• Title/Summary/Keyword: Enterprise Security Management

Search Result 207, Processing Time 0.027 seconds

반도체 산업에서의 Enterprise Document Management Architecture 구현에 관한 연구 (A Study on Constructing Approach of Enterprise Document Management Architecture in Semiconductor Business)

  • 장현성;이영중;송하석;한영준;안정삼
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2001년도 추계학술대회 논문집
    • /
    • pp.11-14
    • /
    • 2001
  • A systematic construction and re-use of technology related to the product development and production has been the most important for the semiconductor industry dependent on process and equipment. Therefore, numerous outputs in the form of paper has been produced in the process of information management ranging from the creation to recycling and disposal of technologies. In this research, the technology and documents necessary for the business management in the field of semiconductor manufacturing were classified in an effort to solve problems while the modeling of document management architecture at the enterprise level was performed by properly setting up the security system to prevent the unauthorized disclosure of the product development technology to the third parties. Especially, the product and process specification are designed in such a way as to ensure a real-time response in interface with the production system in order to shorten the development lead-time and improve the productivity. This paper is to discuss the modeling approach, the strategy to construct the system and its results.

  • PDF

Innovation and investment strategies to intensify the potential modernization and to increase the competitiveness of microeconomic systems

  • Tulchynska, Svitlana;Vovk, Olha;Popelo, Olha;Saloid, Stanislav;Kostiunik, Olena
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.161-168
    • /
    • 2021
  • Within the article, strategic guidelines for the modernization of microeconomic systems are identified. Modernization levels of the potential implementation are formalized for enterprises: contractile, extensive technical, technological, progressive, adaptive, steady, intensive, creative, absolute and leader modernization. This allowed to specify the directions and tasks of the enterprise modernization at different management levels. Accordingly, the conditions and criteria for selecting resource tools are set. It is proved that the strategies of the potential modernization of enterprises must be carried out at four main management levels: first, at the enterprise level; secondly, for a particular type of product / service; third, by functional directions of modernization of separate spheres of the enterprise activity or responsibility, fourth, at the level of structural units of the enterprise. It is substantiated that in the processes due to the activation of the potential modernization, the resources are transformed into the results of the innovation implementation and the investment strategies modernization. A system of tasks for the corporate strategies implementation in order to modernize microeconomic systems has been formed. Key vectors of the activation determine the nature and properties of investment resources and necessary innovations to enhance the modernization potential. Therefore, the system of innovation and investment strategies' modernization, based on the vector and resource provision of the modernization process, is specified:

eProcurement Models and Solution

  • Sanghoon Han
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 1999년도 종합학술대회발표논문집
    • /
    • pp.780-797
    • /
    • 1999
  • ㆍ eProcurement Services ㆍ eBusiness Security Services ㆍ Electronic Data Interchange(EDI) ㆍ Enterprise-scale Project Management and Accountability (omitted)

  • PDF

기업보안관리(ESM) 제품의 평가모델 개발 (Development of Evaluate Model of Enterprise Security Management (ESM) Product)

  • 강상원;전인오;양해술
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2010년도 춘계학술발표논문집 1부
    • /
    • pp.408-411
    • /
    • 2010
  • 보안관리가 진화하고 있다. 보안의 중요성이 강조되면서 도입된 수많은 보안 솔루션은 관리의 어려움을 증가시키고 있고, 각기 다른 장비가 쏟아내는 수많은 정보들로 효율적인 전사적 보안 체계 마련의 필요성이 대두되고 있기 때문이다. 국내에서는 ESM(Enterprise Security Management)이 보안관리를 대표했지만, 이를 더욱 고도화해야 한다는 요구가 증가하고 있다. 본 연구에서는 기업보안관리(ESM) 제품의 질적인 면을 평가하고 품질수준을 파악하여 개선방향을 도출함으로써 품질향상을 지원할 수 있는 보안성 평가모델과 시험 방법론에 대해서 개발하였다.

