• 제목/요약/키워드: Supply Chain Security

검색결과 121건 처리시간 0.029초

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

모델 기반 EPCglobal 네트워크의 성능 분석 (A Model-based Performance Study of the EPCglobal Network)

  • 강용신;손경원;이용한;이종태
    • 산업공학
    • /
    • 제24권2호
    • /
    • pp.139-150
    • /
    • 2011
  • The EPCglobal Network is a computer network used to share product data among trading partners. It provides the supply chain with improved visibility and traceability by using Electronic Product Code (EPC), which is stored on an RFID tag. Although this network model is widely accepted as a global standard and the growth of EPCglobal-subscriber base is considerable, the EPC technology adoption process is still in its infancy. This is because some of the critical issues on this model still remain to be verified such as scalability, data management, security, privacy and the economic value of data sharing. In this paper, we focus on scalability issue among the challenges to overcome and we regard performance of the EPCglobal Network only as a track and trace query-processing cost in the network. We developed performance models consisting of three elements of the EPCglobal Network : Discovery Services (DS), EPC Information Services (EPCIS), Object Naming Services (ONS). Then we abstracted out the track and trace query execution model to evaluate performance of the overall EPCglobal Network. Finally using the proposed models, we carried out simulation analysis based on an RFID-based inbound logistics process of automobile parts. This work is an important step towards the EPC technology diffusion and provides guidelines for businesses looking to buy or build the EPCglobal Network-based systems.

The New Ecosystem of Cross-border E-Commerce among Korea, China and Japan Based on Blockchain

  • Shen, Xiang-Dong;Chen, Xi;Ji, Ran;Wu, Ren-Hong
    • Journal of Korea Trade
    • /
    • 제24권5호
    • /
    • pp.87-105
    • /
    • 2020
  • Purpose - The purpose of the study is to propose a theoretical framework of cross-border e-commerce ecosystems based on blockchain technology. The ecosystem includes five systems, namely, crossborder supply chain intelligent system, cross-border logistics system, cross-border payment system, cross-border product quality traceability system and cross-border customs supervision system. Design/methodology - This study firstly derived the main improvement factors for the new ecosystem based on blockchain through prior research and expert interviews on cross-border e-commerce. Then explored the use of virtue of decentralization, anti-counterfeiting traceability, consensus mechanism, smart contract and other means of the core technology of blockchain to overcome the bottleneck of cross-border e-commerce development among Korea, China, and Japan. Finally, proposed valuable implications in both theoretical and practical perspectives. Findings - As a result, we combined with the problems existing in cross-border e-commerce among Korea, China and Japan, this paper proposes a solution based on blockchain. On this basis, it constructs a cross-border e-commerce ecosystem among these three countries, including five systems. In addition, we discuss the main problems existing in the current blockchain, such as low transaction concurrency, security loopholes, and inconsistent standards, the corresponding countermeasures are proposed from the technical level, security level and industry standards. Originality/value - This study is the first to apply the blockchain technology to solve the cross-border e-commerce problems in Korea, China and Japan, which is of pioneering significance in both literature and practice. Block chain technology is in the ascendency. This study provides technical solutions for promoting the development of cross-border e-commerce import and export trade between Korea, China and Japan.

국제해상컨테이너운송에서 보안강화를 위한 전자태그(IC tag)의 적용과 대응방안 (A study on the application and counter measures of IC tag in international marine container transport)

  • 한상현;최준호
    • 통상정보연구
    • /
    • 제12권2호
    • /
    • pp.133-158
    • /
    • 2010
  • Since 11 September 2001, the awareness of terrorists' actions has clearly risen. The potential threat of terrorists using containers poses a large risk to our economies and to our societies. In order to protect cargo from damage and terrorist threats, business and government turn to RFID and IC tags, and tradition container is replaced by IC smart container. In this study, presented application of IC tag and future tasks to Container transport by sea in viewpoint of security strengthening. First, realization and international SCM realization structural order that cover container supply chain whole of international standardization and association between industry are certainly needed. Second, it may have to try in technical development for IC tag Ratio that can read elevation moment develop suitable IC tag or reader in International Standard. Third, Need to establish concrete use policy as soon as possible in national dimension at the same time effort for international standard normalization of frequency. Finally, it shows to uses jointly with electron sealing and must solve problem about usable plan and information leak.

