• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.03 seconds

Factors Affecting Outsourcing Decisions in the Implementation of Small and Medium Sized Cyber Shopping Shops (중소 사이버쇼핑숍 구현에서의 아웃소싱 결정요인에 관한 실증적 연구)

  • Chung, Young-Soo
    • Asia pacific journal of information systems
    • /
    • v.12 no.2
    • /
    • pp.25-44
    • /
    • 2002
  • The internet-based electronic commerce is considered as a new strategic alternative to boost competitiveness for small and medium-sized enterprises(SMEs). However, very little research about them has been reported. Meanwhile, the cyber shopping shops in Korea are growing rapidly in their numbers, scales, and diversity of business models. The primary purpose of this study is to investigate the factors influencing outsourcing decisions in the implementation of small and medium-sized cyber shopping shops. Based on the previous studies on IS outsourcing, marketing channel, and their related theories, three areas of determinants(IT & organizational, product, marketing channel characteristics) were identified. Responses of 125 cyber shopping shops from e-mail survey indicate that IT capability, technical specificity of shop implementation, degree of product customization, average amount of order, marketing capability are negatively associated with outsourcing of cyber shopping shop implementation. The results also indicate that the outsourcing decision on systems implementation and marketing channel selection(direct/indirect selling) is performed separately.

Establishment of Cyber Security Countermeasures amenable to the Structure of Power Monitoring & Control Systems (전력계통 제어시스템 구조에 따른 사이버 보안대책 수립)

  • Woo, Pil Sung;Kim, Balho H.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.12
    • /
    • pp.1577-1586
    • /
    • 2018
  • The emergence of the Smart Grid is an integrated solution for the next generation power system that combines IT technology in the power system to create optimal energy utilization and various services. However, these convergence technologies (power systems and information communications) are not only improving the related technologies but also producing various problems especially exposure to cyber risk. In particular, the intelligent power grid has security vulnerabilities through real-time information sharing among various organically linked systems, and it is more complicated than the cyber risk problem in the existing IT field and is directly connected to national disaster accidents. Therefore, in order to construct and operate a more stable smart grid, this paper analyzes the system of power system control system in Korea, and proposes a cyber security element definition and a countermeasure establishment method of power monitoring & control systems based on security standards of smart grid (No. SPS-SGSF-121-1-1).

Fish Schooling Behavior Simulator for the Contents Production of Cyber Underwater Environment (가상 해저 환경 콘텐츠 제작을 위한 Fish 군중행동 시뮬레이터)

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.25-33
    • /
    • 2007
  • Crowd behaviors on cyber underwater environment are often produced in entertainment contents, such as films and games. It is easy for us to come in contact with the scenes appearing a lot of characters as digital films and animation works are increased gradually, owing to developing of computer graphics. Though the processing a scene of crowd and the behavior system of crowd, related to the processing techniques of crowd behavior in cyber space, have been implemented so far, the research for developing the natural crowd behavior simulator can not be still satisfying. In this paper, we designed a realistic and efficient Fish Schooling Behavior Simulator for the contents production of cyber underwater environment, which showed each type of fish behavior in cyber underwater smartly, and which generated the animating the behavior automatically, reducing the time and cost.

  • PDF

A Consideration for Intellectual Property Rights under Digital Environments (전자상거래에서의 지적재산권에 관한 문제점과 개선방안)

  • Kwon, Sang-Ro
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.249-265
    • /
    • 2004
  • In the current digital age, most of the countries in the world recognize the electronic business to be a very prospective area in the future and plan to activate for the preoccupation of the business. As a result, this led a rapid increase of the electronic business volume. Electronic business takes place in the cyber space, using internet. However, the intellectual property rights have a high degree of possibility of being infringed as the digitalized intellectual property is easy to receive, copy and transmit in the cyber space. The language structure on the web, represented by HTML, makes easier to copy the intellectual property. And, as the internet has no national boundary, the infringement of the intellectual property rights is easier regardless of country, which could lead to the commercial disputes between the concerned countries. There are in fact many legal disputes nowadays on the infringement of the intellectual property rights in such field as computer programming, infringement of the copyright, business model patent and infringement of the trademark right on the registered name of the domain. It is, therefore, time now to prepare a new theory or legal system to protect the intellectual property rights on copyright, patent and trademark right so as to comply with the digital environment together with such a splendid growth of "electronic business." USA and Germany are nowadays making a significant movement on the legislation of the electronic business, and this study will focus on the legislative contents, judicial precedents and interpretation of law in the above countries.

