• Title/Summary/Keyword: Integration Security management

Search Result 148, Processing Time 0.024 seconds

Efficiency of Innovative Development Management: Interstate Assessment of the Economic Competitiveness in the Context of European Integration and Economic Security

  • Khodakivska, Olga;Ramos, Olena Ribeiro;Nechyporenko, Oleksandr;Tsiutsiupa, Svitlana;Krasnoshtan, Olexander;Mayovets, Yaryna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.67-72
    • /
    • 2021
  • The article identifies areas for effective management of innovative development. The competitiveness of the economy in the context of European integration and economic security is assessed. The level of innovative economy of some countries of the world is analyzed. The issue of attracting foreign investors to stimulate innovative production in Ukraine is raised. It is identified the need for the formation of an updated state policy capable of providing innovative development and improving the competitive position of the state in international rankings. Emphasis is placed on the need to form a critical mass of managers-civil servants capable of developing, implementing and monitoring the policy of innovative development of entrepreneurship.

Difficulties in ERP integration in Umm Al Qura University: A Case Study

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.35-43
    • /
    • 2024
  • The development and integration of Enterprise Resource Planning (ERP) systems have consistently attracted attention from software engineering researchers. Many studies have examined the factors that influence successful ERP integration, while others have focused on introducing integration models that address issues and challenges that affect the successful integration of ERP. However, it is crucial to recognize that the key player in successful integration is the individual involved. This paper aims to investigate how individuals based on departmental attachments and experiences have viewed the factors that affected the success of ERP integration. A case study was conducted at one large organization namely Umm Al Qura University, Saudi Arabia. Five departments were involved namely: Financial management, purchasing management, warehouse management, human resources management, and the Deanship of Information Technology. The results of 78 participants were collected and analyzed. Furthermore, it was different how individuals from different departments involved in the ERP integration viewed the factors that affected the success of integration. In addition, it was noticed that individuals with different experiences have various views on the factors. Moreover, it was evident that departmental attachments and individual experience might play a role in the successful integration of ERP.

클라우드 환경에서의 통합 보안관제 모델 연구 (A Study on Integration Security Management Model in Cloud Environment)

  • 변연상;곽진
    • 디지털융복합연구
    • /
    • 제11권12호
    • /
    • pp.407-415
    • /
    • 2013
  • 최근 다양한 IT 서비스 및 컴퓨팅 자원을 인터넷 기반으로 제공받을 수 있는 클라우드 환경에 대한 사용자들의 관심이 증가하고 있으며, 이에 따라 클라우드 환경의 보안에 대한 관심 또한 증가하고 있다. 클라우드 환경은 다양한 사용자들에게 적절한 서비스를 제공하기 위해 막대한 양의 IT 자원 및 서비스들을 클라우드 상에 저장하고 사용자의 요구에 따라 제공하기 때문에 저장된 데이터 및 자원들에 대한 무결성, 불법 유출, 위 변조와 같은 보안 사고를 예방하고 신속하게 처리할 수 있는 능력이 요구된다. 그러나 기존에 개발된 다양한 솔루션이나 연구결과들은 클라우드 환경을 고려하지 않고 개발 및 연구되었기 때문에 클라우드 환경에 접목시키기에는 다소 무리가 있다. 따라서 이러한 문제를 해결하기 위해 본 논문에서는 클라우드 환경에서 발생할 수 있는 다양한 보안 사고를 사전에 방지하고, 발생 시 신속하게 대응할 수 있는 유 무선 통합 보안관제 모델을 제안한다.

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

물리적 보안시스템 운용수준 분석 (Improvement of Physical security System Operation)

  • Chung, Taehwang
    • 한국재난정보학회 논문집
    • /
    • 제10권2호
    • /
    • pp.282-286
    • /
    • 2014
  • 본 논문에서는 90개의 시설을 대상으로 물리적 보안시스템 구축 및 운용수준에 대해 조사하여 결과를 분석하고 향상방안을 제시하였다. CCTV에 대한 구축수준과 운영수준이 출입통제시스템이나 침입감지시스템에 비해 높은 것으로 나타났으나 구축된 보안시스템에 대한 개선이나 유지 관리 수준이 낮게 나타나 구축 후 관리가 부족하게 나타났다. X-ray 검색기를 설치한 시설이 적게 나타났지만 이는 물품의 반입 반출을 검색에 대한 관심을 보여주는 것이라 할 수 있다. 물리적 보안시스템을 통합적으로 구축 운영 수준이 비교적 낮게 나왔는데, 물리적 보안시스템의 기능과 보안인력의 기능이 연계될 수 있도록 기술과 운영을 포함한 통합보안운영체계 구축을 확대하는 것이 필요하다. 출입통제시스템의 효과를 높이기 위하여 구역별 개인별로 세분화 된 형태로 출입통제시스템을 운용하고, 많은 인원의 출입을 동시에 통제할 수 있고 일정한 경계구역을 설정할 수 있는 스피드게이트와 RFID의 사용을 확대할 필요가 있다.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권8호
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

시큐리티 환경변화에 따른 융합보안의 대두와 물리보안업체의 대응 (A Study on the Development of Convergence Security with the Changes in Security Environments)

  • 안황권
    • 융합보안논문지
    • /
    • 제11권5호
    • /
    • pp.31-40
    • /
    • 2011
  • 시큐리티 환경이 급변하고 있다. 위협의 종류가 복합화 되고 다양한 채널과 방법으로 발생하고 있으며, 신종위협이 발생하고 있다. 또 보안기술이 비 IT산업에 활용되고 있고 정보통신기술과 스마트폰의 등장으로 비즈니스 환경이 변화하고 있다. 이에 적절하게 대응하기 위해 융합보안이 대두고 있다. 융합보안은 융합관제, 통합인증, 출력물보안 등의 형태로 진전되고 있다. 융합보안 시대를 맞이하여 물리보안 사업자도 보안환경 변화 속에서 새로운 비즈니스 기회를 찾아야 할 것이다.

Extenuating Food Integrity Risk through Supply Chain Integration: The Case of Halal Food

  • Ali, Mohd Helmi;Tan, Kim Hua;Pawar, Kulwant;Makhbul, Zafir Mohd
    • Industrial Engineering and Management Systems
    • /
    • 제13권2호
    • /
    • pp.154-162
    • /
    • 2014
  • Effects of food scandals on religious belief, human health and even on causes of death indicate that firms and consumers are vulnerable to integrity risks in the global supply chain. Mitigating the integrity risk and maintaining the credence quality products like halal food is very challenging, if not impossible. Our aim in this research is to show that supply chain integration can mitigate the halal food integrity risk. To illustrate this idea, we have conducted case studies and interviews in seven Malaysian chicken supply chain focal firms. We unpack the halal integrity risks along the supply chain, such as production risk, raw material risk, food security risk, outsourcing practices risk, service risk, and logistics risk. The research argues that supply chain integration, such as internal integration and external integration practices, could minimize the halal integrity risk. The advantages of supply chain integration in mitigating the halal integrity risk are also highlighted in this paper.

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • 제5권4호
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.