure a competitive advantage by strengthening the fundamental technological competitiveness of the company, we propose a method of using patent big data centering on the case of Company A, and verify its validity. I would like to suggest some implications. Through this, it is intended to raise awareness of the use of patent big data, and to suggest ways to use patent big data in connection with the company's company-wide strategy, business strategy, and functional strategy.