• Title/Summary/Keyword: Electronic Business

Search Result 1,709, Processing Time 0.035 seconds

Development of an Information Security Standard for Protecting Health Information in u-Health Environment (u-Health 환경에서의 정보보호 수준제고를 위한 보안 표준 개발)

  • Kim, Dong-Soo;Kim, Min-Soo
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.177-185
    • /
    • 2007
  • e-Business in healthcare sector has been called e-Health, which is evolving into u-Health with advances of ubiquitous technologies. Seamless information sharing among health organizations is being discussed in many nations including USA, UK, Australia and Korea. Efforts for establishing the electronic health record (EHR) system and a nation-wide information sharing environment are called NHII (National Health Information Infrastructure) initiatives. With the advent of u-Health and progress of health information systems, information security issues in healthcare sector have become a very significant problem. In this paper, we analyze several issues on health information security occurring in u-Health environment and develop an information security standard for protecting health information. It is expected that the standard proposed in this work could be established as a national standard after sufficient reviews by information security experts, stakeholders in healthcare sector, and health professionals. Health organizations can establish comprehensive information security systems and protect health information more effectively using the standard. The result of this paper also contributes to relieving worries about privacy and security of individually identifiable health information brought by NHII implementation and u-Health systems.

Design the b-Cart based Agent System in B2B EC: AgentB (B2B EC에서의 b-Cart기반 에이전트시스템의 설계:AgentB)

  • 임규건;이재규
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2003.05a
    • /
    • pp.377-384
    • /
    • 2003
  • B2B EC에서 지능형 에이전트에 대한 요구의 증가와 함께 기업구매자가 직접 전자시장으로부터 구매하는 데스크탑 구매의 요구도 증가하고 있는 추세이다. 본 논문에서는 B2B 상에서 전자시장으로부터의 효율적인 구매를 지원하는 b-Cart 기반 에이전트 시스템의 설계 사례에 대해서 기술한다. b-Cart는 구매자가 소유하고 사용되는 구매자 사이트에 위치한 쇼핑카트로서, 본 논문에서는 B2B EC에서의 b-Cart 기반 에이전트 시스템의 요구 기능을 사용자식별(Identification), 사용자 다이알로그(User Dialog), 상품정보수집(Collection), 물품정보제거(Trashing), 개별 구매의사결정지원(Individual Purchase Decision Support), 조직 구매의사결정지원(Organizational Purchase Decision Support), 협상(Negotiation), 주문처리(Ordering), 지불처리(Payment), 진행사항 추적(Tracking), 구매기록(Recording), 전자구매시스템에 구매기록 전송(Record Transmission), 지식베이스에 새로운 지식 유지(Knowledge Maintenance)으로 정의하고, b-Cart 기반 에이전트 시스템의 메시지 인터페이스를 설계하고 시스템의 구조를 설계하여 프로토타입 시스템인 AgentB의 설계 사례를 소개한다. b-Cart 기반 에이전트시스템은 기업구매자의 전자시장으로부터 구매자 증가함에 따라 분산된 정보를 관리 해주고 통합적으로 구매처리를 해줄수 있는 효과적인 시스템이다. 향 후 B2B EC의 에이전트 시스템은 b-Cart를 기반으로 할 것으로 예측할 수 있다.

  • PDF

Survey on the Application of Standards and Specifications in Munitions Companies (II) (군수업체에서의 표준·규격 활용실태 조사 연구 (II))

  • Choi, Ki-In;Park, Il-Gwang;Kim, Sung-Kwang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1597-1602
    • /
    • 2011
  • To understand current status for the utilization of Korean military specifications(KDS) and other standards/specifications in munitions companies, we have surveyed 150 companies mainly related with electrical and electronic industry. Most of the companies have expected that the harmonization of KDS and KS would bring a positive effect on their business, especially from the point of quality control, productivity increase, the reduction of expenditure for standard management and so on. This survey result will help to build more user-friendly management system for KDS as well as KS.

