• Title/Summary/Keyword: End-User Computing

Search Result 131, Processing Time 0.02 seconds

Productivity Improvement Through the Knowledge Management System Focused on End-user (현업실무자 중심의 지식관리시스템도입을 통한 생산성 향상)

  • 정한욱;이창호
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.3
    • /
    • pp.37-46
    • /
    • 2000
  • A company needs low cost and high efficient S/W tools to improve the white color productivity in daily operation, These needs may be satisfied by end-user knowledge management system to be suggested in this paper. We suggest that the end-user knowledge management is not made by specialized developer but directly made by end-users of some related managers using company-wide DB and department DB. We expect that this end-user knowledge management system will increase the efficiency of end-user daily operation and minimize the total life cycle cost of end-user computing system in industry. The suggested end-user knowledge management system has been tested in some companies through the training course.

  • PDF

A Study on the Environment and Stategies of End-User Computing (EUC 환경분석과 대응전략에 관한 연구)

  • 김용식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.7
    • /
    • pp.574-580
    • /
    • 1990
  • Recently End-User Computing(EUC) is emerging as an alternative to the traditional information systems development approach which cannot cope with users' requirements of systems development because of increase in backlog. It is necessary that appropriate models of EUC to evaluate the expected benefits and risks and to implement should be developed for managers. The main objective of this study is to help managers who need to review their MIS policies by presentinb EUC strategies under the information systems research framework which have concluded through many studies.

  • PDF

Construction Of The Measurement Model Of User Satisfaction In Internet Shopping Environment -Based On The End-Use Computng Satisfaction Instrument -

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.3-13
    • /
    • 2006
  • To develop and validate an instrument to measure user satisfaction in Internet shopping environment, the EUCS instrument by Doll and Torkzadeh (1988) was used for this research. The results of the study shows how the main constructs of the model that will eventually interact for the user satisfaction in internet commerce environment. This research will present significant progress towards keeping the End-User Computing Satisfaction instrument relevant and applicable under the Internet shopping environment.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

A contingent analysis on the relationships between end-user computing attributes and its implementation (최종사용자 컴퓨팅의 속성과 실행과의 상황적 분석)

  • 이진주;서건수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1990.04a
    • /
    • pp.81-90
    • /
    • 1990
  • The major objective of this paper is to analyze the relationships between End-User Computing(EUC) attributes and its implementation. Reviewing the related literatures, we categorized EUC attributes into threefactors - relative advantage, compatibility, complexity. With such attributes this paper proposed a hypothetical model which explains the effect of the EUC attributes on its implementation. Under the assumption that EUC attributes affect its implementation differently according to the several contingent factors, the model included such factors as organizational size, organizational support level on the EUC activities and individual characteristics - computer experience, education level, age. Data were collected form 177 end-users of 40 Korean business firms. Hypotheses were tested using Pearson Correlation, t-test, ANOVA and the results are discussed below.

  • PDF

Effective management of end-user computing based on its dimensions (최종사용자 컴퓨팅의 업무차원구분과 효과적 관리방안)

  • 김상훈
    • Korean Management Science Review
    • /
    • v.11 no.1
    • /
    • pp.165-186
    • /
    • 1994
  • The increasing importance of end-user computing(EUC) is reflected in the proliferation of academic and practitioner literature on the subject. However, much of this literature assumes widely differing dimensions of EUC, which tends to make many researchers suggest different success factors for managing EUC. Moreover, the variables regarding EUC management have been considerably restricted in previous research. In order to overcome these problems, this study focuses on identifying EUC dimensions theoretically and deriving generic variables representing the mode of EUC management by factor analysis first. Then, based on these EUC dimensions and generic variables for EUC management, effective ways of managing EUC are hypothesized and tested empirically through a mail survey of end-users in 83 Korean business organizations. The results suggest that effective management of EUC should be different depending upon which dimension more importance is attached to in implementing EUC.

  • PDF

Adaptive Deadline-aware Scheme (ADAS) for Data Migration between Cloud and Fog Layers

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1002-1015
    • /
    • 2018
  • The advent of Internet of Things (IoT) and the evident inadequacy of Cloud networks concerning management of numerous end nodes have brought about a shift of paradigm giving birth to Fog computing. Fog computing is an extension of Cloud computing that extends Cloud resources at the edge of the network, closer to the user. Cloud computing has become one of the essential needs of people over the Internet but with the emerging concept of IoT, traditional Clouds seem inadequate. IoT entails extremely low latency and for that, the Cloud servers that are distant and unknown to the user appear to be unsuitable. With the help of Fog computing, the Fog devices installed would be closer to the user that will provide an immediate storage for the frequently needed data. This paper discusses data migration between different storage types especially between Cloud devices and then presents a mechanism to migrate data between Cloud and Fog Layer. We call this mechanism Adaptive Deadline-Aware Scheme (ADAS) for Data migration between Cloud and Fog. We will demonstrate that we can access and process latency sensitive "hot" data through the proposed ADAS more efficiently than with a traditional Cloud setup.

A Study of the Effect on the End-User Satisfaction Changing Information Center in Systems Perspective (시스템측면에서의 정보센터 개념변화가 사용자 만족도에 미치는 영향에 관한 연구)

  • 윤중현
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.75-91
    • /
    • 2003
  • The purpose of this study is to identify the new roles and services of information center that is affected by changing information technology and end-user computing environment. A user satisfaction model has been used and hypotheses are developed to find relationships information center service evaluation factors. The hypotheses have been tested with 41 user surveys. This study presents the relationship between certain information center management variables and the end-user satisfaction applying organization-wide information service. The result of this research can give an insight of the evaluation of information center service activities.

An Operation of Cloud System for the Centralization Services of Business Documents (업무문서 중앙화 서비스 제공을 위한 클라우드 시스템 운영방안)

  • Yoon, Yong;Kim, Younsung
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.309-324
    • /
    • 2014
  • This case study focuses on the preparing a guide for the plan to the companies that want to build a business document system for the centralized services under the cloud computing. Total 3 Operating companies with regard to cloud computing issues are introduced for this purpose. Analyzing the usage and development direction of the selected companies were performed to set up plans. Through this in-depth needs of the user's point of view for the management of business documents, The necessary improvements in the process of collaboration and document sharing were derived. Business documents centralized service plans were proposed based on cloud computing models. Practical experiences of the companies were helpful to present the details of the operational strategy and operational plans. Especially with minimal staff input and verification process, Sample method for the automatic generating of the new document file name is introduced. A test bed before operating the enterprise-wide system were presented with information that is to be considered when building systems.

End-to-End Delay Analysis of a Dynamic Mobile Data Traffic Offload Scheme using Small-cells in HetNets

  • Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Recently, the traffic volume of mobile communications increases rapidly and the small-cell is one of the solutions using two offload schemes, i.e., local IP access (LIPA) and selected IP traffic offload (SIPTO), to reduce the end-to-end delay and amount of mobile data traffic in the core network (CN). However, 3GPP describes the concept of LIPA and SIPTO and there is no decision algorithm to decide the path from source nodes (SNs) to destination nodes (DNs). Therefore, this paper proposes a dynamic mobile data traffic offload scheme using small-cells to decide the path based on the SN and DN, i.e., macro user equipment, small-cell user equipment (SUE), and multimedia server, and type of the mobile data traffic for the real-time and non-real-time. Through analytical models, it is shown that the proposed offload scheme outperforms the conventional small-cell network in terms of the delay of end-to-end mobile data communications and probability of the mobile data traffic in the CN for the heterogeneous networks.