• Title/Summary/Keyword: 정보자산화

Search Result 219, Processing Time 0.029 seconds

An Effects of the Distribution Information Technology Application on the Communication strategies and CRM performance (유통정보기술 활용이 커뮤니케이션 전략과 CRM 성과에 미치는 영향)

  • Moon, Jang-sil
    • Journal of Distribution Science
    • /
    • v.8 no.2
    • /
    • pp.13-22
    • /
    • 2010
  • Customer Relationship Management(CRM) paradigm has emerged that suggests organizations will be more successfully if they concentrate on obtaining and maintaining a share of each customer rather than a share of the entire market, with information technology(IT) being the enabling factor. This paper presents five key elements that provide the necessary steps that allow and organization to position its people, business process, and information system to establish and take advantage of this paradigm. The key elements are : (1) IT investment, (2) Website application, (3) IT System application, (4) Communication strategies, (5) CRM Performance. The results show that IT investment, IT system application, and Website application play a vital role in enhancing an Organizational Communication. Also, the results show that IT investment, IT system application, Website application, and Organizational Communication play a vital role in enhancing an organization's performance of customer relationship management. Further, this paper discusses the importance of integrating these four elements for achieving effective customer interaction. The author provides academical and managerial implication for business strategies.

  • PDF

Study for a Efficient Mission of the Flood Control Office (홍수통제소의 효율적 임무 수행을 위한 연구)

  • Choi, Kyu-Hyun;Hong, Sung-Hun;Kim, Joung-Ho;Song, In-Kwon;Kim, Min-Sik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.1537-1540
    • /
    • 2009
  • 홍수통제소는 수문조사, 하천유량관리, 홍수예보 등 다양한 업무를 수행하고 있다. 수문조사는 물 관리를 위한 기본 자료 확보와 수자원이라는 국가의 귀중한 자산을 정량화하는 중요한 업무이다. 하천유량 관리는 하천의 물을 합리적으로 관리하여 공익을 증진하고 모든 사람들이 혜택을 고루 향유할 수 있도록 배분하는 업무이다. 홍수예보는 큰 비에 의해 유역에서 발생할 수 있는 홍수의 규모를 예측하고 그 수치를 유관기관에 제공하여 홍수를 사전에 대비토록 함으로써 홍수피해를 최소화 할 수 있도록 하는 업무이다. 상기 언급된 홍수통제소의 주요 업무들을 효율적으로 수행하기 위하여 낙동강홍수통제소에서는 전년도 시험연구과제로서 "홍수통제소 발전방안"이라는 주제로 낙동강 홍수통제소의 발전을 위한 기본적인 개선항목 중 홍수통제소 홍보동영상 제작을 통한 통제소 홍보 및 이미지 제고, 수자원 자료실의 전산화와 관측소 이력 및 기본제원 시스템화 등을 통한 업무의 효율성 증대를 위하여 연구를 수행하였다. 금년은 지난해 개선된 업무들을 토대로 업무 효율성 증대를 도모하고자 한다. 현재 낙동강홍수 통제소에서 관리되고 있는 수문관측소는 239개소(수위 및 우량, 10분 단위)으로, 이들 관측소에 대한 효율적인 관리와 정확한 자료 생성을 위해서는 해당 내용에 대한 체계적이고 합리적인 관리가 필요하다. 이를 위하여 관측소 이력관리 프로그램을 시험적으로 운영을 하여 매년 실시되는 분기별 관측소 정기점검 결과를 업로드 시켜 관련 직원들이 내용을 공유할 수 있도록 추진하고 있다. 이는 수문자료의 정확한 검보정에도 활용될 수 있을 뿐만 아니라 다양한 정보를 체계적으로 관리하여 향후 추가적인 업무 효율화를 위하여도 이용될 수 있을 것이다.

  • PDF

A Study of Analysis and Response and Plan for National and International Security Practices using Fin-Tech Technologies (핀테크 금융 기술을 이용한 국내외 보안 사례 분석 및 대응 방안에 대한 연구)

  • Shin, Seung-Soo;Jeong, Yoon-Su;An, Yu-Jin
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2015
  • Recently, finance technology related to Fin-Tech has emerged while national and international financial incidents have increased. Security technologies that are currently operated in the financial institutions, have been reported to be vulnerable to security attacks. In this paper, we propose a method of response and plan of security incident using Fin-Tech technology in the divers authentication methods and the usage of biometrics. Proposed method provides a convenient banking services to the users by integrating IT technology, such as personal asset management, crowdfunding to finance technology. Also, the proposed method may provide the security with ease by applying the security technologies such as PCI-DSS, tokenization technique, FDS, the block chain. Proposed method analyzes a number of security cases in relation to the Fin-Tech, financial technologies, for a response.

