• Title/Summary/Keyword: SMB Information

Search Result 1,655, Processing Time 0.024 seconds

A Study of Successful IT Outsourcing model for SMB

  • Jeong, Seon-Phil;Kim, Yeong-Real
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.301-304
    • /
    • 2005
  • Most of the small and medium industries rather focus on immediate problems and how to properly maintain organizational matters and existing system than the strategic and operational use of Information Technology when they deal with applications and operation of Information System. This study found out that there were few studies on IT outsourcing for small and medium companies in Korea compared to large enterprises' IT outsourcing. Most preceding studies researched the problems of partnership and technical, managerial, and economical success factors for big companies. Small and medium companies have the problems of financial difficulty, organizational scale (40.3%), shortage of manpower for system operation (24.1%), and lack of practical use of managers (8.9%). SMB firms have required support of government for their Informationalization but, we found out amount of companies (41%) not be informed or don't account on government's supporting IT of SMB programs. In addition, Range and Contents of outsourcing, Reputation of Outsourcing vendor, Reliability of maintaining were selected as CSFs of SMB IT outsourcing. While large corporation staff more considered CEO's willing and inner facts of their companies.

  • PDF

A Study on the Improved Proposal of SMB Enterprises IT Supporting Policy (중소기업 정보화 A/S지원사업의 정책 개선에 관한 연구)

  • Kang Min-Shik
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.2
    • /
    • pp.133-138
    • /
    • 2005
  • The South Korean Government had supported the IT implementation of 30,000 SMB(Small and Medium-sized) enterprises from '2000 to '2003 for the purpose of the competitiveness of SMB enterprises. However, the utilization rate of If package is very low. This paper recommanded the improved suggestion of the existed policies of the following service of the SMB industry's information technology implementation. There are industry-university cooperation program, efficient on-offline integration system, the development of SMB industry's IT performance measure evaluation index and so on.

Economic Value Analysis of Supercomputing Service for Small and Medium-sized Businesses (중소기업 슈퍼컴퓨팅 서비스의 경제적 가치 분석)

  • Kim, Jae-Sung;Lee, Sang-Min;Kim, Myung-Il;Jang, Jin-Gyu
    • IE interfaces
    • /
    • v.23 no.4
    • /
    • pp.319-326
    • /
    • 2010
  • The SMB supercomputing service provides a supercomputing infrastructure for Small and Medium-sized Business (SMB) to enhance the efficiency of product development activity. In this study, the economic value of SMB supercomputing service is presented. The economic value of service is comprised of a direct and an indirect economic value. A direct economic value was estimated based on the result of user survey on service effectiveness. The input-output analysis method was adopted to estimate an indirect economic value induced from a direct economic value. The future economic value based on the result of user demand survey is also presented. As a result, the annual and future economic value of service were estimated about 55,215 million won and 323,928 million won, respectively.

A study on the success factors in the Enterprise Information Systems introduced (기업 정보시스템 도입 시 성공 요인에 관한 연구)

  • Shin, Jong-Chang;Kim, Kyung-Ihl
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.1-8
    • /
    • 2016
  • In this study, we must investigate what the major success factors that should be considered before introducing to successfully achieve the goal of building enterprise information systems. To evaluate the factors significantly affecting among the success factors. This study is to present by analyzing the typical success factors affecting successful introduction of the system information to companies that lack sufficient information and reviews for the introduction of enterprise information systems.

Effective Countermeasure to APT Attacks using Big Data (빅데이터를 이용한 APT 공격 시도에 대한 효과적인 대응 방안)

  • Mun, Hyung-Jin;Choi, Seung-Hyeon;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.1
    • /
    • pp.17-23
    • /
    • 2016
  • Recently, Internet services via various devices including smartphone have become available. Because of the development of ICT, numerous hacking incidents have occurred and most of those attacks turned out to be APT attacks. APT attack means an attack method by which a hacker continues to collect information to achieve his goal, and analyzes the weakness of the target and infects it with malicious code, and being hidden, leaks the data in time. In this paper, we examine the information collection method the APT attackers use to invade the target system in a short time using big data, and we suggest and evaluate the countermeasure to protect against the attack method using big data.

Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey (중소기업 정보시스템의 공격예방 및 탐지를 위한 대응 : 서베이)

  • Mun, Hyung-Jin;Hwang, Yooncheol;Kim, Ho-Yeob
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.1-6
    • /
    • 2015
  • Small and medium-sized companies lack countermeasures to secure the safety of a information system. In this circumstance, they have difficulties regarding the damage to their images and legal losses, when the information is leaked. This paper examines the information leakage of the system and hacking methods including APT attacks. Especially, APT attack, Advanced Persistent Threats, means that a hacker sneaks into a target and has a latency period of time and skims all the information related to the target, and acts in the backstage and neutralize the security services without leaving traces. Because he attacks the target covering up his traces not to reveal them, the victim remains unnoticed, which increases the damage. This study examines attack methods and the process of them and seeks a countermeasure.

  • PDF

Aspects of Warfare in the Information Age - NCW Concerning (정보화 시대의 전쟁양상 - Network Centric Warfare(네트워크 중심 전쟁)을 중심으로)

  • Woo, Hee-Choul
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.45-50
    • /
    • 2016
  • This research suggests a method to contribute to the perfect execution of duty in prospective information warfare by inspecting network-based warfare, in which its basic concepts and efficient management plans are provided; it is especially important, due to growing focus on information warfare caused by sudden improvements on information technology which affects not only civil matters but international military affairs as well. For this purpose, this research scrutinizes on the chronological organization of warfare traits during the information age, and information-warfare execution, as well as its effects, thereby providing proper management plans for network-based warfare.

Basic Prototype Design and Verification of Hadoop Cluster based on Private Cloud Infrastructure for SMB (중소기업을 위한 프라이빗 클라우드 인프라 기반 하둡 클러스터의 기본 프로토타입 설계 및 실증)

  • Cha, Byung-Rae;Kim, Hyeong-Gyun;Kim, Dae-Gue;Kim, Jong-Won;Kim, Yong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.225-233
    • /
    • 2013
  • Recently, Cloud Computing and Big Data has become a buzzword in the field of IT. In this paper, as part of special efforts to support small businesses (SMB) in these situations, we designed the basic prototypes ver. 0.1, 0.2, and 0.5 for Hadoop cluster based on private cloud infrastructure and implemented the part of basic prototypes. And we verified the performances of the basic prototypes using ASA Dataset.

Design and Implementation of Companion to Improve Windows Shared Folders (윈도우즈 공유 폴더 기능 향상을 위한 도우미 설계 및 구현)

  • Yoon, Kyung Seob;Lim, Do Yeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.177-180
    • /
    • 2020
  • 윈도우즈(Windows)에는 서버 메시지 블록(SMB :Server Message Block) 프로토콜을 이용하여 폴더(Folder)를 공유(Share)할 수 있는 기능을 제공 하고 있다. SMB 프로토콜은 네트워크 상 존재하는 노드들 간에 자원을 공유할 수 있도록 설계된 프로토콜이다. 주로 네트워크에 연결된 컴퓨터끼리 파일, 프린터, 포트 또는 기타 메시지를 주고받는데 사용된다. 하지만 이 기능은 대부분 사람들이 잘 알지 못하고 설정 방법을 몰라 사용 하지 않는 경우가 많다. 본 논문에서는 이 공유 폴더 기능을 보다 쉽고 빠르게 설정 할 수 있도록 공유 폴더 기능 향상을 위한 도우미를 설계하고 구현 한다.

  • PDF

MetaData Configuration of Architecture Asset (아키텍처 자산의 메타데이터 구성)

  • Choi, Han-Yong
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.151-156
    • /
    • 2016
  • It has been constantly demanding for effective way to improve software development productivity and automation. In this paper, we did research to configure the component assets to reuse design information from the design phase domains based on the DMI. It is necessary abstracted information architecture of an independent platform development environment to reuse design information on the design stage. Also, It should be based on a well-designed to support the design architecture of the application domain. Therefore, in this paper, I want to use the DMI architecture that can be represented by formal level of architectural design information platform and application domain area. It is able to decomposition architecture asset with the part design information from the design phase composition or a high level of abstraction on DMI. Therefore, the metadata structure of the asset architecture will support a structure which can reuse the structure-based design of the domain areas.