A Study on Information Technology Plan and Status of University 2013

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "A Study on Information Technology Plan and Status of University 2013"

Transcription

1 , pp A Study on Information Technology Plan and Status of University 2013 Tae-Yong Shim 1, Il-Jun Choi 2, Jin Kim 3 and Young-Hun Lee 4 1 Department of Information & Computing Center Tongwon University, 2,3 Computer System Engineering Department JungWon University, 4 Department of Electronics Engineering, Hannam University Corresponding Author Abstract This study is aimed at offering basic data for establishing higher education information policies and enforcing them in a reasonable and effective manner. To accomplish the objective, the following were conducted. First, the data on information status linked to the government's nationwide university information projects was studied and analyzed. Based on the results, information indicators were established. Second, interviews with university information experts and surveys were conducted. Based on the results, the university information level was diagnosed. It was aimed at securing basic data for solving various university information-related issues and making plans for developing information. The purpose of this study is as follows: promoting reasonable information investment with various factors such as university budget, personnel, and equipment and supporting operational efficiency; offering a guideline for developing university information and investment plans. Keywords: Korean Education Network (KREN), University, ICT, Research Analysis 1. Introduction Colleges have made efforts to develop and build efficient comprehensive information system and secure competitiveness of education, research and employment coping with a change in educational environment and improvement of work by development of informationization. The number of colleges making good use of improving quality of education and efficiency of education through development of informationization has increased. Colleges should make efforts to increase information resources that serve as base for education so that informationization can change to qualitative growth which is suitable for knowledge information oriented information from quantitative change as information based education continues to expand. Data on informationization of colleges should be collected and managed to cope with qualitative growth and grasp the level of informationization of colleges[1-4]. The purpose of this study is to provide basic materials for establishing and implementing higher education informationization policy. Informationization index was drawn by researching and analyzing status of informationization and literature. Basic data for solving informationization related problems and a plan for development was secured by diagnosing the level of informationization of colleges through interview and survey on experts of informationization in universities. The findings of this study may serve as guideline when making a plan for development of informationization that colleges promote and may help efficiency of efficiency of operation and make a reasonable guidance of investment. ISSN: IJSEIA Copyright c 2014 SERSC

2 2. Research Method 2.1. Development of Questionnaires Research and cases at home and abroad were analyzed to develop index to survey and analyze the state of college informationization [5-13]. Basic framework of questionnaires that developed in research for three years supported by Korea Education Network (KREN) was kept and questionnaires which were excessively descriptive and questionnaires on specific vendor were reduced and questionnaires required in new information environment were added [7-8]. The questionnaires of this study were composed of general area, information system area, information network area, information security area, education and service area, and other areas as shown in Table 1. Table 1. Survey Configuration Areas of survey General areas (29) Content general aspects of agencies to be surveyed, organization and human resources, an organization in charge of informationization, budget for informationization, informationization education, plan on informationization, promotion of informationization, CIO interest area Information system area (18) server, general administration/school affair/research information system, main system platform environment, introduction of system and plan, backup method, data center, next generation informationization system, cloud service Information network area (25) Information security area (19) wire information network, IP address and DNS, network management, wireless LAN, maintenance information security, PC security, server and network security Education and service area (31) equipment for rental of students, limit of concurrent access when registering for courses, representative homepage, homepage of department and professors, smart service, survey of satisfaction, fixed mobile convergence service, commercial SW, virtual course(e-learning) and on-line content service College informationization survey use area (5) use of findings of research, reflection of opinion in government policy Number in ( ) is the number of questionnaires Scope and Method of Survey A survey for 366 colleges that were related to Korea Education Network (KREN) was conducted by using on-line survey system of Korea Education Network (KREN) in order to survey the state of college informationization. Phone, mail and SMS surveys were used to enhance response rate of survey. 48 Copyright c 2014 SERSC

3 Survey period ranged from October 7, 2013 to October 18, 2013 but the period was extended until November 1, 2013 at the request of universities. Error data was corrected after reviewing input values and making inquiries of data which was presumed to be erroneous in order to secure reliability of input data. Survey from 25 colleges that correction of erroneous data was not made was excluded Survey Response Rate 297 colleges out of 366 colleges responded to survey (81.8%) which increased by 20.7% over 2012 [8]. 25 colleges which made an unfaithful reply to survey out of 297 colleges were excluded. Survey from 272 colleges was applied for this study. As far as enrollment quota of colleges whose survey was applied for this study was concerned, 59.56% was four-yearcourse colleges, 33.82% was two-year-course colleges and 6.62% was three-year-course colleges. As far as the number of students was concerned, less than 5,000 students was 49.26%, 5,000 10,000 students was 25.37%, 10,000 15,000 students was 10.29%, 15,000 20,000 students was 5.15%, and more than 20,000 was 9.93%. Table 2. Comparison of Survey Response Rate by year Year Number of colleges to be surveyed Number of colleges that responded Survey response rates KREN % KREN % KREN % 3. State of Colleges Informationization 3.1. General Area As far as general area was concerned, position of chief information officer (CIO), organization of informationization committee, personnel in charge of informationization, budget for informationization, informationization education, comprehensive plan for informationization, difficulties with promotion of informationization, CIO's interest level were surveyed. 95% of the colleges surveyed have CIO. In 3.7% of the colleges, vice president held a position of CIO with vice president. In 48.5% of the college academic affair committee member held a position of CIO with academic affair committee member. In 52.2% of the colleges, vice president or academic affair committee member held a position of CIO with vice president or academic affair committee member. 74.6% of the colleges have informationization committee. 61.4% of the colleges have informationization department. As far as personnel working in informationization department, regular position was 57.5 which decreased 15% over last year while temporary position was 16.8% and outsourcing was 25.7% which increased over last year. Average budget for informationization was 906 million won. Average total budget was 187,500 million won. Budget for informationization counted for 0.5% of total budget. As far as education that personnel working for informationization department take in 2012 was concerned, 35.4% took information security (personal information protection) related education and 27.9% took development environment and tool related education. Colleges that had long term informationization plan of over 5 years were Copyright c 2014 SERSC 49