  • PDF

Data Science and Machine Learning Approach to Improve E-Commerce Sales Performance on Social Web

  • Hussain Saleem;Khalid Bin Muhammad;Altaf H. Nizamani;Samina Saleem;M. Khawaja Shaiq Uddin;Syed Habib-ur-Rehman;Amin Lalani;Ali Muhammad Aslam
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.137-145
    • /
    • 2023
  • E-Commerce is a buzzword well known for electronic commerce activities including but not limited to the online shopping, digital payment transactions, and B2B online trading. In today's digital age, e-commerce has been playing a very important and vital role in areas such as retail shopping, sales automation, supply chain management, marketing and advertisement, and payment services. With a huge amount of data been collected from various e-commerce services available, there are multiple opportunities to use that data to analyze graphs and trends. Strategize profitable activities, and forecast future trade. This paper explains a contemporary approach for collecting key data metrics and implementing cost-effective automation that will support in improving conversion rates and sales performance of the e-commerce websites resulting in increased profitability.

Management of the Processes on the Quality Provision of the Logistic Activity in the Context of Socio-Economic Interaction of Their Participants

  • Savin, Stanislav;Kravchyk, Yurii;Dzhereliuk, Yuliia;Dyagileva, Olena;Naboka, Ruslan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.45-52
    • /
    • 2021
  • The article proves the relevance of developing conceptual frameworks for managing the quality assurance of logistics activities in the context of socio-economic interaction of their participants. It is established that the fundamental difference of the logistic approach in management from traditional approaches is the allocation of a single management function of previously separated, disparate material flows, as well as economic, technological, information integration of chain links into a single system capable of effective management of these flows. It is substantiated that the functioning of the enterprise as a logistics system can be represented in the form of a triad of logistics components, namely: supply logistics, production logistics, sales logistics. Management of quality assurance processes of logistics activities in the context of socio-economic interaction of their participants is a functional component of the entire logistics system due to the quality of work and interaction of all participants in the implementation of certain activities. The quality of logistics activities will affect the level of economic potential, rationalization and optimization of all logistics flows. It is proved that the management of quality assurance processes of logistics activities in the context of socio-economic interaction of their participants involves the following main areas: the introduction of a quality system of logistics processes; development and implementation of the general strategy of quality improvement at the enterprise; internal integration; controlling. Management of quality assurance processes of logistics activities in the context of socio-economic interaction of its participants requires compliance with the following requirements: systematic and comprehensive management of all flow processes; coordination of criteria and indicators for assessing the effectiveness of the entire logistics system; dissemination of the use and application of information technology; ensuring partnerships and close interaction of all participants in sales networks.

스마트 무역계약 연구의 체계적 문헌고찰 (Systematic Literature Review of Smart Trade Contract Research)

  • 이호형
    • 무역학회지
    • /
    • 제48권3호
    • /
    • pp.243-262
    • /
    • 2023
  • 본 연구는 스마트 무역계약의 체계적 문헌고찰을 통해 스마트계약과 블록체인 기술을 활용한 무역계약의 디지털화와 자동화에 관한 연구 동향과 이론적 배경을 파악하고, 기술적 측면과 법적 측면에서의 도전 과제와 해결 방안을 분석하였다. 스마트 무역계약은 블록체인을 기반으로 한 자동화된 계약 시스템의 개념을 무역과 관련된 거래에 적용한 것이다. 기술적 측면에서는 스마트계약 플랫폼의 개발, 블록체인 네트워크의 확장성과 성능 개선, 보안 및 개인 정보 보호 등을 다루었고, 법적 측면에서는 스마트계약의 법적 구속력, 계약 조건의 자동 이행과 이의 실현 가능성, 계약 당사자의 책임과 의무 등을 다루었다. 스마트 무역계약은 국제무역, 공급망 관리, 금융, 보험, 에너지 등 다양한 산업 분야에서 적용 사례가 발견되고 있으며, 이를 통해 무역금융의 용이성과 공급망의 효율성 향상, 비즈니스 모델 혁신에 이바지할 수 있는 것으로 확인되었다. 그러나 스마트 무역계약의 한계점으로는 법적 규제와의 상호작용 문제, 기술적 측면에서의 도전 과제 등이 있으며, 후속 연구에서는 실증 연구, 비즈니스 모델 혁신, 법적 쟁점 해결, 보안과 개인 정보 보호, 표준화와 협력, 사용자 경험 연구 등 다양한 측면을 고려해야 할 것으로 판단된다.

