• Title/Summary/Keyword: Security essential information

Search Result 491, Processing Time 0.034 seconds

Study on SBOM(Software Bill Of Materials) adoption in domestic companies :Focusing on the moderating effect of management support and institutional support (국내기업 대상 SBOM (Software Bill Of Materials) 도입에 관한 연구 : 경영층의 지원과 제도적 지원의 조절 효과를 중심으로)

  • Ryu Han Min;Lee Sin-Bok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.279-288
    • /
    • 2024
  • With the development of ICT, the use of software has become essential for organizations to exchange information or manage operations. However, security and software management issues that have increased with the development of ICT are issues that need to be continuously addressed. In 2021, the U.S. government has standardized and established SBOM as one of the countermeasures for software security. This research was initiated as a study to lay the groundwork for the introduction of SBOM in Korea. Based on the effects of SBOM characteristics on adoption intention, we tested management support and institutional support as moderating variables. As a result, security management was found to be a significant moderating variable for management support, and transparency was found to be a significant moderating variable for government institutional support. This study verified that SBOM adoption requires both corporate and government efforts, and the variables that are important from each perspective are different. We hope that this study will contribute to the development and adoption of SBOM.

Efficient Digital Video Recording / Searching / Internet-Streaming Techniques for Multi-Channel DVR Systems (다채널 DVR 시스템을 위한 효율적인 디지털 비디오 저장 탐색 및 인터넷 전송 기술)

  • Shin, Tae-Hyun;Lee, Jae-Sung;Shin, Hyun-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.959-962
    • /
    • 2005
  • Efficient video data storage and search techniques are essential for DVR-based security systems. We have designed appropriate data structures and search techniques for efficient image storage and search, in this study. The date and time can be saved and searched as a folder form. The overall system is designed for MPEG4 CODEC. It can handle variable sizes of frames (100bytes $^{\sim}$ 6Kbytes) produced by MPEG4 CODEC without errors. We also have developed image transmission techniques through inter-net networking.

  • PDF

A Study on the Internet Based Cooperation-Design system for Ship Design (선박설계를 위한 인터넷기반의 협동설계시스템에 관한 연구)

  • 조민철;박제웅;이근무;김영훈
    • Journal of Ocean Engineering and Technology
    • /
    • v.15 no.4
    • /
    • pp.80-85
    • /
    • 2001
  • The early construction of the internet based ship basic planning supporting system based on the concurrent engineering and the internet technology is essential as a means for the improvement of technology and design productivity our ship building industry is facing currently. Further more, technological base construction for the construction for the construction of the cooperation system on the level of ship building industry is necessary for the technological base security to maintain and develop ship building industry continuosly in the 21st century of the information industry environment and for the technological improvement of the middle and small shipyard falling behind relatively and finally for the breaking through our ship building industry environment in which inter-enterprise competition is deeping. In this study, we designed the frame-system of the ship design supporting system and presented the development scenario based on core element technology.

  • PDF

The Design for the Web Based Cluster System Accounting applying SEED (SEED를 이용한 Web기반 클러스터시스템 어카운팅 설계)

  • 오충식
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.113-119
    • /
    • 2003
  • Both the highly developed computing environment and the rapid increase of the internet users enable the present web based cluster system accounting service to help many users access to numerous data at high speed. However, the information security of users and data is also as important as the convenience of the systematic environment. Especially, the significance of damage to the individuals and organizations resulted from the data outflow, hacking and malicious coding has risen up to one of the most essential problems in the internet service business. In this study, I suggest a more safe web based cluster system accounting service solution applying SEED, the Korean Telecommunications Technology Association (TTA) standard encryption algorithm.

  • PDF

The Trends of Domestic SI Industry and Promotion Strategies for the CALS Model Projects (국내 SI업체의 동향 및 CALS 시범사업 추진전략)

  • 정기원;임춘성;정동길
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.131-151
    • /
    • 1997
  • The CALS/EC is the world-wide accepted concept and its application domain is being expanded continuously throughout the private and public sectors. One of the essential points for realization of CALS/EC is to promote the domestic system integration(SI) industry. This paper describes the present status of the domestic SI companies and the clues to solve their facing problems. In order to evaluate the status of the current SI technology, the MBNQA(Malcom Baldridge National Quality Award) is adopted. The surveyed results show that the average levels of 14 SI companies over 7 evaluation criteria turn out to be 30% through 40% point. The major projects' activities of the SI companies on the information systems over the areas of trade, science and technology, industrial manpower, health and welfare, national security, etc are explained. Also, the competitive power of the SI companies is also discussed. As a target sample, the Korea Telecom(KT) CALS model project is described in terms of its Progresses and Problems. Furthermore, the strategic plans and detailed research items are proposed to resolve on-going issues.

