• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.026 seconds

On Study for the JIT System By CIM(Computer Integrated Mfg) (JIT실현을 위한 CIM구축 사례연구)

  • Lee, Jong-Hyung;Lee, Youn-Heui
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.7 no.4
    • /
    • pp.425-432
    • /
    • 2004
  • This study for Customer Satisfaction(Customer Focus) by Profit security' in the field Process improvement activity and man-power upgrade in the learning of organization activity or upgrading ability of each peoples. This thesis study on the focus of KAPEC which introduce Toyota system can apply to VM, 3jeong, Right Box and Right Position), 5S, JIT(Just In Time), KAlZEN, KANBAN System, CIM, ERP, DAS an output of Factory. For strategic changes to take place in industry 3 key important factors need to be included ; integration of tasks functions and process, decentralization of information and responsibility and finally simplification of products and product structures. These describes how CIM can be implemented using these factors. This study for (1)System Integration, (2) Help Logistic Problems, (3) Partly facilitated growth. (4) Improved production planning (5) Real-time management. (6) Fast reporting (7) Productivity. Quality. Delivery Up, Cost reduction and Autonomy management, FMS in the Plant etc.

  • PDF

The Customs Union between the European Union and Turkey and its Impacts on Turkey's Economy

  • Becker, Kip;Baki, Ibrahim;Lee, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.3 no.2
    • /
    • pp.41-49
    • /
    • 2016
  • Since World War II nations have formed alliances for reasons of security and trade. Countries have seen international integration as an appropriate approach to resolving domestic and international political issues, improving their welfare by both transforming their infrastructures and increasing their foreign trade. While the majority of these relationships are straightforward d Turkey's relationship with the European Union is more complex due to differences in religion and, at times, political ideology from other Union members. As a candidate country Turkey has made advances towards the full membership of the European Union with the customs union being the most significant. The impact of customs union membership is discussed and the effects of the customs union on Turkey's trade and economy are examined from a perspective of different economic theories.

A Study on the Model between the IRM and the Organizational Performance (정보자원관리(IRM)와 조직성과간의 이론적 연구모형)

  • Kim Jeong-Wook
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.1-14
    • /
    • 1999
  • Recently, information resource management(IRM) has a considerable interest among researchers and practitioners because the information resource have been found critical influence on organizational performance. The IRM construct has been defined a comprehensive approach to planning, organizing, controlling the resources, and activities associated with acquiring and distributing data to meet a business need. This study have several objectives: 1) to operationalize the measurement instrument of IRM, 2) to identify the factors influencing organizational performance, and 3) to suggest the research model between IRM and organizational performance and then 4) to provide reference for managers to assess the IRM implementation in their organization. By reviewing the literature, past experience, others' use, encouragement by others, and anxiety are selected as the factors influencing IRM. The IRM construct has been classified with eight dimensions : chief information officer, planning, security, technology integration, advisory committees, enterprise model, information integration, and data administration. Eight hypotheses concerning the relationship between each of the IRM and organizational performance are suggested in this study.

  • PDF

Integration of Cloud and Big Data Analytics for Future Smart Cities

  • Kang, Jungho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1259-1264
    • /
    • 2019
  • Nowadays, cloud computing and big data analytics are at the center of many industries' concerns to take advantage of the potential benefits of building future smart cities. The integration of cloud computing and big data analytics is the main reason for massive adoption in many organizations, avoiding the potential complexities of on-premise big data systems. With these two technologies, the manufacturing industry, healthcare system, education, academe, etc. are developing rapidly, and they will offer various benefits to expand their domains. In this issue, we present a summary of 18 high-quality accepted articles following a rigorous review process in the field of cloud computing and big data analytics.

A Study on Maturity Model of Information Integration System (정보연계 시스템의 성숙도 모델에 관한 연구)

  • Ha, Hyodong;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.570-578
    • /
    • 2019
  • In this era of big data, a variety of government organizations are trying to create new added value via Information Integration. Therefore, several projects related to government agencies' information sharing have activated system connection/integration. The risk factors of system operation, however, have increased as the volume of Information Integration System grows. The interference in information sharing is predicted to affect the operation of the agencies, and the issue will grow even worse with massive impact on civil society when the agency operation is interrupted due to system failures in terms of infrastructure, software, data quality, and security. Diverse studies related to the maintenance of Information System have been conducted, but there is currently no evaluation framework for the operational system of Information Integration between various government agencies. In this respect, this study distinguishes each of the Information System components, Data, IT, People, Process, systematizes with Plan-Do-See, and finally presents a maturity model for Information Integration. Nine derived processes were analyzed through interview and questionnaires from Information Integration System officials, further suggesting maturity stage applying CMMI. This model allows diagnosis of the maturity level of an Information Integration System, and is expected to be utilized as resource for improving organizational processes.

