• Title/Summary/Keyword: IT information

Search Result 89,393, Processing Time 0.084 seconds

Information Security Pre-Evaluation Model for New IT Service : Case of RFID Service (신규IT서비스의 정보보호사전평가모델 : RFID 서비스 적용 중심)

  • Shin Dong-Hoon;Kim Guk-Tea;Lee Gang-Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.975-978
    • /
    • 2006
  • 통신기술의 급속한 발전으로 네트워크 환경이 광대역통합망으로 진화되어가고 있다. 이로 인해 개별 네트워크에서 운영되던 IT서비스들 또한 광대역통합망 환경에서 빠른 속도로 융합되고 있다. 하지만, 개별 네트워크에서 운영되던 기존의 IT서비스들이 광대역통합망에서 서로 융합되어 신규 IT 서비스를 생성하는 과정에서 보안요소가 적용되지 않을 경우에 신규 IT서비스의 안정성 및 신뢰성이 떨어질 수 있다. 이러한 문제점을 해결하기 위해서, 본 논문에서는 신규 IT 서비스의 기반구축 및 운영이전인 서비스에 대한 기획 및 설계시에 필수적인 보안대책 제시하여 서비스 운영이전에 보안대책을 적용할 수 있도록 함으로써, 신규 IT 서비스의 안정성과 신뢰성을 확보할 수 있는 방법으로 정보보호사전평가 모델을 제시하고, 이 모델을 RFID 서비스에 적용한 예제를 설명한다.

  • PDF

Study of Information Security Pre-Evaluation Model for New IT Service (신규 IT서비스에 대한 정보보호사전평가모델 연구)

  • Shin, Dong-Hoon;Kim, Sung-Hoon;Lee, Kang-Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.991-994
    • /
    • 2005
  • 통신기술의 급속한 발전으로 네트워크 환경이 광대역통합망으로 진화되어가고 있다. 이로 인해 개별 네트워크에서 운영되던 IT서비스들 또한 광대역통합망 환경에서 빠른 속도로 융합되고 있다. 하지만, 개별 네트워크에서 운영되던 기존의 IT서비스들이 광대역통합망에서 서로 융합되어 신규 IT 서비스를 생성하는 과정에서 보안요소가 적용되지 않을 경우에 신규 IT서비스의 안정성 및 신뢰성이 떨어질 수 있다. 이러한 문제점을 해결하기 위해서, 본 논문에서는 신규 IT 서비스의 기반구축 및 운영이전인 서비스에 대한 기획 및 설계시에 필수적인 보안대책 제시하여 서비스 운영이전에 보안대책을 적용할 수 있도록 함으로써, 신규 IT 서비스의 안정성과 신뢰성을 확보할 수 있는 방법으로 정보보호사전평가 모델을 설명한다.

  • PDF

A Study on the KERIS Introduction of ITA to Which Segment Architecture is Applied (세그먼트 아키텍처 방법을 적용한 한국교육학술정보원 ITA 도입 방안 연구)

  • Park, Hyeong-Yong;Han, Chang-Oh;Kim, Seo-Hoon;Kim, Hyoung-Jin
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.119-138
    • /
    • 2008
  • The KERIS having a central role in education information has selected IT Architecture as a means to provide high quality service for customers; based on this, it intends to lay the groundwork for general information projects to come and perform the IT Governance, the management system for information system. The KERIS set up a mid- and long-term road map in order to introduce and utilize ITA and has been preparing for the introduction of architecture to a proper business sector using architecture approaches by segments(sectors) since 2005. This study presented several cases which organizations can refer to when they introduce architecture while promoting an architecture project; and the details were discussed as follows.ition stage, but planned decision-making will take over when it is proven to be effective with information searching.

Construction Information Management Using Information Technology (IT기술을 이용한 건설 정보관리 효율화 방안)

  • Ha Yong-Ho;Yu Seung-Hoon;Youn Hak-Joong;Lee Se-Jun;Kim Young-Suk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.513-518
    • /
    • 2001
  • In recent years, construction information management systems using Information Technology(IT) have been developed in the construction industry. Construction information management plays a significant role in successful project implementation and completion. However, there have been a number of problems in current practice that manually collects and utilizes construction information generated in site. This paper mainly describes a new approach which is able to gather, manage, and accumulate the construction information in real-time using IT tools such as PDA, barcode, RFID, biometrics identification and digital camera. It first reviews the existing applications and their limitations, and potential IT tools for construction data collection and management. It then proposes a utilization method of IT tools for an effective information management in domestic construction site. Conclusions and future research works are also made in this paper,

  • PDF

The Impact of Using Information Technology Architecture on IT Capability and IT Performance : Focused on Public Agencies (정보기술아키텍처 활용이 조직의 정보기술역량과 정보화성과에 미치는 영향관계 : 공공기관을 대상으로)

  • Oh, Seung-Woon;Kim, Jong-Woo
    • Journal of Information Technology Services
    • /
    • v.7 no.2
    • /
    • pp.25-39
    • /
    • 2008
  • As the amount of IT investment and the complexity of information systems in public agencies have been increased, efficient and structured management of IT systems is more emphasized. For the Korean government. ITA (Information Technology Architecture) is one of the core parts of the e-Government initiative. Also introducing and managing ITA in organizations is mandated by law in Korea. The objective of the paper is to study whether using ITA in public agencies is related with their IT capability and IT performance or not. A questionnaire had been designed for the purpose, and a survey had been performed on Korean public agencies. The survey results show that using ITA has influence on relation and technology capability. However, ITA does not influence on human capability and IT performance. The reason why using ITA is linked to relation and technology capability is that ITA includes relationship between both business and technology. Also ITA provides a technical reference model (TRM) and standard profile (SP), so it has influence on technology capability.