  • PDF

The Concept of Human Resource Management in Logistics Processes

  • Shtuler, Iryna;Zabarna, Eleonora;Kyrlyk, Nataliya;Kostovyat, Hanna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.110-116
    • /
    • 2021
  • The article focuses on the need to deepen the issue of human resource management in logistics processes. It is noted that changes in market conditions and turbulence in the institutional environment require managers to form a highly effective human resources policy capable to ensure the innovative development of the enterprise. Functional strategies for human resource management in logistical processes are proposed, namely: adaptive, innovative, selective and exclusive. Innovative technologies that should be used in the adaptive human resources policy process are identified.

네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계 (A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks)

  • 유일선;김종은;조경산
    • 정보처리학회논문지C
    • /
    • 제10C권1호
    • /
    • pp.1-10
    • /
    • 2003
  • 본 논문에서는 취약점 검색공격 탐지시스템 DS-NVSA(Detection System of Network Vulnerability Scan Attacks)에서 서버와 에이전트들 사이의 상호연동을 위한 안전한 통신 프레임워크를 제안한다. 기존 시스템과의 상호연동을 위하여 제안 프레임워크는 IETF의 IDWG에서 제안한 IDMEF와 IAP를 확장 적용하였다. 또한 공개키 기반의 환경을 지원하지 못하는 네트워크 시스템을 위해 대칭키 기반의 암호화 통신 프로토콜 SKTLS(Symmetric Key based Transport Layer Security Protocol)를 제시하였다. 제안된 프레임워크는 DS-NVSA 이외에도 기존의 이기종 침입탐지 시스템의 제사용과 탐지 영역의 확대를 제공하며, 또한 기업내 통합 보안환경시스템 ESM(Enterprise Security Management) 시스템에도 적용될 수 있다.

BCM(재해경감활동관리)산업 활성화를 위한 법·제도 개선 방안 연구 (A study on the improvement of BCM industry through legal systems)

  • 한종우
    • 방재&안전
    • /
    • 제5권1호
    • /
    • pp.93-100
    • /
    • 2015
  • Although many years passed since 'The Legislative bill on the support of voluntary activities of enterprises for disaster reduction'(hereinafter referred to as 'enterprise disaster reduction act') has been first enacted in 2007, BCMS is still not activated in our society. In contrast, after 911 Terror, importance of BCM is getting magnified and standardization research & institutionalization i s a lso proceeding i all over world. Lately, Disaster preventing activities is urgently needed like the sinking of 'Sewol ferry'. So the purpose of this paper is proposed for establishment of 'BCMS' and activation of the certificate system for Best-Run Business by analyzing the problem of 'enterprise disaster reduction act' and weak of activation as following. First, propel changing the policy of self-regulated participation to mandatory about the certificate system for Best-Run Business from public entity to government ministry and it is able to activate by propelling demo business of the certificate system for Best-Run Business. Second, public entity that has been given the certificate system for Best-Run Business by affiliating with Disaster Management Assessment of government management can be exempted from Disaster Management Assessment or those entity can arrange for connectivity acquisition method of 'Excellent rate'. Third, to publicize the activation of the law mentioned above, makes public entity r ecognizable by incorporating 'BCMS' into National safety management plan and establishment of National critical infrastructures security plan. Fourth, it should be reviewed to improving the related act regarding to inclusion of public organizations as well as private enterprises.

  • PDF

Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos

  • An, Kyu-Hee;Lee, Ki-Yeal;Chung, Mok-Dong
    • Journal of Information Processing Systems
    • /
    • 제2권3호
    • /
    • pp.170-177
    • /
    • 2006
  • Recently, RFID technology has attracted considerable attention in many industry fields. The RFID environment requires a standard architecture for the smooth exchange of data between heterogeneous networks. The architecture should offer an efficient standard environment, such as a communication environment based on Web Services, PKI or Kerberos-based security, and abstract business processes which could be used in the diverse domains. Therefore, in this paper, we propose an Enterprise Application Framework (EAF) which includes a standard communication protocol, security functions, and abstract level business processes. The suggested architecture is expected to provide a more secure and flexible security management in the dynamic RFID application environments, and is expected to provide an abstract business event for the development of business processes which could apply RFID technology to the existing systems.