  • PDF

Merchandise Management Using Web Mining in Business To Customer Electronic Commerce (기업과 소비자간 전자상거래에서의 웹 마이닝을 이용한 상품관리)

  • 임광혁;홍한국;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.1
    • /
    • pp.97-121
    • /
    • 2001
  • Until now, we have believed that one of advantages of cyber market is that it can virtually display and sell goods because it does not necessary maintain expensive physical shops and inventories. But, in a highly competitive environment, business model that does away with goods in stock must be modified. As we know in the case of AMAZON, leading companies already consider merchandise management as a critical success factor in their business model. That is, a solution to compete against one's competitors in a highly competitive environment is merchandise management as in the traditional retail market. Cyber market has not only past sales data but also web log data before sales data that contains information of path that customer search and purchase on cyber market as compared with traditional retail market. So if we can correctly analyze the characteristics of before sales patterns using web log data, we can better prepare for the potential customers and effectively manage inventories and merchandises. We introduce a systematic analysis method to extract useful data for merchandise management - demand forecasting, evaluating & selecting - using web mining that is the application of data mining techniques to the World Wide Web. We use various techniques of web mining such as clustering, mining association rules, mining sequential patterns.

  • PDF

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

A Study on Apprehension Factor of Cyber Shopping Mall (사이버쇼핑몰의 인지요인에 관한 연구)

  • 유한종
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.201-207
    • /
    • 2000
  • The digital economic is increased electronic commerce of firms in business environment This article propose on the study of cyber shopping mall in factor of apprehension. short summaries of this study are as follows, 1) the most important of factor's name is "Advertisement factor" 2) the second factor's name is "product factor" 3) so on.(reliability, price, purchase convenience) This 5 factor's is the most important of cyber shopping mall. The result of this study, cyber shopping mall have to enforced advertisement, sales force. The advertisement increased on apprehension of customer that purchased.omer that purchased.

  • PDF

A Study on the Measures for the Development of Electronic Security in the 4th Industrial Revolution Era (4차 산업혁명 시대 Electronic Security 발전 방안에 관한 연구)

  • Kim, Min Su
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.109-114
    • /
    • 2020
  • Currently, in the 4th industrial revolution era(4IR), the convergent infrastructure has been established by actively utilizing data based on the existing digital technological innovation in the 3rd industrial revolution. Thus, the technological innovation based on the knowledge-information society needs to put innovative efforts for creating new business models in various areas. Thus, this study aims to present an Electronic Security Framework by suggesting the Cyber-Physical Security System(CPSS) that could more accurately predict and efficiently utilize it based on structured data obtained by collecting, analyzing, and processing an enormous amount of unstructured data which is a core technology distinguished from the 3rd industrial revolution.

Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool (원전 사이버 보안 취약점 점검 도구 개발을 위한 규제요건 분석)

  • Kim, Seung-Hyun;Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.725-730
    • /
    • 2017
  • The use of general IT resources in the Instrumentation and Control system(I&C) for the safety of Nuclear Power Plants(NPPs) is increasing. As a result, potential security vulnerabilities of existing IT resources may cause cyber attack to NPPs, which may cause serious consequences not only to shutdown of NPPs but also to national disasters. In order to respond to this, domestic nuclear regulatory agencies are developing guidelines for regulating nuclear cyber security regulations and expanding the range of regulatory targets. However, it is necessary to take measures to cope with not only general security problems of NPPs but also attacks specific to NPPs. In this paper, we select 42 items related to the vulnerability inspection in the contents defined in R.G.5.71 and classify it into 5 types. If the vulnerability inspection tool is developed based on the proposed analysis, it will be possible to improve the inspection efficiency of the cyber security vulnerability of the NPPs.

A Study for Electronic Surveillance (REID, CCTV, Electronic Resident Card) in Augmented Reality Environment (증강현실 환경 하에서 전자감시(REID, 감시카메라, 전자주민카드)에 관한 소고)

  • Kang, Jang-Mook;Jung, Jo-Nam;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.75-82
    • /
    • 2006
  • Ubiquitous Computing is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous Computing. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the information revolution that Cyber Space saw a prime while world wide web service was expanded was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous Computing revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. This paper checks the present situation of currently proceeding Ubiquitous computing technology(RFID, CCTV) in augmented reality environment. Also, The main purpose of this paper is to analyze the concepts analysis of privacy, personal information, and electronic surveillance in augmented reality environment. Thus this paper treated the analysis of case, technological issue, problem and solution and so on.

  • PDF