4 39%. Colleges that had mid-term informationization plan of 3 4 years were 31.8%. Colleges that did not have informationization plan were 14.6%. As far as difficulties with promotion of informationization was concerned, insufficient budget was 44.6%, insufficient human resources was 34.1%, and insufficient mental attitude was 9.5%. CIO's interest (multiple response was allowed), improvement of college management efficiency through IT was 73.5% followed by support for IT service access (43.8%) Information System Area As far as information system area was concerned, state of information system server, information system operation method, school affair administration information system user authentication method, backup system operation, data center operation, direction of building next generation informationization system, cloud service provision, and cloud service provision types were surveyed. As far as number of servers possessed according to server size was concerned, number of small size server was 18 and number of medium size server was 6.7. As far as information system introduction method was concerned, development by subcontractors was prevalent in research administration system, general administration system, and school administration system. As far as school administration system was concerned, development by subcontractors was 49.2%, self-development or development by subcontractors was 33.8%, self-development was 14.7%, and introduction of commercial package was 1.9%. As far as school administration system was concerned, self-operation was 66.3% and combining self-operation with outsourcing was 22%. As far as school affair administration information system user authentication method was concerned, assigning ID and password faculty and students was 56.6% and using public key with ID/password was 34.8%. As far as information system server platform environment was concerned, number of CPU was 4.5, number of Core was 11.6, and memory was 43.5GB. 92.1% of the colleges operated back up system and 70.6% of the colleges out of the colleges that operated back up system had long-distance backup or storage of separate place. Colleges operating data center within campus was 80.8% and colleges that did not operate data center was 14.3%. As far as direction of building next generation informationization system was concerned, SI was 71.6% and introduction of ERP was 28.4%. Most of the colleges plan to build next generation informationization system through SI. As far as cloud service was concerned, colleges that did not provide cloud service were 94.4%. As far as colleges that provided cloud service was concerned, SaaS was 60%, PaaS was 20% and IaaS was 20%. As far as type of service was concerned, storage was 40% and mail was 26.7% Information Network Area As far as information network area was concerned, construction of wire network, internet backbone network connection, IP address possession, network management, method of building wireless LAN and method of maintaining information network were surveyed. As far as information network was concerned, 98.1% of the colleges operated wire information network which increased by 1.9% over last year. As far as internet backbone network was concerned, 94.3% of the colleges used Ethernet. As far as IP address was concerned, B class address was KREN (58.3%), LG U+(22.9%),and KT (14.6%) while C class address was KREN (52.6%), KT (22.8%), and LG U+(11.8%). As far as DNS operation method was concerned, using general server was 61.2% and using equipment for exclusive use of DNS was 32.7%. As far as network management was concerned, colleges that operated network management system(nms) was 50% and colleges that used both NMS and NAC was 9.6% and colleges that did not network management system was 35.8%. 95% of the colleges did 50 Copyright c 2014 SERSC

5 not consider operating next generation internet address (IPv6) and 1.9% of the colleges operated next generation internet address (IPv6). As far as method of building wireless LAN was concerned, building wireless LAN through collaboration of college and telecommunication operator was 41.2% and building wireless LAN through telecommunication operator was 26.1%. Building wireless LAN through telecommunication operator has increased. As far as method of maintaining information network, maintaining server, network and computer in an integrated manner was 35.4% and maintaining separately was 61.5%. Figure 1. Average ICT Budget / Information Difficulty when Driving / CIO Concern Status 3.4. Information Security Area As far as information security was concerned, number of information security certificate holders, number of personnel in charge of information protection, information protection operation, method of operating against infringement, connection risk management system and ECSC, compulsory duty in accordance with PC use and server and network security system operation were surveyed. Though information security is important, the colleges that had over one information security certificate holders was 12.9% while the colleges that did not have information security certificate holders was 85.7%. The colleges that had personnel in charge of information protection was 19.8% which increased by 4% over last year. 38.5% of the colleges had a person in charge of network deal with information protection, 24% of the colleges had a person in charge of server deal with information protection, and 22.1% of the colleges had a person in charge of other than information protection deal with information protection. The colleges that had an organization coping with infringement were 59.1% and the colleges that did not have an organization coping with infringement were 30.3%. The colleges that connected Educational Cyber Safety Center (ECSC) and Security Information Management System (TMS, SIMS) were 84.5%. The colleges that had compulsory duty for PC use with the aim of strengthening information security were 73.6% and the colleges that operated server and network safety system was 98.1%. Information security showed lower informationization than other area despite its importance. Copyright c 2014 SERSC 51

