• Title/Summary/Keyword: IT information

Search Result 89,393, Processing Time 0.078 seconds

User-centered information service and a n.0, pplication of sense-making theory (이용자 중심 정보서비스와 Sense-making 이론의 적용)

  • ;Noh, Jin-Goo
    • Journal of Korean Library and Information Science Society
    • /
    • v.28
    • /
    • pp.447-475
    • /
    • 1998
  • We are seeing a shift of the focus of information service from system-centered(data-centered or intermediary-centered) a n.0, pproach to user-centered a n.0, pproach. Sense-making theory is one of the user- centered a n.0, pproaches. This study focused on user-centered information service paradigm concepts of Dervin's sense-making theory and interpreting sense-making theory in the practical context of library services. The sense-making theory is basically a cognitive a n.0, pproach to information-seeking, in that it recognizes information as something that involves internal cognitive processes. The user of information becomes the focus in this sense-making model. The sense-making theory sees information as subjective, situational, and cognitive. It focuses on understanding information within specific contexts and on understanding how information needs develop and how they are satisfied. It regards the user not as a passive receive of external information but as the center in a active, ongoing process of change. It related to the information needs of users. Dervin's method for studying information needs employs the 'situation-gap-use' metaphor. All information needs stem from a discontinuity or 'gap! in one's knowledge. Dervin believes that information needs can be addressed by understanding the process that each individual goes through in experiencing a gap, in trying to resolve it, and in gaining something (especially new knowledge) from the experience. Sense-making is a process; 'sense' is the product of this process. Sense includes 'knowledge'. However, it includes a host of other subjective factors that reflect an individual's interpretations of a situation including intuitions, opinions, hunches, effective responses, evaluations, questions, etc. For several reasons, however, difficulties are encountered if one attempts a more substantial assessment of the theory. First, it has not yet crystallized into a well-defined theory. Secondly, though the theory has aroused general interest, e.g. within LIS, detailed discussion of its strong and weak points is still lacking. A third source of difficulty is that the basic assumptions of the theory have been explicated metaphorically. If sense-making theory is to be really useful, it needs to be interpreted for library settings. But we have found no attempt to construct an information service based on the theory. Because the research tradition is still relatively young, there are many unanswered questions connected, e.g. with the design of information systems. In any case, e.g. intermediary access systems would be more efficient and effective it their planning could be founded on the user-centered a n.0, pproach.

  • PDF

Information Technology Strategy and Architecture: An Explanatory Contingency Framework (정보기술전략과 정보기술아키텍쳐: 설명적 상황이론 프레임워크)

  • Yum, Ji-Hwan
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.81-94
    • /
    • 2002
  • The study employs the conceptual framework of the strategic success paradigm developed by Ansoff (1990). The strategic success paradigm denotes that optimal performance will be attained when the level of environmental turbulence is aligned with the strategic aggressiveness and organizational capability. Based on the paradigm, authors developed the concept of IT (information technology) aggressiveness (IT aggressiveness henceforth) and capability (IT capability henceforth). In order to clarify the different concept of IT aggressiveness and capability, the author brought the concept of IT architecture. The difference of capability and architecture lies in the depth of technical considerations. Where capability refers attitudinal aspects of managers, architecture emphasizes technical capacity of the organization as a whole. The study validated the need for alignment among IT architecture, environmental turbulence and IT aggressiveness. The imbalance between IT strategy and IT architecture (such as a higher level of IT aggressiveness but a lower level of IT architecture, or vice versa) has a marginal contribution to the organizational IT performance. The alignment among organizational environmental turbulence, IT aggressiveness, and IT architecture resulted in an optimal level of IT performance especially in a turbulent environment.

A Study of Informational Strategy Character of hospital Administration (병원행정의 정보화 전략특성에 관한 연구)

  • Kim Tae-Seong
    • Management & Information Systems Review
    • /
    • v.1
    • /
    • pp.413-443
    • /
    • 1997
  • In today's hospital-management, information system and the information by it will be a necessary administrative materials of organization with man-power, funds, equipment and resources. This study is for figuring out steps to utilize information-system, an important strategy to grow the hospital applying to the change of surroundings, improving the service for patients, accelerating medical examination, improving it in quality and suggesting a basis be able to manage it effectively by putting information system in practice such as economic effect by shorting time and the effect of medical study by computerizing clinical data. And the result of it is as follows: From the Nolan's 6 step - model about the degree using information system in hospital-management, the 1st group of hospital-size came to 1st and 2nd step, the 2nd group to the 3rd and 4th step and the 3rd group to the 5th and 6th step, which correspond to the survey- results that information system increases with the size of the hospital to propagation, regulation and integration step and that the number of the hospital developing to the step managing information is increasing.

  • PDF

Informatization Evaluation System Model for Colleges (전문대학 정보화수준 평가시스템 연구)

  • Kim Yong-Shik
    • Management & Information Systems Review
    • /
    • v.12
    • /
    • pp.37-52
    • /
    • 2003
  • An informatization evaluation is becoming a major issue among vocational colleges, as the 21th century begins. This century is characterized as Knowledge and Information era. Thus it is popular for administrative organizations to use Information Technologies as major tool to innovate themselves. The main objective of this study is develop evaluation indexes on applications of information technologies for vocational colleges because they must operate their education services by using management principles. Four major indexes were recommended to evaluate their information environment of educational service as follows. 1. Strategic Information System 2. Environmental Factors of Information System 3. Informational Resources 4. Utilization of Information Technologies Each index has 4 variables to identify the level of informatization and every variable is consisted of several questions. Such an evaluation system will be applied for vocational colleges to know their own situation of IT application and to develop managerial strategies by using IT. This system also will be useful to compare you with your potential competitors and to find appropriate polices of IT application by measuring the indexes at different points of time.

