• 제목/요약/키워드: Innovation Network

Search Result 920, Processing Time 0.023 seconds

Design and Implementation of RFID-based U-SCM System for Automobile Part Industry (자동차부품산업의 RFID기반 U-SCM시스템 설계 및 구현)

  • Moon, Tae-Soo;Choi, Sang-Min;Kang, Sung-Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.4
    • /
    • pp.267-286
    • /
    • 2009
  • Most companies in automobile part industry need a SCM (Supply Chain Management) system under the cooperation with suppliers for assembling a automobile. Automobile part industry has a industry feature of hierarchical structure like 1st, 2nd, 3rd vendors. Recently, new cases to implement RFID (Radio Frequency Identification) technology appear in various areas required for integrated information system. Especially, supply chain environment in automobile part industry turns toward ubiquitous computing environment. Most companies in automobile part industry are interested in implementing RFID-based supply chain management system, which makes them shorten the business process, share the transaction information, and enhance the collaborative relationship between trading partners. This paper intends to implement RFID technology in the physical distribution area of automobile part industry such as warehousing, delivering, inventory management. The purpose of this paper is to improve the collaborative relationship of supply chain network using RFID applied to u-SCM system in ubiquitous computing environment. The contribution of this paper is to suggest a new system approach to transform existing business process into new business process through designing and implementing a RFID based SCM system using UML techniques.

  • PDF

The Public Key Polynomial Cryptosystem for Data Security in Communication Networks (통신 네트워크의 정보보호를 위한 공개키 다항식 암호시스템)

  • Yang, Tae-Kyu
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.59-68
    • /
    • 2003
  • In this paper, a public key kanpsack cryptosystem algorithm is based on the security to a difficulty of polynomial factorization in computer communication is proposed. For the proposed public key kanpsack cryptosystem, a polynomial vector B(x,y,z) is formed by transform of superincreasing vector A, a polynomial f(x,y,z) is selected. Next then, the two polynomials B(x,y,z) and f(x,y,z) is decided on the public key. Therefore a public key knapsack cryptosystem is based on the security to a difficulty of factorization of a polynomial f(x,y,z)=0 with three variables. In this paper, a public key encryption algorithm for data security of computer network is proposed. This is based on the security to a difficulty of factorization. For the proposed public key encryption, the public key generation algorithm selects two polynomials f(x,y,z) and g(x,y,z). The propriety of the proposed public key cryptosystem algorithm is verified with the computer simulation.

  • PDF

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

Collaborative Consumption Motivation Factor Model under the Sharing Economy (공유경제 모형에서의 협력적 소비 영향요인)

  • Roh, Tae-Hyup;Choi, Hwa-Yeol
    • The Journal of Information Systems
    • /
    • v.27 no.2
    • /
    • pp.197-219
    • /
    • 2018
  • Purpose The purpose of this study is to examine what motivates users to adopt one of the emerging applications for collaborative consumption of sharing economy. Using the self-determination theory, motivation theory and TAM(Technology Acceptance Model) as the theoretical framework, this study illustrates important factors that influence adoption of collaborative consumption service. We develops the ICTs(Information and Communications Technologies) initiatives and motivation model to collaborative consumption. Design/methodology/approach This paper makes use of a quantitative methodology using survey questionnaire that allows for the measurement of the eight constructs(System Availability, Contents Quality, Design & Personalization, Security & Privacy, Emotional & Social Value, Economic Value, Attitude, Adoption & Consumption) contained in the hypothesized theoretical model on the basis of the prior literatures. Data collected from a sample of 227 respondents who have used the collaborative consumption services and provided the foundation for the examination of the proposed relationships in the model. Findings This study has the following implications for the users and providers of CC platforms and services. The ICTs initiatives (System Availability, Contents Quality, Design & Personalization, Security & Privacy) are the influential factors that motivate the emotional and social value to CC. On the other hand, The ICTs initiatives (System Availability, Contents Quality) are not very significant factors of economic value to CC. The empirical analysis result indicate that there are significant causal effect among emotional & social value, economic value, and adoption to CC. This study provides important theoretical implications for innovation adoption research through an empirical examination of the relationship between ICTs initiatives, motivation factors to collaborative consumption in the sharing economy.

A Study On The Wearable Embedded System Platform (입을 수 있는 내장형 시스템 플랫품에 관한 연구)

  • Yoo, Jin-Ho;Jeong, Hyun-Tae;Cho, Il-Yeon;Lee, Sang-Ho;Han, Dong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.831-837
    • /
    • 2005
  • Personal general purpose computer(PC) has been evolved from desktop to portable mobile device such as tablet PC and PDA. Technology innovation on semiconductor have made it possible to package a reasonably Powerful Processor and memory subsystem with advanced input/output devices. At last these subsystems are miniaturized into wearable system. Wearable computer has recently gained attention as the post PC in the ubiquitous environment. Wearable computing becomes more and more feasible and receives growing attention throughout industry and the consumer marketplaces. This paper proposed and developed WPS that has multimedia features and network features as a wearable embedded platform. We explain the form, overall architecture, functions and user applications of this WPS. This paper also discusses the form of next generation computer platform with intuitive user interfaces and well designed applications in the future.