A Study on the Activation Measures of Internet Trade in International Trade (국제상거래에 있어서의 인터넷 무역 활성화 방안)

  • 최준호
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.39-55
    • /
    • 2000
  • Internet Trade is the new type of business transaction, which sells and advertises the product and services by using the Internet, which is spreaded rapidly to the world. Under these circumstance, our country should discuss the proper position and role as the center in the trade amount in the world trade market, and face the irresistible changes of trade environment. First, in the institution and legal aspect. Second, the price payment system of the internet trade. Third, the so-called infra construction, the physical sector for activating the internet trade, the comprehensive plan of super-highway information communication net work by the government authorities is expected to be promoted. There is no perfect solution that internet trade could be completely done in front of monitor and will be solved one by one along with the development of electronic commerce. At last, the government's and industry's joint positive concern and participation in the rapidly changing new world trade trends of internet trade is expected fit for our position in the world.

  • PDF

A Study on the Simplication of International Trade Procedures and International EDI Standards (EDI거래하에서의 무역절차간소화.표준화의 고찰)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.2 no.1
    • /
    • pp.149-162
    • /
    • 1999
  • This article studies certain standards which have been developed for exchanging information about business and trading transactions, both nationally and internationally. In this context standards means standardised ways of representing trade information and standardised procedures for communicating it in computer-based environments. Early in the 1960s, the United Nations UN/ECE working party was formed. The purpose of the this organization was to simplify and standardize trade document. This organization eventually evolved into what is currently known as EDIFACT, the international EDI standards organization. EDIFACT is the basis for agreement on a common structure for documents such as those used for trading(e.g., orders, invoices), so that they can be interchanged electronically between computer systems. The standard was ratified in 1987 and has already been adopted by many EDI users for the earlier European and American standards for trading data interchange called UN/TDl and ANSI Xl2 respectively.

  • PDF

故障許容電算體系의 設計와 信賴度

  • 조정완
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.1 no.1
    • /
    • pp.42-49
    • /
    • 1983
  • 전산기의 신뢰도(reliability)라 함은 사용자가 제출한 입력에 대하여 전산 기가 제공하는 결과의 신빙성의 척도라할 수 있는데, 이것은 주어진 전산기의 부 분품 하나하나가, 그리고 프로그램의 하나하나의 instruction이 설계당시에 목적한 성능을 얼마나 잘 유지하고 있는가를 측정하는 척도라고 볼 수 있습니다. 이 신 뢰도는 전산기의 수명, 필요할 때 전산기가 가동할 확율, 또는 전산기의 성능으로 나타낼 수 있습니다. 제2세대 이전의 전산기들에서는 전자공업과 전산기 기술의 불충분한 발전으로 인하여 비용과 기계의 크기의 한정 때문에 신뢰도 향상을 위 한 대책이 거의 없었습니다. 따라서 현재 볼 수 있는 American Air Line의 SABRE(Semi Automatic Business Research Environment), Bell 전화 연구소의 ESS-I, II, III(Electronic Switching System), IBM의 FMS(Future Manufacturing System)과 같은 real-time 씨스템으로서의 응용분야의 개발은 상 당히 어려운 문제였습니다. 그러나 전자공업의 비약적인 발전에 힘입어 금세대의 범용전산기의 설계가 가능하게 되었고, 오퍼레이팅 씨스템의 발전으로 인하여 multiprogramming, time-sharing, real-time 씨스템 등의 응용분야의 개발이 활발 하게 되었습니다. 이러한 응용분야의 활발한 개발과, 대규모 집적회로 (LSI)의 개 발로 ROM(Read Only Memory)의 가격화, 그리고 microprogram의 보급 등으로 특수 목적의 time sharing operation을 위한 소형 전산기가 발전하게 되었으며 종 래의 범용 전산기 대신에 CDC의 string unit과 pipeline을 이용한 STAR 100과 일리노이 대학의 256processor와 Burrough의 B6500로 구성된 ILLIAC-IV와 같은 초대형 전산기가 등장하게 되었습니다.

