• Title/Summary/Keyword: 정보시스템(IS) 성과

Search Result 12,822, Processing Time 0.045 seconds

Impact of the IS Audit on Software Process (정보시스템 감리가 소프트웨어 프로세스에 미치는 영향)

  • 정승렬;문대원;신동익
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.425-434
    • /
    • 1999
  • 감리 효과성에 관한 연구가 중요한 이유는 효과적인 감리 수행이 조직의 정보시스템 개발 및 자원관리에 어떠한 영향을 미치는 지를 파악하여, 그 결과 향후 감리 제도의 추진방향 제시 및 역할 정립을 할 수 있기 때문이다. 본 연구는 정보시스템 감리의 효과성을 프로세스 관점에서 정의하고 실제로 이러한 감리가 소프트웨어 프로세스를 향상시키는데 영향을 미치는 지를 살펴본다. 이를 위해 본 연구는 정보시스템 감리를 실시한 공기업을 대상으로 설문 조사를 실시하며 그 효과를 CMM 모델을 이용하여 분석한다.

  • PDF

A Case Study on the Hospital Information Systems Usability (병원정보시스템 사용성에 대한 실증연구)

  • Park, Chan-Seok;Lee, Hyen-Uoo;Koh, Seok-Ha
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.289-311
    • /
    • 2008
  • This study is a development of quality scale and a measurement of quality levels for the Hospital Information System(HIS) used in the hospital industry. This study is to provide decision-making guidelines for hospital managers, system analysts, and software designers, and to provide feedback for the users' information needs. The target people of the study were medical doctors, nurses, pharmacists, and clerical staff. The service contexts of usability were diagnosis/treatment, nursing, medicine preparation, and treatment fee receipt/claim. The quality factors were the efficiency, effectiveness, and satisfaction of IS09241-11. This study shows that the current domestic HISs are mostly based on patient diagnosis/treatment and treatment fee accounting, and that other quality scales are necessary according to different job categories, specializations, positions, and service domains. Especially, the low quality of HIS was found in the abnormal service processing, information sharing by outside institutions, and standardization. It may be added that the HIS should be improved and developed in these respects.

The Impact of Characteristics of Enterprise Information Systems on Business Performance: the cases of Taiwan companies (기업정보시스템의 특징들이 경영성과에 미치는 영향: 타이완 기업의 경우)

  • Kim, Dae-Kil
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.79-93
    • /
    • 2012
  • Despite growing interest and attention from researchers and practitioners in management studies, empirical research has been limited on how factors that influence an organization's business performance are affected by certain characteristics of enterprise information systems (IS), such as maturity and infrastructure. This study reports on an empirical analysis of survey data to identify relationships among the informatization level, the business environment, and IS maturity and infrastructure related to business performance-based on financial and non-financial performance measurements-from the perspective of 136 Taiwan firms. The survey questionnaire respondents were drawn from individuals in each of these firms who were typically working in divisions related to business performance functions. Structural equation modeling was used to test the hypotheses that came from the research model in this study.

Development of Efficient Risk Analysis and Productivity Improvement System in Interface Communication Environment (인터페이스 통신 기반 개발 환경에서의 효율적인 위험도 분석 및 생산성 향상 시스템 개발)

  • Song, TaeIll;Hong, ChoongSeon;Kim, KyeongSu;Choi, HongSuk;Jeong, WonSik;Won, JongSeop
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.632-645
    • /
    • 2016
  • The enterprise environment, various interface systems are utilized for business processes and for exchange of messages. In the interface communication environment, as business complexity increases, the interface system is connected with numerous systems. With increasing number of linked systems, there is a proportional increase in the workforce, leading to a rise in numerous risks (inconsistency of information, non-compliance with standards, etc.). To solve the problem, we propose a system for managing and centralizing information of the message based interface system. The proposed system enables information integration management, message information distribution, standard code generation, risk management and risk evasion. Using the proposed system, the in development environment user can prevent inconsistent information, analyze risk, avoid risk, distribute information automatically and create a standard code. Ultimately, there is an increase in user productivity and it is possible to evade the risks involved.

