• Title/Summary/Keyword: Security technologies

Search Result 1,856, Processing Time 0.025 seconds

APPLICATION OF PROJECT MANAGEMENT: LEAN TECHNOLOGIES AND SAVING MANUFACTURING (ASPECTS OF MANAGEMENT AND PUBLIC ADMINISTRATION)

  • Kulinich, Tetiana;Berezina, Liudmyla;Bahan, Nadiia;Vashchenko, Iryna;Huriievska, Valentyna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.57-68
    • /
    • 2021
  • Successfully adapting to digital and customer-oriented transformation, the concept of lean manufacturing professes the philosophy of creating greater benefit while minimizing losses. These losses are operations that do not add value in the production process to ensure the efficiency, flexibility, and profitability of projects. In the context of broad automation and digitalization of all sectors of the economy, mechanisms for combining automation technologies and lean production are becoming available. Moreover, when it comes to the efficient use of financial, human, or material resources, it is clear that the use of Industry 4.0 technologies can be an effective tool for achieving the goals of lean production, as many of them pursue the same goal. In this context, this article aims to study the effectiveness of the implementation of project management concepts at the global level and identify the main factors influencing its effectiveness to ensure the achievement of lean production through LEAN technologies and Industry 4.0 technologies. To achieve this goal, several statistical indicators were selected and several statistical methods of analysis were used: pairwise correlation, regression analysis, methods of comparison, synthesis, and generalization. Statistical analysis was conducted according to a survey conducted by the Project Management Institute (PMI) in 2020. An economic-mathematical model of dependence of project effectiveness in different regions of the world on the level of implementation of project management approaches is built, which shows that the increase in project effectiveness by 85% is due to financial losses, technical training, and consumer orientation. These results allow project managers to develop appropriate strategies to improve project management approaches at all levels. It is established that LEAN technologies and technologies of Industry 4.0 have several tools that have a positive effect on minimizing losses following the concept of lean production. Besides, given that the technology of Industry 4.0 is focused on the automation of Lean Production technology, a mechanism for the introduction of lean production using these technologies and methods.

Application of Information Technologies to Improve the Quality of Services Provided to the Tourism Industry Under the COVID-19 Restrictions

  • Iudina, Elena Vladimirovna;Balova, Suzana L.;Maksimov, Dmitrij Vasilievich;Skoromets, Elena Klimentinovna;Ponyaeva, Tatyana Anatolyevna;Ksenofontova, Ekaterina Andreevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.7-12
    • /
    • 2022
  • The modern stage of society's development is characterized by the rapid penetration of information technologies into all spheres of life. Their use contributes to improving the quality of tourism services, as well as the competitiveness of tourism industry enterprises. The role of information technology in tourism is growing more and more every year, which determines the relevance of the study of modern trends in the use of information technology in the tourism sector. The purpose of the study is to determine the possibilities of using information technologies to improve the quality of services provided to the tourism industry under the COVID-19 restrictions. The article systematizes the main approaches to the "cluster" category and provides an original definition of the "regional tourist cluster" concept. Based on an expert survey, the main trends in the introduction of information technologies in the tourism industry under the COVID-19 restrictions have been identified, which include virtual reality and augmented reality, speech recognition technologies, photo, video, audio (contactless control technologies), mobile IT applications and Big Data technologies. It has been concluded that the vast majority of improvements in the organization of tourism services under restrictions will be based on the organization of virtual solutions and online activities. The types of tourism services will also change, and information technology will help their development and dissemination.

Optimization of Information Security Investment Considering the Level of Information Security Countermeasure: Genetic Algorithm Approach (정보보호 대책 수준을 고려한 정보보호 투자 최적화: 유전자 알고리즘 접근법)

  • Lim, Jung-Hyun;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.18 no.5
    • /
    • pp.155-164
    • /
    • 2019
  • With the emergence of new ICT technologies, information security threats are becoming more advanced, intelligent, and diverse. Even though the awareness of the importance of information security increases, the information security budget is not enough because of the lack of effectiveness measurement of the information security investment. Therefore, it is necessary to optimize the information security investment in each business environment to minimize the cost of operating the information security countermeasures and mitigate the damages occurred from the information security breaches. In this paper, using genetic algorithms we propose an investment optimization model for information security countermeasures with the limited budget. The optimal information security countermeasures were derived based on the actual information security investment status of SMEs. The optimal solution supports the decision on the appropriate investment level for each information security countermeasures.

