• 제목/요약/키워드: Information System Types

검색결과 3,547건 처리시간 0.035초

유통업체의 정보물류시스템 아웃소싱 유형과 물류성과에 관한 실증연구 (An Empirical Study of Logistics Performance and Outsourcing Types of Korean Distributors)

  • 유창권
    • 유통과학연구
    • /
    • 제12권4호
    • /
    • pp.41-46
    • /
    • 2014
  • Purpose - This study focused on providing strategic findings that make significant sense for companies that are looking for a future outsourcing strategy. The study analyzes the results of outsourcing in the information logistics systems field and verifies the results through experimental study of the performance delivered by logistics outsourcing types. Research design, data, and methodology - The study sample was assembled based on a random sampling method used to extract the initial 451 companies from a list of Korean distributors, wholesalers, and retailers. Following that sample process, 423 companies were confirmed by verifying their e-mail address and contacts (telephone and fax numbers), and were selected as initial research subjects. We reduced that number to 331 companies for the survey sample through telephone interviews in advance with the 423 companies that were targeted, in order to verify whether they are in the field of outsourcing of information logistics systems. The period of the survey extended from November 10, 2013 to January 10, 2014. The number of collected surveys totaled 181. We reviewed the contents of the survey responses, and reduced the number of research subjects to 175. In this study, we used a standard analysis to investigate whether there is a difference in distribution results based on different types of outsourcing information in the logistics system field and, through T-verification, we investigated whether the difference between distribution results in each group resulting from that standard analysis is statistically significant. Results - These results show that there is a difference in distribution outcome, based upon type of distribution outsourcing. In addition, we determined that they are meaningful results by confirming that, for usability and to improve the capabilities of a third-party logistics service supplier, both the choice of reasonable outsourcing types and the enhancement of various types of alliances are very important success factors. Taken together these study results, with a goal of enhancing the distribution capabilities of a Korean distributor, can be implemented to enhance management results achievable by supplying an information logistics system in the form of strategic outsourcing rather than in the form of simple outsourcing. In addition, the outcomes of logistics distributors in Korea that are using outsourcing in the logistics information systems field show high performance results in commercial endeavors in the following order: competitive, pre-competitive, non-competitive, and pro-competitive. Conclusions - This study focused on providing strategic findings. However, in the case of outsourcing in the field of information logistics systems of Korean distributors, there has been a focus on simple outsourcing rather than on strategic outsourcing; furthermore, there has been a concentration on non-competitive forms instead of pro-competitive forms, which could achieve better distribution results. This discussion is presented in more detail in the analysis results of this study.

개인 정보 역량 평가시스템 개발에 관한 연구

  • 윤취영;임춘성
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2003년도 종합학술대회 논문집
    • /
    • pp.148-154
    • /
    • 2003
  • An Evaluation System of Personal Information Competency was developed to evaluate individual Information competency and maturity levels in the enterprises of the information environment. The Evaluation System measures the requirements of information knowledge, skills, and mindset with the evaluation indices of personal information maturity. The indices are customized to four types of business departments - strategy Planning, development/maintenance, business applications, and administration support. Also, a maturity model of personal information competency is defined for interpretation of the evaluation results. The system was applied to assessment of actual human resources, 124 workers in an enterprise, to testify to its practical value. The case evaluation procedures include a series of questionnaires, written tests and application tests.

  • PDF

도서관 열람환경에서의 어린이 인지정보처리에 관한 연구 (A Study on Interpretations of Children's Cognitive Information Processing in Reading Environment of Library)

  • 한귀연;윤성규;한영호
    • 한국실내디자인학회논문집
    • /
    • 제24권1호
    • /
    • pp.104-114
    • /
    • 2015
  • The library means to children a place where they find information necessary for them among a variety of knowledge and information to address their intellectual curiosity, which makes their lives wise and mature. There are not enough research materials understanding children's cognitive systems and behaviors in studies of a children's library with this necessity. This study divided and analyzed the behaviors of children, who were users into three types of reading in terms of information processing. First, it observed the types of reading depending on the stage of their cognitive development; Second, it analyzed the patterns of their behaviors through plays; and lastly, it presented the phases of their behaviors depending on the degree of an assistant's intervention. As a result of the study, the sensory system used and the space preferred differed depending on the stage of their cognition; there were differences in the patterns of their behaviors in each age group depending on the type of play; and there were differences in the children's ability of information processing depending on the assistant's ability. It is anticipated that there will be improvements of children's reading ability at the reading room in a better environment if the three types are considered in terms of information processing.

현존하는 디지털도서관의 문제점과 미래환경에 관한 연구 (A study of the existing problems of digital libraries and their future environment)

  • 박일종
    • 한국도서관정보학회지
    • /
    • 제27권
    • /
    • pp.391-421
    • /
    • 1997
  • Information scientists need not to answer whether future libraries will be a digital library or not, but to answer how they are structured and served effectively to users currently. 'The library with walls' or 'the library as place' need to be existed in the future, but 'digital library without the wall' or 'virtual library' will need to be studied continuously. This study has tried to reveal the existing problems of digital libraries and their future environment after considering the ambiguous concepts of various types of electronic libraries and their efforts for library automation, and the changed information retrieval circumstances during the last 30 to 40 years through a qualitative document study. As a result, the major findings and suggestions are prepared. The library of the future will be a part of local and national cooperative systems, be filled with the intelligent use of old and new technologies, and be able to su n.0, pport both a place with extensive collections and convenient, easy, & free access to remote intellectual resources. Also, the information storage and retrieval (ISAR) to the future library system would easily provide users with any types of data retrieval system by anybody rather than by an expert or a specialist, so called 'A&E retrieval' in the coming 21th century. It will be highly possible that the future society changes to the information marketplace whose data may be recognized as an intangible assets.