정보보안체계 수립이 Multibusiness 기업 성과에 미치는 영향에 관한 연구: IT Relatedness 이론 관점에서 (Study about the Impact of Information Security Systems on Corporate Performance: Based on IT Relatedness Theory)

  • 구자면;박주석;박재홍
    • Asia pacific journal of information systems
    • /
    • 제23권4호
    • /
    • pp.129-149
    • /
    • 2013
  • According to the development of new Information Technologies, firms consistently invest a significant amount of money in IT activities, such as establishing internal and external information systems. However, several anti-Information activities-such as hacking, leakage of information and system destruction-are also rapidly increasing, thus many firms are exposed to direct and indirect threats. Therefore, firms try to establish information security systems and manage these systems more effectively via an enterprise perspective. However, stakeholders or some managers have negative opinions about information security systems. Therefore, in this research, we study the relationship between multibusiness firms' performance and information security systems. Information security indicates physical and logical correspondence of information system department against threats and disaster. Studies on information security systems suggested frameworks such as IT Governance Cube and COBIT Framework to identify information security systems. Thus, this study define that information security systems is a controlled system on enterprise IT process and resource on IT Governance perspective rather than independent domain of IT. Thus, Information Security Systems should be understood as a subordinate concept of IT and business processes. In addition, this study incorporates information capability to information security system literature to show the positive relationship between Information Security Systems and Corporate Performance. The concept of information capability suggested that an interaction of human, information, technical and an effect on corporate performance using three types of capability (IT Practice, Information Management Practice, Information Behaviors and Values). Information capability is about firms' capability to manage IT infrastructure and information as well as individual employees who use IT infrastructure and information. Thus, this study uses information capability as a mediating variable for the relationship between information security systems and firms' performance. To investigate the relationship between Information Security Systems and multibusiness firms' performance, this study extends the IT relatedness concept into Information Security Systems. IT relatedness provides understanding of how corporations cope with conflicts between headquarters and business units to create a synergy effect and achieve high performance using IT resources. Based on the previous literature, this study develops the IT Security Relatedness model. IT Security Relatedness is our main independent variable, while Information Capability and Information Security Performance are mediating variables. To control for the common method bias, we collect each multibusiness firm's financial performance and use it as our dependent variable. We find that Information Security Systems influence Information Capability and Information Security Performance positively, and these two variables consequently influence Corporate Performance positively. In addition, this result indirectly shows that corporations under a multibusiness environment can obtain synergy effects using the integrated Information Security Systems. This positive impact of Information Security Systems on multibusiness firms' performance has an important implication to various stakeholders. Therefore, multibusiness firms need to establish Information Security Systems to achieve better financial performance.

자원 제약하의 중소기업 정보보안계획 수립방안 연구 (A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions)

  • 권장기;김경일
    • 융합정보논문지
    • /
    • 제7권2호
    • /
    • pp.119-124
    • /
    • 2017
  • 정보는 기업의 규모와 무관하게 소중한 자산이며 정보보안은 기업의 생존과 번영을 위해 필수적인 요소이다. 하지만 대기업의 경우 정보보안경영시스템(ISMS)의 신속한 도입을 통해 안전을 확보해 나가지만, 중소기업의 경우는 예산 제약, 보안 지침의 미흡, 보안에 대한 인식 부족 등, 복합적인 요인들로 인해 보안시스템이 구축되지 않거나 구축이 지체되고 있다. 본 논문에서는 중소기업의 정보보안 관리 실태를 설문조사를 통하여 문제점을 분석하고, 중소 기업을 위한 무료 또는 저렴한 방법으로 종합적인 보안계획 수립 방안을 제시하고자 한다. 본 논문이 제시하는 방법을 적용해 중소기업들은 최저 비용의 기본적인 정보보안을 구현할 수 있을 것이며, 정보보안 계획을 수립하고자 하는 중소기업들에 도움이 될 것이라고 믿는다.