  • PDF

An Empirical Study on Managerial Factors Affecting Performance of Defense R&D Projects (국방연구개발 사업성과에 영향을 미치는 사업관리 요인에 관한 실증연구)

  • Pyun, Wan-Joo;Kim, Sung-Kun;Lee, John-Hearn
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.223-244
    • /
    • 2009
  • Defense R&D is an essential investment for the national security. Recently our nation has also begun to initiate a number of defense R&D projects. As a lot of fund and resources are allocated to these projects, we need to identify which projects to initiate and then how to manage these projects well. Though there have been a number of studies on R&D projects in commercial sector, there are only a few studies in defense R&D sector. Moreover, these existing defense R&D studies mainly deal with the former issues, which are occurring at the stage of project planing. We are more concerned with project management issues, such as how to manage projects that had already been evaluated to undertake at the planning stage. Specifically our study aims to identify project management factors leading to the success of defense R&D projects. Results of the empirical analysis indicate that management support, user-driven requirements management, and project planning capability are key elements for project performance.

  • PDF

A Study of an Effective Database Design Method for Power System Protection (효율적인 계통보호 데이터베이스 디자인 방법에 관한 연구)

  • Ahn, Y.T.;Choi, M.S.;Lee, S.J.;Kang, S.H.;Kim, H.P.;Choi, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.905-907
    • /
    • 1998
  • The setting of protective relays, which is critical to the system security, requires a huge volume of data and a lot of repetitive calculations. Since an effective design of a database is essential. The relay setting database must accommodate a variety of protective devices. Also its information can be viewed and updated with easy by humans and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper develops an effective database for power system protection with their advantages.

  • PDF

Analysis of AI Content Detector Tools

  • Yo-Seob Lee;Phil-Joo Moon
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.154-163
    • /
    • 2023
  • With the rapid development of AI technology, ChatGPT and other AI content creation tools are becoming common, and users are becoming curious and adopting them. These tools, unlike search engines, generate results based on user prompts, which puts them at risk of inaccuracy or plagiarism. This allows unethical users to create inappropriate content and poses greater educational and corporate data security concerns. AI content detection is needed and AI-generated text needs to be identified to address misinformation and trust issues. Along with the positive use of AI tools, monitoring and regulation of their ethical use is essential. When detecting content created by AI with an AI content detection tool, it can be used efficiently by using the appropriate tool depending on the usage environment and purpose. In this paper, we collect data on AI content detection tools and compare and analyze the functions and characteristics of AI content detection tools to help meet these needs.

An Implementation of the Host-based DBMS Simulator for Developing Switching System Software (교환기 소프트웨어 개발을 위한 호스트 기반 데이터베이스 시뮬레이터의 구현)

  • Park, Young-Ho;Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.231-239
    • /
    • 2006
  • For such large-scale software as for operating a switching system, the use of real-time databases is essential for data exchanges among various functions and their data processing. Under the environment of developing the DBMS software for a switching system, the application program including database manipulations is first developed on a host computer and then the developed program is loaded into a switching system for its tests. To make it possible for DBMS manipulation software to be developed on a host computer rather than a switching system itself, we developed a host-based DBMS simulation system(HDBMS). In this paper we presented the roles and functions of HDBMS, its system structure, and the technical details for implementing HDBMS.

  • PDF

A Systematic Design Automation Method for RDA-based .NET Component with MDA

  • Kum, Deuk Kyu
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.69-76
    • /
    • 2019
  • Recent Enterprise System has component driven real-time distributed architecture (RDA) and this kind of architecture should performed with satisfying strict constraints on life cycle of object and response time such as synchronization, transaction and so on. Microsoft's .NET platform supports RDA and is able to implement services including before mentioned time restriction and security service by only specifying attribute code and maximizing advantages of OMG's Model Driven Architecture (MDA). In this study, a method to automatically generate an extended model of essential elements in an enterprise-system-based RDA as well as the platform specific model (PSM) for Microsoft's .NET platform are proposed. To realize these ideas, the functionalities that should be considered in enterprise system development are specified and defined in a meta-model and an extended UML profile. In addition, after defining the UML profile for .NET specification, these are developed and applied as plug-ins of the open source MDA tool, and extended models are automatically generated using this tool. Accordingly, by using the proposed specification technology, the profile and tools can easily and quickly generate a reusable extended model even without detailed coding-level information about the functionalities considered in the .NET platform and RDA.