• Title/Summary/Keyword: 정보시스템(IS) 성과

Search Result 12,844, Processing Time 0.045 seconds

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

A Study on Revitaliztion of the Emergency Rescue Information System (긴급구조 정보시스템 활성화 방안에 관한 연구)

  • Woo, Seong-Cheon;Chae, Jin
    • Fire Science and Engineering
    • /
    • v.21 no.2 s.66
    • /
    • pp.1-13
    • /
    • 2007
  • As population has been gravitating to the city and buildings have been getting higher, closer and deeper, the damage is getting greater and taking countermeasures against disaster is rising one of the major government's projects. The aim of this study is to suggest a utilization plan of the emergency rescue information system based on the operating problems after valuating user part, system part and organization part of the system. As result, facility plan for access to emergency rescue information system and operating on user part, raing plan of rapidity and stability on system part, decision making and organization and contribution plan on organization part are suggested.

Factors Influencing Is Outsourcing Implementation : An Empirical Study from the Interorganizational Relationship Perspective (정보시스템 아웃소싱의 성공요인 분석 : 조직간 관계 관점에서의 실증적 연구)

  • Chung, Young-Soo
    • The Journal of Information Systems
    • /
    • v.6 no.2
    • /
    • pp.51-83
    • /
    • 1997
  • 정보시스템 아웃소싱(outsourcing)의 적용 범위와 그 규모가 증대함에 따라, 아웃 소시은 정보시스템의 관리에서 근본적인 이슈로 등장하게 되었다. 정보시스템 아웃소시의 중요성이 인식되었으나, 그에 대한 실증적 연구는 매우 미흡한 실정이다. 본 연구의 주요 목적은 정보시스템 아웃소싱에 있어 고객회사(client firm)와 서비스 제공업자(vendor)간의 관계의 성공 및 실패에 영향을 미치는 요인을 조사하는 것이다. 본 연구의 연구 모델은 관 계적 거래이론(relational exchange theory), 커뮤티케이션 행동(communication behavior), 거래비용분석(transaction cost analysis) 등의 조직간 관계(interorganizational relationship) 이론에 기반을 두고 작성되었다. 미국의 207개 회사의 정보시스템 아웃소싱 설문조사에 의 하여 다음과 같은 연구결과가 도출되었다. (1) 서비스 제공업자의 능력(vendor capability), 관계결속성(solidarity), 터링(monitoring of the vendor), 참여도(participation) 등이 아웃소 싱 관계의 성공과 양의 상관관계를 가지고 있으며, (2) 역할참여도(role integrity), 자산특이 성(asset specificity) 등은 아웃소싱 관계의 성공과 음의 관계를 가지고 있는 것으로 나타났 다. 이 결과에 의하면, 비관계적 거래(discrete exchange) 보다는, 관계적거래(relational exchange)에 기반을 두어 아웃소싱 관계를 운영하는 것이 아웃소싱의 성공적인 구현을 위 하여 필수적으로 보여진다. 이 연구 결과를 기초로 하여 아웃소싱 대상 업무의 선택, 서비 스 제공업자의 선택, 그리고 아웃소싱 관계의 지속적인 관리를 위한 지침을 제시하였다.

  • PDF

A study on the effects of information integration on logistics performance (정보의 통합화가 물류성과에 미치는 영향에 관한 연구)

  • Kim, Heon
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.1-11
    • /
    • 1998
  • Today's firms face task of achieving competencies in two somewhat mutually exclusive areas. That is, due to fierce competition in the market, firms need to provide better products and services without losing cost advantage. In this respect, effective logistics management is one of the process that can yield a foundation of competitive advantage. Many firms are already using integrative supply chain management to achieve mutual goals of each firms within the supply chain. However, it is highly likely that inefficiency will occur because of different operations systems and organizational characters of each firms. Information system is receiving attentions as to reduce inefficiencies and gain competitive advantage. This study analyzes the effects of information integration on logistics performance to search the role of information system in supply chain management.

  • PDF

Priority Demand Assessment for Overseas Construction Information Using Clustering Method (클러스터링 기법을 활용한 해외건설 필요정보 우선순위 수요 조사 평가)

  • Choi, Wonyoung;Kwak, Seing-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.4
    • /
    • pp.57-68
    • /
    • 2018
  • In a situation when domestic construction market is expected to be stagnant, Overseas Information System for Construction Engineering (OVICE) is operated to support the construction SMEs that advance to the global market. In this study, we aimed to improve the quality of information service by providing direction of information provision, by comparing expert questionnaire with information system user statistics. For statistical analysis of information systems, to improve the efficiency of statistical analysis that is difficult to prioritize, K-means clustering is used for more efficient analysis. As a result, analyzing the difference between the survey results and the information system statistics, we were able to identify improvement point of information provision in the system and important contents that were not highlighted during the survey.

