• Title/Summary/Keyword: IT enterprise

Search Result 2,287, Processing Time 0.03 seconds

The Effect of Utilization of Enterprise SNS on Communication and Work Performances (기업용 SNS 활용이 커뮤니케이션과 업무성과에 미치는 영향)

  • Jang, Gil-Sang
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.2
    • /
    • pp.55-63
    • /
    • 2018
  • This study empirically verified the effect of enterprise SNS usage on communication and work performance and the effect of communication on work performance for corporate employees. To accomplish the purpose of this study, we proposed a research model, set up research hypotheses, and verified the hypotheses based on previous studies. For this study, we surveyed the employees of manufacturing companies located at Ulsan city. The results of this study are summarized as follows. First, the use of enterprise SNS has a significant effect on communication. Second, communication has a significant effect on work performance. Third, the use of enterprise SNS has a significant effect on work performance. Through the results of this study, it can be confirmed that the introduction and utilization of enterprise SNS suitable for enterprises leads to the satisfaction of employees' communication and improvement of the work performance.

A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility (주요 정보통신기반시설의 평가컨설팅 방법론에 대한 연구)

  • Lee, Young-Ro;Cho, Jae-Wan
    • Journal of Digital Convergence
    • /
    • v.5 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • It soaks but 2001 July information communication base step law enforcement and the Enforcement Ordinance are published to follow, in order to support the establishment of evaluation and protective measure in order the vulnerability analysis against the facility of the agency which manages an important information communication base hour opinion to designate information protection specialty enterprise. As information protection specialty enterprise being revealed evacuation laboratory back 12 enterprises from information communication department become designation as the consulting enterprise and they do an enterprise activity actively. It follows in diffusion of the IT and information reconciliation level the other side where our country belongs in the world-wide first group, the research against the disfunction plan of preparation comparison the fact that law it is come negligently all actuality. The network as it will give management coat fatal effect even at obstacle occurrence hour of instant for of case and IT facility of the cyber transactions which leads, in the future there to be to corporate management, there is a possibility the stable civil official of information Facilities for communications very seeing in the portion which is important. Present condition and important propulsion contents of information communication base step law enforcement after, against a vulnerability analysis of information protection relation field and evaluation consulting methodological application situation to sleep it researches from the dissertation which it sees consequently and it does.

  • PDF

A Study on Life-Cycle Categorical Variables of Quasi-Market SOC Public Enterprise (공기업 수명주기 분류변수 도출을 위한 기초연구 : 준시장형 SOC 공기업을 대상으로)

  • Park, Dong Sun;Shin, Wan Seon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.37 no.4
    • /
    • pp.168-176
    • /
    • 2014
  • The enterprise life cycle derived from the product life cycle consists of introduction, growth, maturity and decline. The enterprise tries to reach the growth stage early and stay at the maturity stage stably through expanding its businesses and investing for the new technology. The public enterprise is not different but its life cycle is more prone to be affected by the national development and policy. A typical example can be found in the case of the quasi market SOC public enterprise which spends massive amount of fund to provide social infrastructure. After the fulfillment of its mandated mission it is exposed to the pressure of a merger or a closure usually because large portion of the debt is directly linked to the national financial stability and credit ratings. This research is focused on the variables that influence the life cycle of the quasi market SOC public Enterprise for its future competitiveness is in connection with its normalization, advancement and rationalization. In this respect, categorical variables system centering on public characteristics and profitability drew eight categorical variables such as policy outcomes, public benefit, finance and business values etc.

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

ISIS Architecture for Developing Complex Enterprise Applications (복잡한 엔터프라이즈 응용 개발을 위한 ISIS 아키텍처)

  • Jo, Eun-Hwan;Lee, Kap-Hoon;Lee, Min-Soo;Lee, Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.392-404
    • /
    • 2010
  • Recently, as both business processes and IT systems become ever more complex. Especially, enterprise applications tend to become unmanageably complex and increasingly costly to maintain. Therefore complexity is the insidious enemy of software development. It is critical to have a methodology that recognizes and manages this enemy effectively. In this paper, we propose ISIS (Integrated System of Independent Subsystems) - the architectural style needed to develop the complex enterprise applications. The ISIS was developed to meet the challenge of reducing the complexity of a larger enterprise application today. It gives us architecture models for reducing development complexity and composite application. The enterprise application is partitioned into a collection of independent subsystems using ISIS decomposition schemes and equivalence relations. We use middleware named ISIS engine that provides a service for subsystems interoperability by enabling the integration of distributed, cross-platform subsystems. We have implemented an ITSM system that achieves our objectives, reducing development complexity, using the ISIS architecture. Finally, ISIS architecture provides greater flexibility and productivity when an organization needs either to change its business processes, or to update the underlying systems.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