6 3.5. Education and Service Area As far as education and service was concerned, possession of equipment for rental of students, limit of concurrent access when registering for courses, cycle of complete reorganization of college homepage, types of homepage of departments and professors, provision of smart service, requirements for providing or expanding smart service, satisfaction with information service, intention to participate in group purchase of SW, and virtual course and on-line contents service were surveyed. As far as equipment for rental of students was concerned, notebook computer/netbook was 26.8%, and tablet was 8.5%. The colleges that did not limit concurrent access when registering for courses were 62.3%. As far as college homepage was concerned, complete reorganization of homepage every 3 years was 26.8% and complete reorganization of homepage every 5 years was 18.9%. As far as support and operation of homepage of departments and professors were concerned, support of construction and maintenance was 68.8%, provision of tools for construction was 14.7%, and design support was 9.9%. As far as service type was concerned, the colleges providing homepage service were 92.2% and the colleges providing cafe service was 15.5%. The colleges providing smart service were 68.3% and the colleges providing notice service was 70.7% and the colleges providing school affair administration service such as signing up for courses and check of result was 55.8%. The colleges surveyed said that the most urgent was securing contents for providing or expanding smart service (41.6%) followed by securing workers (29%). As far as implementation of survey of satisfaction with information service was concerned, the colleges that implemented survey of satisfaction with information service was 38.3% while the colleges that did not implement survey of satisfaction with information service was 61.7%. As far as intention to participate in group purchase of SW was concerned, the colleges that had intention of participating in group purchase of SW were 74.3%. The colleges that had intention of participating in group purchase of SW if 20% of purchasing cost could be reduced were 58.4%. The colleges that provided virtual course and on-line contents was 54%. The colleges surveyed said that the most necessary to provide virtual course and on-line content service was lecturers and education contents (93%) which suggests that lecturers and education are insufficient. Figure 2. Average ICT Budget / Information Difficulty when Driving / CIO Concern Status 52 Copyright c 2014 SERSC

7 4. Conclusion In this section, proposals to improve informationization of colleges based on result of evaluating informationization level of colleges were made. First, it is necessary to enhance position of Chief Information Officer(CIO) and secure budget for informationization in order to improve management efficiency through IT. As shown in Figure 1, the colleges which had vice president serve as CIO was 3.7%. If a person who did not have the right to decide policy served as CIO, securing budget for informationization and workers was limited. Securing security equipment for information system and experts is needed to make and promote informationization policy. Second, it is necessary to secure workers who will work for information security and increase informationization education. As shown in Figure 2, the colleges that have persons in charge of information protection increased by 4% over last year. The colleges that do not have information security certificate holder were 85.7%. The colleges that did not have a team to cope with infringement were 30.3%. Third, it is necessary to develop various contents and expand wireless network because provision of smart service has increased. As shown in Figure 3, it is important to expand wireless network because the use of information service has increased. Though the use of smart service increased rapidly, colleges provided only certain services such as notice service and registration service. It is necessary to develop various contents in order to meet the needs of people. Fourth, evaluation index of informationization is necessary when evaluating government's funding. Evaluation index of informationization is not included in items that evaluate funding. It is difficult for CIO with lower position to secure budget for informationization because colleges cannot help focus on items which are related to budget or financial support project. Fifth, it is necessary for government to support Korea Education Network. Almost all colleges join Korea Education Network and share information. Support for Korea Education Network help colleges build computer network. It is essential for government to continue supporting Korea Education Network so that Korea Education Network can serve as agency through which colleges share useful information and exchange it. References [1] Korea Education and Research Information Service, "Education Information White Paper 2012", Ministry of Education, Science and Technology, (2012). [2] Korea Association of Regional Information, "Information Statistical Data of 2012", Ministry of Public Administration and Security, (2012). [3] Korean Council for University Information, "University Information White Paper", Korean Council for University Information, (2012). [4] Korea Education and Research Information Service, "Analysis sourcebook of the university information technology services", Ministry of Education, Science and Technology, (2010). [5] Leah Lang and Pam Arroway, "2012 CDS Executive Summary Report", EDUCAUSE, (2013) January. [6] Susan Grajek and Pam Arroway, "The EDUCAUSE 2011 Core Data Service Report", EDUCAUSE, (2012) January. [7] Gyeongsang National University, "Study on University Information Status and Analysis in 2011", Korea Education Network Operations Division, (2011). [8] I-BIZNET, "Study on University Information Status and Analysis in 2012", Korea Education Network Operations Division, (2012). [9] [10] [11] [12] Copyright c 2014 SERSC 53

