• Title/Summary/Keyword: Supply Chain Security

Search Result 119, Processing Time 0.03 seconds

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.7
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

An Empirical Investigation on the Effect of Logistics Security in Import and Export Risk Management (물류보안이 수출입 리스크관리에 미치는 영향에 관한 실증연구)

  • Yi, Hong-Won;Kim, Jae-Bong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.317-325
    • /
    • 2014
  • The government of South Korea has introduced various security measures in the supply chain, such as CSI (including a 24-hour rule) and AEO (Authorized Economic Operator), in compliance with global security trends and the war on terror. However, many participants in the import and export process are still unfamiliar with the purposes and functions of CSI, the 24-hour rule, and AEO. As such, considering these risks as obstacles or as factors that interfere with the import and export process, this study suggests proper management schemes, which can identify, measure and evaluate these risks.

A Study on the Effectiveness of Blockchain and Legal System and Policy Tasks for SMEs (중소기업의 블록체인 적용효과와 법제도 및 정책적 과제에 대한 융합적 연구)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.14-24
    • /
    • 2019
  • It is necessary to look into multiple subjects, such as effectiveness, laws and polices of blockchain in order to easily accept blockchain technology in small and mid-sized enterprises(SME). This study analyzes the positive effects of applying the block chain to SMEs, examines the laws and policies required to apply them, and identifies the tasks. As a result, we confirmed that it can create positive effects such as optimizing supply chain management, simplifying import and export process documents, improving product quality, facilitating flow of funds, and improving transaction reliability. Also, we confirmed that it is necessary to improve the basic law of electronic transaction, electronic commerce law, electronic financial transaction law, personal information protection legislation, and needs policy supplement for platform development, education system for SMEs, transaction standardization guidelines, tax reduction policy, and block chain research and development. More extensive practical research and specific individual legal studies are needed in the future.

An Empirical Study on the Competition Factor Electronic Logistics Information and International Logistics Management (국제물류관리와 전자적물류정보의 경쟁요인에 관한 실증연구)

  • Kwak, Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.257-283
    • /
    • 2007
  • As Global industrial structure is diversified, multinational corporations accomplished fast internationalization to introduction of new management policy by development of an IT technology. Enterprise' business environment is changing transcending border. To overcome raging waves of change accident and to be secured enterprise's future, the logistics is recognized the third profit source joining in curtailment of sale enlargement, production cost. To seek cost saving or reform in logistics class that is last area of pursuit of profits within ancient city life in the fast lane from these viewpoint, importance of study that integrates and manages international logistics bases supply neck walk is emphasized. Specially, to meet on in terms of competitive power security regarding curtailment of logistics cost is available through link between logistics bases, various consumer's request, merchandise and service logistics management that supply fixed quantity as is reliable in right place at good season was embossed by point game plan of business management, and SCM efficiency anger of mortification international logistics activity importance of study that see at that dominate competitive advantage point bring. This study analyzes interrelation and presents model for integration of international logistics bases supply network with supply network habit at factor and supply chain, and supply network activity in integration of supply chain process and production. Also, it establishes following method of study to achieve study purpose for actual proof analysis for integration sequence of international logistics bases supply network. Specially, immersion of network and supply network, very high interrelation appeared by thing which is with international logistics base supply network integration. The integration of international logistics base supply network means that the enterprises which give trust and sincerity deal with market environment change positively and can decide proceeding of various cooperative work. Also, it means the possibility by necessity of cooperative relation and interdependence to continuous immersion and normative immersion, for the maintain of long business relations.

  • PDF

A Fundamental Research for Technology area of SCM in Korean Nuclear Power Plant Construction (원전건설 공급망관리 기술영역 도출을 위한 기초연구)

  • Park, Hang-Soon;Kim, Woo-Jung;Chong, Young-Whan;Won, Seo-Kyung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.268-270
    • /
    • 2013
  • The construction project can be defined as a network combined between elements which are engineering, procurement, construction, start-up, and has a plenty of subjects and partners. For the successful project management in construction industry, it is necessary to adopt various management methods, such as lean production, information network system, SCM(Supply Chain Management), which can increase the efficiency of project management. During recent years, even though various management techniques have been applied, the SCM system has not formulated in construction industry. Especially, the Nuclear Power Plant Construction which requires high regulations of the safety and security has not applied SCM. Therefore, this study aimed to propose technology area of SCM in Korean Nuclear Power Plant Construction.

  • PDF

The Quantum Computing Industry from a Market Perspective (시장 측면에서 본 양자컴퓨팅 산업)

  • B.S. Cho;S.J. Lee;S.H. Jeong
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.58-68
    • /
    • 2024
  • Quantum computing can be a game changer in all areas of economy security, and society, and it is expected to bring innovation to the entire industrial ecosystem. The competition in this industry is accelerating with various countries pushing for policies to preempt technology and maintain a technological advantage. The quantum computing market is expected to show commercial gains in 2027 as an inflection point. Initially, it is expected to replace the high-performance computing market. However the continuous growth of quantum computing will depend on the development innovative services such as ChatGPT in AI, and technological breakthroughs. We examine the definition and outlook, evolution and dynamics, and supply chain structure of the quantum computing industry in an attempt to unveil implications for its development.

Market Performance of Major Companies in Cybersecurity and Policy Trends in Information and Communication Technology Supply Chain (사이버 보안 분야 주요 기업의 시장 성과와 ICT 공급망 관련 정책 동향)

  • C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.48-57
    • /
    • 2024
  • Cyberthreats and crimes have become common in society and demand the adoption of robust security measures. Financial cybercrimes, personal information breaches, and spam messages are now prevalent, while companies and nations face an increasing number of cyberthreats and attacks such as distributed denial of service, ransomware, and malware. As the overall socioeconomic landscape undergoes digitalization powered by big data, cloud computing, and artificial intelligence technologies, the importance of cybersecurity is expected to steadily increase. Developed nations are actively implementing various policies to strengthen cybersecurity and providing government support for research and development activities to bolster their domestic cybersecurity industries. In particular, the South Korean government has designated cybersecurity as one of the 12 nationwide strategic technology sectors. We examine the current landscape of cybersecurity companies and the information and communication technology supply chain, providing insights into the domestic cybersecurity market and suggesting implications for South Korea.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

A Study on Proving RMF A&A in Real World for Weapon System Development (무기체계 개발을 위한 RMF A&A의 실증에 관한 연구)

  • Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.817-839
    • /
    • 2021
  • To manage software safely, the military acquires and manages products in accordance with the RMF A&A. RMF A&A is standard for acquiring IT products used in the military. And it covers the requirements, acquisition through evaluation and maintenance of products. According to the RMF A&A, product development activities should reflect the risks of the military. In other words, developers have mitigated the risks through security by design and supply chain security. And they submit evidence proving that they have properly comply with RMF A&A's security requirements, and the military will evaluate the evidence to determine whether to acquire IT product. Previously, case study of RMF A&A have been already conducted. But it is difficult to apply in real-world, because it only address part of RMF A&A and detailed information is confidential. In this paper, we propose the evidence fulfilling method that can satisfy the requirements of the RMF A&A. Furthermore, we apply the proposed method to real-world drone system for verifying our method meets the RMF A&A.