• Title/Summary/Keyword: Electronic Commerce Convergence

Search Result 138, Processing Time 0.029 seconds

Design of Fraudulent Process Notification for Management Information Systems (정보시스템 부정행위 신고시스템 설계)

  • Lee, Joong Hee;Lee, Sangwon;Ahn, Hyunsup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.629-631
    • /
    • 2013
  • In many enterprises, fraudulent activities and processes are widely prevalent. But, their employees would not report the illegal activities since they would be attacked by defensive and reactive retaliations in their enterprises. Against this backdrop, we design notification systems for whistle blowing. The design would certainly be useful for fraudulent process notification while using management information systems in the field of business. The fraudulent process notification is related to whistle blowing systems, methods, storage media, and so on. Also, we establish the whole architecture of fraudulent process notification with functional structure from the viewpoint of systems and whistle blower. The flow diagram of notification method is added.

  • PDF

Application Plan of Big Data and NoSQL (빅데이터와 NoSQL 활용방안)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.223-225
    • /
    • 2013
  • For a long time, Relational Databases have been widely used in many enterprises. Even though the Relational Databases have merits such as excellent power of data preservation, concurrency controlling as a standard model in databases, there are a demerit in the inconsistency of objects and relations. Against this backdrop, NoSQL is being magnified as a new solution for Big Data since it can be operated without any schema. In this paper, we research on not only merits and demerits of Relational Databases but also the comparison between application databases and integrated databases. And then, we define NoSQL for Big Data and check its characteristics.

  • PDF

A Study on Generate User Hazzard Event in IoT Intelligent Convergence Security Environment (IoT 지능형 융합 보안 환경에서 사용자 위험 이벤트 생성을 위한 연구)

  • Lee, Jun Young;Park, Dong Ha;Lee, Hyerin;Lee, Sungyeon;George, Uduakobong;Jeong, Junho;Son, YunSik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1271-1273
    • /
    • 2017
  • 융합 보안이란, 물리적으로 정보, 인명, 시설을 보호하는 물리 보안과 ICT 기술을 이용한 정보 보안과의 융합되는 보안 기술 및 서비스를 의미한다. 최근에 IoT 환경의 발전으로 다양한 센서로부터 얻은 정보를 바탕으로 사용자의 상태, 위치 추적, 위험, 제한 시설의 접근을 감지하여 융합 보안에 활용하고자 하는 연구가 진행되고 있다. 본 논문에서는 융합 보안 환경에서 사용자의 위험 요소를 정의하고, 위험 요소에 따른 이벤트를 생성하기 위한 기법을 제안한다.

The Review of the State Policy in the IT Industry and HRD in South Korea

  • Park, In-Sub
    • Journal of Digital Convergence
    • /
    • v.7 no.1
    • /
    • pp.19-29
    • /
    • 2009
  • This article is concerned to investigate the changing nature of the role of the state in relation to industrial policy to foster the IT industry in the Republic of Korea. In doing this, it has started with economic globalization introduced to the Korean political economy since the late 1980s. It has identified in what ways the state responded to the change, and to what extent the role of the state has fundamentally been changed in the context of policy mechanism in the process towards facilitating the IT industry in Korea. In addition, it presented how the state played a role in skill formation in relation to the industrial policy. In consequence, the role of the Korean state in fostering the IT industry has fundamentally changed from that as the developmental state in the industrialization process. In the process, that the strategic co-ordination role of the state and relations between the state and private capitals and societies are very significant to achieve the economic goal is presented as results, as well as some future tensions that would encounter in the way of charting the current policies.

  • PDF

Design of Infrastructure to Analyze Big Data (빅데이터 분석을 위한 인프라 설계)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.202-204
    • /
    • 2013
  • Nowadays, owing to the development of hardware, most of enterprises should operate and manage bigger amount of data than they used to do in the past. For this reason, the enterprises ceaselessly and urgently need systemized tools, platforms, and analysis methodologies in order to collect, store, and handle explosively increasing data. In this paper, we firstly understand key elements of Big Data, and secondly define critical factors for Big Data application with these elements. Thirdly, we research on various analysis techniques for Big Data analysis. Lastly, we propose an infrastructure to analyze bid data.

  • PDF

Application Plan of Graph Databases in the Big Data Environment (빅데이터환경에서의 그래프데이터베이스 활용방안)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.247-249
    • /
    • 2013
  • Even though Relational Databases have been widely used in many enterprises, the relations among entities are not managed effectively and efficiently. In order to analyze Big Data, it is absolutely needed to express various relations among entities in a graphical form. In this paper, we define Graph Databases and its structure. And then, we check out their characteristics such as transaction, consistency, availability, retrieval function, and expandability. Also, we appropriate or inappropriate subjects for application of Graph Databases.

  • PDF

Selection Analysis of Databases to Manage Big Data (빅데이터 관리를 위한 데이터베이스 선정분석)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.258-260
    • /
    • 2013
  • There are two major factors to use NoSQL in order to manage Big Data; to increase productivity of an application programmer and to increase data access performance. But, in many business fields, this hopeful plan lacks careful consideration. For efficient and effective management and analysis of Big Data, it is necessary to perform a test with the expectation for productivity and performance of the application programmer before deciding whether NoSQL technique is used or not. In this paper, we research on programmer productivity, data access performance, risk distribution, and so forth.

  • PDF

Application Plan of Document Databases in the Big Data Environment (빅데이터환경에서의 문서데이터베이스 활용방안)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.230-232
    • /
    • 2013
  • For Many enterprises are creating and handling huge amount of data in their business administration. However, it would be impossible for general databases such as Relational Databases, hierarchical databases, and network databases to manage and analyze this large amount of document data efficiently and effectively. So, in this paper, we define document databases and check out their characteristics such as consistency and transaction. And we propose appropriate or inappropriate subjects for application of document databases.

  • PDF

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 식별 및 인증)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang;Lee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.211-212
    • /
    • 2014
  • This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process.

  • PDF

Legal System and Regulation Analysis by S/W Development Security (주차시설 현황 조사를 통한 주차 회전율 파악)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.227-228
    • /
    • 2014
  • In this paper, a license plate investigation which is one of parking usage is performed. We survey research that should be given time interval using the camera without the observer. We assigned the investigation time interval to each of to each of the parking car, average parking duration is determined. Parking turnover, the number of vehicles of parking per hour per parking surface, is examined.

  • PDF