• Title/Summary/Keyword: Core Assets

Search Result 115, Processing Time 0.026 seconds

Developing the Methodology for Diagnosing Virtual Community of Practice (Virtual 실행공동체의 진단 방법론 개발)

  • Hong, Jong-Yi
    • Korean Management Science Review
    • /
    • v.29 no.1
    • /
    • pp.73-88
    • /
    • 2012
  • Much of knowledge that can retain a company's competitive advantage remains within the organization. However, identifying, finding and leveraging knowledge in an organization is still problematic [17]. Although knowledge is the key to success, it is simply too valuable to be left in an organization [59]. The CoP (Community of Practice) within an organization is a practical way to manage knowledge in an organization as systematically as other critical assets in order to deploy and share it [59]. However, research related with CoP, has focused on the value of CoP. Therefore, we developed not only a holistic and systematic method for understanding and assessing the current position of CoP but also a method for extracting the core strategies and CSFs of CoP based on performance evaluation. We developed strategies, CSF (Critical Success Factor) and PM (Performance Measure)s of CoP based on BSC (Balanced Scorecard) process. Specifically, CSFs and strategies of CoP were extracted based on maturity model and type of CoP. According to the procedure from the methodology to evaluate the performance of CoP, three different industrial cases were adopted to validate the evaluation methodology.

Developing An Application Guideline for Core Assets in Product Line by Mapping to Artifacts of CMMI Engineering Process Areas (CMMI Process Area 산출물로의 대응을 통한 Product Line 핵심 자산 적용지침서 개발에 대한 연구)

  • Choi, Kang-Sik;Moon, Mi-Kyeong;Yeom, Keun-Hyuk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.418-420
    • /
    • 2005
  • 소프트웨어 프로덕트 라인 공학은 두 가지 측면에서 재사용 활동을 정의한다. 첫째는 자산들의 공통성과 가변성을 분석하고 이를 명시적으로 표현하고자 하는 재사용 계획 프로세스 즉, 도메인 공학 프로세스이다 둘째는, 존재하는 핵심자산들을 이용하여 실제 프로덕트를 개발하는데 초점을 두고 있는 재사용 적용 프로세스 즉, 애플리케이션 공학 프로세스이다. 지금까지 프로덕트 라인 공학에서 많은 연구들은 재사용 계획 프로세스에 초점을 두고 있었으며, 재사용 적용 프로세스는 핵심자산의 단순한 커스터마이즈 또는 인스턴스화하는 수준으로 언급하고 있었다. 그로인해, 핵심자산들은 각기 다른 개발 프로세스에서 사용 표준 없이 적용되거나 핵심자산에 의존하여 개발 프로세스가 변경되어야 하는 문제를 발생시켰다. 본 논문에서는 프로덕트라인 핵심자산이 각기 다른 프로덕트 개발 프로세스에서 효율적으로 재사용 될 수 있도록 가이드해 주는 적용지침서 개발 방법을 제시한다.

  • PDF

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

A Study on the Vitalization of Value Assessment for Contents (콘텐츠 가치평가 활성화 방안 수립 연구)

  • Lee, Dong Wook;Choi, Jae Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.311-325
    • /
    • 2014
  • The content industry is the core of the creative economy. The content industry is a fast-growing and high value-added industry, but becomes a high risk market on the other hand. Content related enterprises are difficult business environment. Thus, the accurate evaluation of content on its value is essential. But, it is hard to assess the value of content because of its intangible characteristics. This study is enabled improving the financing conditions of enterprises through the vitalization of value assessment for contents. Improve financial accessibility is required composition, means of access financial diversification, financial ecosystem to vitalization of value assessment for contents. In addition, the system should be established to support the economic activities of the creative content sector companies. The content industry should develop a new strategy for sustained growth. But, we believe that the accordance and cooperation from related parties, including contents producers, contents developers and governmental departments, are definitely required to boost the game contents industry. We hope that the more efficient methods are vitalizing the contents industry.

