• Title/Summary/Keyword: Information Technology (IT)

Search Result 25,040, Processing Time 0.055 seconds

The function of Information Technology as a Driver of eManufacturing (eManufacturing의 Driver로서 정보기술의 기능)

  • 김태운;김병남
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.268-271
    • /
    • 2000
  • Based on the rapid development of information technology (IT) including networks, manufacturing environment faces more customer engagement, global collaboration, greater emphasis on agility, increasing reach and connectivity through world-wide web, and micro transaction tracking and intelligence to name a few. The new ideas of manufacturing concept, eManufacturing is discussed in view of IT. In specific, a framework to identify. IT application in the product realization process and collaboration and coordination to implement eManufacturing is proposed.

  • PDF

A Comparative Study on Maturity Levels of Information Technology (정보기술수준 비교분석 연구)

  • 이상엽;이주현
    • The Journal of Information Technology and Database
    • /
    • v.4 no.1
    • /
    • pp.129-138
    • /
    • 1997
  • In today's competitive environment, Information Technology is a resource of primary importance to most organizations. This paper compares Korea's IT maturity levels with respect to those of other major nations. For this research, we used an empirical approach, based on experts surveys. IT classification framework proposed by ETRI is adopted to organize the responses. The results of this study can be used for strategic IT planning by the government.

  • PDF

Level-wise Information Dispersal Protocol for Efficient Data Management (효율적인 데이터 관리를 위한 레벨-단위 데이터 분할 프로토콜)

  • Song, Sung-Keun;Youn, Hee-Yong;Lee, Bo-Kyoung;Choi, Joong-Sup;Park, Chang-Won;Lee, Hyung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1043-1046
    • /
    • 2002
  • 서바이벌 스토리지 시스템(Survivable Storage System)은 데이터의 가용성 및 보안성을 높이기 위해 여러 가지 분할 복제 기법들을 사용한다. 이러한 기법들을 정보의 중요도를 고려하지 않고 모든 데이터에 일괄적으로 적용하면, 시스템의 성능면에서 비효율적이다. 본 논문은 이를 해결하기 위해 정보의 중요도별로 다른 정보 분할 기법(IDS : Information Dispersal Scheme)를 적용하는 레벨 단위 데이터 분할 프로토콜을 제안하고 그 성능을 평가한다. 그 결과 제안된 방식은 정보의 중요도가 높을수록 데이터의 실질적인 가용성 및 보안성을 증가시킨다는 것을 볼 수 있다.

  • PDF

An Example of ISO 9001 Quality Management System based on BPMS (ISO 9001 품질정보시스템 구축 사례 연구)

  • Shin, Sung-Ho;Kim, Sang-Kuk;Lee, Young-Sei;Chung, Taik-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.659-662
    • /
    • 2005
  • Most organizations adopt a process-based approach to manage their operations and now business process management(BPM) is a well-established concept. Because ISO 9001:2000 has been influenced by BPR and it also emphasizes process based. BPM can get together with ISO 9001:2000. Korea Institute of Science and Technology Information has taken ISO 9001:2000 certificate in November 11, 2003 and now implements quality management systems based on BPMS. We call it KQMS(KISTI Quality Management System). KQMS based on BPMS is a new example in field of ISO quality management and is expected to support process management well.

  • PDF

A Study on the Information Technology and Competition Strategy - Focused on Continuous Competitive Advantage - (정보기술(IT)과 경쟁전략에 관한 연구 -지속적 경쟁우위와의 관련을 중심으로-)

  • Lim, Sang-Hyeok
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.15-31
    • /
    • 2006
  • There is no overdoing of enforcement of the importance of strategical mind which indicates future direction when management environment around organizations are variously changing. This document describers preceding and comparison research about competition strategy, competitive advantage and IT centered on organizations' common issue "Guarantee of Continuous Competitive Advantage" and researched various factors to determined if Information Technology is functioning properly through the cases of excellent organizations operating continuous competitive advantage Continuous competitive advantage's source is evaluating positively about resource based view which is described by innovation of business process. However, reality of operating continuous competitive advantage with difficult imitation of business process' "Time" "Complexity" is insufficient. Confirm how continuous competitive advantage is operated in reality by accepting easy application of "Simple Concise" business process. Confirm existence of information technology capability creating difficult imitation is functioning as a source of continuous competitive advantage, not Information Technology resource supporting business process.

