• Title/Summary/Keyword: Information Management Model

Search Result 9,089, Processing Time 0.036 seconds

A design of object croup model in open distributed processing environments (개방형 분산 환경에서 객체그룹 모델의 설계)

  • 이승용;정창원;신영석;주수종
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.9A
    • /
    • pp.2258-2270
    • /
    • 1998
  • Recently, the distributed processing environments provide various open multimedia serivces through telecommunication network and have been developing into information networking structure based on object oriented concepts and distributed systems which can apply new services with a few changes the existing networks. This paper proposes the object group model which is the collection of objects and can functionally and efficiently manage the individual object. this paper presents the analysis of the requirement and the function specifications to propose the object group model, and depicts the functional structure in details using its analysis. The goal of this paper is to decrease the complexity of the object's management and to voercome the limitations of among the components of object group for management and service functions based on our proposed the object group model and show interaction procedures to eTD (event tracing diagram)s and finally we design the object group model by TINA-ODL.

  • PDF

Comparison of 3D Reconstruction Methods to Create 3D Indoor Models with Different LODs

  • Hong, Sungchul;Choi, Hyunsang
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.674-675
    • /
    • 2015
  • A 3D indoor model becomes an indiscernible component of BIM (Building Information Modeling) and GIS (Geographic Information System). However, a huge amount of time and human resources are inevitable for collecting spatial measurements and creating such a 3D indoor model. Also, a varied forms of 3D indoor models exist depending on their purpose of use. Thus, in this study, three different 3D indoor models are defined as 1) omnidirectional images, 2) a 3D realistic model, and 3) 3D indoor as-built model. A series of reconstruction methods is then introduced to construct each type of 3D indoor models: they are an omnidirectional image acquisition method, a hybrid surveying method, and a terrestrial LiDAR-based method. The reconstruction methods are applied to a large and complex atrium, and their 3D modeling results are compared and analyzed.

  • PDF

An Analysis of IS-Related Curriculums in Korea Based on the IS 2002 Model Curriculum (IS 2002 표준교육과정에 입각한 국내 정보시스템 관련학과의 교육과정에 대한 분석)

  • Ryu, Young-Tae
    • Management & Information Systems Review
    • /
    • v.29 no.3
    • /
    • pp.149-171
    • /
    • 2010
  • The purpose of this research is an assessment of Information Systems(IS) curriculums in Korea based on the IS 2002 model curriculum. Out of the 201 Korean universities, 60 universities have the IS discipline as a major or a department having an independent curriculum. Out of these 60 universities, 38 universities(63.4%) have the IS discipline in the business schools while the IS discipline in the rest of universities is located under the social science school and others. Information Systems as a field of academic study exists under a variety of different names. The different labels(Information Systems, Management Information Systems, Computer Information Systems, Information Management, e-commerce, e-business, etc.) reflect historical development of the field, different ideas about how to characterize it, and different emphases when programs were began. The result of mapping the IS courses into the IS 2002 model curriculum supports the fact that management as a reference discipline that provides underlying theories for IS as a particular new discipline should be its academic home. Within the IS courses, information technology area is the most popular. and followed by information systems fundamentals area, information systems theory and practice area, information systems development area, and information systems deployment and management process area.

  • PDF

A Development of the Model for Evaluating the Security of Information Systems in Health Care Organizations (의료기관의 정보보안 수준 측정을 위한 평가모형 개발)

  • Ahn, Sun-Ju;Kwon, Soon-Man
    • Korea Journal of Hospital Management
    • /
    • v.10 no.4
    • /
    • pp.98-112
    • /
    • 2005
  • The purpose of this study is to develop a framework for evaluating security levels in hospitals. We classify security indicators into administrative, technical and physical safeguards. The security evaluation model for hospital information systems was applied to three general hospitals. The analysis of the results showed a low security level in information systems. In particular, requirements for administrative and physical safeguards were very low. Hospitals need strict security policies more than other organizations because their information systems contain patients' highly confidential data. The evaluation model developed in this study can be used for guidelines and as a checklist for hospitals. The security evaluation in hospital informational systems needs to be an essential element of hospital evaluation.