A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.504-515
    • /
    • 2008
  • Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.

  • PDF

A Study of VoIP Secure Gateway (VOIP 보안 게이트웨이에 관한 연구)

  • Park Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.237-244
    • /
    • 2005
  • IP-Internet Telephony Service has not vet been achieved that of operating an IP-PBX service and a consumer Internet telephone services using VoIP technologies. In this paper, i suggest that the technologies of the VoIP Secure Gateway have connecting and securing for IP-Internet Telephony Service which makes If telephony protocols, firewall VPN tunneling, using Application Level Gateway, connection of the VoIP Secure Gateway. I suggest of telecommunication technologies that are enables an enterprise If-PBX service to interoperate with a consumer IP telephony service through a firewall. Also, I have proposed the solutions of security problems which was the security for VoIP Secure Gateway.

  • PDF

Network Analysis of Korean legislators using Bipartite Network Projection (입법 발의안을 통한 대한민국 국회의원 네트워크 분석)

  • Lee, Ji-Yeon;Jo, Hyun-Joo;Yoon, Ji Won
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.103-110
    • /
    • 2014
  • In study we analyze the network about the legislators in Korean National Assembly. We focused on 17th National Assembly since there were full of important changes in composition. Mutual cooperation is necessary to pass the bills beyond their given mission in legislation. In order to find out the relationship of legislators based on the introducing bills, total 5728 bills in 17th National Assembly, we used bipartite network projection. We can find who is a highly influential legislator and the difference between a ruling party and a main opposition party in aspects of cooperative behavior.

Efficient Masked Implementation for SEED Based on Combined Masking

  • Kim, Hee-Seok;Cho, Young-In;Choi, Doo-Ho;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.33 no.2
    • /
    • pp.267-274
    • /
    • 2011
  • This paper proposes an efficient masking method for the block cipher SEED that is standardized in Korea. The nonlinear parts of SEED consist of two S-boxes and modular additions. However, the masked version of these nonlinear parts requires excessive RAM usage and a large number of operations. Protecting SEED by the general masking method requires 512 bytes of RAM corresponding to masked S-boxes and a large number of operations corresponding to the masked addition. This paper proposes a new-style masked S-box which can reduce the amount of operations of the masking addition process as well as the RAM usage. The proposed masked SEED, equipped with the new-style masked S-box, reduces the RAM requirements to 288 bytes, and it also reduces the processing time by 38% compared with the masked SEED using the general masked S-box. The proposed method also applies to other block ciphers with the same nonlinear operations.

An Efficient Key management for Wireless Sensor Network (무선센서 네트워크를 위한 효율적인 키 관리 연구)

  • Park, Sung-Kon
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.129-139
    • /
    • 2012
  • Recently, the smart sensor technologies are rapidly developing in accordance with the technology of implementation in small-size, low-cost, and low power consumption. With these sensor technologies, especially with MEMS and NEMS, the researches on the WSN are actively performing. For the WSN, a network security function is essential even it requires high physical resource level. But the WSN with the smart sensor technologies could not be provided with enough resources for the function because of limited size, computing-power, low-power, and etc. In this paper, we introduce security and key-management protocols of WSN.

Trends in Data Privacy Protection Technologies with Enhanced Utilization (활용성 강화 데이터 프라이버시 보호 기술 동향)

  • Kim, J.Y.;Jho, N.S.;Chang, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

Implementation of Advanced IP Network Technology for IPTV Service

  • Joo, Young-Do
    • Journal of Information Processing Systems
    • /
    • v.5 no.1
    • /
    • pp.25-32
    • /
    • 2009
  • It is absolutely essential to implement advanced IP network technologies such as QoS, Multicast, High Availability, and Security in order to provide real-time services like IPTV via IP backbone network. In reality, the existing commercial networks of internet service providers are subject to certain technical difficulties and limitations in embodying those technologies. On-going research efforts involve the experimental engineering works and implementation experience to trigger IPTV service on the premium-level IP backbone which has recently been developed. This paper introduces the core network technologies that will enable the deployment of a high-quality IPTV service, and then proposes a suitable methodology for application and deployment policies on each technology to lead the establishment and globalization of the IPTV service.