  • PDF

The Analysis Of Informatization Of Agricultural Corporations In Korea: their use of information technology and its effect on performance change

  • Song, Cheolho;Jang, Ikhoon;Park, Heundong
    • Agribusiness and Information Management
    • /
    • v.12 no.1
    • /
    • pp.18-35
    • /
    • 2020
  • Due to the rise of Information & Communication Technology (ICT) adoption in many fields, it is necessary to diagnose the informatization situations of corporations in agriculture and give suggestions for improvement. For this goal, surveys were designed and conducted to understand the current informatization situations of agriculture corporations in Korea. The survey covers the plan for utilizing information technology, the establishment of infrastructure for information technology, IT application status, and its effect on their performance. The specific focus of our research is to segment the corporations by their type of industries and their level of sales and give differentiated managerial implications for each segment. This is because the type of informatization and information technology assistance they need highly depends on their industry type and sales level. Based on descriptive statistics and regression analyses, tailored managerial and polic.

Building up an IT Service Management System through the ISO 20000 Certification

  • Park, Jung-Hoon;Kim, Hwan-Min
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.2 no.2
    • /
    • pp.31-45
    • /
    • 2012
  • This study prepared a foundation to provide high-quality services in a stable and effective way to meet the customer expectations, by building up and establishing an ISO 20000 certified IT service management system and protecting the information assets from various threats through effective system operation that meets the requirements of international standards, in order to ensure the reliability and stability of NDSL public services provided by KISTI Information Service Center and to enhance the customer satisfaction.

Hierarchical Flow-Based Anomaly Detection Model for Motor Gearbox Defect Detection

  • Younghwa Lee;Il-Sik Chang;Suseong Oh;Youngjin Nam;Youngteuk Chae;Geonyoung Choi;Gooman Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1516-1529
    • /
    • 2023
  • In this paper, a motor gearbox fault-detection system based on a hierarchical flow-based model is proposed. The proposed system is used for the anomaly detection of a motion sound-based actuator module. The proposed flow-based model, which is a generative model, learns by directly modeling a data distribution function. As the objective function is the maximum likelihood value of the input data, the training is stable and simple to use for anomaly detection. The operation sound of a car's side-view mirror motor is converted into a Mel-spectrogram image, consisting of a folding signal and an unfolding signal, and used as training data in this experiment. The proposed system is composed of an encoder and a decoder. The data extracted from the layer of the pretrained feature extractor are used as the decoder input data in the encoder. This information is used in the decoder by performing an interlayer cross-scale convolution operation. The experimental results indicate that the context information of various dimensions extracted from the interlayer hierarchical data improves the defect detection accuracy. This paper is notable because it uses acoustic data and a normalizing flow model to detect outliers based on the features of experimental data.

A Development of Evaluation Indicators for Information Security by Means of the Coincidence Analyses (부합성 분석을 통한 정보보안 평가지표 개발)

  • Lee, Yeong-Kyu;Kim, Sang-Hoon
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.175-198
    • /
    • 2008
  • The wide spread of the Internet has become a momentum to promote informatization, and thus individuals, organizations, and government bodies are competitively participating in this kind of new wave. Informatization enables us not only to circulate and utilize information without any limitation but also to maximize users' benefits and convenience. On the other hand, it brings about negative effects-security incidents such as cyber terror, Internet fraud and technology leakage, etc. Evaluation on security level should precede over all the others in order to minimize damage by security incidents since it diagnoses current status on security as it is and can be used as a guideline for appropriate security management. In this study, evaluation domains, items and indicators of information security to evaluate information security are theoretically developed on the basis of critically reviewing the major existing research. And then the coincidence level(content validity, ease and reliability of evaluation) of each evaluation indicators are empirically analyzed through performing the field study of 83 information security experts.

Analysis of Smart City Core Technology Using Quantitative Indicators of Patentes (특허의 정량적 지표를 활용한 스마트시티 주요기술 분석)

  • Kwon, Won Jin;Lee, Jung Hoon;Lee, Nam Jung
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.4
    • /
    • pp.79-101
    • /
    • 2021
  • The purpose of this research is to define detailed technologies of smart city based on excellent patents through patent analysis related to major technologies of smart city, and to use quantitative indicators to classify relatively high technology importance and identify related technologies. To achieve the purpose of the study, patent collection is conducted by reflecting literature research and expert opinions based on information related to the smart city Internet of Things/Internet of Things communication core technology. Also, DEA were used to determine the relatively high technology. The inputs and outputs used in the study used quantitative indicators to determine technical value and made up of impact assessment, performance assessment and value assessment. As a result of the analysis, various technology groups were classified into smart city-related platform technologies, information sharing technologies, and network-related technologies, and based on the results of this research, it is expected that it will be able to apply technology patents related to smart cities to research and development strategies through key detailed technologies by major technologies of Smart City.