• Title/Summary/Keyword: Executive Information Systems

Search Result 74, Processing Time 0.025 seconds

Design and Implementation of a Mail Browser that can control Data-Flow on the Web (Web에서 데이터 흐름제어가 가능한 Mail Browser의 설계 및 구현)

  • Park, Gyu-Seok;Kim, Seong-Hu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2752-2763
    • /
    • 1999
  • On account of the text based mail system has it's limit to support multimedia applications, GUI based mail system platform was developed to control document flow and automatize information process. The existing mail systems's to transmit data must need additional functions to automate document flow control. The platform of document flow control is deeply related to EDMAS(Electronic document Management System), workflow, Electronic Banking, DMS(Document Management System) automation, so it needs an ability to control proper data and document correctly. To resolve this problems, we are need of browser and engine to design work flow and to control documents flow. In this paper, we develope a mail browser to design document flow by follow user's requirements. This system can generate executive script code for document flow, and we add the function of workflow and process management to automatize the document flow in this system, and then we implement this Data flow engine.

  • PDF

A study on the current archival system of government document in korea (한국의 현행 정부기록보존제도에 대한 고찰)

  • 김상호
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.225-256
    • /
    • 1996
  • The purpose of this study is to find the ways that will be helpful to improve archival system and to establish National Archives. The contents of this study were focused on comparing the characteristics of archival system in governmental administration,: Executive, Legislature, and Judiciary. They were also focused on analyzing the problems of those current system. This research was basically conducted depending on the detailed articles of the legislation and regulation pertinent to the archives. Two major results of the research are 1) There are much differences among the governmental administrations in structuring and organizing for archival administrations. Archival works of government document are divided primarily according to the period of conservation and it is necessary to establish the regional archives and central management system, and to employ archivists as an expert staff. 2) The principles and methods of archival process, such as transferences, classifications, preservations, access, and destructions are similar to each other. In order to improve and co-ordinate current systems, it is necessary to constitute several councils endowed with consultative and decision-making power.

  • PDF

Reverse Iterative Image Encryption Scheme Using 8-layer Cellular Automata

  • Zhang, Xing;Zhang, Hong;Xu, Chungen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3397-3413
    • /
    • 2016
  • Considering that the layered cellular automata (LCA) are naturally fit for representing image data in various applications, a novel reverse iterative image encryption scheme based on LCA is proposed. Specifically, the plain image is set as the final configuration of an 8-layer CA, and some sequences derived from a random sequence are set as the pre-final configuration, which ensure that the same plain image will never be encrypted in the same way when encrypted many times. Then, this LCA is backward evolved by following some reversible two order rules, which are generated with the aid of a newly defined T-shaped neighborhood. The cipher image is obtained from the recovered initial configuration. Several analyses and experimental results show that the proposed scheme possesses a high security level and executive performance.

A Study on Factors that Effect the Organizational Commitment of Employees in the Organization in a Venture Company (벤처기업 종업원의 조직몰입에 미치는 영향요인에 관한 연구)

  • Choi Seong-Wook;Byun Sang-Woo
    • Management & Information Systems Review
    • /
    • v.9
    • /
    • pp.99-115
    • /
    • 2002
  • This study focuses on forces and correlation among such independent factors as the style of leadership, motivation and relationship in order to find out what kind of ingredients have an effect on the employees' organizational commitment in a venture company. It is likely that the organizational commitment of the employees in the organization in a venture company may be different from that of existing enterprises since they differ 100 percent in their nature. In an attempt to prove it, actual corroboration has been made. As a result, it turned out that transformational leadership had a great impact on the organizational commitment while transactional leadership did not; in the motivation factor, the more vision the employees envisage, the more organizational commitment they show followed by management goals and self-admiration; in the relational factor, more openness in the communication led the employees to devote themselves to their companies, which was valid in the range of 90% in the confidence index. This study reveals that there is not much difference between venture and general companies in the factors that affect employees' organizational commitment in the organization. Therefore, the Chief Executive Officer in the venture company should make a favorable environment with transformational leadership and obvious vision through free and open communication with colleagues so that his or her employees can devote themselves to the organization to which they belong, since venture companies are usually staffed by young workers with high education.

  • PDF

Strategic Management And Business Ethics (경영전략과 기업윤리)

  • Jang Ik-Seon
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.419-438
    • /
    • 1999
  • Following is an idea to utilize the business ethics as one of business administration strategies. Firstly, conversion of perception is needed in the business administration. Neglecting the pursuit of profit, the conventional strategic goal, is not desirable, we need to, however, have a mind that the consumer and environment centered mind is indispensible to the survival and growing of a business ultimately in establishing a strategic goal of diversified environmental changes. Secondly, conversion of the Chief Executive Officer (CEO)'s attitude in business administration is needed. It is necessary for the CEO to have a strong belief that the business ethics is indispensible to the survival and growing of a business by way of fair and logical management. Therefore the business ethics should be improved since the CEO's ethics can be the standard of his business. Thirdly, the business concerned parties should be considered. The realization of business ethics should be done in a certain way so as to protect the benefit of the all concerned parties such as stockholders. employees, consumers, suppliers, competitors, the local community, etc., since a business is an organization that can exists and grows only in the coexistence with its environment and concerned parties. Fourth, the business ethics should be transformed into a business culture through the enlargement of the general principles of and of employees' behavior as a management strategy. Lastly, business ethics should be improved through continuous evaluations to accommodate its environmental change.

