• Title/Summary/Keyword: IT information

Search Result 89,393, Processing Time 0.071 seconds

Enterprise Management according to the Development of Information Technology (정보기술의 발전과 기업경영)

  • Kim Chang-Tae
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.45-61
    • /
    • 2001
  • Among the changes of the management environments surrounding enterprises, one of the most important reasons that affect the organization management in the future would be the rapid development in the field of information technology(IT). And every company takes the speed to be important to maintain the competitive superiority of its own especially. To meet this kind of circumstances, the expectations to reorganize the business processes using the IT become higher. The IT is worth when the companies manifest their own potential powers by taking advantage of the it and when they evolve and apply the novel ways to the business as well. Even though they, therefore, introduce the information system to realize their strategic superiorities, it is difficult to achieve their initial aims. Moreover, in the phase of IT introduction, it is necessary to include the property of alignment between the IT and the conventional management fields containing the management strategy and the organization planning. In the case the company revolution by IT is carried out, the two facts we should note to maintain the alignment between the management strategy and the target of organization are as follows. First. it is required to share the common and underlying recognition on the IT between the chief executive officers(CEOs) and the system part. Second. it is important to exchange information with other companies by utilizing the IT.

  • PDF

How does the Stock Market Reacts to Information Security Investment of Firms in Korea : An Exploratory Study (기업의 정보보안 투자에 시장이 어떻게 반응하는지에 대한 탐색적 연구)

  • Park, Jaeyoung;Jung, Woojin;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.33-45
    • /
    • 2018
  • Recently, many South Korean firms have suffered financial losses and damaged corporate images from the data breaches. Accordingly, a firm should manage their IT assets securely through an information security investment. However, the difficulty of measuring the return on an information security investment is one of the critical obstacles for firms in making such investment decisions. There have been a number of studies on the effect of IT investment so far, but there are few researches on information security investment. In this paper, based on a sample of 76 investment announcements of firms whose stocks are publicly traded in the South Korea's stock market between 2001 and 2017, we examines the market reaction to information security investment by using event study methodology. The results of the main effects indicate that self-developed is significantly related to cumulative average abnormal returns (CAARs), while no significant effect was observed for discloser, investment characteristics and firm characteristics. In addition, we find that the market reacts more favorably to the news announced by the subject of investment than the vendor, in case of investments with commercial exploitation. One of main contributions in our study is that it has revealed the factors affecting the market reaction to announcement of information security investment. It is also expected that, in practice, corporate executives will be able to help make an information security investment decision.

An Empirical Approach to the Influence of IT Assets and Information Security Service on Information Security Quality and Satisfaction (IT자산과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Gwon, Sun-Jae;Lee, Geon-Chang;Kim, Chang-Hyeon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.467-481
    • /
    • 2006
  • In the era of the Internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security qualty positively, leading to users' satisfaction eventually To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets and Information Security Service influence informations security quality positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets and Information Security Service helped great improve the information security quality and user satisfaction.

  • PDF

A Case Study on the Construction of Information Technology Architecture in MOMAF (정보기술아키텍처 구축 사례 연구: 해양수산부문을 중심으로)

  • Kang, Jae-Hwa;Kim, Hyun-Soo
    • Journal of Information Technology Services
    • /
    • v.5 no.1
    • /
    • pp.111-128
    • /
    • 2006
  • It was on the rise importantly to provide the efficient management process of the organization for dealing with the change about information and business management quickly and consistently. It was suggested with the architectural model on information technology to provide it in theoretically. The Federal Government and budget organization of the USA used it on actual business and the terms of EA (Enterprise Architecture) and are raising the efficiency of management. NCA (National Computerization Agency) of Korea published the book - "The Research about establishing ITA (Information Technology Architecture) and appling the standards". After being applied the model on MOGAHA (Ministry of Government Administration and Home Affairs) and MIC(Minisstry of Information and Communication), the concrete case was made. MOMAF (Ministry of Maritime Affairs and Fisheries) drove the leading model. The report ascertained the basic contents of ITA and researched the case of USA, MOGAHA, MIC, and tried to analyze the contents of appling maritime and fisheries area. The report contained the definition of purpose through analyzing environment and establishing the vision and the principles based on them. The report also contained the contents of architecture based on the standard of NCA - "The Government Standard Meta Model version 2.0" - and researched the MOMAF's Reference model using Government Reference model. The report established the investment architecture and the process of information technology asset management. It ascertained the characteristic of maritime & fisheries area and the subject of developing the MOMAF's ITA sustainably.

The Effects of IT Human Capability on Knowledge Transfer in Information Systems Outsourcing (정보기술 인적 역량이 지식 이전에 미치는 영향에 관한 연구: 정보시스템 아웃소싱 상황을 중심으로)

  • Park, Joo-Yeon;Kim, Joon-S.;Im, Kun-Shin
    • Asia pacific journal of information systems
    • /
    • v.16 no.2
    • /
    • pp.85-110
    • /
    • 2006
  • The objective of this research is to identify the process of knowledge transfer and to examine the effect of IT human capability on knowledge transfer in information systems outsourcing. Through a field survey, it is found that clients' IT human capability significantly affects on cooperative learning with vendors and knowledge transfer from vendors to clients. The survey also shows that clients' trust with vendors indirectly enhances the knowledge transfer by increasing the cooperative learning. This study provides a solution of knowledge transfer problem in information systems outsourcing. Also it brings out issues that can be accrued in the outsourcing situation, such as clients' dependency on vendors and knowledge asymmetries developed in favor of the vendors. These issues should be topics for future research on information systems outsourcing.

