• Title/Summary/Keyword: Enterprise Information System

Search Result 1,164, Processing Time 0.029 seconds

Enterprise Architecture for Linking Administrative Affairs and Spatial Information (행정업무에 공간정보 연계활용을 위한 엔터프라이즈 아키텍처)

  • Youn, Jun-Hee
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.3
    • /
    • pp.95-103
    • /
    • 2008
  • Spatial information is essential for administrative affairs. So many Administrative Information System(AIS)s and Geographic Information System(GIS)s have been implemented at local government to support administrative affairs. AIS deals with document based information, and is not designed to use map information. Also, various information is not matched, because address systems for AIS and coordinate system for GIS are different. Therefore, existing AIS and GIS are not suitable for linking administrative affairs and spatial information. This paper deals with the enterprise architecture for local government to support the linkage of administrative affairs and spatial information. Enterprise architecture in this paper is composed of business architecture, data architecture, application architecture, and technical architecture. Each architecture is designed up to planner's and owner's level. Detail structures of each architecture follow the practical guidance for applying e-government enterprise architecture in Korea. Business and data architecture are applied to transportation administrative affairs.

  • PDF

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.

A Study for Korea Small Business Enterprise Policy and Vision (중소기업의 정책방안과 비전에 관한 연구)

  • Heo Kap-Soo
    • Management & Information Systems Review
    • /
    • v.15
    • /
    • pp.109-145
    • /
    • 2004
  • Upcoming 21st century, Management circumstance for a small and medium enterprise have been rapidly changed by Knowledge management, Informationization, Hi-technology. Changing from an era of small concept to strong concept, It will be a severe innovation period and can not survive with life as the same as the past, It is the era of best which mean only the best can survive, None of the average faculty can survive. Due to rapid proceeding of innovation of Informationization, It stimulate acceleration of technology innovation, infinity competition regardless the nation boarder, result in proceeding to Informationization. A small and medium enterprise is defined as smaller size of business than big business as point of capital, employee, output. It is concept, which usually used against concept of big business. When define a small and medium enterprise, criteria to determine a small and medium enterprise is depends on country and a category of business. However, In every country, A small and medium enterprise is getting be bigger and importance factor in whole industry. A small and medium enterprise is well developed and also well balanced with a large enterprise in the developed country. All around in the world, Interest about a small and medium enterprise is becoming higher. It is actively researching into a small and medium enterprise as the mean to create new employment, new industry, as means to from integration of a all and medium enterprise,as source of high competitive power. The status quo of rapid changing into informationization have been realized at considerable level in Korea. Information society is defined as information technology is main key to determine individuals competitiveness, which can solve effectively the side effect result from industrialization. It cleary imply that information technology is the most promising and important industry in 21st century. Therefore, We should seek to foster independent a small and medium enterprise and develop them corresponding to new concept of a small and medium enterprise in 21st century. The main frame of policy should be new economic system, which can contribute establishment of a small and medium enterprise, management innovation. It also attribute a small and medium enterprise to reveal their creative. New economic paradigm in 21st will be expanded with organization, market, technology. So far, a small and medium enterprise has been acknowledge as economic weaker and the one should be protected. However, In 21st century a small and medium enterprise will be considered as active majority or a source of creative. Development of technology to produce a small quantity with variety product and acceleration of knowledge and informationization will result in comparative merits of a small and medium enterprise. Hereby, The role and relative importance of a small and medium enterprise in our economic will getting be larger and It will be developed as the main force to activate the economic. However, Only a small and medium enterprise, which overcome difficulty with active desire and effort to improve their lot can be developed as a competitive enterprise in 21st century in considering themselves to be developed as diversity, active, independent, business by an enterprise.

  • PDF

A study on the legal status and problem improvement of enterprise disaster management standard (기업재난관리표준의 법적성격과 문제점 개선에 관한 연구)

  • Rhee, Sangsoo;Jung, Uiyun;Park, Jeonghun;Cheung, Chongsoo
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.2
    • /
    • pp.115-121
    • /
    • 2018
  • Purpose: The purpose of this study is to identify the legal status of enterprise disaster management standards established as part of business continuity management and to ensure resilience, and to improve the problem of application of industry disaster management standards in related industries. Method: We collected relevant data for the study and conducted a literature review on the logistical definition of laws and academic systems such as constitution and enterprise disaster reduction law, and HLS structure. Results: It has been confirmed that the enterprise disaster management standards in the Enterprise Disaster Management Standard are higher in the legal status than the ISO 22301: 2012 international standard. Conclusion: Through this study, it is necessary to establish a development direction of application and related regulations by clarifying the enterprise disaster management standard according to the enterprise disaster reduction law.