An Integrative Method of Fault Tree Analysis and Fault Modes and Effect Analysis for Security Evaluation of e-Teaching and Learning System (전자 교수학습 시스템의 보안성 평가를 위한 결함트리분석과 고장유형에 대한 영향분석의 통합적 방법)

  • Jin, Eun-Ji;Kim, Myong-Hee;Park, Man-Gon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.1
    • /
    • pp.7-18
    • /
    • 2013
  • These days, the teaching and learning system has been increasing for the rapid advancement of the information technologies. We can access education systems of good quality anytime, anywhere and we can use the individually personalized teaching and learning system depending on developing the wireless communication technology and the multimedia processing technology. The more the various systems develop, the more software security systems become important. There are a lot kind of fault analysis methods to evaluate software security systems. However, the only assessment method to evaluate software security system is not enough to analysis properly on account of the various types and characteristic of software systems by progressing information technology. Therefore, this paper proposes an integrative method of Fault Tree Analysis (FTA) and Fault Modes and Effect Analysis(FMEA) to evaluate the security of e-teaching and learning system as an illustration.

A Study of the Systems Quality Effect on the Intention to Use of Cloud Computing Services in Information Center (정보센터 시스템 품질이 클라우드 서비스 이용의도에 미치는 영향 연구)

  • Yoon, Jung-Hyeon
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.4
    • /
    • pp.49-63
    • /
    • 2011
  • The purpose of this study is to identify the new roles and services of information center that is affected by changing information technology so called cloud computing service. Using Information Technology acceptance model, hypotheses were developed to find relationships among intention to use of a cloud service, perceived usefulness, perceived easy of use and three system quality evaluation factors such as data safety, network response time, and system accessibility. The hypotheses have been tested with 114 user surveys. This study presents the relationship between certain attitude and intention to use variables and system accessibility applying clouding service. The result of this research gives an insight of the evaluation and a guideline for the implementation of cloud computing services in information centers.

Main Memory Spatial Database Clusters for Large Scale Web Geographic Information Systems (대규모 웹 지리정보시스템을 위한 메모리 상주 공간 데이터베이스 클러스터)

  • Lee, Jae-Dong
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.1 s.11
    • /
    • pp.3-17
    • /
    • 2004
  • With the rapid growth of the Internet geographic information services through the WWW such as a location-based service and so on. Web GISs (Geographic Information Systems) have also come to be a cluster-based architecture like most other information systems. That is, in order to guarntee high quality of geographic information service without regard to the rapid growth of the number of users, web GISs need cluster-based architecture that will be cost-effective and have high availability and scalability. This paper proposes the design of the cluster-based web GIS with high availability and scalability. For this, each node within a cluster-based web GIS consists of main memory spatial databases which accomplish role of caching by using data declustering and the locality of spatial query. Not only simple region queries but also the proposed system processed spatial join queries effectively. Compare to the existing method. Parallel R-tree spatial join for a shared-Nothing architecture, the result of simulation experiments represents that the proposed spatial join method achieves improvement of performance respectively 23% and 30% as data quantity and nodes of cluster become large.

  • PDF

Image Cryptography for Secure Video Conference System (안전한 화상회의 시스템을 위한 영상암호화)

  • 고석만;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.1
    • /
    • pp.70-75
    • /
    • 2002
  • Video conference system has guided swiftness of information transmission and business processing taking away time and manufacturing drug of space that is happened that long-distance people gather and talk. But, leakage of important meeting contents, peculation etc.. in that execute video -conferences can happen. Therefore, research about video conference system of safety is progressing under secure superhigh speed information communication fetters. This treatise studied about techniques to encipher videotex to prevent variation and outward flow of burn information, peculation etc.. except general encryption notation such as user certification to have drawn problem about stability of general video conference system, and is used present as countermeasure about here. Used improved Vernam's encryption techniques to encrypt videotex.

Effect that Number of Meals and Dietitian's Individual Special Quality Get in Efficiency of Menu Information System (급식소 식사제공수와 영양사의 개인특성이 메뉴관리 정보시스템의 효율성에 미치는 영향)

  • Lee Sang-Mi;Choi Sang-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.5
    • /
    • pp.170-177
    • /
    • 2006
  • The purpose of this study is to enhance efficiency of menu management of information system on the institutional restaurant according to the academic background, working career, and times of meal serving. The questionnaires were distributed to 120 units. A total of 116 questionnaires were usable. First, result that is significant to menu management factor at meals manager's work career and food information system operation analyzed that is. Second, analyzed that difference of meals subdivision meal number is not significant to menu management factor at food information system operation. Third, manager's attainments in scholarship which operate food information system analyzed that practical use degree is significant to menu management factor at food information system operation.

  • PDF