• Title/Summary/Keyword: cyber infrastructure

Search Result 215, Processing Time 0.026 seconds

A Study on a Model of University Information Systems for e-Business Era (e-비즈니스 시대의 대학정보시스템 구축 모델에 관한 연구: K 대학교 사례를 중심으로)

  • Kwon Moon Taek
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.133-145
    • /
    • 2004
  • The two main purposes of this paper are to 1) investigate critical components of university information systems for information resources management, 2) develop a comprehensive framework model of university information systems for e-Business Era. Through a literature review and by employing group decision making techniques with managers of K University, critical components for developing university information systems were identified. The critical components of university information systems are 1) academic affaires. 2) general administration. (3) research administration. (4) information services. (5) management support, (6) cyber education. (7) knowledge management, (8) e-library. (9) mobile service. and (10) IT infrastructures. In the second stage. by employing IT experts in K University and other institutes. a comprehensive framework of university information systems for e-Business era was developed. The comprehensive framework shows that major components for university information resources management are (1) information infrastructure. (2) common operating environments. (3) applications/information services. The results of this study expect to help managers. who are in charge of university information systems. plan to develop information systems based on the framework proposed in this paper.

  • PDF

A Study on the TradeCard Payment System in the Cyber Trade Era (사이버 무역시대의 TradeCard 결제시스팀에 관한 고찰)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.4 no.4
    • /
    • pp.113-128
    • /
    • 2001
  • The international trade industry is on the brink of a radical Internet-driven transformation. TradeCard is a payment and settlement system that is an alternative to letters of crdeit. That is, TradeCard is a business-to-business e-commerce infrastructure that enables buyers and sellers to conduct and settle international trade transactions securely over the Internet. Paperless, payment-guaranteed international trade transactions - which eliminate the traditional letters of credit with electronic certifications - are widely considered the most difficult B2B transactions to conduct. The TradeCard system was initially built to accommodate and process this complex, cross-border payment type at a US$100 service fee for each transaction of up to US$100,000 since November 1999.

  • PDF

A study on the TradeCard and Problems of L/C under Cyber Trading (사이버무역시대에 신용장결제방식의 한계와 TradeCard의 활용)

  • 한상현
    • The Journal of Information Technology
    • /
    • v.3 no.4
    • /
    • pp.23-40
    • /
    • 2000
  • Because the international trading community has witnessed a number of significant technical and commercial changes, documentary credit practices will quite clearly need to be updated to meet both the business and technical demands of the latest commercial and technical developments in international trade. The potential for developing "paperless credit" should, therefore, be examined. TradeCard is a B2B(business-to-business) e-commerce infrastructure that enables buyers and sellers to conduct and settle international trade transactions securely over the Internet and objective of TradeCard is to provide a secure, reliable cost-effective and user-friendly solution for conducting and settling international trade transactions. This paper analyzes the reviews of TradeCard by Electronic Message and the various problems which come to application of TradeCard, with particular attention to existing international frameworks for Payment systems based on Documentary Credit.ry Credit.

  • PDF

A study on the TradeCard System for Payment under Cyber Trading (전자무역시대에 트레이드카드 결제시스템의 경제적 효용성과 문제점)

  • 한상현
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.55-69
    • /
    • 2001
  • TradeCard is a B2B (business-to-business) e-commerce infrastructure that enables buyers and sellers to conduct and settle international trade transactions securely over the Internet. and objective of TradeCard is to provide a secure, reliable, cost-effective and user-friendly solution for conducting and settling international trade transactions. This paper analyzes the reviews of TradeCard by Electronic Message and the various problems which come to application of TradeCard, with particular attention to existing international frameworks for payment systems based on Documentary Credit.

  • PDF

A Study on the New Payment Methods in the Cyber Trade Age (사이버 무역시대(貿易時代)의 신결제방식(新決濟方式)에 관한 연구(硏究))

  • Park, Seok-Jae
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.237-256
    • /
    • 2000
  • Electronic commerce has been threatening to address the transaction inefficiencies in international trade that is conducted through letters of credit(L/Cs) and other forms of traditional paper-based financial instruments. The replacement of traditional paper documets with electronic alternatives is becoming more of a relity within a number of business sectors. The conceptual model of electronic L/Cs presented in this paper is intended to provide a framework for discussing the development of a paperless credit. The TradeCard network provides a business-to-business e-commerce infrastructure that enables buyers and sellers to conduct and settle international trade transactions securely over the Internet. Sellers and Buyers should select the best payment methods of traditional L/Cs, electronic L/Cs, TradeCard, Bank Credit Card etc. in consideration of their business circumstances.

  • PDF

디지털시장의 시장구조와 제품판매방식

  • 최동수
    • Journal of Technology Innovation
    • /
    • v.10 no.2
    • /
    • pp.107-129
    • /
    • 2002
  • Expansion and enhancement of information and communication infrastructure can create a market closer to an ideal type for a perfect competition, utilizing a cyber space in the network (with the expanded usage of Internet and e-commerce) and it could be a market of a monopolistic form. The government can take one of the two approaches responding to this monopolization of the digital market. First, the government maintains laissez-faire policy since the monopoly cannot be maintained over a long period of time due to an increasing in the production, decrease in the price, profit resulting from this and rapid technology evolution. Second, the government can actively interrupt the monopolization of the digital market. Monopolization in a digital market can lead to a market failure. Unstable market structure and too much frequent merger and acquisition contribute to making the digital market very dynamic. Information goods exchanged in the digital market have the features of very low marginal cost required to copy the original product whereas its initial fixed cost is very high. This explains why the information products are not priced based on the existing marginal price determination principles and why companies producing them have various product sales strategies (price/product differentiation strategy, and other sales strategies).

  • PDF

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

Analyses of Security and Privacy Challenges in Industrial Based on Internet of Things (사물 인터넷망에 기반한 산업 시설의 보안 요구 사항 해석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.598-599
    • /
    • 2016
  • Today, embedded, mobile, and cyber-physical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industry 4.0" and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. We survey an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems in this paper.

  • PDF

A Study on Certificate Requirement of Health Informatics Public key infrastructure Standard (의료 보안 PKI 표준의 인증서 요구사항에 관한 연구)

  • Park, Keunho;Kim, Sungjin;Shon, Taeshik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.277-279
    • /
    • 2016
  • 보건의료 산업에서 보건의료제공자와 의료 단체들은 국가와 국가간 환자의 정보를 교환한다. 이 때 교환되는 환자의 정보를 보호하기 위한 수단으로 공개키 기반 구조와 전자 인증서 기술을 사용해야 한다. 하지만 국가마다 전자인증서를 사용하기 위한 인증기관과 등록기관의 정책이 일치하지 않으므로, 여러 나라들과 기관이 신뢰하고 사용할 수 있는 프레임워크가 필요하다. 이러한 프레임워크를 구축하기 위한 국제 표준 문서가 ISO 17090이며, 본 고에서는 ISO 17090에 명시된 인증서 요구사항과 암호화 알고리즘에 대한 개선방안을 제시한다.

Information Security Status and Comparative Analysis of Government-funded Research Institutes (정부출연연구기관의 정보보안 현황 및 비교분석)

  • Song, Young-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.587-590
    • /
    • 2017
  • In this paper, we investigate the current status and problems of information security in government - funded research institutes, where the frequency of cyber - infringement threats is increasing, and emphasize the importance of information security. do. To this end, we will contribute to the establishment of a stable information security infrastructure for government-funded research institutes in the future by identifying problems and proposing improvement measures based on data related to information security such as information security policies, organizations, and budgets of government-funded research institutes.

  • PDF