• Title/Summary/Keyword: Information Systems Policy

Search Result 1,886, Processing Time 0.03 seconds

Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems (정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구)

  • Lee, Kyu-Woong
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.

An Improved Reorder Policy for the General Multi-Echelon Distribution Supply Chain based on the Order Risk (다계층 분배형 공급사슬의 운영 개선을 위한 주문리스크 기반의 재주문정책과 실용적 근사방법)

  • 서용원
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.11a
    • /
    • pp.159-165
    • /
    • 2003
  • The objective of this paper is to provide an improved reorder decision policy for general multi-echelon distribution systems utilizing the shared stock information. Since it has been known that traditional reorder policies sometimes show poor performance in distribution systems, in our previous research we introduced the order risk policy which utilizes the shared stock information more accurately f3r the 2-echelon distribution system and proved the optimality. However, since the real world supply chain is generally composed with more than 2 echelons, we extend the order risk policy for the general multi-echelon systems. Since the calculation of the exact order risk value fur general multi-echelon systems is very complex, we provide two approximation methods. Through the computational experiment comparing the order risk policy with the existing policies under various conditions, we show the performance of the order risk policy and analyze the value of the shared stock information varying with the characteristics of the supply chain.

  • PDF

An Improved Reorder Policy for the General Multi-Echelon Distribution Supply Chain Based on the Order Risk (일반적 다계층 분배형 공급사슬에서 주문리스크 기반의 개선된 재주문정책에 관한 연구)

  • Seo, Yong-Won
    • IE interfaces
    • /
    • v.17 no.3
    • /
    • pp.359-374
    • /
    • 2004
  • The objective of this paper is to provide an improved reorder decision policy for general multi-echelon distribution systems utilizing the shared stock information. It has been known that traditional reorder policies sometimes show poor performance in distribution systems. Thus, in our previous research we introduced the order risk policy which utilizes the shared stock information more accurately for the 2- echelon distribution system and proved the optimality. However, since the real world supply chain is generally composed with more than 2 echelons, we extend the order risk policy for the general multi-echelon systems. Since the calculation of the exact order risk value for general multi-echelon systems is very complex, we provide two approximation methods for the real-time calculation. Through the computational experiment comparing the order risk policy with the existing policies under various conditions, we show the performance of the order risk policy and analyze the value of the shared stock information varying with the characteristics of the supply chain.

An Approximate Order Risk Evaluation Method for the General Multi- Echelon Distribution Supply Chain (다계층 분배형 공급사슬에서 주문리스크의 근사적 계산방법과 비용개선효과)

  • Seo, Yong-Won
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.636-647
    • /
    • 2004
  • The objective of this paper is to provide an improved reorder decision policy for general multi-echelon distribution systems utilizing the shared stock information. It has been known that traditional reorder policies sometimes show poor performance in distribution systems. Thus, in our previous research we introduced the order risk policy which utilizes the shared stock information more accurately for the 2-echelon distribution system and proved the optimality. However, since the real world supply chain is generally composed with more than 2 echelons, we extend the order risk policy for the general multi-echelon systems. Since the calculation of the exact order risk value for general multi-echelon systems is very complex, we provide two approximation methods for the real-time calculation. Through the computational experiment comparing the order risk policy with the existing policies under various conditions, we show the performance of the order risk policy and analyze the value of the shared stock information varying with the characteristics of the supply chain.

  • PDF

An Empirical Study to Examine the Relationship between the Level of Information Systems and the Business Performance of the Local Small Business Firms (지방중소기업의 정보화 현황과 정보화수준에 따른 기업성과)

  • Kim Kap Sik
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.109-128
    • /
    • 2003
  • This study is intended to suggest an ideal direction of the information systems policy for the local small business firms. In an effort to accomplish this objective, this paper tried to identify the current states of the information systems and measure the level of the information systems of local small business firms based on the maturity stage and the development level. The study then explored the evidence how the maturity stage and the development level affect the business performance of the local small business firms. The research found out that the organizational factor such as the support of CEO and the financial factor such as IS investment took major roles to improve the business performance. Based on the research findings of this study, the paper suggested the desirable solution of the information system policy to deal with the problems the local small business firms need to overcome.