8 [13] Authors Tae-Yong Shim is a Administrator in the Department of Information & Computer Center in TongWon University, kyeonggido, Korea. He received his Ph.D. from Chungbuk National University. His current research interests are in the areas of System Administrator and Network Security. He is a member of the Korea Institute of Information Technology. Il-Jun Choi is a professor in the Department of Computer System Engineering in JungWon University, Chungbuk, Korea. He received his Ph.D. from Chungbuk National University. His current research interests are in the areas of Network Design and Network Security and Hadoop Cluster. He is a member of the Korea Institute of Information Technology. Jin Kim is a professor in the Department of Computer System Engineering in JungWon University, Chungbuk, Korea. He received his Ph.D. from Chungbuk National University. His current research interests are in the areas of Network Security and Information Security. He is a member of the Korea Institute of Information Technology. Young-Hun Lee Electronics Engineering, Donga University M.S. Electronics Engineering, Soongsil University Ph. D. Electronics Engineering, KyoungHee University Present. Professor in Electronics Engineering, Hannam University Major Field: Hybrid Circuit Design 54 Copyright c 2014 SERSC

Information Technology Plan 2013 of Korea University

Information Technology Plan 2013 of Korea University , pp.159-163 http://dx.doi.org/10.14257/astl.2014.51.36 Information Technology Plan 2013 of Korea University Tae-Yong Shim 1, Il-Jun Choi 2, and Jin Kim 3 and Young-Hun Lee 4 1 Department of Information

More information

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment , pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer

More information

Security Measures of Personal Information of Smart Home PC

Security Measures of Personal Information of Smart Home PC , pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate

More information

University Dedicated Next Generation ERP System

University Dedicated Next Generation ERP System , pp.38-42 http://dx.doi.org/10.14257/astl.2014.46.09 University Dedicated Next Generation ERP System Lee Yong Hui 1, Kim Hwan Seok 2 1 Shinsung University, Chief of Information Service Center, DaehackRo1

More information

A Research on Security Awareness and Countermeasures for the Single Server

A Research on Security Awareness and Countermeasures for the Single Server , pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business

More information

How to Use the Computer Network etc.

How to Use the Computer Network etc. Research Information Service Office Technical Report E012 December 2012 How to Use the Computer Network etc. For Staffs & Teachers of the Graduate School of Economics and Management Contents Ⅰ. Using the

More information

The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator

The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong

More information

A Study on UNIX Server Consolidation by Virtualization

A Study on UNIX Server Consolidation by Virtualization , pp.43-47 http://dx.doi.org/10.14257/astl.2014.46.10 A Study on UNIX Server Consolidation by Virtualization Lee Yong Hui 1, Kim Hyun Gi 2 1 Shinsung University, Chief of Information Service Center, DaehackRo1

More information

Policy Implications on Direction and Improvement of University Entrepreneurship Education

Policy Implications on Direction and Improvement of University Entrepreneurship Education , pp.131-135 http://dx.doi.org/10.14257/astl.2015.103.28 Policy Implications on Direction and Improvement of University Entrepreneurship Education 1 Lee Sin-Jeong*, Lee Young-Min** Sookmyung women s Univ*,

More information

Cloud Computing based Livestock Monitoring and Disease Forecasting System

Cloud Computing based Livestock Monitoring and Disease Forecasting System , pp.313-320 http://dx.doi.org/10.14257/ijsh.2013.7.6.30 Cloud Computing based Livestock Monitoring and Disease Forecasting System Seokkyun Jeong 1, Hoseok Jeong 2, Haengkon Kim 3 and Hyun Yoe 4 1,2,4

More information

User Authentication Platform using Provisioning in Cloud Computing Environment

User Authentication Platform using Provisioning in Cloud Computing Environment User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,

More information

Big Data Collection Study for Providing Efficient Information

Big Data Collection Study for Providing Efficient Information , pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and

More information

http://www.cisjournal.org A Conceptual Architectural Framework of Cloud Computing for Higher Educational Institutions in the Sultanate of Oman 1

http://www.cisjournal.org A Conceptual Architectural Framework of Cloud Computing for Higher Educational Institutions in the Sultanate of Oman 1 A Conceptual Architectural Framework of Cloud Computing for Higher Educational Institutions in the Sultanate of Oman 1 Zeyana Saif Alkindi, 2 John Haynes, 3 S. Arockiasamy 1 Demonstrator, Information Systems,

More information

South Korea Information and Communication Industry

South Korea Information and Communication Industry South Korea Information and Communication Industry Compiled by: Swiss Business Hub Korea Seoul, August 2011 Korea s ICT industry is divided into the ICT equipment, telecommunications services and software

More information

Mobile Hybrid Cloud Computing Issues and Solutions

Mobile Hybrid Cloud Computing Issues and Solutions , pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University

More information

Integration of Hadoop Cluster Prototype and Analysis Software for SMB

Integration of Hadoop Cluster Prototype and Analysis Software for SMB Vol.58 (Clound and Super Computing 2014), pp.1-5 http://dx.doi.org/10.14257/astl.2014.58.01 Integration of Hadoop Cluster Prototype and Analysis Software for SMB Byung-Rae Cha 1, Yoo-Kang Ji 2, Jong-Won