  • PDF

Effect of Board Independence on Performance: Interaction Effect with CEO's Firm Specific Experience (이사회의 독립성이 기업성과에 미치는 영향 : CEO의 기업 내 경력과의 상호작용효과에 대한 연구)

  • Yoo, Jae-Wook;Kim, Kwang-Soo
    • Management & Information Systems Review
    • /
    • v.24
    • /
    • pp.1-24
    • /
    • 2008
  • This paper examines the direct effects of board independence and also its interaction effects with CEO's firm specific experience on firm performance. The findings in an hierarchial regression analysis of multiyear sample of computer hardware companies indicate that independent, outsider directors are beneficial to firms' performance when CEO has high-level of firm specific experience whereas it is harmful when CEO has low-level of firm specific experience. However, separating the positions of board chair and chief executive officer that has been used as another means for increasing board independence does not influence to firms' performance. These findings imply that researchers in corporate governance should reconsider the relative weight placed on directors' monitoring and assistance role. Rather than focusing predominantly on directors' willingness or ability to control executives, in future research scholars should yield more productive results by focusing on the assistance directors provide in bringing valued resources to the CEOs and in serving as a source of advice and counsel especially for CEO's improvement of management technique. In addition, they should pay more attention on identifying intervening processes between board and firm performance in order to provide optimal governance mechanisms and configurations to practitioners.

  • PDF

Design and Optimization for Distributed Compress-and-Forward System based on Multi-Relay Network

  • Bao, Junwei;Xu, Dazhuan;Luo, Hao;Zhang, Ruidan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2949-2963
    • /
    • 2019
  • A novel distributed compress-and-forward (CF) system based on multi-relay network is presented. In this system, as the direct link between the source and destination is invalid due to some reasons, such as the limited power, special working environment, or even economic factors, relays are employed to receive analog signals and carry on distributed compressed encoding. Subsequently, the digital signals are transmitted to the destination via wireless channel. Moreover, a theoretical analysis for the system is provided by utilizing the Chief Executive Officer (CEO) theory and Shannon channel capacity theory, and the rate-distortion function as well as the connection between the transmission rate and the channel capacity are constructed. In addition, an optimal signal-to-noise ratio (SNR) -based power allocation method is proposed to maximize the quantization SNR under the limited total power. Simulation result shows that the proposed CF system outperforms the amplify-and-forward (AF) system versus the SNR performance.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A guideline for evaluating EIS software packages

  • Byun, Daeho;Suh, Euiho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1994.04a
    • /
    • pp.344-354
    • /
    • 1994
  • In the development of executive information systems (EIS) the selection of an appropriate software package as a system building tool is regarded as a key technology. This paper attempts to shed some light on the evolving field of EIS software packages and provides a helpful Guideline for selecting the most suitable product by addressing significant considerations. A framework is presented that includes a six-step evaluation process: need analysis, team building, vendor survey, identification of decision criteria, and building an evaluation model and its verification. The major evaluation criteria of the full-featured software include: special functionality, reporting, graphics. decision support capability user friendliness, general functionality physical requirements, communication linkage, vendor support, cost related factors, performance, and documentation capability. An illustrative model using the analytic hierarchy process (AHP) method is also discussed to prove the appropriateness of our approach.

Automation of the Concurrent Real-Time Task Structuring in the modified CDOARTS Methodology (수정된 CODARTS 벙법론에서의 실시간 병렬 태스크 자동 구성)

  • 김규년;정민포;이종구
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.1
    • /
    • pp.106-106
    • /
    • 1999
  • When we design real-time software target system is analyzed and then we structure sequential executive modules into concurrent tasks. As a result of the analysis, control flow and dataflow diagram based on the RTSA notation is produced. This diagram is structured into concurrenttasks under the condition that performance problem is not serious. The criteria structuring concurrenttasks are introduced as Concurrent Design Approach for Real-Time System(CODARTS) by Gomaa.But structuring concurrent tasks using the criteria of CODARTS is somewhat difficult because thecriteria are dependent on designer's experience. CODARTS is an wide-range and abstractmethodology. As a result, the design can be inconsistent and peoples can understand it differently Inthis paper, we restructure the CODARTS methodology, propose a revised CODARTS structure andrepresent the task structuring steps for this new framework to overcome the understanding andinconsistency problems. The revised CODARTS framework and task structuring steps can be used toautomate the design of real time concurrent software systems. Finally, we show an example of taskstructuring in revised CODARTS framework.