http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Feruza Nurimova,Kang Tae-Koo 한국무역연구원 2013 무역연구 Vol.9 No.2
This study examines how parent firms' firm-specific advantages and choice of entry modes influence the performance of their foreign subsidiaries. The results indicate that their firm-specific advantages and entry mode choice had positive effects on their foreign subsidiaries' performance. More specifically, parent firms with clear firm-specific advantages were likely to have wholly owned subsidiaries that outperformed joint ventures; firm-specific advantages, including assets, R&D investment, and local expertise, had positive effects on the performance of subsidiaries; wholly owned subsidiaries of firms with firm-specific advantages in R&D investment and local expertise outperformed their joint ventures; and the higher the number of a parent firm's subsidiaries, the more likely the parent firm was to have joint ventures that outperformed wholly owned subsidiaries. This study contributes to FDI research by examining the economic relations between South Korea and Uzbekistan. The results indicate that the number of firm-specific advantages had a positive effect on the performance of subsidiaries, which is consistent with the findings of previous studies. In addition, wholly owned subsidiaries of firms with advantages in R&D investment and local expertise outperformed that are investing with joint ventures. The hypotheses were empirically tested based on a sample of Korean subsidiaries in Uzbekistan. For the reliability of the sample, the performance of these subsidiaries was determined using both subjective (managers' evaluation of the market share) and objective (return on assets) measures.
Advanced Security Model of BSM with New Approach
Feruza Sattarova Yusufovna 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.2
Information is an essential resource for all businesses today and is the key to growth and success. However, we need to ensure that the information held on our IT systems is secure. The impact of a security breach may be far greater than we would expect. The loss of sensitive or critical information directly may not only affect our competitiveness and cash flow but also damage our reputation - something which may have taken us years to establish and which may be impossible to restore. In our paper we introduce a structure of Business Service Management (BSM) with security approach offering an advanced model of integrated secure BSM model.
Separated SCADA Environment as a Security Approach
Feruza Sattarova Yusufovna,Rosslin John Robles,Min-kyu Choi,Maricel O. Balitanas,Farkhod Alisherov Alisherovich,Nayoun Kim,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Supervisory Control and Data Acquisition (SCADA) systems are critical to the safe, reliable and efficient operation of many essential services that affect the daily lives of millions of people. These services include power generation plants, potable water systems, wastewater treatment facilities, oil and gas production and transportation/distribution networks. In today’s uncertain world, security stands beside profitability, productivity, performance and control as a key element for maintaining business activities in industrial facilities. Prevention of malicious attacks against business infrastructure has become as vital to ongoing success as has the widespread use of the computer systems which make such attacks so easy and so painful. The vulnerabilities and condition of security of SCADA networks are considered in this paper. Also approaches on how to best secure SCADA system are discussed.
Implementing Intrusion Detection System against Insider Attacks
Feruza Sattarova Yusufovna,Seong-eon Cho 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Insiders pose the top corporate security threat today. Recent reports indicate that insider breaches have risen from 80% to 86% of all incidents, with more than half occurring after employee termination. Not surprisingly, internal employees who are authorized to access company systems are most likely to be linked to fraud or a security breach?and of all employees, IT staff members have the most resources to do so.
Feruza Sattarova Yusufovna 사단법인 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.2
In any system, the network firewall is the main feature which will be protecting the system from getting attacked from any illegal intruders who will try to hack the system and steel the information from the network. These firewalls have been involving in the optimization that has to be done when any other tries to come through the other firewall and sharing the information will improve the network performance very well. Firewall will be mainly concentrating on intra firewall and also inter firewall optimization that will be helpful to improve the security of the network. Previously, there has been the use of cross-domain privacy preserving cooperative firewall policy optimization protocol. But there is no improvement that made a lot of difference in the native methods used. So we propose secure multi-party computation of union which will be improving the firewall optimization and also improving the security very well when compared to the all the previous methods.
Design of Integrated Secure Business Service Management
Feruza Sattarova Yusufovna,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
In this paper a structure of business service management integrated with security management is offered. Our integrated BSM model with security approach is the hierarchy of data management in any growing business. It creates a logical flow of data from its inception into the organization through the management levels. Thus, allowing for proactive business decisions to be made on a consistent basis. The end result is an increase in both corporate flexibility and profitability. It encompasses the process and use of Customer Data Management, Customer Relationship Management, Enterprise Resource Planning and Business Insurance all supported by a robust Service Desk.
Advanced Model of Business Service Management with Security Approach
Feruza Sattarova Yusufovna,Nayoun Kim,Eun-suk Cho,Seok-soo Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Information is an essential resource for all businesses today and is the key to growth and success. However, we need to ensure that the information held on our IT systems is secure. The impact of a security breach may be far greater than we would expect. The loss of sensitive or critical information directly may not only affect our competitiveness and cash flow but also damage our reputation - something which may have taken us years to establish and which may be impossible to restore. In our paper we introduce a structure of Business Service Management (BSM) with security approach offering an advanced model of integrated secure BSM model.
An Effective Approach in Building an Intelligent Intrusion Detection System
Feruza Sattarova Yusufovna,Seong-eon Cho 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Intrusion detectionsystems have proved to be an effective instrument for protecting computer and network resources. In addition to preventive security mechanisms as authentication, encryption, or access control, they provide an automatic detection of security violations. Inour paper we propose a new model of Intrusion Detection System (IDS) which combines fuzzy logic with data mining with simplified structure.
Effective Estimation Software cost using Test Generations
Feruza Sattarova Yusufovna,Farkhod Alisherov 사단법인 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.1
In software engineering, we have many problems particularly with software cost estimation and the assessment of the evaluation model. Software cost estimation mainly depends on two factors which are the estimation consistency and estimation accuracy. These are very much important to the perfect development of the software without any drawbacks to it. In the past there have been many models and techniques that have failed to give the correct software estimation that really challenges the all factors of perfect software in this paper we use software requirement specification but we were not getting the accurate results that are helpful for developing of perfect software that is having perfect cost estimation. So we introduce the Automated Test-Data Generation Techniques method that gives us the desired results which will be helping us to know the software cost estimation very much accurately and also estimate consistently.