Survivability Assessment using DMKB for IT infrastructure (DMKB를 이용한 IT 기반구조의 생존성 평가 시스템)

  • Choi Eun-Jung;Kim Myuhng-Joo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.608-614
    • /
    • 2006
  • The popularization of high-speed networks and the innovation of high-performance hardware/servers have enlarged the role of large-scale, highly distributed IT infrastructure. Though many criteria on the assessment of IT infrastructure can be considered, the survivability assessment is treated as the most important one due to the essential role as an infrastructure. While assessing the survivability of some given IT infrastructures, we can not only choose the best one among them but also improve their survivability by modifying their structure and security policies. In this paper, we propose a DMKB-based assessment system on the survivability of IT infrastructures, where DMKB is a kind of database which provides the known vulnerabilities and defense mechanism for many system components.

International Collaboration in the Age of Digital Technologies : Focusing on the 10 East-Asian Countries (디지털 테크놀로지 시대의 국제 협동연구 : 동아시아 지역의 분석을 중심으로)

  • Park, Han-Woo
    • Journal of Information Management
    • /
    • v.36 no.1
    • /
    • pp.77-101
    • /
    • 2005
  • The purpose of this paper is to examine some aspects of international collaboration in the age of digital technologies. First, the paper describes the longitudinal structure of collaborative pattern among the 10 East-Asian countries based on their frequency of co-authoring SCI journal articles in the year 2001-2003. Second, a focus interview was made to explore the way in which new digital technologies such as the Internet have changed a research practice in the field of science, technology, and innovation. This research found that Japan and China are preferred as the number one collaborator by other Asian countries. Their share of international collaboration with other Asian countries has been increasing in three years. The results of indepth interview with a scholar suggest that digital network technologies have several advantages enabling individual and institutional actors to collaborate with each other effectively in terms of knowledge management as well as information exchange.

A Study on Factors Influencing User's Satisfaction of OTT Service (OTT 서비스의 이용만족도에 영향을 미치는 요인에 관한 연구)

  • Lee, heesung;Jin, Haiyan;Hwang, HaSung
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.93-100
    • /
    • 2017
  • In multi-media, multi-channel era, video viewing using various digital devices via the Internet, not the existing broadcasting network, is emerging as a new broadcasting viewing behavior. OTT service is regarded as the main service of this change of viewing behavior. It is a video service that can seamlessly use any content desired by the user at any time, at any time, any device, any contents, if the Internet connection is available. The purpose of this study is to investigate the factors affecting the satisfaction of OTT service by applying the technology acceptance model (TAM). As a result of analyzing through 303 questionnaires of the early users of OTT service, social pressure, perceived popularity, perceived cost, user reputation, individual innovation, and esthetics set as external factors in this study are partially affects perceived usefulness, perceived ease of use, and perceived enjoyment. In addition, perceived usefulness, ease of use, and enjoyment are directly influencing satisfaction. Based on these results, we discuss the theoretical and practical implications and propose future research direction.

The Use of Internet of Things and Innovation of the Private Security (사물인터넷의 활용과 민간시큐리티의 혁신)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2017
  • The Internet of things is a system that connects and communicates all sorts of things such as people, objects, and data. It's to create and share information by its own each other. It can be used to enhance the function of private security and has brought about innovative development of private security. The Internet of things is a system that allows devices connected to the Internet to communicate independently of people-objects, objects-objects connected to the Internet. That and can be used in many industries, especially in the private security sector, its value is high. The use of the Internet of things to private security sector can reinforce security zones with always-on surveillance systems, also be enhanced by its own preparedness and response to the situation. However, this study will discusse the application and development of private security in the Internet of things. The practical application of the virtual space is an immediate task and it is also an essential factor in securing security.

A Study on CSFs in the 4th Industrial Revolution (제4차 산업혁명의 성공요인에 관한 연구)

  • Sung, Tae kyung
    • Journal of Service Research and Studies
    • /
    • v.10 no.1
    • /
    • pp.69-83
    • /
    • 2020
  • The purposes of this study is to identify the critical success factors for the 4th industrial revolution through literature review and to empirically evaluate the validity of these factors through questionnaires from executives engaging in the industries of the 4th industrial revolution. Literature review identifies leadership, change management, top management support, strategic fit, training, empowerment, teamwork, organizational culture, communication, and project management as ten critical success factors, Questionnaires were administered to CIOs and CEOs in the industries belong to the 4th industrial revolution. Response rate was 64.4% which shows quite high participation. Respondents rated strategic fit as the most important factor, followed by top management support, leadership, change management, project management, teamwork, communication, training, organizational culture, and empowerment. To successfully pursue the 4th industrial revolution, the followings are recommended. (1) detailed and refined execution strategy, (2) establishment of effective network among government, public companies, research institutes, universities, and industries, (3) strategic and long-term plan, (4) differentiated execution strategy from other countries and global cooperation system.