관세법상 "수출입안전관리 우수공인업체"(AEO) 제도의 효율적인 운용 방안에 관한 연구 (A Study on Introduction and Administration Strategy of AEO Program : main examples and its implications for Korea Customs Service)

  • 남풍우;안재진
    • 무역상무연구
    • /
    • 제39권
    • /
    • pp.313-344
    • /
    • 2008
  • The role of Customs Service has changed significantly in recent times, and what may represent core business for one administration may fall outside the sphere of responsibility of another. This is reflective of the changing environment in which customs authorities operate, and the corresponding changes in government priorities. Since the terrorist attacks on the United States in 2001, customs administrations around the world have been developing AEO programs in which they grant AEO status to operators who are well-compliant with the supply chain security standards. These programs also provide such operators with trade facilitation measures under the customs procedures, acknowledging the importance of ensuring secure and facilitated trade. Thus, this paper analysed leading countries's AEO program regime focused on the two fold : (1)provide an overview and present a implication of its AEO program ; (2)offer an appropriate proposal to Korea Customs Service's new program.

  • PDF

EPC Class1과 C1G2 보안성 분석 (Analysis about EPC Class 1 and C1G2 Security)

  • 김건우
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 가을 학술발표논문집 Vol.32 No.2 (1)
    • /
    • pp.70-72
    • /
    • 2005
  • 최근들어 Radio Frequency Identification (RFID) 태그가 다수의 상품에 부착되고 절러 분야에 적용되기 시작했지만, 비용문제로 인해 인증이나 암호화 같은 보안기능은 고려하지 않고 있다. 보안 기능이 없는 RFID시스템은 개인정보 노굴, 불법 리더의 접근, 위조 태그의 남용과 같은 심각한 부작용을 초래하지만 현 단계에서는 보안기능을 적용하기가 쉽지않다. 절러 기술을 따르는 수동형 태그중 EPCglobal의 EPC Class 1과 Class 1 Generation 2(C1G2)는 산업계의 여러 분야에서 특히, supply-chain 모델에서 사실상 국제표준으로 여겨진다. EPC Class1 수준의 태그는 자체 밧데리를 가지지 않는 수동형 태그이고, 암호 프리미티브를 적용한 알고리즘이나 프로토콜은 제공하지 않는다. EPC Class1 과 EPC C1G2의 유일한 보안 대책으로는 태그를 영원히 동작하지 못하게 하는 Kill 기능이 있다. Kill을 수행한 태그는 RFID 태그로서의 의미가 사라진다. 본 논문에서는 Kill 기능에 대한 EPC Class1 시스템의 취약성을 보이고 또한, EPC C1G2 시스템에서 Kill 관점에서의 보안성을 분석한다.

  • PDF

수동 RFID 태그를 위한 경량화된 보안 및 인증 프로토콜 분석 (Analyses of Lightweight Privacy and Authentication Protocol for Passive RFID Tags)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.629-630
    • /
    • 2010
  • Radio frequency identification (RFID) tags are cheap, simple devices that can store unique identification information and perform simple computation to keep better inventory of packages. Because of this, they are intended to replace the barcodes for supply chain management in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed to be scanned, subjecting them to unauthorized scanning by malicious readers and to various attacks. Therefore, a security protocol for RFID tags is needed to ensure privacy and authentication between each tag and their reader. In order to accomplish this, in this paper, we proposed a lightweight privacy and authentication protocol for passive RFID tags.

  • PDF