• Title/Summary/Keyword: IP Management Strategy

Search Result 37, Processing Time 0.023 seconds

An Empirical Study on Security Management Model for Small IT Service Business (소규모 IT 서비스 기업 비즈니스 특성을 고려한 보안 관리모델 실증연구)

  • Kim, Yanghoon;Na, Youngsub;Chang, Hangbae
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.131-141
    • /
    • 2012
  • Depending on the sophistication of IT, it is increasing more and more information leaks and breaches. Accordingly the majority of companies have expand investment protection for the information. However, companies still have been exposed the vulnerability of information leakage. Especially, small IT service businesses than large corporations relatively have some limitations in the points of resources and manpower business activities. For studies on information security for small IT service companies so far, however, there have been insufficient studies considering small business scales and business characteristics of IT services. In this study, we made to design an information security management model for establishing security measures of small IT service companies which are classified SI/SM, DB, IR and IP industry that depending on how the value creation of the business. In detail, we performed an empirical analysis for small IT service business to consider business characteristics and we proposed security implementation strategies based on the analysis results.

  • PDF

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Cost Reduction of Location Registration Using the LiEy UBdate Strategy in Hierarchical Mobile IPv6 (계층적 이동 Ipv6환경에서 지연갱신전략을 이용한 위치등록 비용 감소)

  • Yi Myung-Kyu;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.370-381
    • /
    • 2005
  • Mobile IP provides an efficient and scalable mechanism for host mobility within the Internet. Using Mobile If, mobile nodes may change their point of attachment to the Internet without changing their If address. However, it would result in a high signaling cost. To reduce the signaling cost, we factor in the fact that mobile users will not be actively communicating much of the time. In fact, there Is no necessity to send a binding update message to the home agent when an mobile node does not communicates with others while moving. From this point of view, we propose a lazy update strategy for minimizing signaling cost using the forwarding pointer in hierarchical Mobile IPv6. In our proposal, binding updates are sent only when a mobile node is in a busy mode. If an mobile node is in a dormant mode, binding update messages are delayed until busy mode using the forwarding pointer. As a result, our proposal can reduce the total signaling cost by eliminating unnecessary binding update messages when a mobile node Is in a dormant mode. In addition to, our proposal reduces unnecessary location update cost resulting from ping-pong effect under mobile node's dormant mode. Analysis results using the discrete analytic model presented in this paper shows that our proposal can has superior performance than hierarchical Mobile nv6 when the call-to-mobility ratio is low and the length of the forwarding pointer chain K is low.

A Study on the Interior Design Guidelines in consideration of Merchandising of Department Store Supermarket (백화점 수퍼마켓의 머천다이징을 고려한 실내디자인 지침에 관한 연구)

  • Park, Seoung-Zun;Choi, Sang-Hun
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.6
    • /
    • pp.22-29
    • /
    • 2015
  • The purpose of this study is to investigate the details of the overall interior design of the department store supermarket retail space, interior design and development, seeks to help change. In this study, a range of research the department store supermarket located in the major department store. Since 2012, new construction or renewal has been done in a department store, was investigated by selecting a total of five locations of two places in the premium supermarket. Conclusions are as followings ; First, In-store merchandising strategies, store configuration strategy, product mix strategies, and the layout plan considering the advanced strategies. Secondly, the interior guidelines are, (1)VP should be planned as an expression of a company or brand management strategies to visualize a concept image of product planning stages of merchandising to entering the store to induce curiosity to customers. (2)PP is by planning purposes, the use of lighting, directing structure, color harmony, by utilizing such as props and small parts must be able to attract attention. (3)IP is the customer to organize display, depending on the type of the display items to facilitate fraud, and the fixture plan in association with it, the customer selects a product must induced to purchase.

IP기반 유선인터넷전화 가입요인 도출을 위한 분석적 연구: 통신상품결합서비스의 영향

  • Ha, Seong-Ho;Yang, Jeong-Won
    • Proceedings of the Korea Database Society Conference
    • /
    • 2010.06a
    • /
    • pp.187-199
    • /
    • 2010
  • Recently, Internet Telephony has become increasingly popular in telecommunication industry. However, previous research on Internet Telephony has focused on analyzing specific Internet Telephony solutions, identifying the Internet Telephony movement itself. The research on prediction models about Internet Telephony adoption has been minimal. The main propose of this study is to develop models for predicting transition intention from using traditional telephones to using Internet Telephony. To do so, this study uses data mining methods to analyze demands in the IT communications market and to provide management strategies for Internet telephony providers. Especially this study uses discriminant analysis, logistic regression, classification tree, and neural nets to develop the prediction models for the Internet Telephony adoption. The models are compared with each other and a superior model is chosen.

  • PDF

Bridging the Digital Divide : The Case of Nepal Wireless

  • Pun, Mahabir
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.3
    • /
    • pp.105-127
    • /
    • 2013
  • Information and Communication Technology (ICT) has become a vital instrument for delivering a number of services such as education, healthcare and public services. Community wireless networks are community-centric telecommunication infrastructure developed to provide affordable communication for those who live in remote areas. This chapter discusses the role of Nepal Wireless in achieving socio economic development of rural communities by facilitating affordable Internet access. We analyze the challenges Nepal Wireless faced and articulate on the approaches it took to address those challenges such as lack of technical skills, appropriate technology and funding, difficult geographical terrains, unstable political situation, and expensive devices. In addition, we address the success and failure factors of this community-based ICT4D approach in order to guide similar endeavors. We conclude the chapter by some suggestions for policy makers, community developers, and academicians.