The Relationships among Orientations of IT Strategy, Directions of IT Portfolio, and IT Performance

  • Kang Taegyung;Park Sanghyuk
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.11a
    • /
    • pp.201-208
    • /
    • 2004
  • Many organizations experience that the Performance they gained from IT portfolio is lower than they expected values. As with any investment, executives are concerned with maximizing the performance from their investment in IT. This study focused on the relationship or fit between orientations of IT strategy and directions of IT portfolio to maximize IT performance. A field survey of chief information officers of Korea manufacturing sector was conducted in 2003. Complete data of 147 firms was analyzed to determine relationship among the three research constructs that are orientations of IT strategy, directions IT portfolio, and IT performance. In this study, the orientations of IT strategy have two dimensions that are operation orientation and market orientation. The directions of IT portfolio have two dimension that are internal system focused and external system focused. And the IT performance has divided into operational performance and competitive performance. As a result of this study, the companies that are putting a focus with operation orientation were concentrated on internal information systems than external information systems. On the other hand, the other companies that are focused on market orientation were concentrated on external information systems than internal information systems. Consequently, the companies that are focused on operation orientation were operational performance higher than competitive performance and the other companies that are focused on market orientation were competitive performance higher than operational performance. More importantly, the research results provide empirical evidence that supports the hypothesis related to closer fit between IT strategy and IT portfolio does lead to increase operational and competitive performance of IT. And the results emphasize manager's efforts of fit between orientations of IT strategy and directions of IT portfolio to be realized IT performance.

  • PDF

IT ROI Methodology Development and Application: A Case Study on Financial Company (IT ROI 방법론의 개발 및 적용: L 금융기업 사례를 중심으로)

  • Lee, Jung-Hoon;Park, Gi-Han;Oh, Bu-Yeon
    • Information Systems Review
    • /
    • v.8 no.2
    • /
    • pp.189-209
    • /
    • 2006
  • Business expects that IT investment would maximize the effects, like availability, timeliness, rapidity of information, by practical using of information technology for a strategic goal. However, it is not clear yet that IT investment would increase business productivity and could create profitability in the end-the linkage between IT investment and business KPI(Key Performance Indicator). In this case study(only provides post-evaluation case), we suggested integrated IT ROI(Return On Investment) methodology with a consistent and integrated view, on the base of practical implementation at Korean financial company. Especially, we evaluated connection between IT and business strategy, made business-related IT KPI development methodology, suggested framework for sustainable IT evaluation and management.

Analysis of the Problem of fire Qualification Information and Employment Information Due to Incomplete Information in the Job Search Process

  • Kong, Ha-Sung
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.92-96
    • /
    • 2019
  • This study analyzes the problems of fire qualification information websites and job search websites due to incomplete information in the job search process and suggests an improvement plan. It has been confirmed that the main reason for the cost of job searching is incomplete information required for a job search and job search through existing analysis. As a result, it is suggested to construct a smooth information system for economic entities and to provide easy access to information by mitigating the incompleteness of information. Based on this, analysis of the problems of Korean qualifications in the firefighting realm reveals that there is a qualification holder information and a job information site, and a qualification holder management system is established but only information of either qualification acquisition information or employment information is provided. In addition, it is easy to access information through a qualification acquisition information and employment information site via the Internet, but there are inconveniences that qualification acquisition information and employment information are dualized. In order to improve this, it is necessary to build a new customized integrated qualification management system that covers existing Q-net qualification acquisition information and worknet employment information.

Developing key Performance Indicators for Financial IT Security (금융IT 보안조직 역량강화를 위한 핵심성과지표(KPI) 도출에 관한 연구)

  • Jang, Sung Ok;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.125-142
    • /
    • 2013
  • As a reinforcing strategic-alignment of IT business, Financial Service becomes more rely on IT systems. It needs to continuous information security activities to provide a secure and reliable finance service. Performance measurement of information security activities can be useful for decision and management support. The purpose of this study is to derive CSF(Critical Success Factor) and KPI(Key Performance Indicator) based on K-ISMS, Financial IT Information Security Standards. Providing a rationale can be used to determine key performance indicators, which are utilized as basic data for establishing security policies for financial IT security competency.

A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services (신규 IT 서비스에 대한 정보보호 등급 인증 타당성 연구)

  • Chang, Hang Bae;Joe, Tae Hee;Kim, Hyo Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.113-119
    • /
    • 2009
  • In this study we analyzed and gauged the information security needs for the new IT service which will be proceeding. Then we designed Information Security Rank Authentication System to raise the level of information security. To achieve this study, we analyzed rank authentication system of the inside and outside of the country and developed the practical propulsive system and the evaluation model which reflects IT service's own feature differing from the general evaluation of IS information security. The result of this study can be utilized to assess the level of domestic IT service information security objectively, and it can be applied as the means of rational decisionmaking for establishing a policy to raise degree of information security of corporations providing IT service.

  • PDF