More information

Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service

Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service , pp. 195-204 http://dx.doi.org/10.14257/ijsh.2015.9.5.19 Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service Ju-Su Kim, Hak-Jun

More information

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Design and Implementation of Automatic Attendance Check System Using BLE Beacon , pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,

More information

Success factors for the implementation of ERP to the Agricultural Products Processing Center

Success factors for the implementation of ERP to the Agricultural Products Processing Center , pp.61-66 http://dx.doi.org/10.14257/astl.2015.95.12 Success factors for the implementation of ERP to the Agricultural Products Processing Center Jung Rock Do 1, Jin Hyeung Kim 2, Young Chan Choe 3 1

More information

Review of the Techniques for User Management System

Review of the Techniques for User Management System , pp.87-91 http://dx.doi.org/10.14257/astl.2014.46.20 Review of the Techniques for User Management System Jaegeol Yim *, Gyeyoung Lee *, Kyungsoo Ham * *Dongguk University at Gyeongju Korea, {yim, lky,

More information

The Development of an Intellectual Tracking App System based on IoT and RTLS

The Development of an Intellectual Tracking App System based on IoT and RTLS , pp.9-13 http://dx.doi.org/10.14257/astl.2015.85.03 The Development of an Intellectual Tracking App System based on IoT and RTLS Hak-Jun Lee 1, Ju-Su Kim 1, Umarov Jamshid 1, Man-Kyo Han 2, Ryum-Duck

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

Fujitsu s Approach to Cloud Computing

Fujitsu s Approach to Cloud Computing Fujitsu s Approach to Cloud Computing Kenta Miyazawa Cloud computing (hereafter cloud or clouds) has come to be specifically used in various fields. Private clouds are used in enterprises. Groups and individuals

More information

Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security

Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security International Distributed Sensor Networks Volume 2015, Article ID 581563, 5 pages http://dx.doi.org/10.1155/2015/581563 Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data:

More information

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

A Study on User Access Control Method using Multi-Factor Authentication for EDMS , pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University

More information

Study on the Nursing Practice Programs of the Nurses in Small to Medium Sized Hospitals

Study on the Nursing Practice Programs of the Nurses in Small to Medium Sized Hospitals , pp.259-266 http://dx.doi.org/10.14257/ijbsbt.2015.7.5.24 Study on the Nursing Practice Programs of the Nurses in Small to Medium Sized Hospitals Myoung-Jin Chung 1 and Bong-Sil Choi 2 1 Department of

More information

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data , pp. 169-178 http://dx.doi.org/10.14257/ijsh.2014.8.6.16 A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data Eun-Jee Song 1 and

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment , pp.18-22 http://dx.doi.org/10.14257/astl.2013.42.05 Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment Changhee Cho 1, Sanghyun Park 2, Jadhav Yogiraj

More information

ICT priorities in Canada

ICT priorities in Canada ICT priorities in Canada Enterprise ICT investment plans to 2013 November 2012 TABLE OF CONTENTS 1 Enterprise ICT investment trends... Error! 1.1 Introduction... Error! 1.2 Survey demographics... Error!

More information

A Study on the Psychological Exhaustion and Job Stress of Childcare Center Teachers (Centered Around the City of Ulsan)

A Study on the Psychological Exhaustion and Job Stress of Childcare Center Teachers (Centered Around the City of Ulsan) , pp.114-118 http://dx.doi.org/10.14257/astl.2015.92.24 A Study on the Psychological Exhaustion and Job Stress of Childcare Center Teachers (Centered Around the City of Ulsan) En-Young Lee 1, Seong-Je,

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

Cloud Panel Service Evaluation Scenarios

Cloud Panel Service Evaluation Scenarios Cloud Panel Service Evaluation Scenarios August 2014 Service Evaluation Scenarios The scenarios below are provided as a sample of how Finance may approach the evaluation of a particular service offered

More information

Comparison of Open Source Cloud System for Small and Medium Sized Enterprises

Comparison of Open Source Cloud System for Small and Medium Sized Enterprises , pp.276-282 http://dx.doi.org/10.14257/astl.2014.51.63 Comparison of Open Source Cloud System for Small and Medium Sized Enterprises Yasuo Uchida 1, Seigo Matsuno 1, Makoto Sakamoto 2 1 Ube National College

More information

The Common Challenges to the Successful Implementation of SmartWork Program

The Common Challenges to the Successful Implementation of SmartWork Program , pp.127-132 http://dx.doi.org/10.14257/ijmue.2014.9.2.12 The Common Challenges to the Successful Implementation of SmartWork Program Kyung Jin Cha 1 and Joon Seub Cha 2 1 KeiMyung University, 1095 Dalgubeol-daero,

More information

System Framework of Livestock Disease Forecasting based on Cloud

System Framework of Livestock Disease Forecasting based on Cloud , pp.177-181 http://dx.doi.org/10.14257/astl.2015.95.34 System Framework of Livestock Disease Forecasting based on Cloud Sangshin Park, Hyun Yoe 1 Department of Information and Communication Engineering,

More information

Software Rental subscription payable monthly in advance $ 120.00. Initial 3 months rental $ 360.00

