• Title/Summary/Keyword: Enterprise Network

Search Result 433, Processing Time 0.033 seconds

Executives' Characteristics and Their Management Implications in Korean Entertainment Companies (우리나라 엔터테인먼트 기업의 임원 특성과 경영 함의점)

  • Kim, Jeong-Seob
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.3
    • /
    • pp.77-89
    • /
    • 2019
  • What are the characteristics of firm executives who have led the fast-growing Korean entertainment industry since the Korean Wave in the early 2000s, and what management implications can be inferred from them? To search for the answer to these questions, we conducted a complete survey of 293 executives from 27 listed Korean entertainment companies. Research has shown that career path diversity has increased in order of general enterprise managers, IT experts, accountants, lawyers and artists, away from the limited human resources level around artists. Thirty three percent of the firms gave stock options to their CEO. This is a positive aspect as data implying that these companies have been striving to do specialization, transparent management, digital and network management, creativity management, and motivational management in the context of sustainablity. However, it was pointed out as an improvement task that the percentage of young(20s and 30s) and female executives is low, even though such people's creativity, sensitivity, initiative and dynamic quality are apt to bring out their advantages especially in the entertainment company, a typical knowledge-creative firms and that the period of the CEO's average tenure was relatively short to 4.02 years.

A Study on Logistics Information System Integration: in case of Korea Post (물류정보시스템 통합에 관한 연구 : 한국우정사업본부의 사례를 중심으로)

  • Han, Young-Soo;Jung, Hae-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.217-226
    • /
    • 2009
  • In this paper, we analyze process of implementing and successful enabler of Postal Logistics Integrated Information Systems(PostNet) through a case study on Korea Post. PostNet was integrated by considering contingently organizational integration (organizational structure redesign), strategical integration (business process reengineering), and technical integration(data integration, application integration, and integrated platform implementation). And also integration was implemented for supporting three aspects. PostNet has implication for advanced integration with business mission and operational efficiency by comparing integration with physical level and hardware level. Korea Post has the biggest logistics network, organization, and service in logistics industry area. The results of this paper will suggest theoretical framework for the future information system integration, and will be utilized as a practical guideline for the information system integration.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

A Study on the Security Requirements Analysis to Build a Zero Trust-Based Remote Work Environment (제로트러스트 기반의 원격 근무 환경을 구축하기 위한 보안요구사항 분석 연구)

  • Hae-na Kim;Ye-jun Kim;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.83-102
    • /
    • 2024
  • Recently, as the use of the cloud increases year by year and remote work within the enterprise has become one of the new types of work, the security of the cloud-based remote work environment has become important. The introduction of zero trust is required due to the limitations of the existing perimeter security model that assumes that everything in the internal network is safe. Accordingly, NIST and DoD published standards related to zero trust architecture, but the security requirements of that standard describe only logical architecture at the abstract level. Therefore, this paper intends to present more detailed security requirements compared to NIST and DoD standards by performing threat modeling for OpenStack clouds. After that, this research team performed a security analysis of commercial cloud services to verify the requirements. As a result of the security analysis, we identified security requirements that each cloud service was not satisfied with. We proposed potential threats and countermeasures for cloud services with zero trust, which aims to help build a secure zero trust-based remote working environment.

The Case on Valuation of IT Enterprise (IT 기업의 가치평가 사례연구)

  • Lee, Jae-Il;Yang, Hae-Sul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.881-893
    • /
    • 2007
  • IT(Information Technology)-based industries have caused a recent digital revolution and the appearance of various types' information service, being largely expanded toward info-communication device company, info-communication service company, software company etc.. Therefore, the needs to evaluate the company value of IT business for M&A or liquidation are growing tremendously. Unlike other industries, however, IT industry has a short lift cycle and so it doesn't have not only a company value-evaluating model for general businesses but the objective one for IT companies yet. So, this thesis analyzes various value-evaluating technique and newly rising ROV. DCF, the change method of company's cash flow including tangible assets into future value, had been applied during the past industrialization economy era and has been persuasively applied to the present. However, the DCF valuation has no option but to make many mistakes because IT companies have more intangible assets than tangible assets. Accordingly, it is ROV, recognized as the new method of evaluating companies' various options normally and quantitatively, that is brought up recently. But the evaluation on the companies' various options is too subjective and theoretical up to now and due to the lack of objective ground and options, it's not possible to be applied to reality. In this thesis, it is found that ROV is more accurate than DCF, comparing DCF and ROV through four examples. As the options applied to ROV are excessively limited, we tried to develop ROV into a new method by deriving five invisible value factors within IT companies. Therefore, on this occasion, we should set up the basic valuation methods on IT companies and should research and develop an effective and various valuation methods suitable to each company like an internet-based company, a S/W developing enterprise, a network-related company among IT companies.

