• Title/Summary/Keyword: IT Implementation Model

검색결과 2,328건 처리시간 0.034초

대학 교과과정에서의 ERP교육 방안 (The Approach for ERP Courses into University Curriculum)

  • 윤철호;김상훈
    • 한국IT서비스학회지
    • /
    • 제3권2호
    • /
    • pp.39-51
    • /
    • 2004
  • Based on investigating and analyzing the cases of advanced foreign universities that have already included ERP courses in their education systems, this study proposed the ways of incorporating ERP courses into Korean universities' curriculums in terms of the following three areas: 1) development of ERP courses, 2) establishment and maintenance of ERP education environment, 3) continuous evaluation and improvement of ERP education implementation. As reasonable ERP courses, "Introduction to ERP" targeted to educating overall basic concepts in ERP system and business administration, "ERP System Implementation" for fostering business process design and system implementation skills, "ERP Programming" such as ABAP for the purpose of customizing ERP system, and "Strategic Use of ERP" dealing with ERP package selection and implementation methodologies of effective utilization of ERP systems were suggested. Regarding the establishment and maintenance of ERP education environment, single server architecture model that contained both database and application was proposed with the intention of set-up cost saving and maintenance efficiency. As for the evaluation and improvement on ERP education implementation, its methodologies were introduced through analyzing the advanced cases. Finally in addition to the above three areas, critical success factors for effectively launching ERP education in the universities were suggested through reviewing the previous case studies.

오라클 VPD 기반의 RDF 웹 온톨로지 접근 제어 모델의 설계 및 구현 (Design and Implementation of the RDF Web Ontology Access Control Model based on Oracle VPD)

  • 정혜진;정동원
    • 한국시뮬레이션학회논문지
    • /
    • 제17권3호
    • /
    • pp.53-62
    • /
    • 2008
  • 이 논문에서는 웹 온톨로지를 위한 오라클 보안 모델 기반의 구현 모델을 제안한다. 최근 웹 온톨로지에 대한 접근 제어를 위해 관계형 데이터베이스 보안 모델을 이용한 접근 제어 모델이 개발되고 있으며 대표적인 접근제어 모델이 RAC 보안 모델이다. 그러나 RAC 보안 모델은 관계형 데이터베이스의 표준 보안 모델에 기반을 두고 있으며 실제 관계형 데이터베이스 관리시스템의 구현 모델은 개발되어 있지 않다. 이 논문에서는 이러한 RAC 보안 모델의 문제점을 해결하기 위하여 현재 가장 널리 사용되며 다양한 보안 정책을 제공하는 RDBMS인 오라클 기반의 구현 모델을 제안한다. 또한, 제안하는 RAC 구현 모델의 구현 및 평가에 대하여 기술한다. 특히, 제안하는 구현 모델은 오라클에서 제공하는 VPD 보안 모델을 이용하며 높은 실용성과 활용성을 제공한다.

  • PDF

ebXML 레지스트리의 설계 및 구현 (Design and Implementation of an ebXML Registry)

  • 김경일;김록원;송병열;조현규
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2001년도 International Conference CALS/EC KOREA
    • /
    • pp.253-258
    • /
    • 2001
  • In electronic commerce, a registry is an integrated software system that supports access to registry metadata in order to locate and retrieve registered objects it can be discovered and used by a client or customer. In general, a registry consists of information model and its service. A registry implementation supports a registry services interface that can be used by abstract agents to assist a human or some other software process to register new objects, provide appropriate metadata for those objects, browse or query registry content, filter out irrelevant references, and retrieve the content of selected items. We show a layered registry architecture that is flexible enough to support the required specialization of many different kinds of registry specification of other sponsoring groups. This architecture could easily adopt different registry specification. This paper suggests a prototype implementation model which supports ebXML Registry standard based on this layered architecture.

  • PDF

Design and Implementation of NNI Interworking Protocol of OBP Satellite B-ISDN

  • Park, Seok-Cheon;Kang, Sung-Young;Kim, Jung-Hoon;Nam, Ki-Mo;Park, Jae-Kyun;Seo, Dong-Woon
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -2
    • /
    • pp.719-722
    • /
    • 2000
  • It is essential to develop the internetworking strategies between the OBP satellite B-ISDN and the terrestrial B-ISDN for the economical and efficient implementation of the future network infrastructure. We have considered the implementation issues of the emerging B-ISDN, especially interworking strategies of the terrestrial B-ISDN with the OBP satellite B-ISBN. We proposed interworking model between terrestrial B-ISDN and OBP satellite B-ISDN NNI signaling protocol, and describes the design and verification of the interworking protocol. For the verification, interworking protocol is modeled by Predicate/Action Net derived from Petri Net and the designed model is analyzed by reachability tree. Using Unix socket, the verified interworking protocol is implemented in two workstations and implemented interworking protocol is tested by local test method which is outstanding in error detection and recommended by ISO.

