The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and investment companies. This...
Web services are composed by consolidation of individual services to constitute complex business processes. Since there are similar functionalities among Web services published by providers, Web services users should consider quality of the services, such as security, when they are composed. This paper aims to design a broker to compose Web services, which considers quality of services in the composition...
Information availability is crucial for business continuity and enterprise level service provisioning. Maintaining information flow without compromising Confidentiality, Integrity, and Availability is a major task for the Information Technology Managers. Besides this, the dependability on Information has increased exponentially which requires highly complex Data Centers, which in turn become a huge...
The effective, efficient and continuous execution of business processes is crucial for meeting entrepreneurial goals. Business process modeling and simulation are used to enable desired business process optimizations. However, current approaches mainly focus on economic aspects while security aspects are dealt with in separate initiatives. This missing interconnection may lead to significant differences...
The mobile industry is evolving rapidly and new mobile devices with sophisticated capabilities are released almost every day. The hacking technologies and/or methodologies have also evolved and a single security solution cannot address all the security threats and vulnerabilities. To provide a strong security mechanism a combination of solutions need to be implemented at different levels based on...
During the past twenty years, the economic environment of enterprises has changed dramatically. Optimizing business processes, reducing costs and speeding up customer response time become what an enterprise needs to consider. A lot of enterprises start to form the value chain alliances with upstream providers, downstream firms (such as franchisers, agents, retailers and so on) and customers. Relying...
In this paper, we presented a qualitative initial risk analysis for selecting risk analysis approach suitable for security efforts where an organization is really need. An initial risk analysis is important to identify which risk analysis method is appropriate for each information system. If an organization conducts a baseline approach in information system which has very high value and risk, it could...
Business critical applications are increasingly being deployed as web services that access database systems, and must provide secure operations to its clients. Although the open web environment emphasizes the need for security, several studies show that web services are still being deployed with command injection vulnerabilities. This paper proposes a learning-based approach to secure web services...
The importance of enterprise website to promote enterprise development is becoming more and more attention by the small and medium-sized enterprises. This paper establishes an evaluation index system of food enterprise websites from the perspective of user's experience based on the website localization and the current literature, and uses analytic hierarchy process to determine the weight of each...
An ever increasing amount of functionality is incorporated into mobile phones-this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented...
Web services enable the collaboration across organizational boundaries and, thus, are a powerful technology for implementing global Service-oriented Architectures, i.e., the Internet of Services. Despite typical security mechanisms such as message encryption, attackers can create detailed profiles of service consumers, providers, and market places by merely monitoring communication endpoints. In a...
Business-process-management systems are increasingly used in service-oriented architectures (SOA), coordinating activities of loosely coupled information systems, of web services, and of human actors. This often requires exchanging and processing sensitive, personally-identifiable information, e.g., in e-employability and e-health applications. Supporting security in such a service-oriented environment...
At present, the tourism change information management cannot be resolved efficiently and effectively, and this may cause tourists' travel to be out of order, leaving behind much pressure to transportation, scenic spots, hotels facilities and so forth. The main reason for this is lacking adaptive handling mechanism for this situation. This paper describes the mechanism of tourism information Change...
With the rapid development of information technology revolution, technological innovation has brought increasing benefit to financial enterprises in China. However, the strategic priority and intense competition of technological innovation in China's financial business, as well as the uncertainty and dynamic of their development process, determine the high risk of technological innovation in China'...
Nowadays integration and interoperability studies and research have become hot topics in business field, providing technologies which enable Enterprise Application Integration (EAI). In this sense, Enterprise Service Bus (ESB) products have gained a significant prominence as the mechanisms for supporting EAI. As a consequence, several ESB products from both commercial and open source have emerged...
In this paper, we present a Privacy Impact Assessment (PIA) decision support tool that can be integrated within a cloud computing environment. Privacy is an important consideration in cloud computing, as actual or perceived privacy weaknesses will impact legal compliance, data security, and user trust. A PIA is a systematic process for evaluating the possible future effects that a particular activity...
An approach to detection of phishing hyperlinks using the rule based system formed by genetic algorithm is proposed, which can be utilized as a part of an enterprise solution to anti-phishing. A legitimate webpage owner can use this approach to search the web for suspicious hyperlinks. In this approach, genetic algorithm is used to evolve rules that are used to differentiate phishing link from legitimate...
For the assessment of the third-party logistics enterprise's warehouse receipt pledging risk, affect factors of risk assessment are analyzed, and Alpha coefficient is used to evaluate the consistency and reliability of factors based on expert marking. Then business risk assessment indicators are identified. The structure equation model (SEM) is made to test the importance of warehouse receipt pledging...
The following topics are dealt with: artificial intelligence; machine learning; CRM; decision support system; distributed system; database management; e-business; e-commerce; e-learning; enterprise information system; environmental technology management; global production network; green technology; health informatics; human resource management; manufacturing system technology; renewable resource;...
Telecommunication providers are still searching for business models beyond the bit pipe. While added-value services like Software-as-a-Service (SaaS) become more and more common for private customers as well as small and medium enterprises, in this paper we demonstrate the opportunities of Platform-as-a-Service offerings for specific business domains. By offering such platforms as cloud services,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.