A Study on the Factors Influencing the Knowledge Sharing in Foodservice Enterprise (외식기업의 지식공유 영향요인에 관한 연구)

  • Yoo, Taek-Yong;Na, Young-Sun
    • Culinary science and hospitality research
    • /
    • v.10 no.4
    • /
    • pp.31-49
    • /
    • 2004
  • Nowadays, a knowledge management becomes more important as it recognizes and utilizes a industrial knowledge as a significant sources for the improvement of enterprise competitiveness. Moreover, a industrial value tends to be evaluated by a knowledge value. In this study, influencing factors (processes, compensation system, leadership and information technology) on the knowledge sharing for strategies in foodservice Enterprise were investigated. For processes, it was important that the sharing and collecting factors for restaurants in hotel, the knowledge sharing and collecting for family-restaurants, the knowledge utilization and collecting for fast-food restaurants and the knowledge utilization and sharing for special restaurants. In compensation system, both mental and physical compensation were not related with the knowledge sharing in hotel-restaurants. On the other hands, the knowledge sharing in family-restaurants, fast-food restaurants and special restaurants was highly affected by the mental compensation, which indicated that food-service. Enterprise should lay emphasis on mental compensation than physical compensation. In industrial cultures, the influencing factors on the knowledge sharing were rational culture and progressive culture for restaurants in hotel and fast-food restaurants, and for special restaurants and family- restaurants, respectively. The ordering leadership was important factor for restaurants in hotel, fast-food restaurants and family-restaurants, while the knowledge sharing in special restaurants was more influenced by the supporting leadership. For information technology, it was important that the information utilization for restaurants in hotel, special restaurants and fast-food restaurants, and both information utilization and ability for family-restaurants.

  • PDF

A Study of Platform-Based ERP+ System Design (플랫폼기반 ERP+ 시스템 설계에 관한 연구)

  • Cheng, Zhi-Chao;Jin, Chang-Hai;Kwon, Young-Jik
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.95-103
    • /
    • 2015
  • In this paper, we designed a platform-based $ERP^+$ system, which integrates ERP system and SCM system. With platform-based technology we can connect online and offline platforms, enterprise management systems, and government systems. In our research, first we examined the problems of the existing ERP systems, and second we discussed all basic tasks of our $ERP^+$ system. We also designed several modules for this platform-based system and system network. Our results showed that a platform-based $ERP^+$ system can effectively manage the information and the human/material resources, by using O2O (online to offline) technic. Even different systems can be integrated effectively. It can reduce the costs of enterprise management activities, enhance the enterprise competitiveness.

The research regarding an information system risk management process characteristics (정보시스템 위험관리 프로세스 특성에 관한 연구)

  • Kim, Tai-Dal;Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.303-310
    • /
    • 2007
  • Information system failure is various such as program test unpreparedness, physical facilities for damage prevention unpreparedness from simple software error. Although cross is trifling the result causes vast damage. Recently, became difficult by simple outside security system to solve this problem. Now, synthetic countermove establishment and suitable confrontation connected with danger came in necessary visual point about general Information Technology of enterprise. In connection with, in this paper, various informations and system and control about data that can happen information inside and outside considering integrity for IT resource, solubility, confidentiality within organization studied about special quality to model synthetic Risk Management System that can of course and cope in danger.

The Information value-based document management technique using the Information Lifecycle Management Theory (정보주기관리 이론에 근거한 정보가치 기반문서 관리기법)

  • Im Ji-Hoon;Lee Chil-Gee;Lee Young-Joong
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.4
    • /
    • pp.19-30
    • /
    • 2005
  • Due to explosive expansion in R & D efforts for advancement of technological predominance by Enterprises, the volume of technical information rapidly increases and emphasize on the valuation of this information has grown ever increasingly important. Therefore the requirement for systematic management and safeguard and accumulation of these intellectual properties of the Enterprise is in very high demand. A lot of effort and research has been carried out and many on going studies in progress to try to derive the optimum solution on how to manage information retention policy, processes, execution method, and hardware to execute the information with and etc. The intent of this thesis is to recommend a way for the Enterprise on how to evaluate the valuation of the data and to suggest the method on how to manage these intellectual properties by way of using Information Lifecycle Management theory which manages data according to the business valuation of the data. The decision on valuation of data and retention cycle is based on analytic method of a nonparametric regression, experimentation was carried out by applying to Enterprise Document Management System to present the suitable retention cycle according to the valuation and variety of attribute of data.

  • PDF

Visualized Assurance Approach for Enterprise Architecture

  • Zhi, Qiang;Zhou, Zhengshu;Yamamoto, Shuichiro
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.117-127
    • /
    • 2019
  • In software engineering, to ensure reliability between systems, describing both system architecture and assurance arguments between system elements is considered necessary. There are proposals for system architecture assurance, but use of these traditional methods often requires development of different diagrams using different editors. Because the visual sense of the traditional methods is inadequate, errors readily occur when manipulating different diagrams. Therefore, it is essential that the assurance of dependability between components and systems is visualized and easy to understand. In this paper, an integrated approach to describe the relationship between system actors and system architecture is proposed, and this approach is clarified using an enterprise architecture modeling language. A case study is carried out and comparison to the traditional approach $d^*$ framework is explained. The comparison results show that the proposed approach is more suitable for ensuring dependability in system architecture.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.