A Competitiveness Analysis on Business Resources of 'TVING' in Korean OTT Market: Focusing on Resource-based Theory and VRIO Framework (국내 OTT 시장에서 '티빙' 경영자원의 경쟁력 분석: 자원준거이론(RBT) 및 VRIO 분석 모형을 기반으로)

  • Vickie Jinhee Yu;Ilhan Hong;Kenneth Chi Ho Kim
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.147-172
    • /
    • 2023
  • This study aims to review the competitiveness of 'TVING', a Korean OTT player in Korean market. For this, this study extracts core business resources of TVING focusing on resource-based theory, and analyzes their competitiveness under VRIO framework. TVING has 4 tangible and intangible resources respectively and 1 human resource. Tangible resources of TVING are technology(recommendation, compression), content(original, exclusive, discriminative non-exclusive), production studio, and paid-subscribers. Intangible resources are content planing capability, distribution network(local, global), marketing promotion·PR, sales), brand preference. And human resource of TVING creates IP professionalism of the company. As a result of VRIO analysis, discriminative non-exclusive content, production studios, and domestic service channels are the most powerful resources of TVING to 'sustain competitive advantage'. Technology, original content, planning capability and IT professionalism bring 'temporary competitive advantage', while exclusive content, the number of paid-subscribers, global service network, and promotion capabilities are not core resources with staying in competitive rank stages. By the way, TVING has potential users for sales of KT and LGU+ thanks to partnership and M&A, but this is not effectively used at the organization level yet. The meaning of this study can be found in that this evaluated competitiveness by each resource of TVING and arranged its implications.

A Study on Preparation Plan against National Industrial Technology Outflow (국가 산업기술유출 대비 방안 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.55-62
    • /
    • 2009
  • Industrial Security is a management activity protecting industrial asset of enterprise by application of security elements(physical, IP, conversion security tools) and can be understood as a comprehensive term including software aspect(establishment of policy and strategy, maintenance operation, post- response act, etc.) as well as the operation of hardware elements. In this paper, after recognizing the definition and relative concept of industrial security, the role and its relative laws of the industrial security organizations, the management system and the reality, I will find some problems and submit a reform measure. Furthermore I would like to propose the policy direction to enhance the national competitiveness and to become one of the advanced nations in 21st industrial security through the effective industrial security activities of our enterprises.

  • PDF

A Study on the Brand-based Warehouse Management in Online Clothing Shops (온라인 쇼핑몰의 브랜드 중심 창고관리 기법에 대한 연구)

  • Song, Yong-Uk;Ahn, Byung-Hyuk
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2011
  • As the sales volume of online shops increases, the job burden in the back-offices of the online shops also increases. Order picking is the most labor-intensive operation among the jobs in a back-office and mid-size pure click online shops are experiencing the time delay and complexity in order picking nowadays while fulfilling their customers' orders. Those warehouses of the mid-size shops are based on manual systems, and as order pickings are repeated, the warehouses get a mess and lots of products in those warehouses are getting missing, which results in severe delay in order picking. To overcome this kind of problem in online clothing shops, we research a methodology to locate warehousing products. When products arrive at a warehouse, they are packed into a box and located on a rack in the warehouse. At this point, the operator should determine the box to be put in and the location on the rack for the box to be put on. This problem could be formulated as an Integer Programming model, but the branch-and bound algorithm to solve the IP model requires enormous computation, and sometimes it is even impossible to get a solution in a proper time. So, we relaxed the problem, developed a set of heuristics as a methodology to get a semi-optimum in an acceptable time, and proved by an experiment that the solutions by our methodology are satisfactory and acceptable by field managers.

Study on the Prevention of Patent Disputes through Network Analysis - Focusing on NPEs in Smart Car Industry - (스마트카 특허분쟁 네트워크분석을 통한 특허분쟁예방에 관한 연구)

  • Ryu, ChangHan;Suh, Minsuk
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.23 no.3
    • /
    • pp.315-325
    • /
    • 2015
  • Smart Car market has been experiencing continuous growth to drive leading companies in automotive and IT industries to focus on advancing related technologies. As the IT technologies fuse into automotive technologies, the patent litigation has been showing changes. One of the prominent changes in patent litigation pattern of Smart Car field is the increased activities of the Non-Practicing Entities (NPEs), whose main field has been the IT area. However, the automotive companies have been mainly focusing on preventing patent disputes against competitors through trend analysis, which caused them to become relatively vulnerable to the attacks from NPEs. In this study, we developed a methodology for monitoring and analyzing the activities of NPEs using network analysis tools to suggest effective strategies for manufacturing companies to fortify their ability to respond against unanticipated attacks. Our methodology, which is developed for the Smart Car field, can also be useful for other fields such as IT and electronics.