• 제목/요약/키워드: Supply Chain Security

검색결과 119건 처리시간 0.029초

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • 유통과학연구
    • /
    • 제20권7호
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

물류보안이 수출입 리스크관리에 미치는 영향에 관한 실증연구 (An Empirical Investigation on the Effect of Logistics Security in Import and Export Risk Management)

  • 이홍원;김재봉
    • 한국항해항만학회지
    • /
    • 제38권3호
    • /
    • pp.317-325
    • /
    • 2014
  • 우리나라 정부는 글로벌 보안 추세와 전쟁 및 테러리즘에 대처하기 위해 컨테이너 보안조치(CSI, 24시간 규칙 포함), 종합인증 우수업체(AEO) 등 다양한 보안 제도 및 보안 조치를 도입했다. 하지만 수출입 과정의 다양한 구성원들은 CSI, 24시간 규칙, AEO의 목적과 기능에 여전히 부정적이다. 이것은 보안 리스크를 수출입 과정의 장애나 방해 요인으로 여기고 있기 때문이다. 따라서 본 연구의 목적은 이러한 리스크를 규명, 측정, 평가하고 적절한 관리 방안을 제시함에 있다. 이를 위한 리스크규명과 리스크관리에 따른 성과 측정을 위해 선행연구 및 현장조사를 바탕으로 설문조사를 진행했다. 설문조사를 통해 대상 리스크를 상대적인 값을 구분하여 Key Risk, Major Risk, Minor Risk로 나눌 수 있었으며 각 리스크를 대상으로 분산분석을 실시하여 집단별 관리정도의 차이를 알아낼 수 있었다. 마지막으로 회귀분석을 통해 리스크관리 정도별 물류성과 검증을 실시하여 CSI 리스크관리가 물류 재무적 성과에 유의미한 영향을 미치며, CSI 리스크관리와 AEO 인증 리스크관리는 물류 서비스 성과에 유의미한 영향을 미치는 것을 알아낼 수 있었다.

중소기업의 블록체인 적용효과와 법제도 및 정책적 과제에 대한 융합적 연구 (A Study on the Effectiveness of Blockchain and Legal System and Policy Tasks for SMEs)

  • 안명구;박용석
    • 융합정보논문지
    • /
    • 제9권7호
    • /
    • pp.14-24
    • /
    • 2019
  • 블록체인의 활용이 금융서비스 등에서 우선적으로 진행되고 있고, 중소기업 분야의 경우 블록체인의 활용도와 효과성이 높은 분야로 거론된다. 본 연구에서는 중소기업에 블록체인을 적용했을 때 나타날 수 있는 효과성에 대해서 확인하고 적용 시 우선적으로 필요한 법제적 및 정책적 과제를 살펴보기 위한 논문이다. 이는 관련 주제를 함께 다룸으로서 그 도입에 대한 당위성을 알아보기 쉽게 하기 위함이다. 선행연구의 부족으로 다양한 논문과 보고서를 참고하였으며, 공급사슬관리 최적화, 서류작업의 간략화, 제품 생산성 향상, 자금 흐름 원활화 등의 긍정적 효과가 나타날 수 있다는 것을 확인했다. 또한 전자거래기본법, 전자상거래법, 전자금융거래법, 개인정보보호법에 관한 법제적 보완의 필요성을 확인했으며, 플랫폼 개발, 중소기업 대상 교육 제도, 거래 표준화 지침, 세금 감면 정책, 블록체인 연구 개발을 위한 정책적 보완의 필요성을 확인하였다. 향후 보다 광범위한 실무적인 연구와 구체적인 차원의 개별 법률 연구가 필요하다.

국제물류관리와 전자적물류정보의 경쟁요인에 관한 실증연구 (An Empirical Study on the Competition Factor Electronic Logistics Information and International Logistics Management)

  • 곽현
    • 통상정보연구
    • /
    • 제9권2호
    • /
    • pp.257-283
    • /
    • 2007
  • As Global industrial structure is diversified, multinational corporations accomplished fast internationalization to introduction of new management policy by development of an IT technology. Enterprise' business environment is changing transcending border. To overcome raging waves of change accident and to be secured enterprise's future, the logistics is recognized the third profit source joining in curtailment of sale enlargement, production cost. To seek cost saving or reform in logistics class that is last area of pursuit of profits within ancient city life in the fast lane from these viewpoint, importance of study that integrates and manages international logistics bases supply neck walk is emphasized. Specially, to meet on in terms of competitive power security regarding curtailment of logistics cost is available through link between logistics bases, various consumer's request, merchandise and service logistics management that supply fixed quantity as is reliable in right place at good season was embossed by point game plan of business management, and SCM efficiency anger of mortification international logistics activity importance of study that see at that dominate competitive advantage point bring. This study analyzes interrelation and presents model for integration of international logistics bases supply network with supply network habit at factor and supply chain, and supply network activity in integration of supply chain process and production. Also, it establishes following method of study to achieve study purpose for actual proof analysis for integration sequence of international logistics bases supply network. Specially, immersion of network and supply network, very high interrelation appeared by thing which is with international logistics base supply network integration. The integration of international logistics base supply network means that the enterprises which give trust and sincerity deal with market environment change positively and can decide proceeding of various cooperative work. Also, it means the possibility by necessity of cooperative relation and interdependence to continuous immersion and normative immersion, for the maintain of long business relations.

