검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 2

        1.
        2003.10 구독 인증기관 무료, 개인회원 유료
        According to increasing extended use of ERP from intranet to extranet environment, from enterprise internal use to suppliers and business partners and from wired to wireless devices, it became very important to authenticate proper user allow to access proper application module and database, not only to protect enterprise information asset but also keep data integrity. In this document, we introduce the technologies of privilige management infrastructure, role based access control and the building of privilige management system for ERP implementation regarding this point of view.
        3,000원
        2.
        2015.06 KCI 등재 서비스 종료(열람 제한)
        In this article, we analyze the decision of the Supreme Court in Korea with respect to the unauthorized modification of information and the immediacy of property disposal in a computer fraud critically. In the mentioned case, the defendant was charged with unlawful behavior to change the information by installing a hacking program on electronic bidding system of an administrative office. The author evaluated the defendant‘s conduct at issue not as an unauthorized change of information, but as an input of false information or illegal command input for computer. In terms of the immediacy of property disposal, this paper contends that we can’t say that computer fraud doesn’t hold, without exception, if a person involved in the property disposal process. In order to determine whether the computer fraud is established, we have to analyze the contents of the involved individual’s action in detail.