• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.039 seconds

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

The Payment Transaction Processor of Integrated Electronic Commerce Systems (통합 전자상거래 시스템의 지불 트랜잭션 처리기)

  • 강병도
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.91-95
    • /
    • 2002
  • Electronic commerce over the Internet is predicted to grow at an ever-increasing rate over the next few years, with on-line sales already heading for several billion. Many companies are using this new sales channel, and a few retailers now have established major on-line sales sites. There have been some successes, particularly in technology, business-to-business and niche markets. This paper has been produced to summarise the basics of electronic commerce system, covering on-line catalogues and on-line purchasing. Electronic commerce systems consists of the authoring tools and web applications, the electronic payment technology, and the security and transaction processing.

  • PDF

Three Dimensional Spatial Object Model

  • Lee, Sun-Jun;Kim, Sang-Ho;Lee, Seong-Ho;Chung, Jae-Du;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.885-890
    • /
    • 2002
  • As Geographic Information Systems represents three-dimensional topological Information, the systems provide accurate and delicate services for user. In order to execute three-dimensional topological operations, a dimensional transformation and heterogeneous spatial models should be used. However, the existing systems that use the dimensional transformation and the heterogeneous models, are not only difficult to operate the spatial operators, but also happened to support non- interoperability. Therefore, in order to support the spatial operation as well as interoperability between dimensions, we propose three-dimensional spatial operators for the proposed models. We defined the three-dimensional spatial operators prior to designing the proposed model. We also implemented the operators of proposed model and evaluated the implemented model on the component environment. Finally, the proposed model is able to not only support interoperability among systems but also execute spatial queries efficiently on three-dimensional spatial objects.

  • PDF

Development of Feeding System by Micro Particle Powder (마이크로 미립 이송시스템 개발에 관한 연구)

  • 박정수
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.105-110
    • /
    • 2003
  • The purpose of this paper is to development of micro particle powder feeding systems for the reduction of air leakage of the feeding system. Most of the powder-granule supply systems using compressed air supply have a large amount of air leakage interference. The results of this study lead to reduce air leakage rate by over 50% and to save production cos by. 60%.

  • PDF

A Study on Bureaucratic System of Library Organization (도서관조직의 관료제에 관한 연구)

  • Kim Jung Soh
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.15
    • /
    • pp.95-117
    • /
    • 1988
  • The purpose of this research is to analyze the characteristics of bureaucracy on library structure and then to review typologies and parthological phenomena, their following aspects of securities of library. The most important characteristics of library bureaucracy is its strong speciality and needs regurality and its hierarchic power systems. We can separate its systems from machine bureaucracy and professional bureaucracy. and the bureaucratic systems are attended with controls, observance of rules, and pathological phenomena by entrusting sombody with power, etc. To revise these pathological phenomena of the library structure, the following items must be included. First, librarians should be given with professional authority. Second, all librarians should participate in decision-making. Thirdly, it is desirable that the communication should upward communication and lateral communication much more preferable than downward communication. Fourthly, professional. librarians must be maintained with compensation systems. Fifthly, they must be 'PROACTIVE LIBRARIAN' who cope with any given circumstances.

  • PDF

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.

A study on Quality Evaluation of a of a systems based on SOA (SOA기반 시스템의 품질평가에 관한 연구)

  • Cheng, Zhichao;Kwon, YoungJik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.59-70
    • /
    • 2012
  • This paper provides a model which is used for SOA based system's quality evaluation. This model make evaluation with "Reliability, Usability, Efficiency, Usability and Maintainability", these five aspects which were reference from ISO/IEC 9126. A systems based on SOA was tested by this model in these five aspects. As the results of the evaluation this system satisfied 61.45% users including Service Requester and Service Registry.

A Proposal of the Authentication Protocol for Wireless Mobile Communication Systems Using Keyed Hash Function

  • Park, Young-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.1
    • /
    • pp.56-60
    • /
    • 2001
  • An authentication protocol for wireless mobile communication systems is proposed. The protocol employs the keyed hash function to provide mutual authentication and session key distribution. This makes the low computation power of mobile stations. To provide the security architecture with minimal assumption about the security of intermediate transport networks, this protocol has no assumptions about the security of the intermediate, fixed networks.

  • PDF

Coupling Measures for Classes in Object-Oriented System (객체 지향 시스템에서의 클래스 결합도 척도)

  • 이종석;천은홍
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.4
    • /
    • pp.22-29
    • /
    • 2001
  • As the importance of software measurement increases, there are more researches developing the new software measure. Given the importance of object-oriented development techniques, one specific area where this has occurred is coupling measurement in object-oriented systems. This thesis presents the coupling measure COM based on the methods and OOC based on the classes in measuring the coupling of object-oriented systems. And, it evaluates them using the coupling properties suggested by Briand while it compares them with other coupling measures by applying them to a system developed in the language of C++programming language.

  • PDF

LCC Analysis to Determine an Appropriate Apartment Rent Rate for HVAC System Renovation Projects

  • Kim, Dae Young;Lim, Hyoung-Chul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.5
    • /
    • pp.107-115
    • /
    • 2015
  • Residential building owners are turning toward renovating their existing buildings to improve old and inefficient HVAC systems. Due to the renovation, much of the added costs will inevitably be passed on to tenants by increasing rent rates. This increment often increases the vacancy rate in the buildings. To balance the interests of both owners and tenants, this paper suggested a method to determine an appropriate rental rate increment for the HVAC system renovation. A case study on residential buildings was conducted to determine a balanced point where the rental rate increment that offsets the amount tenants are willing to pay for the renovation. To calculate all costs incurred by the renovation, life-cycle cost analysis was carried out. Therefore, this paper ultimately provides a threshold value of rental rate increment such that building owners can make a reasonable decision on the HVAC system renovation.