위메프의 '개인화 추천 이메일 서비스'는 최근 고객들의 클릭·구매 이력을 바탕으로, 고객 개인별로 최적화된 상품을 추천해 고객의 쇼핑 피로도를 최소화하는 동시에 관련 상품 구매도 적극 유도하고 있다. 특히 고객이 사이트에 들어와 클릭하거나 구매한 이력들을 분석해 관심 카테고리를 만들고
1. List and describe the security controls
and weaknesses at TJX Companies
TJX used Wired Equivalent Privacy (WEP) encryption system which was easy for hackers to attack. Furthermore, TJX had neglected to install firewalls and data encryption on many of the computers in the wireless network. Besides, TJX transmitted credit card details to banks without encryption, violating credit card com
with their existing database, G market can use this source to CRM. This procedure will explained in the following parts.
3.2 ISP& ESCROW&SSL
To ensure the security of E-commerce, G market provides some security program for transaction. This is represented by ISP, ESCROW service. Also, there is a SSL protocol that is used to protect the private information and credit card information.
data need to be collected. This is done through the Bus Management System (BMS). It was developed in 2005, becoming the first bus management system in Korea. The major function of BMS is the control of bus services by showing the current condition of bus operations, and the distance between the earlier and following buses to manage the time in which buses arrive at the bus stops. It does so by co
Browse the integrated information easily?
KAMO
KAIST Mobile Portal
How can Administrator Manage All the Information efficiently?
CRMS
Campus Resource Management System
SW Infrastructure includes Legacy IT Systems
KAIST Web Portal, LMS, Web Mail,
KAIPA, ERP, Cyber-KAIST
HW Infrastructure collects various data from sensors
GPS, Surveillance devices, Digital Meters, Security Access