A Study on the Relationship between the Level of B2B Collaboration and the Use of IT Systems on Small and Medium-Sized Collaborative Enterprise (중소 협력업체의 IT 활용 수준과 모기업과의 협업 수준에 대한 관계 분석)

  • Hong, Jung-Wan;Jeon, Dong-Uk;Lee, Hyo-Sook
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.129-143
    • /
    • 2011
  • In modern industrial society, the importance of inter enterprise collaboration is more emphasizing for the survival of companies and strengthening its competitiveness. The studies using IT systems effect on inter-enterprise collaboration are already taken several times. However, there is not much systematic research to evaluate the informatization level of B2B collaboration. In this paper, we examined the level of B2B collaboration and the use of IT systems for each business area in small and medium-sized collaborative enterprise which are classified into shipbuilding, automobile, and electronic industry. We verified that the level of collaboration between companies are significant to the level of IT use for each business area by regression analysis. The conclusion of this study is that the level of B2B collaboration and the use of IT systems for each business area are different.

Enterprise Systems in the Post-Implementation Phase: An Emergent Organizational Perspective

  • HAMMAMI, Samir;ALKHALDI, Firas
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.619-628
    • /
    • 2021
  • Enterprise system (ES) reflects a significant IT commitment to achieve corporate goals and satisfy its thrust toward a sustainable competitive advantage. This research investigates the required ES architecture, the value of a well-planned ES, and the human factor capabilities that drive the effective implementation of ES from a management perception. This paper examined the critical factors shaping the business systems' performance, architecture readiness, experts' readiness, and enterprise systems planning. Based on an extensive literature review, the attributes of factors mentioned earlier were identified, classified and then statistically examined using the author's' proposed conceptual structural model. This study employs a quantitative research methodology, with a random sampling technique. This paper has used the data collected from 510 respondents working in service, engineering and health sectors in OMAN. The study model analysis utilized both exploratory and confirmatory factor analysis, followed by a structural equation modeling using SPSS 25 and EQS6.3 statistical tools. The results unveil a piece of remarkable and robust evidence suggesting that ES planning is the most significant aspect of influencing performance, followed by IT personnel, staff and consumers expertise, and architecture readiness.

Investigating the Relationship between Enterprise Architecture Effort and IT Capability (아키텍팅 노력과 IT 역량 간의 관계)

  • Kim, Sung-Kun
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.4
    • /
    • pp.107-126
    • /
    • 2010
  • IT capability is one of the main research topics in MIS area. Given the finding that IT investment does not necessarily contribute to better organizational performance, the concept of IT capability was selected as an alternative antecedent variable for IT's effect on performance. A number of existing MIS papers have shown that firms with the high level of IT capability lead to a better performance. However, very little research has been done concerning the issue of how the IT capability could be enhanced. Recently, enterprise architecture effort has been emerged as an avenue to better IT management. This study aims to empirically examine the relationship between EA effort and IT capability.

  • PDF

A Case Study on Factors of Family Business Succession of Small Enterprise (소상공인 가업승계 요인에 대한 사례 연구)

  • Choi, Shin hea
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.240-252
    • /
    • 2022
  • A lot of research has been done on the succession of family businesses. However, there has been little discussion and policy approach on the succession of small enterprise. Since '19, the government has established a policy on the concept of small enterprise succession. Therefore, the time has come for a research system to establish the concept of small enterprise succession. Accordingly, this study tried to apply it to small enterprise based on the existing discussion on family business succession. As a result, even for small business owners, the internal factors of enterprise, spirit, and craftsmanship had an important influence on succession. However, small enterprise have a characteristic that ambiguity of authority occurs because they are not yet systematized. Also, role ambiguity occurs in performing various roles, which can be viewed as a characteristic of small enterprise. Prior to empirical research on the family business succession of small enterprise, this study tried to present the basis for the need for research in this field by presenting the definition and conceptualization of small enterprise succession through case study.