• Title/Summary/Keyword: Shared Information

Search Result 2,137, Processing Time 0.032 seconds

Measuring CSV Performance: An Explorative Study on Strategic Activities in Converged Home Appliance Industry (공유가치창출을 위한 가전산업의 전략적 활동 및 성과 측정에 관한 연구)

  • Lee, Hye Sun;Park, Soo Kyung;Cho, Ji Yeon;Kim, Taisiya;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.117-126
    • /
    • 2015
  • The concept of Creating Shared Value (CSV) has emerged as a solution for companies' sustainable growth and social problems through collaboration of business activities and social demand. Therefore, studies on shared value creativity and measurement of companies' performances are required. However, most recent studies have applied the CSV concept to existing business models or measure shared value considering only economic value. Few studies have considered the appropriateness of applying the CSV or discussed performance measurement with respect to industry characteristics. This study selects the industry expected to have the greatest created value with applying the CSV, and then suggests measurement of performance in this industry. First, through the expert interview, the study selects one from among South Korea's 10 main industries, which is expected to solve social demand through convergence with the IT industry, and to create new value for a traditional industry. The Home Appliance industry was selected as appropriate, because it has industrial growth stagnation under the smart environment. Moreover, it is facing problems such as energy savings and environmental issues. The study goes on to suggest, based on Michael Porter's three strategic levels, measurement variables of the value creation process and performance. This study has limitations from an empirical perspective. However, as the interest of applying CSV to business is growing, it is meaningful to explore the CSV strategies activities and measurement performance based on industry-specific characteristics.

A Shared Electronic Medical Record for Lung Cancer Clinic (폐암 클리닉을 위한 공유 전자의무기록)

  • Kim, Kyu-Sik;Park, Eun-Sun;Kim, Seung-Seok;Kim, Hyung-Woo;Kim, Young-Chul;Bom, Hee-Seung;Ahn, Sung-Ja;Na, Kook-Joo;Kim, Yun-Hyeon;Kim, Yu-Il;Lim, Sung-Chul;Moon, Jai-Dong
    • Tuberculosis and Respiratory Diseases
    • /
    • v.59 no.5
    • /
    • pp.480-486
    • /
    • 2005
  • Since the year 2000, lung cancer has become the leading cause of cancer death in South Korea as in many other parts of the world. The current multidisciplinary approach for lung cancer includes a wide range of modalities, not only surgery, radiotherapy, medical drug therapy but also pain control, as well as social and psychological support. Therefore, thoracic surgeons, radiologists, nuclear medicine specialists, anesthetists, psychologist, nurses and social workers as well as medical doctors care for lung cancer patients. Sharing a common treatment protocol and optimal communication are vital aspects of shared care both from a medical and cost-effectiveness point of view. We developed a shared electronic medical record (SEMR) for treating patients with lung cancer in a university hospital to facilitate the sharing protocols and communications between doctors involved in a lung cancer clinic. A SEMR system was developed within a order communication system(OCS) for a lung cancer clinic. The records of radiological, laboratory and pathological studies as well as the records of surgery, chemotherapy, and radiotherapy were stored and presented to all doctors who treat the same patient. Every doctor was allowed to change his/her own records. They could review other doctor s records but could not alter them. With the SEMR, it was expected that the time to complete the medical records for one patient could be reduced because it was easy to review all the data from the other doctors who share the same patient. In addition, the confidence of the doctors who share a common treatment protocol would be higher. Therefore, a shared electronic medical record is expected to improve the quality of patient care.

Theorization and Utilization of Smart Tourism Ecosystems (스마트 관광 생태계의 이론화와 활용)

  • Koo, Chulmo;Kim, Jeong Hyeon;Chung, Namho
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.69-87
    • /
    • 2014
  • The integration of Tourism and Information Communication Technology (ICT) has been continued based on a drastic progress of ICT in the entire sectors of tourism industry. A variety of terminologies such as eTourism, Virtual Tourism, Smart Tourism have appeared during the last decades, however, tourism with Smartphones created a new paradigm has not discussed yet in tourism industry and academia. By investigating on the previous literature in the role of ICT in tourism, we have classified five major streams in the past such as end user perspective (tourist behaviour), Community, Multimedia and Web, Intelligent System, and Smart Tourism. At a result, we investigated the concept of smart tourism and extended to research on Smart Tourism Ecosystems. We suggest the concept of smart tourism ecosystems, which may create values by interacting among tourism players (tourist, distribution channel, supply channel, government, and local community). We propose the discussion of meaning of 'creating shared value' through 'Smart Tourism Ecosystems'.

A method for the protection of the message in social network service(SNS) using access control and hash-chain (SNS에서 접근제어 및 해시체인을 이용한 메시지 보호 기법)

  • Jeong, Hanjae;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • As social network service(SNS) has grown rapidly, the variety information being shared through SNS. However, the privacy of individuals can be violated due to the shared information through a SNS or the post written in the past at the SNS. Although, many researches concerned about it, they did not suggest key management and access control especially. In this paper, we propose the method for the protection of the message in SNS using access control and hash-chain.

lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments

  • Hoonyong Park;Jiyoon Kim;Sangmin Lee;Daniel Gerbi Duguma;Ilsun You
    • Journal of Internet Technology
    • /
    • v.22 no.5
    • /
    • pp.1069-1082
    • /
    • 2021
  • The Internet of Things (IoT) is vulnerable to a wide range of security risks, which can be effectively mitigated by applying Cyber Threat Intelligence (CTI) sharing as a proactive mitigation approach. In realizing CTI sharing, it is of paramount importance to guarantee end-to-end protection of the shared information as unauthorized disclosure of CTI is disastrous for organizations using IoT. Furthermore, resource-constrained devices should be supported through lightweight operations. Unfortunately, the aforementioned are not satisfied by the Hypertext Transfer Protocol Secure (HTTPS), which state-of-the-art CTI sharing systems mainly depends on. As a promising alternative to HTTPS, Ephemeral Diffie-Hellman over COSE (EDHOC) can be considered because it meets the above requirements. However, EDHOC in its current version contains several security flaws, most notably due to the unprotected initial message. Consequently, we propose a lightweight end-to-end privacy-preserving security protocol that improves the existing draft EDHOC protocol by utilizing previously shared keys and keying materials while providing ticket-based optimized reauthentication. The proposed protocol is not only formally validated through BAN-logic and AVISPA, but also proved to fulfill essential security properties such as mutual authentication, secure key exchange, perfect forward secrecy, anonymity, confidentiality, and integrity. Also, comparing the protocol's performance to that of the EDHOC protocol reveals a substantial improvement with a single roundtrip to allow frequent CTI sharing.

An Extended Real-Time Synchronization Protocols for Shared Memory Multiprocessors (공유메모리 다중 프로세서 실시간 시스템에서의 동기화 프로토콜)

  • Kang, Seung-Yup;Ha, Rhan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.136-138
    • /
    • 1998
  • 작업들이 자원을 공유하는 경우 예측하기 어려운 지연시간이 발생한다. 다중 프로세서 시스템에서의 자원공유로 인한 지연시간은 더욱 예측하기 어렵다. 실기간 시스템의 스케줄 가능성 검사를 위해서는 이러한 지연시간을 정확히 예측해야한다. 선점가능한 우선순위 구동 CPU 스케줄링 알고리즘에 의해서 다른 우선순위의 작업과의 동기화는 우선순위 역전 문제를 야기한다. 본 논문에서는 다중 프로세서에서의 동기화 프로토콜을 제안하고 작업의 지연시간을 분석한다. 다른 프로세서에 할당된 작업들이 수행중인 자원을 요구할 때, 자원을 수행하는 작업의 우선순위를 높여줌으로써 자원수행을 빠르게 종료하게 한다. 이로 인해 자원에 의한 지연을 최소화한다. 특히, 높은 우선순위 작업의 경우 더욱 작은 지연시간을 갖게한다. 시뮬레이션을 통한 Shared Memory Protocol [5]과의 비교, 분석 결과 성능의 향상을 보임을 알 수 있다. 다양한 작업집합에 대한 지연시간을 분석하였다.

  • PDF

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

Design of a Consistency Algorithm for VOD Streaming Data (VOD 스트리밍 데이터를 위한 Consistency 알고리즘 설계)

  • Jang Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1414-1421
    • /
    • 2006
  • This paper proposes a consistency algorithm that is able to serve streaming data efficiently in VOD system. The media data is stripping into several pieces of data by the Round Robin method in order to media data service. The barrier mechanism is changed into the minimum data factor(SH. GOP) in this paper. The shared memory is allocated at one host with one fragment size. Data is combined with RTP packet transmission data format using barrier mechanism. I experiment and program the suggested algorithm on the VOD system.

A QoS of Delay supporting Scheme for IP Multicast Routing (인터넷 멀티캐스트 라우팅에서 지연시간에 대한 QoS를 지원하는 방법)

  • Park, Se-Hun;Ahn, Sang-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.498-507
    • /
    • 2001
  • For the Internet multicast routing, there are some protocols researched. This paper presents a new protocol called DPIM (Delay-bounded PIM) to support QoS of delay in multicast routing. This protocol is based on PIM-SM. When the specified delay bound is not satisfied by dynamic membership, the RP (Rendezvous Point) of shared tree is changed and the shared tree is reconstructed. Therefore, the QoS of delay is always supported in this protocol. Through performance analysis and comparison with other protocol, we certify that this protocol is pertinent.

  • PDF

A Parallel Task Oriented Memory Manager for Dynamic Objects (동적 객체에 대한 병렬 타스크 중심의 메모리 관리기)

  • Kim, Eun-Jeong;Bae, Jong-Min
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1391-1400
    • /
    • 1997
  • 공유 메모리 다중 프로세서상에서 많은 동적 객체를 생성하는 언어가 실행될 때, 동적 객체에 대한 메모리 관리 알고리즘은 프로그램의 실행 속도에 큰 영향을 미친다. 본 논문에서는 이러한 환경에서 프로그램의 성능을 향상 시킬 수 있는 새로운 메모리 관리 알고리즘을 제안한다. 이를 위해 힘 영역의 할당 및 회수 작업을 병렬 타스크 중심으로 행한다. 또한 동적 객체를 병렬 타스크사이에 공유 되는 객체(shared data) 와 비공유 객체(mon-shared data)로 구분하고, 힘 영역을 공동 영역과 전용 영역으로 분리 한다. 이는 병렬 타스크가 동적으로 스케줄링되는 것을 자유롭게 하고 창조 지역성 을 높이는 효과가 있으며, 전용 영역에 대한 메모리 재사용으로 인하여 볼용 셀수집기의 수행 횟수를 줄일 수 있다.

  • PDF