  • PDF

원전건설 공급망관리 기술영역 도출을 위한 기초연구 (A Fundamental Research for Technology area of SCM in Korean Nuclear Power Plant Construction)

  • 박항순;김우중;정영환;원서경
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2013년도 춘계 학술논문 발표대회
    • /
    • pp.268-270
    • /
    • 2013
  • The construction project can be defined as a network combined between elements which are engineering, procurement, construction, start-up, and has a plenty of subjects and partners. For the successful project management in construction industry, it is necessary to adopt various management methods, such as lean production, information network system, SCM(Supply Chain Management), which can increase the efficiency of project management. During recent years, even though various management techniques have been applied, the SCM system has not formulated in construction industry. Especially, the Nuclear Power Plant Construction which requires high regulations of the safety and security has not applied SCM. Therefore, this study aimed to propose technology area of SCM in Korean Nuclear Power Plant Construction.

  • PDF

시장 측면에서 본 양자컴퓨팅 산업 (The Quantum Computing Industry from a Market Perspective)

  • 조병선;이선재;정선화
    • 전자통신동향분석
    • /
    • 제39권3호
    • /
    • pp.58-68
    • /
    • 2024
  • Quantum computing can be a game changer in all areas of economy security, and society, and it is expected to bring innovation to the entire industrial ecosystem. The competition in this industry is accelerating with various countries pushing for policies to preempt technology and maintain a technological advantage. The quantum computing market is expected to show commercial gains in 2027 as an inflection point. Initially, it is expected to replace the high-performance computing market. However the continuous growth of quantum computing will depend on the development innovative services such as ChatGPT in AI, and technological breakthroughs. We examine the definition and outlook, evolution and dynamics, and supply chain structure of the quantum computing industry in an attempt to unveil implications for its development.

사이버 보안 분야 주요 기업의 시장 성과와 ICT 공급망 관련 정책 동향 (Market Performance of Major Companies in Cybersecurity and Policy Trends in Information and Communication Technology Supply Chain)

  • 안춘모;유영상
    • 전자통신동향분석
    • /
    • 제39권3호
    • /
    • pp.48-57
    • /
    • 2024
  • Cyberthreats and crimes have become common in society and demand the adoption of robust security measures. Financial cybercrimes, personal information breaches, and spam messages are now prevalent, while companies and nations face an increasing number of cyberthreats and attacks such as distributed denial of service, ransomware, and malware. As the overall socioeconomic landscape undergoes digitalization powered by big data, cloud computing, and artificial intelligence technologies, the importance of cybersecurity is expected to steadily increase. Developed nations are actively implementing various policies to strengthen cybersecurity and providing government support for research and development activities to bolster their domestic cybersecurity industries. In particular, the South Korean government has designated cybersecurity as one of the 12 nationwide strategic technology sectors. We examine the current landscape of cybersecurity companies and the information and communication technology supply chain, providing insights into the domestic cybersecurity market and suggesting implications for South Korea.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권11호
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

무기체계 개발을 위한 RMF A&A의 실증에 관한 연구 (A Study on Proving RMF A&A in Real World for Weapon System Development)

  • 조광수;김승주
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.817-839
    • /
    • 2021
  • 소프트웨어를 안전하게 관리하기 위해 군은 RMF A&A(Risk Management Framework Assessment & Authorization) 표준에 따라 제품을 구매하고 관리한다. 해당 표준은 무기체계를 비롯한 군 IT 제품의 획득 체계에 관한 표준으로 제품에 대한 요구사항, 평가를 통한 구매, 유지보수를 다룬다. 해당 표준에 따르면 제품 개발활동에는 군에서 제시한 임무의 위험도가 반영되어야 한다. 즉, 개발사는 보안 내재화 및 공급망 보안을 통해 제시된 위험도를 완화하였고, RMF A&A의 보안 요구사항을 제대로 준수하였음을 입증하는 자료를 제출해야하고, 군에서는 개발사로부터 제출된 증거자료에 대한 평가를 통해 최종 획득 여부를 결정한다. 기존에 RMF A&A 실증 연구가 수행된 사례가 있다. 하지만, 해당 연구는 RMF A&A의 전체 단계가 아닌 일부분에 대해서만 다루고 있고, 해당 연구의 실증 사례가 대외비인 관계로 상세한 정보가 공개되지 않아 실제 산업 환경에 적용하는데 어려움이 있다. 이에 본 논문에서는 군의 위험도 측정 및 RMF A&A 관련 표준들을 분석하고, 이를 바탕으로 군 RMF A&A의 요구사항을 만족시킬 수 있는 증거자료 작성방안에 대해 제시한다. 또한, 제시한 방안을 실제 드론 시스템에 적용하여 작성된 평가 제출물이 RMF A&A의 요구사항에 부합한지 검증을 수행한다.