  • PDF

Understanding User Continuance of Stock Investment Information in an Online Trading Environment (온라인 거래 환경에서 주식 투자 정보의 지속 사용에 대한 이해)

  • Kim, Hye Min;Chung, Sunghun;Han, Ingoo;Kim, Byoungsoo
    • Knowledge Management Research
    • /
    • v.12 no.4
    • /
    • pp.41-54
    • /
    • 2011
  • Given the prevalence of home trading systems, it has become important to examine user behaviors in a stock investment environment. In this vein, this paper developed an integrated model to deeply understand the key determinants of user's continuance intention to use investment information through constructs prescribed by incorporating trust and perceived risk into expectation-confirmation model. The proposed research model was tested by using survey data collected from 160 users who have experience with stock investment. PLS (partial least squares) was employed for the analysis of the data. The findings of this study showed that the proposed framework provides a statistically significant explanation of the variation in continuance intention to search investment information. The findings revealed that trust and perceived risk are more prevalent predictors of continuance intention to use investment information compared to perceived usefulness. It was also found that user satisfaction serves as the salient antecedents of continuance intention to use investment information. The theoretical and practical implications of the findings were described.

  • PDF

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Design of Information Systems Audit Model for the Small and Medium Enterprise's Informatization Level Evaluation (중소기업 정보화수준 평가를 위한 정보시스템 감리모델 설계)

  • Kim, Jung-Hwan;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.105-120
    • /
    • 2015
  • Enterprise should determine the adoption and utilization of information systems would be a great help to increase management performance. So, it maintains continually the budget and the investment for informatization. However, there is a limit to clarify whether the investment in informatization is contributed to create business opportunities through corporate competitiveness certainty or not. We tend to recognize the information system as a simple means to support common business rather than being used to achieve the company's business performance and to remain competitive. It is not an easy problem for the quantitative evaluation and analysis on the effect of intangible, such as management performance measurement by introducing computerization project. Informatization level evaluation model for the harsh business environment, specifically the Small and Medium Enterprise is lacking. In this paper, we proposed the audit evaluation model of an Small and Medium Enterprise informatization level based on system quality, information quality, user satisfaction, and IT business contribution. The proposed audit evaluation model was evaluated in the information system users, and verified the suitability throughout the survey of the audit professionals.

Developing a Green IT Maturity Model: Assessment and Improvement Strategies (녹색정보화 성숙도 진단 모델 개발 및 실증 연구)

  • Park, Sang-Hyun;Eo, Jae-Kyung;Jeon, Hyo-Jung
    • Information Systems Review
    • /
    • v.13 no.1
    • /
    • pp.115-141
    • /
    • 2011
  • One consequence of the new economic imperative of developing an environment-friendly and sustainable economy has been the growing importance of green management as a corporate management strategy. In Korea, the government has put forth a green growth vision, and followed suit with policy measures reflecting this vision. Companies, in their turn, have announced various new management plans reflecting this green vision. But, thus far, no tangible progress has been made. This is mainly due to the lack of concreteness, both in the government's policy and green management plans by companies. The government's green IT vision, for instance, was formulated without an accurate assessment of the current level of maturity in terms of green IT in Korea. This study presents a model for assessing the level of green IT maturity, developed by taking into consideration the informatization and regulatory environments of Korean firms. We use this model to evaluate a sample of Korean firms selected as representatives of their respective industry sectors to assess the overall level of green IT maturity among Korean companies. Improvement strategies, based on the results of assessment, are presented as well.

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

A Study on U-Learning System (U-러닝 시스템에 관한 연구)

  • Park, Chun-Myoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.616-617
    • /
    • 2010
  • This paper presents a model of e-learning based on ubiquitous computing configuration. The proposed e-learning model as following. we propose the e-learning system's hardware and software configurations which are server and networking systems. Also, we construct the proposed e-learning systems's services. There are attendance and absence service, class management service, common knowledge service, score processing service, facilities management service, personal management service, personal authorization issue management service, campus guide service, lecture-hall management service. Also, we propose the laboratory equipment management service, experimental materials management service etc.

  • PDF