• Title/Summary/Keyword: 정보시스템(IS) 성과

Search Result 12,822, Processing Time 0.052 seconds

A Case Study on the Information Systems Audit of a Bank (은행 정보시스템 감사에 관한 사례 연구)

  • Hwang, Gyeong-Tae;Kim, Song-Ju
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.467-476
    • /
    • 2002
  • Importance of Information Systems in banking industry is higher than that of other industries. This study, based on a case study of a bank, analyzes the current status of information systems (IS) audit and proposes future directions in the area of IS control and audit. Major problems identified in the study include deficiency of IS and audit process, and inability of audit function to improve IS process. In addition, deficiency of staffing level and investment in R&D, and lack of competency and independence of audit staff are identified. In order to solve the problems, the following directions were proposed proper division of functions among audit related departments, utilization of outside audit function, and adoption of CSA, CAAT, career path program, risk-based audit approach. The results of the studs will provide valuable implications to banks and companies in other industries. Also the research framework employed in the study can be utilized in the future research in IS control and audit.

A Study of Methods of Authentication and Access Controls for Financial Information System Operators (금융정보시스템 운영자의 접근통제 기법에 관한 연구)

  • Lee, Jae-yun;Shim, Ho-sung;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.921-923
    • /
    • 2014
  • Financial information systems in financial institutions are characterized in providing financial services concatenated with various types of customer information. The leakage of those information could lead to pecuniary loss and non-pecuniary loss such as psychological pains suffered, etc. in terms of customer damages. Therefore, it is imperative for the operational authentication to be confirmed previously in their access to the financial systems and in work operations. The aim of this study is to analyze the methods of authentication and access controls for appropriate system operators.

  • PDF

Study on Improving the Data Efficiency in National Defense Financial Information (국방통합재정정보 데이터 효율성 향상 방안 연구)

  • Moon, Jaehun;Kang, Seokjoong;Kim, Dokyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1764-1776
    • /
    • 2014
  • This study is the context about an introduction of a bookkeeping by double entry & accrual base accounting which is the turning point of National Accounting and defense integrated financial management which is delivered following system Digital Budget Accounting system, in other words about something to do with the improvement of efficiency of financial information data. National defense Integration Financial Information system (NDIFIS) facilitates Project program management and makes the whole process of Defense financial Business manageable in one system. Also, there is a purpose to increase the credibility and transparency of National defense finances by providing internal and external information users with credible financial statements and cost materials. By using data envelopment analysis (DEA) which is a useful method to measuring the efficiency of organization, this study aims to improve the financial information data efficiency by comparing the efficiency of the same type troops and when it comes to the inefficient troops, by offering the certain objective of efficiency.

A Design of Vehicle Management System Apply Most Network And Sensor (MOST 네트워크와 센서를 활용한 차량 관리 시스템 설계)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.08a
    • /
    • pp.95-98
    • /
    • 2008
  • The vehicle has many technique change from The requirement of the safety the energy environment and convenience dimension is an enlargement toe. This is keeping changing the paradigm of the vehicle industry rapidly. The change to be technical such brought the intelligence of the former control device. And this organizes a sensor network among each systems and makes new traffic system. This paper a standard framework based on Sensor. We call it Vehicle Management System. The VMS used MOST network and It is able to make the stability of the component swap time or vehicle order the greatest.

  • PDF

Common Body of knowledge of IS Audit (정보시스템 감리의 지식체계)

  • 신동익
    • Proceedings of the Korea Database Society Conference
    • /
    • 2002.10a
    • /
    • pp.212-223
    • /
    • 2002
  • 정보시스템감리의 유용성과 중요성이 날로 점증하고 있는 시점에서 정보시스템감리인이 되고자 할 때 기본적인 공통지식에 대한 세밀한 정의가 부족하여 어려움을 겪는 사례가 많이 발생되고 있다. 본 논문은 정보시스템감리 관련 국내외 체계를 분석하고 국내의 감리 실무를 참조하여, 정보시스템감리의 공통 지식체계를 도출하고자 하였다. 아직까지는 높은 수준에서 분석이 이루어졌으나 추후 좀더 세밀한 연구가 진행되면 정보시스템감리 분야의 전문성 향상에 도움이 되리라 생각된다.