An Evolutionary Acquisition Strategy for Defense Information Systems (국방정보시스템의 진화적 획득전략)

  • Cho, Sung-Rim;Sim, Seung-Bae;Kim, Sung-Tae;Jeong, Bong-Ju
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.187-206
    • /
    • 2010
  • Evolutionary acquisition is an alternative to the grand design acquisition approaches. It has activities to make it possible to develop quickly and respond flexibly to changing customer needs and technological opportunities. The Ministry of Defense adopted an evolutionary strategy to acquire defense information systems. but it does not work well always. We look at problems from aspects of acquisition system and project management. We benchmark successful cases for evolutionary acquisition strategy in the DoD, the pubic and the private sector. We suggest an evolutionary strategy for defense information systems. The evolutionary strategy in this study includes an evolutionary acquisition framework, an evolutionary acquisition process, and an evolutionary acquisition guideline for defense information systems. The evolutionary strategy can help to implement evolutionary acquisition process for defense information system, and the process can increase the success rate of projects.

A Study on information resource management based ITA in a organization (ITA 기반에서의 조직 정보화 자원관리 방안 연구)

  • Cho, sung-nam;Kim, ji-young;Chung, taik-yeong;Park, chan-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.410-413
    • /
    • 2007
  • Information Technology(IT) was introduced to the business as a means of improving operational efficiency. Nowadays, IT has become an essential component of an organization's survival. Almost no operations of an organization can be performed without IT. The benefits of using IT in organizations can not be underestimated. Some organizations have flourished because of the competitive advantages derived from the IT systems they have developed. Most IT systems, however, have been extended, changed and integrated with ad-hoc and makeshift solutions without thinking long-range view. It results in high maintenance cost and uncontrolled system for managing information resources. Especially, public institutions under the Project-Based System (PBS) have some problems in keeping a good management systems for information resource, because they are usually operated for a set period. Therefore, we propose the framework how to efficiently manage the IT assets and resources based on the Information Technology Architecture (ITA) that is introduced for the overall optimization of IT investment, change management and inter-operability.

  • PDF

A study of Tendency Analysis to Research Using Clinical and Biological Information (체질임상정보 및 바이오정보를 활용한 연구동향분석에 대한 연구)

  • Kim, Chul;Song, Mi-Young;Eom, Dong-Myung
    • Journal of Korean Medical classics
    • /
    • v.20 no.4
    • /
    • pp.171-186
    • /
    • 2007
  • The fusion research subjects of Oriental medicine and Bio-Technology are actively advanced. Development of information analysis algorithm for constitution diagnosis using clinical and biological information is started recently. In addition, the research for providing personal oriented treatment information with Diagnosis result is to in the process of advancing. This paper considers the inside and outside of the country technical development trend of research for using clinical and biological information by analyzing patents and papers. It executed information analysis about changes to number of research papers and patents, present state and star higher officer of research facility from the dissertation which it sees. It is known that our country research result is slight so far in quantity and quality as result of analysis. But hereafter it contains a many developmental possibility. Also it reflects the appearance and a growth of new field like bioinformatics from constitution and bio information application field. The combination of bio information similar to constitution and heredity and computing technology to control those information efficiently comes to think with core technique.

  • PDF

A Case Study on the Information Security Management System for Major Korean Businessn Groups (국내주요그룹의 정보보안관리 체계에 관한 사례 연구)

  • Sun, Han-Gil;Han, In-Goo
    • Asia pacific journal of information systems
    • /
    • v.8 no.2
    • /
    • pp.105-119
    • /
    • 1998
  • As the first step to information security, the security policy and organizational control need to be established. The purpose of this study is to investigate the policy and management of information security of five major Korean business groups. The results of case study on five giant groups can be summarized as follows. There exists a basic policy for information security. But it is outdated and not realistic in the present. The security audit and education need to be upgraded. It is also necessary to use security tools actively. The security level is low in companies which do not have independent information security divisions. Therefore, it is desirable to build information security teams. The number of security personnel is not enough for the task although there exist an information security team in the company. It is important to check if the team has the ability of perform information security task. The interview with security managers reveals that the total security management should be integrated with physical and computer security. It is suggested that an Information Security Center play the major role for information security. The study on the information security management for industry level is expected to be performed in the future.

  • PDF

Implementation of Personalized Advertisement and Information Application Services Using RFID Virtual Tag (RFID 가상 태그를 활용한 개인화된 광고 및 정보 응용 서비스 개발)

  • Park, Nam-Je
    • Journal of Information Technology Services
    • /
    • v.8 no.4
    • /
    • pp.151-163
    • /
    • 2009
  • In this paper, we design and develop a personalized advertisement and information services system based on mobile RFID using RFID virtual tag. It is a system to perform the use of the contents information or the commercial transaction on the contents products through internet server connection by using RFID tag information with a mobile according as transmitting immediately to a cell phone after a tag generator derived RFID tag information to be substituted for the contents information being output at present, after being transmitted from a cell phone the information request signal on the contents information being output from video media. This service system provides a mechanism for gathering advertisement information left behind by many clients visiting advertisement sites for analysis of customers property, service model for selecting personalized services, and mechanism for providing them to customers who visited in a advertisement mall joined to the shopping site.