The Study on the Requirement Engineering Life-cycle Support to Business Component Development (비즈니스 컴포넌트 개발을 지원하는 요구공학 라이프 사이클에 관한 연구)

  • Kim, Haeng-Kon;Kim, Soung-Won;Kim, Jung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.791-796
    • /
    • 2000
  • 컴포넌트를 기반으로 애플리케이션을 구축하는 패러다임이 제시되면서 특히, 비즈니스 영역에 대한 개발과 기반 연구가 활발히 진행되고 있다. 최근 소프트웨어가 사용되는 영역이 복잡하고 대형화됨에 따라서, 문제영역의 분석을 통한 요구사항을 추출하는 일련의 작업이 점점 어렵게 인식되고, 컴포넌트를 개발하기 위한 모델기반의 방법론은 외부로 나타나는 인터페이스와 실제 구현되는 내부를 분리해서 설계하는 추세를 보이고 있다. 또한, 요구사항 단계에서의 문제점이 전체적인 소프트웨어 개발에 커다란 영향을 미치는 문제점들을 해결하기 위하여 좀더 체계적이고 총괄적인 접근으로 요구공학의 중요성이 강조되고 있다. 본 논문에서는 비즈니스 컴포넌트 개발을 지원하기 위해 문제 영역에서 올바른 요구사항을 체계화하고 분석할 뿐만아니라, 컴포넌트의 내부와 외부 설계, 개발을 고려한 도메인과 서비스 두 가지 관점을 포함한 요구공학 라이프사이클 정의하고자 한다. 또한, 도메인과 서비스 관점을 추출하기위해서 간략한 스펙을 제시하며 사례를 통해, 사용자가 원하는 실세계의 비즈니스 개념을 올바르게 적용하고, 분석, 설계, 개발단계에 유용한 정보로 사용되도록 한다.

  • PDF

Feature Extraction of Shape of Image Objects in Content-based Image Retrieval (내용기반으로한 이미지 검색에서 이미지 객체들의 외형특징추출)

  • Cho, June-Suh
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.823-828
    • /
    • 2003
  • The main objective of this paper is to provide a methodology of feature extraction using shape of image objects for content-based image retrieval. The shape of most real-life objects is irregular, and hence there is no universal approach to quantify the shape of an arbitrary object. In particular. electronic catalogs contain many image objects for their products. In this paper, we perform feature extraction based on individual objects in images rather than on the whole image itself, since our method uses a shape-based approach of objects using RLC lines within an image. Experiments show that shape parameters distinctly represented image objects and provided better classification and discrimination among image objects in an image database compared to Texture.

Implementation of Subsequence Mapping Method for Sequential Pattern Mining

  • Trang Nguyen Thu;Lee Bum-Ju;Lee Heon-Gyu;Park Jeong-Seok;Ryu Keun-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.5
    • /
    • pp.457-462
    • /
    • 2006
  • Sequential Pattern Mining is the mining approach which addresses the problem of discovering the existent maximal frequent sequences in a given databases. In the daily and scientific life, sequential data are available and used everywhere based on their representative forms as text, weather data, satellite data streams, business transactions, telecommunications records, experimental runs, DNA sequences, histories of medical records, etc. Discovering sequential patterns can assist user or scientist on predicting coming activities, interpreting recurring phenomena or extracting similarities. For the sake of that purpose, the core of sequential pattern mining is finding the frequent sequence which is contained frequently in all data sequences. Beside the discovery of frequent itemsets, sequential pattern mining requires the arrangement of those itemsets in sequences and the discovery of which of those are frequent. So before mining sequences, the main task is checking if one sequence is a subsequence of another sequence in the database. In this paper, we implement the subsequence matching method as the preprocessing step for sequential pattern mining. Matched sequences in our implementation are the normalized sequences as the form of number chain. The result which is given by this method is the review of matching information between input mapped sequences.

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 식별 및 인증)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang;Lee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.211-212
    • /
    • 2014
  • This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process.

  • PDF