• Title/Summary/Keyword: Enterprise security

Search Result 382, Processing Time 0.024 seconds

EFFICIENT OPEN SOURCE DISTRIBUTED ERP SYSTEM FOR LARGE SCALE ENTERPRISE

  • ELMASSRY, MOHAMED;AL-AHAMADI, SAAD
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.280-292
    • /
    • 2021
  • Enterprise Resource Planning (ERP) is a software that manages and automate the internal processes of an organization. Process speed and quality can be increased, and cost reduced by process automation. Odoo is an open source ERP platform including more than 15000 apps. ERP systems such as Odoo are all-in-one management systems. Odoo can be suitable for small and medium organizations, but duo to efficiency limitations, Odoo is not suitable for the large ones. Furthermore, Odoo can be implemented on both local or public servers in which each has some advantages and disadvantages such as; the speed of internet, synced data or anywhere access. In many cases, there is a persistent need to have more than one synchronized Odoo instance in several physical places. We modified Odoo to support this kind of requirements and improve its efficiency by replacing its standard database with a distributed one, namely CockroachDB.

Culture Influence on Enterprise Planning Resource (ERP) Implementation In Saudi Arabia's Public Sector

  • Alzahrani, Ahmed Omar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.397-403
    • /
    • 2022
  • Enterprise resource planning (ERP) is widely adopted among enterprises and organizations. In recent years, researchers have become increasingly interested in factors related to ERP implementation success. In this paper, top management members, IT professionals, and end-users were interviewed in the study. The study used Hofstede's main cultural dimensions as a theoretical framework to identify cultural characteristics and their influence on ERP implementation within public organizations in Saudi Arabia. The study followed a qualitative methodology approach to carry on the study to investigate the national culture characteristics in Saudi Arabia that may influence ERP implementation success. The study found some culturally related factors that could influence success in ERP implantation projects in Saudi Arabia..

Security Architecture Proposal for Threat Response of insider in SOA-based ESB Environment (SOA 기반 ESB 환경에서 내부 종단 사용자 위협 대응을 위한 보안 아키텍처 제안)

  • Oh, Shi-hwa;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.55-63
    • /
    • 2016
  • SOA(service oriented architecture) based ESB(enterprise service bus) model is widely adopted in many companies for the safe processing of enormous data and the integration of business system. The existing web service technologies for the construction of SOA, however, show unsatisfactory in practical applications though the standardization of web service security technologies is in progress due to their limitations in safe exchange of data. Internal end users using a large business system based on such environment are composed of the variety of organizations and roles. Companies might receive more serious damage from insider threat than that from external one when internal end users get unauthorized information beyond the limits of their authority for private profit and bad purposes. In this paper, we propose a security architecture capable of identifying and coping with the security threats of web service technologies arouse from internal end users.

Factors Affecting Enterprise's Satisfaction toward Social Security's Online Public Service: The Case of Thanh Hoa Province, Vietnam

  • NGO, Chi Thanh;NGUYEN, Thi Ngoc Mai;NGUYEN, Duy Dat;LE, Hoang Ba Huyen;LE, Van Cuong;LE, Thi Binh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.467-475
    • /
    • 2020
  • The study aims to investigate factors affecting enterprise's satisfaction and loyalty toward the Social Security's online public services, looking at the case of Thanh Hoa province, Vietnam. This study employs samples with 216 enterprises that use online public system of Thanh Hoa province's Social Security. The research model is closely linked to the SERVQUAL model developed by Parasuraman, Zeithaml and Berry (1988). We propose 23 scales that constitute the quality of service, three scales that constitute Customer Satisfaction and three components that constitute Customer Loyalty. This study use the tool of Exploratory Factor Analysis (EFA), Cronbach's Alpha test, Confirm Factor Analysis (CFA) and Structural Equation Modeling (SEM) in order to address the question of satisfaction and loyalty. The result shows that the factor with the most impact is Reliability, next is Capacity of staffs, Tangibles, Attitude of staffs, and the least impacting factor is Empathy; moreover, the results also show that Satisfaction has a strong impact on Customer Loyalty. The findings of this study suggest that Thanh Hoa province's Social Security should: (i) strengthen the reliability of online service system; (ii) build capacity for staffs; (iii) develop the responsiveness of electronic transactions systems; and (iv) improve the empathy of staffs.