  • PDF

Information Cascade and Individual Characteristics in Adopting Blogging (정보 캐스케이드와 개인특성이 블로깅 의도에 미치는 영향)

  • Yang, Kwang-Min;Lim, Byung-H.;Kim, Yong-Kyun
    • Asia pacific journal of information systems
    • /
    • v.15 no.4
    • /
    • pp.89-107
    • /
    • 2005
  • As new information technology(IT) adoption continues to produce many investment opportunities, imperfectly informed IT managers keep trying to acquire credible external signals to update their knowledge on new technologies. Such learning processes usually help them to reach better IT adoption decisions. In some cases, however, the opposite of the goal is achieved. Most IT managers quickly converge to the same adoption decision independent of their private information. Interestingly, such information cascade is the outcome of each individual decision maker's rational choice. A technology acceptance model(TAM) is adopted that has been widely used to predict the end-user's acceptance of a new technology. A model with individual charact-eristics and information cascade variables is constructed to explain user's intention in adopting blogging. The model is empirically tested with surveyed data. The results show that individual characteristics and information cascades have significant impacts in the case of blogging.

A Study on the Critical Success Factors and Practical Method of Information System Disaster Recovery : Assuring Business Continuity of Information System Interface Specification Modeling (정보시스템 재해복구의 핵심성공요인(CSF)과 실천방안에 관한 연구)

  • Jeong, Young-Hee;Lee, Jung-Hoon;Kim, Eun-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.83-101
    • /
    • 2011
  • Since most of companies these days are utilizing the Information system actively, Information System is the most important factor which should be recovered in terms of Business Continuity. However, a lot of enterprises have been outsourcing their Disaster Recovery Center. Therefore, it is highly possible that the information system can not work well and result in the discontinuity of business when any trouble arises because of seperated plan of Business Continuity and Disaster Recovery. The study draws critical success factors for successful disaster recovery through researches of 42 documents. Then, factors are reviewed through interviews with consultants, experts of Business Continuity Plan and the information system officers of domestic banks. Domestic companies can make use of the study when they develop or renew Disaster Recovery Plan or Information System in terms of Business continuity.

Characteristics of Information System that Affect Business Performance : Focusing on Accounting Information System (업무성과에 영향을 미치는 정보시스템의 특성에 관한 실증연구 : 회계정보시스템을 중심으로)

  • Oh, Eun-Hae
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.33-50
    • /
    • 2013
  • As having analyzed an advance research that had looked into how characteristics of information system affect use and success of the concerned system, the study determined that system quality, information quality and service quality are the fundamental requirements for a good accounting information system. In addition, based on perceived usefulness and perceived ease of use that have been selected as major variables related to information system acceptance proposed by Davis[10], the study conducted an empirical analysis on how such factors would influence performance of the accounting information system. According to the results from the analysis, the system quality one of the characteristics of the accounting information system was observed to have a significant influence on the perceived ease of use while both the information quality and the service quality would positively affect the perceived usefulness. Not only that, the perceived ease of use and the perceived usefulness were confirmed to be a significant factor to the performance, and with those results, all the theses of the study have been selected. As proved even with the information system success model, the system quality, the information quality and the service quality are definitely the most necessary elements for business management, and it also turned out that those elements would play an important role in several stages of the information system.

A Study on Information Security Departmentalization Model (정보보호 전담조직 편성모델에 관한 연구)

  • Kang, Hyunsik;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.167-174
    • /
    • 2015
  • Information security organization has normally been organized under the IT department. However, as the importance of information security has gradually increased, the way of information security organized for enterprise security management has become a noteworthy issue. The need for separation of Information security organization from IT department is growing, such as restriction on the concurrent positions in CIO and CISO. Nowadays there are many studies about Information security organization while relatively there has been minimal research regarding a departmentalization. For these reasons this study proposes a Information Security Departmentalization Model which is based on business risk and reliance on the IT for effectively organizing Information security organization, using Contingency theory. In addition, this study classified the position of Information security organization into Planning & Coordination, Internal Control, Management and IT and analyze the strengths and weaknesses of each case.

Management of Information Technology Spending - Best practice in Korean firms - (기업 정보화 지출 관리에 관한 연구 - 대기업 정보화 지출 관리 사례를 중심으로 한 실증적 연구 -)

  • Lee, Seog-Jun
    • Asia pacific journal of information systems
    • /
    • v.9 no.2
    • /
    • pp.59-75
    • /
    • 1999
  • Identifying benefit from IT spending is of great concern to most firms in today's competing world. Cost-benefit analysis of IT spending can be conducted when firms have systematic management process of IT spending and the supporting data. This paper examined Korean firm's management process of IT spending, and proposes the best practice. Management process of IT spending and the definition of IT expense and investment were proposed based on the best practice. A proposition that "IT expenses and investments need to be distinguished to manage IT spending effectively' was proposed. Hypotheses were generated and tested with empirical data. Statistical analyses show that ratios of IT investment to IT expense were significantly different during the study period. The results of the study imply that firms can acquire useful information by distinguishing IT expense and investment in the management process of IT spending.

  • PDF