• Title/Summary/Keyword: IT information

Search Result 89,393, Processing Time 0.084 seconds

The Measurement Model for the Evaluation of Information Systems Service : The Case of Chinese SI Company (정보시스템 서비스 평가를 위한 측정모형의 개발 및 실증적 검증 : 중국 SI 기업 사례)

  • Lee, Sang-Jae;Lim, Gyoo-Gun
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.141-162
    • /
    • 2011
  • The controls of Information Systems (IS) have been an more critical issue controls as the sophistication and integration of IS is more proceeded. ITGI (The Information Technology Governance Institute) of ISACA (Information Systems Audit and Control Association) has suggested COBIT (Control Objectives for Information and related Technology) and this has been widely recognized the evaluation model of IS controls. In COBIT, IS was evaluated in terms of process, information quality, and IT resources. This study used COBIT in order to suggest and empirically test an evaluation model of IS service. The data was collated from one major Chinese SI (Systems Integration) company in four domains of processes : planning and organization, acquisition and implementation, delivery and support, and monitoring. Seven factors are extracted using an exploratory factor analysis as follows : Overall IT planning process, technological assessment process in IT planning of IT, cost-benefit assessment process in IT planning, implementation process, support process, monitoring process, post-implementation evaluation process. The results of confirmatory analysis of three alternative measurement models indicated that the measurement model with one inherent or conceptual variable has greater model fitness than the other models. This study suggests the logical and general way to test and apply COBIT in evaluating IS services.

A Study on the Prior Forecast System of Crossroads Traffic Information based on Vehicle-IT for Decision Assistant (차량 IT 기반 의사결정 지원을 위한 교차로 신호 사전예보 시스템에 관한 연구)

  • Lee, Yang Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2107-2113
    • /
    • 2015
  • This paper proposed a Prior Forecast System of Crossroad Traffic Information that allows vulnerable road users to perceive traffic signal changes beforehand and respond in concentrated traffic areas such as crossroads. Also, it mapped out information linking procedures of the proposed system and it designed a PHY based wireless communication simulator to verify the operational feasibility of wireless communications. Conclusively, by conducting performance analysis according to crossroad channel environments using the simulator designed in this paper, it verified that a Prior Forecast System of Crossroads Traffic Information service for vehicle IT based decision-making support for vulnerable road users is a possibility.

A Study on the New Management System Considering Shadow IT (Shadow IT를 고려한 새로운 관리체계 도입에 관한 연구)

  • Yoo, Jiyeon;Jeong, Nayoung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.33-50
    • /
    • 2016
  • In a dynamic IT environment, employees often utilize external IT resources to work more efficiently and flexibly. However, the use of external IT resources beyond its control may cause difficulties in the company. This is known as "Shadow IT." In spite of efficiency gains or cost savings, Shadow IT presents problems for companies such as the outflow of enterprise data. To address these problems, appropriate measures are required to maintain a balance between flexibility and control. Therefore, in this study, we developed a new information security management system called AIIMS (Advanced IT service & Information security Management System) and the Shadow IT Evaluation Model. The proposed model reflects a Shadow IT's attributes such as innovativeness, effectiveness, and ripple effect. AIIMS consists of five fields: current analysis; Shadow IT management plans; management process; education and training; and internal audit. There are additional management items and sub-items within these five fields. Using AIIMS, we expect to not only mitigate the potential risks of Shadow IT but also create successful business outcomes. Now is the time to draw to the Light in the Shadow IT.

The POI Model of individualization user central Intelligence Form based of WMS (WMS 기반의 개별 사용자 중심 지능형 POI 서비스 모델)

  • Nam, Haeng-Woo;Kang, Min-Sung;Kim, Bu-Rim;Kim, Eun-Young;Kim, Do-Hyeun;Lee, Sang-Jun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.725-728
    • /
    • 2006
  • Recently, It is gradually increasing about need of various information service based of Location that in compliance with rapidly development wireless internet terminal using the real-time location information at mobile environment. But existing information depends service provision method to information provider. so It is many insufficient tailorable information provision about user individuals each other propensity. For this, It need Service skill to provide easily information about tailorable POI(Point Of Interest) of user preference using information based of Location in mobile computing environment. Therefore In this paper, It is use information service based of location in mobile environment. So It analyzes POI information in compliance with propensity of user and It proposes to provide information about service model. It provides to follow individuals propensity analysis POI information service based of location in proposed model. so It provides actively more value information to user.

  • PDF

Necessity and Way to Legislate an Information Technology Education Promotion law for Improvement of National Competitiveness (국가경쟁력 향상을 위한 정보교육진흥법 제정의 필요성과 입법 방향)

  • Ahn, Seong-Hun
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.2
    • /
    • pp.209-217
    • /
    • 2011
  • Korea is a powerful nation in field of IT that has a 30 percent of world market. However Because of the IT education have been treated unimportant, korea has a shortage problem of manpower that develop core technology and software. Therefore, in this paper we propose a direction of the enactment of Information Technology Education Promotion Law to improve an education system and to promote education for IT. Also, we propose detailed contents to include in this law - the duty of country for a comprehensive planning of Information Technology Education, the organization of committee to promote Information Technology Education, a method to promote Information Technology Education in school and society, certification system of Information Technology using ability. Therefore, we expect that the result of this paper will contribute to enact an Information Technology Education Promotion Law that can improve an education system for IT.