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

The Study of Building Security-Established Enterprise Mobile-VPN on WiBro Network (WiBro망에서 보안성이 확립된 기업용 Mobile-VPN 구축 방안 연구)

  • Cho, Do-Hyeoun;Kang, Dae-Seok;Han, Kyu-Jeong;Ji, Yung-Ha;Han, Wan-Ok
    • 전자공학회논문지 IE
    • /
    • v.47 no.4
    • /
    • pp.48-52
    • /
    • 2010
  • Recently, WiBro service as a mobile internet has been being extended. The market of wireless data communication has been being extended rapidly due to the increase of mobile data communication service supply such as smart-phone, WiBro service and so on. As the result, security is also emphasized in the mobile Internet In this paper, we propose the methods that tighten up security in the upcoming Enterprise Mobile-VPN service on WiBro network.

A study on the improvement of BCM industry through legal systems (BCM(재해경감활동관리)산업 활성화를 위한 법·제도 개선 방안 연구)

  • Han, Jong-U
    • Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.93-100
    • /
    • 2015
  • Although many years passed since 'The Legislative bill on the support of voluntary activities of enterprises for disaster reduction'(hereinafter referred to as 'enterprise disaster reduction act') has been first enacted in 2007, BCMS is still not activated in our society. In contrast, after 911 Terror, importance of BCM is getting magnified and standardization research & institutionalization i s a lso proceeding i all over world. Lately, Disaster preventing activities is urgently needed like the sinking of 'Sewol ferry'. So the purpose of this paper is proposed for establishment of 'BCMS' and activation of the certificate system for Best-Run Business by analyzing the problem of 'enterprise disaster reduction act' and weak of activation as following. First, propel changing the policy of self-regulated participation to mandatory about the certificate system for Best-Run Business from public entity to government ministry and it is able to activate by propelling demo business of the certificate system for Best-Run Business. Second, public entity that has been given the certificate system for Best-Run Business by affiliating with Disaster Management Assessment of government management can be exempted from Disaster Management Assessment or those entity can arrange for connectivity acquisition method of 'Excellent rate'. Third, to publicize the activation of the law mentioned above, makes public entity r ecognizable by incorporating 'BCMS' into National safety management plan and establishment of National critical infrastructures security plan. Fourth, it should be reviewed to improving the related act regarding to inclusion of public organizations as well as private enterprises.

  • PDF

A Case Study on Uniform Design Development -Focused on F Distribution Enterprise- (기업의 유니폼 디자인 개발 연구 -F 유통업체 사례를 중심으로-)

  • Kim Zang-Mi;Park Hye-Won
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.5 s.104
    • /
    • pp.75-88
    • /
    • 2006
  • The conception of uniform is changing from function and economical efficiency of the past to symbolism and aesthetic sense So, in such a management strategical point of view as enterprises' PR, scouting talent, organization revitalization etc, this is required to settle uniform culture which is proper to each enterprise and design development. The purpose of this thesis is, first, to study to help distribution enterprises' CI or PR by examining the present condition of uniform design in domestic fashion distribution enterprise and planning uniform design on the base of real case and finally making a real thing in person. Second is to suggest to fashion enterprise security of competitive ability of uniform-producing enterprise by developing article design of worth. Third is to present academic area with how to do design education in a wide range not based on trend article development. Following is how and what to study to carry out these purposes. Details about necessity and how and what to study are in an introduction, the conception of uniform in theory through precedential records examination in chapter 2, the present condition of uniform design based on Changwon city in chapter 3, planning uniform design and making a real thing suitable for F enterprise in chapter 4, and the conclusion is in chapter 5. Through this study, I became to know that uniform in distribution enterprise who treats visitors face to face is very important. I supply material and information concluded from this study to uniform industry and hope this will be helpful in developing uniform. It is significant in that this study as being related with enlarged uniform and enterprise, beyond such a uniform area as school uniform and hospital one, expanded the study range of clothing. I already tell you that this study is based on visual expression of uniform and wearer's feeling in clothes is not included.

A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study

  • Kim, Hwankuk;Lee, Kyungho;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4588-4608
    • /
    • 2017
  • The measurement of information security levels is a very important but difficult task. So far, various measurement methods have studied the development of new indices. Note, however, that researches have focused on the problem of attaining a certain level but largely neglecting research focused on the issue of how different types of possible flaws in security controls affect each other and which flaws are more critical because of these effects. Furthermore, applying the same weight across the board to these flaws has made it difficult to identify the relative importance. In this paper, the interrelationships among security flaws that occurred in the security controls of K-ISMS were analyzed, and the relative impact of each security control was measured. Additionally, a case-control study was applied using empirical data to eliminate subjective bias as a shortcoming of expert surveys and comparative studies. The security controls were divided into 2 groups depending on whether or not a security flaw occurs. The experimental results show the impact relationship and the severity among security flaws. We expect these results to be applied as good reference indices when making decisions on the removal of security flaws in an enterprise.