• Title/Summary/Keyword: IT Network

Search Result 23,065, Processing Time 0.041 seconds

The Empirical Analysis on the Performance of Inter-firm Network Management in the IT Service Firms (IT서비스 기업에서의 네트워크 경영 관련 성과 요인에 대한 실증 연구)

  • Ahn, Yeon S.
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.47-64
    • /
    • 2011
  • In the IT(Information Technology) service, which supply the solutions related to business management and IT, network construction and application trends, the related service business are increasing according to the enlargement of project scope and the diversity of project types as the need of service customers. In this paper, I propose the significant effect factors on the network management of IT service firms. The key findings are from the analysis result about 94 IT service firms as follows. For implementation the high performance of network management in the IT service firms, the strategic elements in the process of network construction are more conceived highly than the basic element in them. Also the perspective of project objectives are considered than the nominal perspectives in the partner selection process. The competency of partner firms', the cooperation process between the partner firms', network relation operation management and network relation structure management are the significant effect factors of network management.

Analysis of IT security threats and countermeasures in a network-separated environment (망분리 환경에서의 IT 보안 위협 및 대응 방법 분석)

  • Kim, chang Seok;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.638-640
    • /
    • 2021
  • The network separation environment is a network security design system that separates the internal business network from the external Internet network. It separates the internal business network from the external Internet by separating it into a business network that is not connected to the network to which the Internet is connected. The network is separated, and it is a relatively secure network structure compared to Danilman in terms of security. However, there are frequent cases of infecting internal networks by using vulnerabilities in internal systems, network devices, and security devices. In this paper, we analyze the vulnerability of IT security threats in such a network isolation environment and provide technical measures for effective security monitoring.

  • PDF

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

A Method to Analyze the Structure of Interpersonal Trust Network in SNS (SNS 구성원 간 신뢰망 구조 분석방법)

  • Song, Hee Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.97-112
    • /
    • 2016
  • Many studies have pointed out that trust is the most important component of social capital. Although there have been lots of attempts to measure level of trust between members of community, it is hard to find studies which examine trust from the standpoint of structural aspects. Because of the recent rapid growth of SNS and openness trend on members and their friendship information, it became possible to understand the structure of trust relationships among users in SNS. This study aims to facilitate interpersonal trust by comparing the structure of the trust network among social network users. For this purpose, it proposes a method to explore the structure of trust network and strategies to evolve toward more open structure. In experiments to distinguish structure of trust network with three social network communities, it is discovered that ADVOGATO has characteristics of open and collective network together whereas EPINION and FILMTRUST have collective and open characteristics respectively.

The Analyses of Research Productivity and Review Efficiency for IT Related Journal (IT 분야 학술지의 연구 생산성 및 심사 효율성 분석)

  • Kim, Kihwan;Kim, Injai
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.93-107
    • /
    • 2014
  • Interests on collaborative research and academic relationship among researchers have been increased. Collaborative researchers can maximize productivity, time and cost savings, and reduce the risk of research. An empirical study on the research productivity of co-authors' network and review efficiency of the reviewer network was conducted based on co-author networks and reviewer networks in Korea Society of IT Service. This study aims to find the characteristics of the co-author and reviewer networks, and to analyze research productivity and review efficiency in order to draw some implications. The meaning of interactions among professional groups was analyzed. Research productivity index was calculated using 728 authors' papers submitted to the society. In order to verify the effects of indicators of social network analysis on research productivity and review efficiency, correlation and regression analyses were used. As a result, the indicators of network centrality did not affect the review efficiency, but affect the research productivity.