Software Rental subscription payable monthly in advance $ 120.00. Initial 3 months rental $ 360.00 Option 1. Rental plan Named user licensing plan (please see explanation below) Small Business Edition One to Three (1-3) Users Software Rental subscription payable monthly in advance $ 120.00 Total initial

More information

Performance Comparison Analysis of Linux Container and Virtual Machine for Building Cloud

Performance Comparison Analysis of Linux Container and Virtual Machine for Building Cloud , pp.105-111 http://dx.doi.org/10.14257/astl.2014.66.25 Performance Comparison Analysis of Linux Container and Virtual Machine for Building Cloud Kyoung-Taek Seo 1, Hyun-Seo Hwang 1, Il-Young Moon 1, Oh-Young

More information

Since 1992, Total Solution Provider. Company Introduction. Samjung Data Service co., Ltd. http://www.sds.co.kr

Since 1992, Total Solution Provider. Company Introduction. Samjung Data Service co., Ltd. http://www.sds.co.kr Since 1992, Total Solution Provider Company Introduction Samjung Data Service co., Ltd. http://www.sds.co.kr Index 1. Overview 2. History 3. Organization 4. Business Area 5. Service Introduction 6. Acquiring

More information

An Empirical Analysis on the Performance Factors of Software Firm

An Empirical Analysis on the Performance Factors of Software Firm , pp.121-132 http://dx.doi.org/10.14257/ijseia.2014.8.7,10 An Empirical Analysis on the Performance Factors of Software Firm Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi and Jae-Sung Choi #3-707, DGIST,

More information

A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan

A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan , pp.61-66 http://dx.doi.org/10.14257/ijmue.2015.10.12.07 A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan Yun-Seong Ko 1, Il-Kyeun Ra 2 and Chang-Soo Kim 1* 1 Department

More information

Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology

Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology Yun Cui 1, Myoungjin Kim 1, Seung-woo Kum 3, Jong-jin Jung 3, Tae-Beom Lim 3, Hanku Lee 2, *, and Okkyung Choi 2 1

More information

Mobility Challenges & Trends The Financial Services Point Of View

Mobility Challenges & Trends The Financial Services Point Of View Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions

More information

A Design of Access Control Framework for User Identification Based on Personal Cloud

A Design of Access Control Framework for User Identification Based on Personal Cloud , pp.17-21 http://dx.doi.org/10.14257/astl.2014.49.04 A Design of Access Control Framework for User Identification Based on Personal Cloud Byung-Wook Jin and Keun-Wang Lee Department of Computer Science,

More information

CLOUD COMPUTING TECHNOLOGY INFRASTRUCTURE TO SUPPORT THE KNOWLEDGE MANAGEMENT PROCESS (A CASE STUDY APPROACH)

CLOUD COMPUTING TECHNOLOGY INFRASTRUCTURE TO SUPPORT THE KNOWLEDGE MANAGEMENT PROCESS (A CASE STUDY APPROACH) CLOUD COMPUTING TECHNOLOGY INFRASTRUCTURE TO SUPPORT THE KNOWLEDGE MANAGEMENT PROCESS (A CASE STUDY APPROACH) RATNA SARI, YOHANNES KURNIAWAN Bina Nusantara University, Department of Information Systems,

More information

- 1 - SmartStor Cloud Web Admin Manual

- 1 - SmartStor Cloud Web Admin Manual - 1 - SmartStor Cloud Web Admin Manual Administrator Full language manuals are available in product disc or website. The SmartStor Cloud Administrator web site is used to control, setup, monitor, and manage

More information

A Study of Savings of Power Consumption and Server Space through Integrated Virtualization of UNIX Servers

A Study of Savings of Power Consumption and Server Space through Integrated Virtualization of UNIX Servers , pp.255-260 http://dx.doi.org/10.14257/ijmue.2014.9.9.27 A Study of Savings of Power Consumption and Server Space through Integrated Virtualization of UNIX Servers Lee Yong Hui 1 and Kim Hwan Seok 2 1

More information

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption

An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption , pp.155-164 http://dx.doi.org/10.14257/ijsh.2013.7.5.16 An Explorative Model for B2B Cloud Service Adoption in Korea - Focusing on IaaS Adoption Kwang-Kyu Seo Department of Management Engineering, Sangmyung

More information

Education for Job Performance and Attitude of Receptionists in General Hospital Front Desk

Education for Job Performance and Attitude of Receptionists in General Hospital Front Desk , pp.119-124 http://dx.doi.org/10.14257/astl.2015.92.25 Education for Job Performance and Attitude of Receptionists in General Hospital Front Desk Yeon Suk Oh 1, Mi Joon Lee 2, Bum Jeun Seo 3 1 Manager,

More information

customer Deliver Value reality COMPANY INTRODUCTION

customer Deliver Value reality COMPANY INTRODUCTION Voice Listen to of Deliver Value customer Vision Make a reality Headquarters : 4F, SHINMYUNG Bldg., 136, Yeoksam-ro, Gangnam-gu, Seoul, Korea Research Center : 9F, LINE Bldg., 16, Teheran-ro 14-gil, Gangnam-gu,