An XML Proxy Cache System for XML Documents with Update Locality in Shipbuilding Information Management System (조선정보관리시스템에서의 갱신의 지역편중성을 갖는 XML문서를 위한 XML 프록시 캐쉬 시스템)

  • Kim Nak Hyun;Lee Dong-Ho;Choi Il-Hwan;Kim Hyoung-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.393-400
    • /
    • 2005
  • XML makes it possible to query the information created and managed different applications, which is impossible if expressed in other structure or language. In using shipbuilding information management system, there is inefficiency in storing and querying such a large XML document in XDBox. XML proxy cache system is suggested to improve that. In this paper, we suggests XML proxy cache system with thought of update locality found in using shipbuilding information management system.

The Impact of Perceived IT Threat on Convergence Information System Performance (지각된 IT위협이 융합 정보시스템 성과에 미치는 영향)

  • Park, Hyeon-Ho;Nho, Hee-Ock;Kim, Yong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.65-71
    • /
    • 2015
  • Based on Technology Threat Avoidance Theory, this study explains the process that the users cope with IT Threat and accomplish IS outcome. To empirically test the proposed model, data were collected through a survey of respondents who have the experience of using IS, and analyzed by using structural equations modelling. The result shows IT Threat had negative effects on Problem-Focused Coping and IS Appropriation. Also Problem-Focused Coping had significant effects on IS Appropriation and IS Appropriation had positive relation on IS Performance. In conclusion the study proposed that IT users improve Convergence Information System Performance by Problem-Focused Coping when they perceive IT Threat.

M2M based personage information monitoring system (M2M기반 인물 정보 모니터링 시스템)

  • Lee, Jong-sung;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1000-1003
    • /
    • 2013
  • The monitoring system using a surveillance camera, has the advantage that can be observed in real time the blind spot of the crime, case to be mounted is increasing. However, surveillance camera, is used for the purpose of verification of the crime later than risk detection of crime before advance. Therefore, in this paper, in order to supplement the weak information collection monitoring system using the monitoring camera, by using the position information of the smartphone, infers the person monitoring region, the movement path of the image information other event occurs it is a fusion iT monitoring system that provides information of the user who judged. Result of the experiment, the proposed system confirmed the improved efficiency and usability than conventional systems.

  • PDF

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

Revisiting the Relationship between Information Technology Capability and Firm Performance: Focusing on the Impact of the Adoption of Enterprise Resource Planning Systems (정보기술 역량과 기업 성과 간 관계 재고찰: 전사적자원관리(ERP) 시스템 도입 효과를 중심으로)

  • Oh, Sehwan;Baek, Hyunmi;Lee, Saerom
    • The Journal of Information Systems
    • /
    • v.25 no.1
    • /
    • pp.49-73
    • /
    • 2016
  • Purpose Though many information systems researchers have made various attempts to investigate the relationship between information technology capability and firm performance from diverse perspectives, we have not come to a conclusion yet with some mixed results. In this research, focusing on the adoption of Enterprise Resource Planning (ERP) systems by firms as a proxy measure for information technology capability, we reexamine whether the association is significantly positive. Design/methodology/approach Previous research on this topic had some limitations to the samples and analysis method. Some research focused only on the 1990s or early 2000s, and other studies failed to adequately compare the impact of ERP adoption on firm performance between the treatment group and the control group. In this research, extending previous analysis approaches with the matched sample comparison of IT leaders and the control group, we attempt to apply propensity score matching in combination with difference-in-difference analysis with a sample of Korean firms that adopted ERP systems in the late 2000s. We match ERP adopters and non-adopters with propensity score matching and compare their financial performance with difference-in-difference estimation between the pre- and post-adoption periods. Findings According to our analysis, we find no positive and significant relationship between ERP adoption and firm performance in profit ratios. This research shows that, contrary to the era of proprietary information systems, standardized information systems today have no additional competitive advantages over competitors.