  • PDF

A Proposal of Efficient Method for Data Center Information System Migration (데이터센터 정보시스템 이전을 위한 효율적인 방안 제시)

  • Song, Min-Gu;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.201-210
    • /
    • 2014
  • Recently, the more complicated with the elements made of information system, the more dangerous in migration them. So it is need to accomplish information system migration systematically. According to the movement of public institution, a large scale of information system migration is in processing and will be made. In this paper, I would like to suggest the use of migration solution in order to speed & effect information system migration process. This will be provided the pursuit function of information system movement, movement location pursuit in real time, monitoring function through the situation room, separation migration possibility on the basis of business attribute. Therefore, if you use the suggested solution, it will be decreased trial and error & minimized the movement time.

Design and Implementation of Alert Analysis System using Correlation (연관성을 이용한 침입탐지 정보 분석 시스템의 설계 및 구현)

  • 이수진;정병천;김희열;이윤호;윤현수;김도환;이은영;박응기
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.438-449
    • /
    • 2004
  • With the growing deployment of network and internet, the importance of security is also increased. But, recent intrusion detection systems which have an important position in security countermeasure can't provide proper analysis and effective defence mechanism. Instead, they have overwhelmed human operator by large volume of intrusion detection alerts. In this paper, we propose an efficient alert analysis system that can produce high level information by analyzing and processing the large volume of alerts and can detect large-scale attacks such as DDoS in early stage. And we have measured processing rate of each elementary module and carried out a scenario-based test in order to analyzing efficiency of our proposed system.

A product recommendation system based on adjacency data (인접성 데이터를 이용한 추천시스템)

  • Kim, Jin-Hwa;Byeon, Hyeon-Su
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2011
  • Recommendation systems are developed to overcome the problems of selection and to promote intention to use. In this study, we propose a recommendation system using adjacency data according to user's behavior over time. For this, the product adjacencies are identified from the adjacency matrix based on graph theory. This research finds that there is a trend in the users' behavior over time though product adjacency fluctuates over time. The system is tested on its usability. The tests show that implementing this recommendation system increases users' intention to purchase and reduces the search time.

The Leadership of CEO and the Building up of Strategic Information Systems: THEFACESHOP Korea Case (CEO의 리더십과 전략적 정보화 시스템의 구축: 더페이스샵 코리아 사례를 중심으로)

  • Lee, Mi-Young;Park, Yang-Kyu;Kim, Woo-Bong;Ahn, Ji-Hyun
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.183-207
    • /
    • 2009
  • In general, the introduction of information technology to domestic small and middle size firms is depending on the governmental supporting policy. However, even under this situation there is also a case that the building up of information technology is initiated by the management of small and middle size firms. An accumulated know-how for information technology and powerful leadership in such firms are considered as success factors. This study attempts to analyze a case for 'THEFACESHOP', in which MIS is successfully built. To achieve corporate goals, the CEO of THEFACESHOP based on the extensive knowledge of information technology drove to build up information system. Also, the board of directors supported him, and employees committed to their organization. Through the strong leadership of the CEO, the information system of THEFACESHOP became sufficient and efficient. And it led the organization and the information system to be competitive. In particular, the systematic approach of THEF ACESHOP reinforcing its competitiveness can be summarized as follows: First, it tried to construct basic information systems as like ERP etc. to increase work-efficiency. Second, it completed CRM related systems for analysis to maximize its customer orientation and marketing effect. Third, the last step can be stated as the building up of operation related CRM systems to improve the responsiveness of target marketing activities and the profitability of its agencies. Such endeavors of THEFACESHOP contributed to increase productivity and performance of the organization. As a result, THEFACESHOP has had its own 'Natural Story' and price competitiveness. For that reason THEFACESHOP became the best of brand-shop cosmetic firms. This success based on the strong leadership and the systematic investment on the information system.

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (네트워크 보안 효율성 제고를 위한 보안 QoS(Quality of Service) 측정방법론 연구)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.39-48
    • /
    • 2011
  • QoS(Quality of Service) is defined "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. The final goal of information system is to secure the performance efficiency within the required time. The security QoS framework is the modeling of the QoS measurement metrics, the measurement time schedule, instrument, method of measurement and the series of methodology about analysis of the result of measurement. This paper relates to implementing issue and performance measuring about blended mechanism between networking technology and security technology. We got more effectiveness in overall network security, when applying and composing amalgamated security mechanism between network technology and security technology. In this paper, we suggest techniques being used on infrastructure system and also offers a security QoS methodology as a model of more effective way. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method.