  • PDF

Wealth Management Framework Experienced in Korean Financial Enterprises

  • 김학민
    • 통상정보연구
    • /
    • 제8권1호
    • /
    • pp.417-435
    • /
    • 2006
  • A Systematic Wealth Management Framework (SWMF) was developed as a private banking management tool to enable more integrative personal finance management of personal wealth. It is a reference model that provides an unified framework for development, operation, and management and makes provision for personal financial services in today's complex financial environment. This study suggested some practical results from banks and insurance companies that have established SWMF as the differentiation business strategy for wealthy customers. The focus of this manuscript is on capturing the methodological approach most financial institutions in Korea adopted to execute new e-finance planning and implementation based on the SWMF. The alignment between the wealth management business goals and information system architecture at an organization constitutes the main theoretical basis of the study. Relevant discussions are made on the wealth management framework as a general business model for financial industry, on the functional relationship between new information systems and business organizations. Finally, lessons learned from the SWMF implementation are discussed.

  • PDF

AHP 기법을 이용한 CRM 도입의 성공요인분석 (An Analysis on Success Factor of CRM Implementation Using AHP Technique)

  • 신택수;함준석;황재훈
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2004년도 추계학술대회 및 정기총회
    • /
    • pp.463-466
    • /
    • 2004
  • This paper suggests the evaluation method of success factors of CRM implementation using AHP technique, and presents why firms implement CRM, how it could be successfully implemented, and what is the most important factor. For the purpose, this study applies the method to department stores' industry. AHP structure consists of three steps to determine CRM's key success factors. First of all, strengthening loyalty of customers, improvement of service quality, upgrade of intelligence system and advancement of management process are selected as superordinate object (i.e. CRM-implementation goal). The next project factor, technology/data factor and organizational factor were decided as success factor of CRM-implementation. Subordinate criteria of project factor consist of 11 criteria. The experimental results of this study show that department stores think advancement of management process and improvement of service quality as most important purposes for CRM implementation. The results also indicate that among the subordinate success factors, accuracy of customer information, conversion to customer-oriented business model, practical use of experienced consultant, and establishing IT infrastructure for CRM are evaluated as most important success factors for CRM implementation.

  • PDF

Ignition Transient Investigation of Rocket Motor

  • Chang, Suk-Tae;Sam M. Han;John C. Chai
    • 한국추진공학회지
    • /
    • 제4권3호
    • /
    • pp.45-54
    • /
    • 2000
  • Ignition transient is a. very rapid process lasting only in the order of 100 milliseconds and therefore it is difficult to measure all relevant ballistic properties. Numerical simulation is thus useful to quantify some of these hard to measure flow and ballistic properties. One-dimensional model was employed to study the effects of aging using simplified aging scenarios for both N-H sustainer and booster motors. Also the effects of newly designed igniter on the ignition of N-H sustainer was simulated. Radiation effects could be significant in terms of energy flux increase to the propellant surface and the energy exchange between the combustion gas itself. One dimension implementation of radiation showed significant effects for rear-mounted igniter. Implementation of radiation effects into 2-D axi-symmetric numerical model was completed and its effects on the N-H sustainer were examined. To have a reliable prediction of computer model on ignition transient, accurate chemical property data on the propellant and igniter gas are required. It was found that such property data on aged N-H motors are not available. Chemical aging model can be used to predict to some degree of accuracy effects of aging on chemical and mechanical properties. Such a model was developed, albeit 2-dimensional, to study migration of moisture through a representative solid rocket motor configuration.

  • PDF

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.

최종사용자전산의 성공적 시행에 영향을 미치는 요인 연구 (An Empirical Analysis of Factors for a Successful Implementation of End User Computing)

  • 강신철
    • Asia pacific journal of information systems
    • /
    • 제3권1호
    • /
    • pp.54-87
    • /
    • 1993
  • This exploratory study addressed the issue of effective EUC management, based on the sociotechnical theory. Extensive literature review gave birth to a set of critical success factors in EUC. With those factors, a basic EUC model was developed. Then the model was tested in the domestic industry to find its validity. It was also attemped to develop a structural equation model in which critical factors for sucessful implementation of EUC are arranged by the result of empirical survey. In the final model, technical support, computer experience, user control, and top management support were included as exogenous factors. Thses contructs were found to influence directly or indirectly three endogenous factors, user satisfaction, computer use, and performance.

  • PDF

OSI-분산 시스템에서의 Biba Security 모델의 구현 (Realization of the Biba Security Model in an OSI-distributed)

  • 박종화
    • 정보학연구
    • /
    • 제5권2호
    • /
    • pp.35-45
    • /
    • 2002
  • 분산 시스템에서는 정보가 공중망을 통해 교환되므로 쉽게 도청되거나 또는 변경될 수 있다. 따라서 분산 시스템에서의 보안정책은 전송 중이거나 또는 단말기 내에서 정보를 보장할 수 있어야한다. 이 논문에서는 두 단말기 내에 각각 존재하는 두 AP(Application Process)들 사이의 통신은 Open System Interconnection(OSI-RM)을 위한 ISO Reference Model[2]에 따라 일어난다고 가정하였다. OSI 보안 services와 Biba 보안모델 사이에 관계를 만들어 내는데 Public Key Systems(PKSs)가 사용되었고, 대칭과 비대칭 cryptographic systems에서 어떻게 하면 key 분배가 최소화할 수 있는지에 대하여 연구되었다.

  • PDF