  • PDF

루프검지기와 피에조 센서를 이용한 차량정보 수집 시스템 설계 (Design of Traffic Data Acquisition System with Loop Defector and Piezo-Electric Sensor)

  • 한경호;양승훈
    • 조명전기설비학회논문지
    • /
    • 제16권6호
    • /
    • pp.102-108
    • /
    • 2002
  • 본 논문에서는 지능형 교통 시스템(ITS)의 기본 정보인 차량정보와 도로정보를 실시간으로 제공하기 위하여 루프 검지기와, 피에조 센서를 사용한 차량정보 수집 시스템의 설계를 다루었다. 루프검지기와 피에조 센서를 도로차선마다 설치하고 프로세서와 입/출력 보드를 통하여 샘플링 주기에 의하여 센서의 신호를 읽어들여 차량 및 교통정보를 생성한다. 생성된 정보는 패킷형태로 만들어져 RS232C 직렬 통신과 모뎀을 통하여 원격에 있는 교통 관제시스템으로 전송된다. 이를 위하여 EISA BUS규격의 32채널 입/출력 보드와 차량정보 수집 프로그램을 설계하고 시뮬레이션 시스템에서 확인하였다.

The Mediating Effects of Bidirectional Knowledge Transfer on System Implementation Success

  • Kim, Jong Uk;Kim, Hyo Sin;Park, Sang Cheol
    • Asia pacific journal of information systems
    • /
    • 제25권3호
    • /
    • pp.445-472
    • /
    • 2015
  • Although knowledge transfer between two different parties occurs in IS development projects, the majority of prior studies focused on knowledge transfer from IT consultants to clients. Considering two parts of knowledge transfer in IS development projects, we must consider both 'where knowledge is transferred from' and 'where it is transferred to'. Therefore, in this study, we attempt to describe two different routes of knowledge transfer, such as knowledge transfer from an IT consultant to a client and knowledge transfer from a client to an IT consultant. In this regard, we have examined the effect of two different routes of knowledge transfer on system implementation success in IS development project. Specifically, we adopted the knowledge stock-flow theory to examine the causal relationship between IT consulting firms and clients in terms of knowledge transfer and eventual system implementation success. Survey data collected from 213 pairs of individuals (both clients and IT consultants) were used to test the model using three different analytic approaches such as PLS (partial least squares) and two types of mediated regression techniques. We found that knowledge transfers partially mediated both the relationships between IT consultants' IT skills (project members' business knowledge) and system implementation success. Furthermore, the effects of each knowledge transfer were distinguished by depending on the types of system, such as ERP or groupware. Our attempts have significant implications for both research and practice given the importance of effective knowledge transfer to IT consulting.

무기체계 설계/형상정보 관리 시스템을 위한 메타 데이터 모델링 (Meta Data Modeling for Weapon System Design/Configuration Data Management System)

  • 김기백
    • 한국군사과학기술학회지
    • /
    • 제7권2호
    • /
    • pp.65-73
    • /
    • 2004
  • In general, weapon system design/configuration data consist of system structure information which is linked to Part information, documents and drawings. For configuration management, version and revision control are necessary and access control of users to information should be managed for information security. Configuration data of weapon systems have various kinds of different meta data which are contained in the structure as well as attributes of parts and documents information. If neutral types of meta data models be used for building configuration management system, they can be applied to many different kinds of weapon systems with a little customization. In this paper, five meta data models are supposed and implementation results of them by using CBD(component based design) methodology are presented.

복잡한 분야의 한정된 데이터 상황에서의 사례기반 추론: 공정제어 분야의 적용 (Case Based Reasoning in a Complex Domain With Limited Data: An Application to Process Control)

  • 김형관
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 1998년도 가을 학술발표논문집 Vol.25 No.2 (2)
    • /
    • pp.75-77
    • /
    • 1998
  • Perhaps one of the most versatile approaches to learning in practical domains lies in case based reasoning. To date, however, most case based reasoning systems have tended to focus on relatively simple domains. The current study involves the development of a decision support system for a complex production process with a limited database. This paper presents a set of critical issues underlying CBR, then explores their consequences for a complex domain. Finally, the performance of the system is examined for resolving various types of quality control problems.

  • PDF

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

정보시스템 운영사업 비용산정 모형 개발에 대한 실증적 연구 (An Empirical Study On Information Systems Operation Cost Estimation Model)

  • 김현수
    • 한국정보처리학회논문지
    • /
    • 제7권6호
    • /
    • pp.1810-1817
    • /
    • 2000
  • The purpose of this research is to develop an estimation model for information systems operating costs. Current cost estimation practices and types of sytem management projects have been reviewed an analyses. Typical operating project types of information systems are determined. They are application system operation, help disk operation, network management and operation, and hardware management. For each type of projects, cost factors ar identified and a structure of cost estimation model is defined. Cost estimation models have been constructed and tested by 24 real operation projects data. Statistical analysis shows derived models are statistically significant. User groups' opinion on these draft cost estimation model has been surveyed and summarized. The results of this research can be used as a cornerstone for future research on operating cost estimation, and for cost estimation guideline of information systems operation projects.

  • PDF