Optimal Pricing Design Based on Preference Values of Purchasing Restrictions for Tour Products (여행상품 구매조건의 선호가치에 따른 최적 여행상품 가격설계 연구)

  • Hwang, Myung Sun;Kim, Su Young;Yoon, Moon Gil
    • Korean Management Science Review
    • /
    • v.31 no.1
    • /
    • pp.27-40
    • /
    • 2014
  • Tour products have been recognized as a perishable asset. For tour operation companies (TOCs), improving profitability is a core decision problem for their business. Since package tour products, typical products of TOCs, are perishable after the tour was departed, TOCs have been tried to increase their sales before the departure date with various marketing strategies including price discounts. The pricing problem for perishable assets have been studied in Revenue Management for a long time. However, it is hard to find a research on pricing decisions for tour products. In this paper, we focus on a pricing problem for tour products. In particular, we will consider the pricing scheme with customer preference values on purchasing conditions. With conjoint analysis, we can use the part-worth value as a preference value for each level of purchasing conditions. To construct various discount prices, we use an enumeration method and suggest a mathematical optimization model. With experimental analysis for a sample tour package, we will show that our pricing process is very helpful for designing customer-oriented pricing decision.

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

A Threat Assessment Algorithm for Multiple Ground Targets (다수의 대지표적을 위한 위협 평가 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.590-599
    • /
    • 2018
  • As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.

Using Dark Tourism Study on Culture and Tourism of industrialization - Focusing on Honam righteous army - (다크 투어리즘을 활용한 문화관광 산업화 방안에 관한 연구 - 한말 호남 의병사(義兵史)를 중심으로 -)

  • Kim, Hyun-Cheol;Yoo, Jun-Ho;Ha, Kyu-Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.6 no.1
    • /
    • pp.59-81
    • /
    • 2011
  • The 21st century, the creation and utilization of knowledge and information are the core of all economic activity, knowledge-based economy is plunging into. Culture can not live without knowing the age of culture and national spirit of a nation's cultural assets. Closed for other cultures, countries can develop a culture that is neither marked by imitation and import of cultural industries can never be developed. Creative and diverse culture of its own cultural code, evenly balanced mix of social culture is really the cultural and creative culture. Central government and local government-led growth in the local economy in terms of competitive cultural industry development policy has been carried out. In general, a country or society, culture, industry, the creation of a unique cultural and Planning on the basis of information deliquescent recreated a typical high-risk high returns to pay the venture industry and the nature of the creative industries and the venture industry a unique mix of industrial Characteristic is that it has. These times and the industry can contribute to the flow of valuable cultural assets and a history of our righteous living and exercise will be a source of resources.

  • PDF

A Domain Analysis Method for Saftware Product Lines Based an Goals, Scenarios, and Features (소프트웨어 프로덕트 라인을 위한 목표, 시나리오, 휘처 기반의 도메인 분석 방안)

  • Kim Min-Seong;Park Soo-Yong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.7
    • /
    • pp.589-604
    • /
    • 2006
  • Software product lines (SPL) are recently an emerging software reuse paradigm, which helps organizations develop their products from reusable core assets rather than from scratch. For developing these assets, understanding commonality and variability (C&V) is essential. A feature-oriented approach has been used extensively for C&V analysis in the SPL. However, this contains no proposal to systematically identify features and provide the rationale for the features. Further, the approach does not directly show how the results of C&V analysis will satisfy an organization's high-level business goals and provide the rationale for the C&V. Therefore, this paper presents a domain analysis method for the SPL based on goals, scenarios, and features in order to overcome some of the deficiencies and limitations of the feature-oriented approach. In particular, the paper proposes a domain requirements model (DRM) and a domain requirements modeling method based on the DRM. This method has been applied to the home integration system (HIS) domain to demonstrate its feasibility with a supporting tool, namely IDEAS. Our approach makes it possible to systematically identify the features and provide the rationale for both the features and the C&V.