  • PDF

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

Behavioral Intention of Health Tourists for developing the product - Based on Internet Information (상품 개발을 위한 의료관광객의 선택 의도 분석 - 인터넷 정보 원천 기반)

  • Kim, Mincheol;Boo, Chang-San
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.385-394
    • /
    • 2013
  • Recently, as the healthcare market is globalized, the importance of the information on the Internet has been recognized. In this study, the analysis by research model with hypothesis that benefit sought factors of health tourism have a positive effect on behavioral intention of destination selection through tourism brand equity by internet information was carried out. As a result of analysis, benefit sought factors like as health and beauty did not have a positive effect on brand cognition and perceived quality but benefit sought factors like as service and nature had a positive effect on brand cognition and perceived quality. However, benefit sought like as experience did not have a positive effect on brand cognition and perceived quality. And brand equity like as brand cognition and perceived quality had a positive effect on behavioral intention. Thus, according to the results of these hypotheses, policies that foster health tourism in Jeju region will be followed based on product development that considering the importance of the existing service and cognition.

An Empirical Study on Security Management Model for Small IT Service Business (소규모 IT 서비스 기업 비즈니스 특성을 고려한 보안 관리모델 실증연구)

  • Kim, Yanghoon;Na, Youngsub;Chang, Hangbae
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.131-141
    • /
    • 2012
  • Depending on the sophistication of IT, it is increasing more and more information leaks and breaches. Accordingly the majority of companies have expand investment protection for the information. However, companies still have been exposed the vulnerability of information leakage. Especially, small IT service businesses than large corporations relatively have some limitations in the points of resources and manpower business activities. For studies on information security for small IT service companies so far, however, there have been insufficient studies considering small business scales and business characteristics of IT services. In this study, we made to design an information security management model for establishing security measures of small IT service companies which are classified SI/SM, DB, IR and IP industry that depending on how the value creation of the business. In detail, we performed an empirical analysis for small IT service business to consider business characteristics and we proposed security implementation strategies based on the analysis results.

  • PDF

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.

Derivation of Security Requirements for Cloud Managing Security Services System by Threat Modeling Analysis (위협 모델링 분석에 의한 클라우드 보안관제시스템 보안요구사항 도출)

  • Jang, Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.145-154
    • /
    • 2021
  • Recently, the introduction of Cloud Managing Security Services System to respond to security threats in cloud computing environments is increasing. Accordingly, it is necessary to analyze the security requirements for the Cloud Managing Security Services System. However, the existing research has a problem that does not reflect the virtual environment of the cloud and the data flow of the Cloud Managing Security Services System in the process of deriving the requirements. To solve this problem, it is necessary to identify the information assets of the Cloud Managing Security Services System in the process of threat modeling analysis, visualize and display detailed components of the cloud virtual environment, and analyze the security threat by reflecting the data flow. Therefore, this paper intends to derive the security requirements of the Cloud Managing Security Services System through threat modeling analysis that is an improved existing research.

An Analysis of Action Learning Process in Education Programs for Senior Officials, Engineers, Chief Executive Officers (고위공직 후보자-엔지니어-최고경영자 교육 프로그램의 액션러닝 프로세스 분석)

  • Jung, Hyun-Kon;Moon, Sung-Han
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.87-104
    • /
    • 2012
  • The purpose of this study was to analyze and present of action learning process in education programs for senior officials, engineers, chief executive officers. The main contents of this study is focused on analysis of orientation activities for each step of action learning process, project selection, analysis of problem clarification, review of data research and analysis, analysis of process for seeking of alternative and selecting execution item, comparison and analysis for the results of execution.

Wireless supply web modeling using mobile service (모바일 서비스를 이용한 Wireless Supply Web 모델링)

  • Kim, T.;Kim, H.;Yang, S.;Cha, M.;Suh, D.;Seong, N.
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.05a
    • /
    • pp.591-597
    • /
    • 2003
  • 모바일 서비스는 공급사슬의 모든 단계와 연관되어 있는데, 특히 재고 주문관리, 주문 충족, 구매, 물류와 모니터링 분야와 밀접히 관련시켜 볼 수 있다. 기본적으로 모바일 서비스의 핵심은 참가자들 간에 정보의 공유로서 이를 통해서 공급사슬의 지각과 반응의 효율을 높일 수 있다. 모바일 서비스의 장점은 편재성(ubiquity), 속도, 추적, 위치확인, 개인화와 안전성에 있다. 공급사슬의 3가지 중요한 요소는 속도, 변화 및 가시성을 들 수 있는데, 모바일 서비스는 이 세가지 분야를 충족시킬 수 있다. 본 연구의 목적은 모바일 서비스를 이용해서 wireless 공급 웹을 모델링 하고자 한다. 재고관리, 원격 진단, 현장 작업자와의 통신, 추적과 모니터링을 포함한 고객요구 충족, 재고의 가시성, 실시간 shop floor data collection, 자산 추적 및 창고관리분야에 적용가능한 고객중심의 공급 웹을 모델링하고 RFID를 이용해서 창고관리 문제에 대한 프로토타입을 제시하고자 한다.

  • PDF