• Title/Summary/Keyword: 제품생명주기관리

Search Result 15, Processing Time 0.022 seconds

A framework of Plant Simulation for a Construction of a Digital Shipyard (디지털 조선소 구축을 위한 물류 모델 프레임워크)

  • Woo, Jong-Hun;Lee, Kwang-Kook;Jung, Ho-Rim;Kwon, Young-Dae;Shin, Jong-Gye
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.42 no.2 s.140
    • /
    • pp.165-174
    • /
    • 2005
  • Recently, world leading companies on manufacturing field are trying to adopt a PLM methodology, which is a new production paradigm, for a survival and strengthening the competitiveness. Some projects for a digital shipyard including a methodology of a digital simulation framework are going on by Seoul national university and Samsung heavy industry. A Database methodology for a scheduling data, an interfacing methodology for a simulation input and output, and a synchronized simulation related methodology are required for enhancing the value of the digital simulation for shipbuilding. In this paper, such a methodologies and a related case study for a fabrication factory and an assembly factory are presented.

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

Management Strategies and the Growth Stages Analysis of Local Festival : Cases of Hampyeong Butterfly Festival and Hwacheon Sancheoneo Ice Festival (지역축제의 성장단계별분석과 관리전략 : 함평나비축제와 화천산천어축제를 중심으로)

  • Kim, Hyeonwook
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.537-549
    • /
    • 2015
  • The purpose of this study is to analyze the characteristics of two local festivals, already recognized as a successful regional cultural festival, over a period of time to apply the product life cycle theory. As a result of the analysis of the two festivals, in introduction stage, the festival organizers have focused mainly on settling down the festival's core programs and raising awareness on the subject of the festival for the stimulation for basic demands. Second, for maintaining increasing demands, the qualitative improvement of the core program, the development of new programs and the expansion of the programs for the visitors' convenience and safety were focused on. In addition, strategies for promoting awareness of the festival had modified the strategy to promote on the contents and programs of the festival, as well as public relations strategy, not only domestic but also the foreign countries, was established and fulfilled. Lastly, in maturity stage, to overcome declining the number of visitors and economic effect both festivals have showed providing sophisticated programs for the visitors' convenience and safety, improving service quality through the development of the existing programs, providing economic benefits such as admission cuts or giving gift certificates and expanding number of foreign visitors with strengthening the promotion that was implemented in growth stage and enhancing the better image of the festival through the social contribution. Therefore, strategies for the each stage mentioned above present the significant policy implications for festival organizers who were planning to establish a new festival or implementing a festival with experiencing the tepid growth.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

A Study on the Supplementation of the Korea's National Information Security Manual from the Perspective of Cyber Supply Chain Security (사이버 공급망 보안 관점의 국가 정보보안 기본지침 개선방안 연구)

  • You, Young-in;Bae, Sunha;Kim, So Jeong;Kim, Dong Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.309-327
    • /
    • 2022
  • As ICT convergence is progressing in all industrial fields and creating the global ecosystem of the supply chain is accelerating, supply chain risk related with cyber area are also increasing. In particular. the supply chain of ICT products is very complex in terms of technical and environmental factors to be managed, so it is vert difficult to transparently manage the entire life cycle. Accordingly, the US, UK, and EU, etc. are conducting and establishing cyber supply chainsecurity-related research and policies for ICT product supply chains. Korea also has the plan to establish management system to secure the supply chain of major ICT equipment as a task in the basic plan of the national cybersecurity strategy announced in 2019, but there is no concrete policy yet. So, In this paper, we review the cyber supply chain security management system in the United States and present a supplementary way to the National Information Security Manual in Korea from the perspective of cyber supply chain security. It is expected that this will serve as a reference material for cyber supply chain measures that can be introduced in domestic information security field.