Effects of Centrality on IT Usage Capability : A Perspective of Social Networks (조직 내 중심성이 IT활용능력에 미치는 영향: 소셜네트워크 관점)

  • Kim, Hyo-Jun;Kwahk, Kee-Young
    • The Journal of Information Systems
    • /
    • v.20 no.1
    • /
    • pp.147-169
    • /
    • 2011
  • In organizations, evaluating the competency of individuals through the position or status has many limitations. To overcome these limitations, this study analyzes the organization's informal network using social network analysis. We measured out-degree centrality and in-degree centrality by making use of social network analysis technique. Out-degree centrality is interpreted as 'madangbal' in that actors actively help other people, while in-degree centrality is interpreted as 'prestige' in that other people want to have a relationship with. This research examines the effects of individual's 'prestige' and 'madangbal' in the instrumental network and communication network on IT competency. We carried out empirical analysis using social network data that were collected from undergraduate students. The result reveals that relationship between IT competency and centrality in the instrumental network is statistically significant, while relationship between IT competency and centrality in the communication network does not show significant results.

Social Network Analysis of Professional Groups based on Co-author and Review Networks (전문가 그룹의 소셜 네트워크 분석: 국내 학술지 공저자 및 심사자 네트워크를 중심으로)

  • Kim, Injai;Choi, Jaewon;Kim, Kihwan;Min, Geumyoung
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.181-196
    • /
    • 2014
  • Many studies have been studied in the Information Technology (IT) area such as Information Systems, Business, Industrial Engineering, Computer Science, Data Analytics and so on. Although various fields for IT exist, searching experts and reviewers in IT journals are subjective. The related journals have made efforts to assign experts for the qualified review. This study conducted developing the framework for understanding and evaluating the experts among co-authors and reviewers through social network analysis. To explore the findings, we collected data of the co-authored network and the reviewer network of the Korea Society of IT Services Journal. Totally, 545 authors for submissions and 314 co-authors were used for analyzing the co-authored network. To analyze the network, we divided two networks as a network for 545 papers and a network of 316 papers excluded 229 single authored-papers. In the findings, we found out various researchers published their papers with collaborations. Also, authors who have high scores of centrality can be said as experts for specific fields. In addition, we analyzed 358 data of reviewers from 2005 to 2011. About 50 reviewers have reviewed the submitted papers based on their expertise since 2005. Peculiarly, the expertise and the qualified review in Korea Society of IT Services Journal were identified in that almost reviewers do not review various papers at a time based on low degree measures and network density.

Comparison of Recommendation Using Social Network Analysis with Collaborative Filtering in Social Network Sites (SNS에서 사회연결망 기반 추천과 협업필터링 기반 추천의 비교)

  • Park, Sangun
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.173-184
    • /
    • 2014
  • As social network services has become one of the most successful web-based business, recommendation in social network sites that assist people to choose various products and services is also widely adopted. Collaborative Filtering is one of the most widely adopted recommendation approaches, but recommendation technique that use explicit or implicit social network information from social networks has become proposed in recent research works. In this paper, we reviewed and compared research works about recommendation using social network analysis and collaborative filtering in social network sites. As the results of the analysis, we suggested the trends and implications for future research of recommendation in SNSs. It is expected that graph-based analysis on the semantic social network and systematic comparative analysis on the performances of social filtering and collaborative filtering are required.

A Investment on Wire-wireless Communication Method for Electrical Device Infrastructure Maintenance (전력설비 관리를 위한 무선 및 유선 통신 방법에 관한 고찰)

  • Kim, Young-Eok;Lee, Jin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.2
    • /
    • pp.354-359
    • /
    • 2016
  • Power plants maintenance data is to be sent to management server system via a communication network. In this case, reliable communication network is required. Transmission of the power plants maintenance data is used in the wired communication network or wireless communication network. PLC communication network is a kind of wired communication network. However PLC communication network is easily affected by noise. On the vulnerable areas in power line system, such as a mountain or rural areas, it is difficult to form a power line communication network. For a wireless communication, environment are also influenced factors in wireless communication. Harsh environmental factors are bring the communication characteristic degradation. In such areas it can be used a combination of two networks and in this way the complementary function can be achieved. Power plants are distributed in various regions across the country. The appropriate communication network is needed to maintain the power plant.This study investigated the effect of environment on the wired communication and wireless communication. It would examine a variable factor which is affect to the communication characteristic. We used PLC communication for wired communication network and ZigBee communication for wireless communication network. We investigated the characteristics of a single communication network and it raised the need for a complex communication technology to complement a single communication network.

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.