More information

A Study among Chinese Tourists in their 20s and 30s for Determining their Choice of Medical Tourism Destinations

A Study among Chinese Tourists in their 20s and 30s for Determining their Choice of Medical Tourism Destinations , pp.13-20 http://dx.doi.org/10.14257/ijunesst.2015.8.9.02 A Study among Chinese Tourists in their 20s and 30s for Determining their Choice of Medical Tourism Destinations Mi Joon Lee 1, In Soon Min 2

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

Concept Design of Testbed based on Cloud Computing for Security Research

Concept Design of Testbed based on Cloud Computing for Security Research , pp.19-23 http://dx.doi.org/10.14257/astl.2013 Concept Design of Testbed based on Cloud Computing for Security Research ByungRae Cha and JongWon Kim School of Information and Communications, GIST, Korea

More information

Structure Based Mobile Device Applications Enterprise Mobility

Structure Based Mobile Device Applications Enterprise Mobility , pp.265-272 http://dx.doi.org/10.14257/ijseia.2014.8.6.21 Structure Based Mobile Device Applications Enterprise Mobility Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology, Catholic

More information

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Vol.8, No.3 (2014), pp.175-180 http://dx.doi.org/10.14257/ijsh.2014.8.3.16 A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Hong-Kyu Kwon 1 and Kwang-Kyu Seo 2* 1 Department

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

Studying Security Weaknesses of Android System

Studying Security Weaknesses of Android System , pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced

More information

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval , pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication

More information

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks , pp. 205-216 http://dx.doi.org/10.14257/ijseia.2015.9.9.18 Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic

More information

Component Based Development for Mobile Enterprise Application

Component Based Development for Mobile Enterprise Application Vol.35(Software 2013), pp.31-35 http://dx.doi.org/10.14257/astl.2013.35.08 Component Based Development for Mobile Enterprise Application Yvette E. Gelogo 1 and Haeng-Kon Kim 1* 1 School of Information

More information

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,

More information

Development of a User Management Module for Internet TV Systems

Development of a User Management Module for Internet TV Systems , pp.43-56 http://dx.doi.org/10.14257/ijmue.2015.10.11.05 Development of a User Management Module for Internet TV Systems Kangjai Lee 1 and Jaegeol Yim 2* 1 Dept. of Computer Information, Suwon Science

More information

A Research on the English for Engineering Students Course Based on Needs Analysis in Korea

A Research on the English for Engineering Students Course Based on Needs Analysis in Korea A Research on the English for Engineering Students Course Based on Needs Analysis in Korea Hyun Hyo Kim Kongju National University, Korea hhkim@kongju.ac.kr Abstract. As Korea has been implementing export-oriented

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

Security management in the internet era

Security management in the internet era Security management in the internet era Cloud Security (1) Septemberr 29, 2011 Jun Murai Keio University! Suguru Yamaguchi! Nara Institute of Science and Technology! Schedule 01st (09/22) Course Description

More information

A Critical Juncture and an Emerging New Paradigm of Health Insurance Policy in Korea: A Theoretical Review

A Critical Juncture and an Emerging New Paradigm of Health Insurance Policy in Korea: A Theoretical Review , pp.36-41 http://dx.doi.org/10.14257/astl.2015.88.08 A Critical Juncture and an Emerging New Paradigm of Health Insurance Policy in Korea: A Theoretical Review JongEun Yim 1, MyungHee Kim 2* 1 Department

More information

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems , pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research

More information

ICT Priorities in Pharmaceuticals

ICT Priorities in Pharmaceuticals ICT Priorities in Pharmaceuticals Enterprise ICT investment plans December 2013 TABLE OF CONTENTS 1 1 Enterprise ICT investment trends... 5 1.1 Introduction... 5 1.2 Survey demographics... 5 1.3 ICT budget

More information

Korea s Innovative GIDC Development

Korea s Innovative GIDC Development Korea s Innovative GIDC Development Definition of Government Integrated Data Center GIDC provides facility infrastructures, ICT infrastructures and e-government application services that are required

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Effectiveness of Flipped learning in Project Management Class

Effectiveness of Flipped learning in Project Management Class , pp. 41-46 http://dx.doi.org/10.14257/ijseia.2015.9.2.04 Effectiveness of Flipped learning in Project Management Class Jeong Ah Kim*, Hae Ja Heo** and HeeHyun Lee*** *Department of Computer Education

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013 The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs

More information

Information Security

Information Security Information Security CDS Spotlight: June 2013 Research Bulletin June 14, 2013 ECAR CDS Spotlight Series Gregory W. Hedrick, Director, Security Services, Purdue University Joanna Grama, Portfolio Manager,

More information

Design and Analysis of Mobile Learning Management System based on Web App

Design and Analysis of Mobile Learning Management System based on Web App , pp. 417-428 http://dx.doi.org/10.14257/ijmue.2015.10.1.38 Design and Analysis of Mobile Learning Management System based on Web App Shinwon Lee Department of Computer System Engineering, Jungwon University,

More information

Cyber Forensic for Hadoop based Cloud System

Cyber Forensic for Hadoop based Cloud System Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division