  • PDF

Efficient security solution structure design for enterprise security management system (통합 보안 관리 시스템 구축을 위한 효율적인 보안 솔루션 구조 설계)

  • Kang Min-gyun;Han Kun-Hee;Ha Kyung-Jae;Kim Seok-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.824-831
    • /
    • 2005
  • Past corporaion's network security system is single security solution, or mixed several ways, but there was inefficient system because doing not get into organic link But, constructed more strong security system by ESM enterance on. ESM uses way to integrate of each agent to manage easily various kinds security solution. That is, it is system that connect system of existent VPN, FireWall, IDS and so on configurationally depending on security policy and manage. ESM is security system that is developed more than existent security system. But, practical use of network and the development speed of technology being increasing with the mon faster speed, is heightening the level more as well as dysfunction of information crime and so on. Many improvements are required at ESM system, this research wished to make up for the weak-point in the ESM system about interior security. Studied on structure of security solution that is basis of security policy. VPN, Firewall, IDS's link that is main composition of existing security system analysis, reconstructed. And supplemented security of ESM system itself. Establish imaginary intrusion and comparative analysis access data that apply each Telnet Log analysys IDS existent ESM system and proposed ESM system comparative analysis. Confirm the importance of interior security and inspected security of proposed system.

Assessment of Disaster Levels of Company using the Analytic Network Process (ANP 기법을 이용한 기업의 재해 수준 평가)

  • Paik, Shinwon;Yim, Mihye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.44-52
    • /
    • 2019
  • Industrial accidents differ considerably according to the industry and the scale of these industries. These industrial disasters have been analyzed in various ways. Therefore, a technique was developed to evaluate the disaster level among companies using the ANP method and the data derived from the disaster statistics over the past five years(2013~2017), as well as the safety information characteristics through questionnaires. The objective of the study was to determine the disaster level and safety level of a company. In this paper, six factors that are considered important for assessing the disaster level of the enterprise among the disaster statistics were selected. These factors included the industry type and size, age of employee, duration of treatment, duration of employment, and typical occurrence. Most companies use the accident rate for their disaster level to compare only with other companies. In this study, the weighting factors of the company were derived taking the characteristics of each company into consideration. Therefore, the disaster level of each company can be evaluated using the disaster statistics from each company and the derived weighting factors.

The Effect of the fit between Innovation Strategy and Company Characteristics on Innovation Performance (혁신전략과 기업특성 간의 적합성이 혁신성과에 미치는 영향)

  • Shin, Sung-Wook;Choi, Won-Ju
    • Management & Information Systems Review
    • /
    • v.37 no.3
    • /
    • pp.131-145
    • /
    • 2018
  • The purpose of this study is to analyze the effect of the fit between innovation strategy and firm characteristics on innovation performance. We conducted surveys for venture companies in the Southeast region, The results of multiple regression analysis based on 135 questionnaires are as follows : First, the higher the fitness between innovation strategy and social network level, the higher the innovation performance. Second, the higher the fitness between innovation strategy and management control system level, the more positive effect on innovation performance. Finally, the higher the fitness between innovation strategy and innovation culture, the higher the innovation performance. This result implies that the enterprise characteristics should be designed and operated in accordance with the innovation strategy implementation.

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.

Optimization of Agri-Food Supply Chain in a Sustainable Way Using Simulation Modeling

  • Vostriakova, Viktorija;Kononova, Oleksandra;Kravchenko, Sergey;Ruzhytskyi, Andriy;Sereda, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.245-256
    • /
    • 2021
  • Poor logistical infrastructure and agri-food supply chain management leads to significant food waste in logistic system. The concept of the sustainable value added agri-food chains requires defined approach to the analysis of the existing situation, possible improving strategies and also assessment of these changes impact on further development. The purpose of research is to provide scientific substantiation of theoretical and methodological principles and develop practical recommendations for the improvement of the agri-food logistics distribution system. A case study methodology is used in this article. The research framework is based on 4 steps: Value Stream Mapping (VSM), Gap and Process Analysis, Validation and Improvement Areas Definition and Imitation Modelling. This paper presents the appropriateness of LEAN logistics tools using, in particular, Value Stream Mapping (VSM) for minimizing logistic losses and Simulation Modeling of possible logistics distribution system improvement results. The algorithm of VSM analysis of the agri-food supply chain, which involves its optimization by implementing the principles of sustainable development at each stage, is proposed. The methodical approach to the analysis of possible ways for optimizing the operation of the logistics system of the agri-food distribution is developed. It involves the application of Value Stream Mapping, i.e. designing of stream maps of the creation of the added value in the agri-food supply chain for the current and future state based on the minimization of logistic losses. Simulation modeling of the investment project on time optimization in the agri-food supply chain and economic effect of proposed improvements in logistics product distribution system functioning at the level of the investigated agricultural enterprise has been determined. Improvement of logistics planning and coordination of operations in the supply chain and the innovative pre-cooling system proposed to be introduced have a 3-year payback period and almost 75-80% probability. Based on the conducted VSM analysis of losses in the agri-food supply chain, there have been determined the main points, where it is advisable to conduct optimization changes for the achievement of positive results and the significant economic effect from the proposed measures has been confirmed. In further studies, it is recommended to focus on identifying the synergistic effect of the agri-food supply chain optimization on the basis of sustainable development.