  • PDF

A Study of IT Governance Model for Enterprise Information Management : Focused on Case Company (EIM(Enterprise Information Management)을 위한 IT 거버넌스 모델 연구 : 사례 기업을 중심으로)

  • Ahn, Jong-Chang;Kang, Youn-Chol;Lee, Ook
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.95-117
    • /
    • 2011
  • Today, IT governance has also become a subject of attention along with recent technologies such as ITSM (IT Service Management), PPM (Project Portfolio Management) and Compliance. At the national level, the market is fairly recent. and therefore, lacks detailed research in the field. Models specifically related to EIM has not yet been presented to this day, hence, firms that are considering EIM as a potential part of their information management system may fall into a state of disorder in the process of its implementation. To this end, this research attempts to construct an IT governance model for EIM based on existing models, surveys and interviews. In particular, E-discovery has been applied as means of protecting information assets and its use as evidence. In addition, by applying the research model to a particular global firm and then assessing its documentation management system, the overall feasibility of the research model has been tested.

Research on Effective Information Visualization Method Based on Mobile Web

  • YOO, Jina;KIM, Tae-Hyeong
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.7
    • /
    • pp.41-49
    • /
    • 2020
  • Purpose: The purpose of this study is to recognize the role and necessity of public data visualization through prior research, investigation, and data verification processes. In addition, this study intends to check what factors should be considered in order to visualize data on the mobile web. Through this process, by identifying the cognitive load affecting information visualization by type, as a result, I would like to propose an effective information visualization method to effectively deliver public data related to government policies. Research design, data and methodology: In this study, we analyzed the case of information visualization according to infographics, which has been widely used in the public field among various visualization methods. For this study, a questionnaire survey was conducted for young people in their 20s and 30s with the highest mobile usage rate. Results: Based on the results, IPA (Importance Performance Analysis) was performed to conduct cognitive load test tools for information visualization of public data and confirmed the implications for each type of infographics. Conclusions: As a result of research, in order to efficiently deliver public data on the mobile web, first, it is necessary to construct a visual screen that can be easily identified through clear data. Appropriate graphic elements can be used according to the type to make it easier for users to acquire and understand information. Second, it is necessary to provide useful content in visualizing information. Third, in order to efficiently transmit information and increase understanding of data, it is necessary to visualize information that can induce interest in data and form metaphors. Fourth, it is necessary to visualize information to reduce cognitive load in terms of physical and mental aspects in order to accommodate users' comfortable information. Fifth, in order to effectively deliver public data, it is necessary to compose contents and information that are easy for users to understand. This study examines effective information visualization methods to increase the communication effect of public data in response to changes in the data-based intelligent information society and suggests implications for each type considering cognitive loads to help future public institutions to communicate and accept information.

IT Architecture: Is It a Brand-new Paradigm? (IT 아키텍처, 과연 새로운 접근방법인가?: 미국과 국내 사례의 비교분석을 중심으로)

  • Jang, Si-Young;Lee, Chung-Seop;Choi, Young-Jin
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.59-80
    • /
    • 2002
  • Today the theme of "IT Architecture" has become a topic of special interest in both public and private sectors. Based on the literature survey on information systems planning and information architecture, IT architecture may be viewed as the outcome of evolution, rather than revolution. A case study was conducted in order to compare the tasks and deliverables of U.S. IT architecture and Korean Information Strategy Planning. No significant differences were found in tasks or deliverables. Implications of the study were discussed.

IT SME Ventures' External Information Network Diversity and Productivity Improvement : The Mediating Role of the Production Period Reduction (IT 중소벤처기업의 외부 정보 네트워크의 다양성과 생산성 향상 : 생산 기간 단축의 매개적 역할)

  • Hau, Yong Sauk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.1
    • /
    • pp.144-149
    • /
    • 2017
  • This study empirically analyzes the effect of IT SME ventures' external information network diversity on their production period reduction and productivity improvement generated from technology development. This research constructs a mediating model based on the open innovation perspective and tests it with the 138 samples of South Korean IT SME ventures based on the ordinary least squares regression. This research is expected to make a good contribution by shedding a new light on the following three points about the critical role of IT SME ventures' external information network diversity in increasing their production period reduction and productivity improvement generated from technology development which has scarcely been illuminated in the extant studies in the field of the management of technology for SMEs. First, IT SME ventures' external information network diversity positively influences their production period reduction. Second, the external information network diversity positively influences IT SMEs' ventures' productivity improvement. Third, IT SME ventures' production period reduction partially mediates the influence of IT SME ventures' external network diversity on their productivity improvement. These three fresh points are expected to provide useful theoretical and practical implications. Related to the theoretical implication, this research provides a fresh implication that IT SME ventures' external information network diversity positively influences not only their production period reduction but also productivity improvement generated from technology development. Concerning the practical implication, this study suggests that the CEOs in IT SME ventures make strategic efforts to use more diverse external information sources in order to increase their production period reduction and productivity improvement generated from technology development.

An Empirical Study on Security Management Model for Small IT Service Business (소규모 IT 서비스 기업 비즈니스 특성을 고려한 보안 관리모델 실증연구)

  • Kim, Yanghoon;Na, Youngsub;Chang, Hangbae
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.131-141
    • /
    • 2012
  • Depending on the sophistication of IT, it is increasing more and more information leaks and breaches. Accordingly the majority of companies have expand investment protection for the information. However, companies still have been exposed the vulnerability of information leakage. Especially, small IT service businesses than large corporations relatively have some limitations in the points of resources and manpower business activities. For studies on information security for small IT service companies so far, however, there have been insufficient studies considering small business scales and business characteristics of IT services. In this study, we made to design an information security management model for establishing security measures of small IT service companies which are classified SI/SM, DB, IR and IP industry that depending on how the value creation of the business. In detail, we performed an empirical analysis for small IT service business to consider business characteristics and we proposed security implementation strategies based on the analysis results.

  • PDF