  • PDF

Information Strategy Planning for Fisheries Policy Information Systems Using the Data Warehouse (Data Warehouse 기법을 이용한 수산정책정보시스템 구축)

  • 어윤양;김하균;이재정
    • The Journal of Fisheries Business Administration
    • /
    • v.31 no.2
    • /
    • pp.119-132
    • /
    • 2000
  • One of most important wort to build Fisheries Policy Information Systems(FPIS) is related to connect the data warehouse between fisheries departments, This paper presents the developing strategies to build the FPIS. First, developing the FPIS needs to compensate the laws and regulations with assistance of fisheries departments. Second, FPIS developer needs to cooperate the related fisheries departments deeply, Third, developing the data warehouse will be contribute to improve criterion and statistics of fisheries data. Forth, For experts of systems use the FPIS, they are needed to educate for appling the systems in the fisheries environments.

  • PDF

A Study on Development of Policy Attributes Taxonomy for Data-based Decision Making (데이터기반 의사결정을 위한 정책 및 사업 속성 분류체계 개발 연구)

  • Kim, Sarang
    • The Journal of Information Systems
    • /
    • v.29 no.3
    • /
    • pp.1-34
    • /
    • 2020
  • Purpose Due to the complexity of policy environment in modern society, it is accepted as common basics of policy design to mix up a variety of policy instruments aiming the multiple functions. However, under the current situation of written-down policy specification, not only the public officers but also the policy researchers cannot easily grasp such frameworks as policy portfolio. The purpose of this study is to develop "Policy Attributes Taxonomy" identifying and classifying the public programs to help making decisions for allocative efficiency with effectiveness-based information. Design/methodology/approach To figure out the main scheme and classification criteria of Policy Attributes Taxonomy which represents characteristics of public policies, previous theories and researches on policy components were explored. In addition, to test taxonomic feasibility of certain information system, a set of "Feasibility Standards" was drawn from "requirements for well-organized criteria" of eminent taxonomy literatures. Finally, current government classification system in the area of social service was tested to visualize the application of Taxonomy and Standards. Findings Program Taxonomy Schemes were set including "policy goals", "policy targets", "policy tools", "logical relation" and "delivery system". Each program and project could be condensed into these attributes, making their design more easily distinguishable. Policy portfolio could be readily made out by extracting certain characteristics according to this scheme. Moreover, this taxonomy could be used for rearrangement of present "Program Budget System" or estimation of "Basic Income".

A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure (개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석)

  • Tae Chul Jung;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.6
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

A PROCESSOR SHARING MODEL FOR COMMUNICATION SYSTEMS

  • Lim, Jong Seul;Park, Chul Guen;Ahn, Seong Joon;Lee, Seoyoung
    • Journal of applied mathematics & informatics
    • /
    • v.15 no.1_2
    • /
    • pp.511-525
    • /
    • 2004
  • we model communication and computer systems that process interactive and several and several types of background jobs. The scheduling policy in use is to share the processor among all interactive jobs and, at most, one background job of each type at a time according to the process sharing discipline. Background jobs of each type are served on a first-come-first-served basis. Such scheduling policy is called Processor Sharing with Background jobs (PSBJ). In fact, the PSBJ policy is commonly used on many communication and computer systems that allow interactive usage of the systems and process certain jobs in a background mode. In this paper, the stability conditions for the PSBJ policy are given and proved. Since an exact analysis of the policy seems to be very difficult, an approximate analytic model is proposed to obtain the average job sojourn times. The model requires the solution of a set of nonlinear equations, for which an iterative algorithm is given and its convergence is proved. Our results reveal that the model provides excellent estimates of average sojourn times for both interactive and background jobs with a few percent of errors in most of the cases considered.