More information

An Efficient Application Virtualization Mechanism using Separated Software Execution System

An Efficient Application Virtualization Mechanism using Separated Software Execution System An Efficient Application Virtualization Mechanism using Separated Software Execution System Su-Min Jang, Won-Hyuk Choi and Won-Young Kim Cloud Computing Research Department, Electronics and Telecommunications

More information

4787 Cotton Run Road ~ Hamilton, Ohio 45011 ~ mobile: 513-324-8686 ~ email: keithweber57@gmail.com

4787 Cotton Run Road ~ Hamilton, Ohio 45011 ~ mobile: 513-324-8686 ~ email: keithweber57@gmail.com 4787 Cotton Run Road ~ Hamilton, Ohio 45011 ~ mobile: 513-324-8686 ~ email: keithweber57@gmail.com Career Eleven Years of Executive Leadership Experience in Higher Education Summary Vice President for

More information

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone Contents Contents 1 2 3 4 5 6 7 Significance of SMEs in Urban Development SME Status Quo IT Capabilities

More information

Student Affairs Information Technology Policies. January 2013

Student Affairs Information Technology Policies. January 2013 Student Affairs Information Technology Policies January 2013 Contents Applications Consultants and Non-SAIT Technical Staff Computers and Equipment Data: Local, Network, and Backups E-Mail Relationships

More information

A Study on Smart Phone Use Condition of Infants and Toddlers

A Study on Smart Phone Use Condition of Infants and Toddlers , pp.123-132 http://dx.doi.org/10.14257/ijsh.2013.7.6.12 A Study on Smart Phone Use Condition of Infants and Toddlers Yu-Mi Baek 1, Jeong-Min Lee 2 and Kyu Soo Kim 3 1 Yu-Mi Baek. Professor, Dept. of Education

More information

Connecting to the University Wireless Network

Connecting to the University Wireless Network Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded

More information

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,

More information

On-Demand Virtual System Service

On-Demand Virtual System Service On-Demand System Service Yasutaka Taniuchi Cloud computing, which enables information and communications technology (ICT) capacity to be used over the network, is entering a genuine expansion phase for

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

Focus On Educating! How to remove the headache of financing and supporting your school s ICT through Outsourcing. Presentation by:

Focus On Educating! How to remove the headache of financing and supporting your school s ICT through Outsourcing. Presentation by: Focus On Educating! How to remove the headache of financing and supporting your school s ICT through Outsourcing Presentation by: Lisette Sens Head of Channel, Zynstra Educational icon? (CP) 22 nd January,

More information

Software Applications, ICT Services and Infrastructure in Large Scale Enterprises in Poland 2015

Software Applications, ICT Services and Infrastructure in Large Scale Enterprises in Poland 2015 Brochure More information from http://www.researchandmarkets.com/reports/3291833/ Software Applications, ICT Services and Infrastructure in Large Scale Enterprises in Poland 2015 Description: This report

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea shkim@kaist.ac.kr

More information

Network Service Policy

Network Service Policy Network Service Policy TABLE OF CONTENTS PURPOSE... 3 SCOPE... 3 AUDIENCE... 3 COMPLIANCE & ENFORCEMENT... 3 POLICY STATEMENTS... 4 1. General... 4 2. Administrative Standards... 4 3. Network Use... 5

More information

A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario

A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario , pp. 55-64 http://dx.doi.org/10.14257/ijseia.2015.9.9.06 A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario Yong-Hyeon Gwon 1, Seung-Kwon Jung 2, Su-Won Lee 2 and

More information

Ready to communicate with a better tomorrow. AHRANTA COMPANY INTRODUCTION. Copyrightc 1991-2014 AHRANTA All Rights Reserved.

Ready to communicate with a better tomorrow. AHRANTA COMPANY INTRODUCTION. Copyrightc 1991-2014 AHRANTA All Rights Reserved. Ready to communicate with a better tomorrow. AHRANTA COMPANY INTRODUCTION CONTENTS 01 02 03 Overview History Major Business 1) Business Area 2) Main Product 3) Customers 04 Patents and Awards 1) Patents

More information

1. Introduction. Abstract

1. Introduction. Abstract Vol.6, No. 6 (2014), pp.129-134 http://dx.doi.org/10.14257/ijbsbt.2014.6.6.13 A Study on the Medical Dispute Experience and Educational Needs of Dental Hygienists According to Expansion of Health Insurance

More information

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

ICT investment trends in Brazil. Enterprise ICT spending patterns through to the end of 2015 May 2014

ICT investment trends in Brazil. Enterprise ICT spending patterns through to the end of 2015 May 2014 ICT investment trends in Brazil Enterprise ICT spending patterns through to the end of 2015 May 2014 1 Trends in ICT budgets 1.1 Summary This report presents the findings from a survey of Brazilian enterprises

More information

Cloud Computing Survey Perception of the companies. DPDP - Macedonia

Cloud Computing Survey Perception of the companies. DPDP - Macedonia Cloud Computing Survey Perception of the companies DPDP - Macedonia Survey regarding the awareness of the companies in relation to Cloud computing in Macedonia Executive summary The survey was conducted

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information