The Effects of Information Transfer of Personal Information Security Breaches (개인정보 유출의 정보전이 효과)

  • Park, Sang-Soo;Lee, Hyun-Chul
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

A study on Korean welfare policy examined through Mokminsimseo (목민심서를 통해 한국적 복지정책에 대한 연구)

  • kim Bong wha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.669-674
    • /
    • 2023
  • This study examined the specific contents of social welfare policies of the Joseon Dynasty through the analysis of Mokminsimseo, Aemin Sixjo and Jinhwang Yukjo, and identified the connection between them and today's social welfare policies. As a result, In the Care of the People, it contained the basic contents of the Elderly Welfare Act and welfare services for the elderly, and in the Freedom, it included welfare policy services related to infants and children, and the value system of welfare for the disabled through government affairs. The policy direction was confirmed, and it was found that disaster relief calls for social integration in response to social crises and disasters. This also confirmed that major areas of social welfare policy such as family safety, income security, health policy, and social integration have been emphasized through social welfare policy indicators. In addition, through the analysis of Qinhwangyukjo, it was found that it contains not only the basic ideology and values of the social security system and social insurance system in terms of visa, scale, and power, but also the details of specific policy implementation. Today's social welfare policies and social service policies, which are equipped with social welfare facilities and are implementing systematic social welfare services for each target, were able to confirm their foundation through the Qinhwangyukjo. This confirms that the emphasis on social integration and income security is prominent in the Qinhwangyukjo through the social welfare policy indicators of the current policy system.

Expand public interest of Private Security activities (민간경비 활동의 공익성 확대 논의)

  • Gong, Bae Wan;Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.3-10
    • /
    • 2014
  • Private security organizations are complementary to the national safety of life and property of individuals as a social role to play in maintaining peace and order. Pursuit of profit is to the public practice according to the logic of capitalist markets and customers seeking to protect the lives and property. However, the legal and institutional constraints of private security is being requirements inhibited by the development. Crime prevention as a private security role that the private companies, which will pursue the public interest. After all, the expansion of the private security crime is results in an increase in unit. The current level of private security in the 1970s remain, and the constraints is being under goodwill and expertise outside of the training system on the market. Variety of crimes, including cyber crime increases and considering the reality of the constraints on private security requirements are able to improve or supplement shall be realistic. In particular, the legal, regulatory and institutional factors must be improved, with goodwill, and for the creation of new industrial policy as a complement to the public interest should be also provided. The private security law interests through integration of private security guards should be guaranteed, and the term of the theorem, sales activities, ensuring the training of professional staff with professional qualifications system is to be settled. As a private security guard industry growth and development can be based on this composition.

Security Architecture Proposal for Threat Response of insider in SOA-based ESB Environment (SOA 기반 ESB 환경에서 내부 종단 사용자 위협 대응을 위한 보안 아키텍처 제안)

  • Oh, Shi-hwa;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.55-63
    • /
    • 2016
  • SOA(service oriented architecture) based ESB(enterprise service bus) model is widely adopted in many companies for the safe processing of enormous data and the integration of business system. The existing web service technologies for the construction of SOA, however, show unsatisfactory in practical applications though the standardization of web service security technologies is in progress due to their limitations in safe exchange of data. Internal end users using a large business system based on such environment are composed of the variety of organizations and roles. Companies might receive more serious damage from insider threat than that from external one when internal end users get unauthorized information beyond the limits of their authority for private profit and bad purposes. In this paper, we propose a security architecture capable of identifying and coping with the security threats of web service technologies arouse from internal end users.

A Decision-Making Model for Handling Personal Information Using Metadata (메타데이터를 활용한 개인정보 처리에 대한 의사결정 모델)

  • Kim, Yang-Ho;Cho, In-Hyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.259-273
    • /
    • 2016
  • After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more serious than external intrusions, financial companies in Korea have been taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financial environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and technical controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defines and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial supervisory authority, and to reinforce internal controls. We derive and verify a decision-making model that reflects the proposed process.