• 제목/요약/키워드: Information process

검색결과 27,670건 처리시간 0.047초

관광통계 프로세스 설계 지원 도구 개발에 관한 연구 (A Study on the Development of Supporting Tool for Tourism Statistics Process Design)

  • 한경진
    • 한국콘텐츠학회논문지
    • /
    • 제4권3호
    • /
    • pp.1-11
    • /
    • 2004
  • 본 연구는 관광통계 프로세스 설계 지원 도구 개발을 통하여 업무 프로세스를 설계하고, 시스템을 구축함으로써, 관광통계를 체계적이고, 통합적으로 관리할 수 있도록 하고 관광개발계획 의사결정 지원도구로 활용하는데 목적이 있다. 이러한 목표하에 정보공급자, 정보생산자, 정보활용자의 3가지 요소로 이루어진 관광통계 프로세스 설계 지원 도구를 개발하였다. 이러한 프로세스 설계 지원 도구는 기존의 개발계획지표가 관광 관련 정책결정 및 개발계획수립에 효율적의 활용될 수 있도록 업무프로세스를 개선하고 시스템 구조를 합리화시킬 수 있다. 프로세스 설계 지원 도구를 활용하여,49개의 업무 프로세스를 설계하였고, 외부 기관과 연계되는 합리적인 데이터베이스를 설계하여, 관광통계정보시스템을 구축하였다. 그 결과 관광개발계획 수립시, 보다 합리적인 의사결정을 지원할 수 있게 되었다.

  • PDF

A Study on the Factors Affecting E-logistics Systems in the Chinese Logistics Industry

  • Yu, Liu;Bae, Jung-Han
    • International Commerce and Information Review
    • /
    • 제2권1호
    • /
    • pp.25-48
    • /
    • 2009
  • With the rapid growth of e-logistics in the global logistics industry, it is important to gain further insight into this growing segment of Chinese logistics industry. The current situation in China consists of many small and medium-sized logistics firms. Furthermore, e-logistics is still relatively undeveloped in the majority of the Chinese logistics companies and presently there are still many problems unresolved. This paper attempted to review the concepts and theoretical background of e-logistics systems from previous studies. After acknowledging the essential issues related to e-logistics systems, a research model based on the theory acceptance model was designed and tested. The key factors to the e-logistics system (reliability, maintainability, software, facility and transportation) were validated through the modeling and testing process. Included in the modelling and testing process are other related factors of e-logistics process, logistics information system and added value as dependent variables in this model. The results of this study confirm that the e-logistics Process is affected by transportation, while maintainability and software factors influence logistics information system. reliability, maintainability, facility and transportation are significant factors associated with added value. This research aimed to provide theoretical and practical contribution to Chinese logistics companies and to give some insights into e-logistics system as a whole. The paper also provided some useful theoretical implication and practical guidelines for the development of e-logistics system in the chinese logistics industry.

  • PDF

A Study on the Factors Affecting E-logistics Systems in the Chinese Logistics Industry

  • Yu, Liu;Bae, Jung-Han
    • 통상정보연구
    • /
    • 제11권2호
    • /
    • pp.3-26
    • /
    • 2009
  • With the rapid growth of e-logistics in the global logistics industry, it is important to gain further insight into this growing segment of Chinese logistics industry. The current situation in China consists of many small and medium-sized logistics firms. Furthermore, e-logistics is still relatively undeveloped in the majority of the Chinese logistics companies and presently there are still many problems unresolved. This paper attempted to review the concepts and theoretical background of e-logistics systems from previous studies. After acknowledging the essential issues related to e-logistics systems, a research model based on the theory acceptance model was designed and tested. The key factors to the e-logistics system (reliability, maintainability, software, facility and transportation) were validated through the modeling and testing process. Included in the modelling and testing process are other related factors of e-logistics process, logistics information system and added value as dependent variables in this model. The results of this study confirm that the e-logistics Process is affected by transportation, while maintainability and software factors influence logistics information system. reliability, maintainability, facility and transportation are significant factors associated with added value. This research aimed to provide theoretical and practical contribution to Chinese logistics companies and to give some insights into e-logistics system as a whole. The paper also provided some useful theoretical implication and practical guidelines for the development of e-logistics system in the chinese logistics industry.

  • PDF

강교량 제작 프로세스 모델을 기반으로한 WBS구축 (Work Breakdown Structure(WBS) based on the Steel Box Girder Production Process Model)

  • 하승호;김석;김경민;박찬혁;김경주
    • 한국건설관리학회:학술대회논문집
    • /
    • 한국건설관리학회 2004년도 제5회 정기학술발표대회 논문집
    • /
    • pp.521-525
    • /
    • 2004
  • 본 연구의 목적은 강교량 제작 현장에서의 효율적인 정보관리를 지원하기 위한 정보관리체계의 구축을 목적으로 한다. 이를 위해 강교량 제작 업무 프로세스와 제작공종별 발생정보의 흐름과 정보관리 레벨(Level)을 분석함으로써 업무 수행과정에서의 효율적인 정보관리를 지원하기 위한 WBS 구축방안에 대한 연구를 수행하였다. 강교량 제작은 다양한 제작공정을 거쳐 수행되며, 각 단계별 업무 목적 및 관행에 따라 다양한 정보관리 수준을 갖는 것으로 파악되었으며, 효율적인 공정, 원가, 자원 및 풀질 등의 정보 관리, 공유 및 재활용을 위해서는 공종과 강교 거더의 부위 분류체계를 바탕으로 한 WBS의 구축이 바람직한 것으로 분석되었다.

  • PDF

정보시스템 부정행위 신고시스템 설계 (Design of Fraudulent Process Notification for Management Information Systems)

  • 이중희;이상원;안현섭
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.629-631
    • /
    • 2013
  • 많은 기업에서 부정행위나 절차가 만연하고 있다. 하지만, 직원들은 방어적 또는 반응적 보복을 당할까 두려워 불법적인 행위들을 고발하지 않고 있다. 이러한 배경에서 부정행위를 신고할 수 있는 시스템을 제안한다. 본 설계는 기업현장에서 정보시스템을 사용함에 있어서 발생하는 부정적 절차에 대해 효과적인데, 이 부정절차 신고는 신고처리, 신고방법, 저장매체 등과도 연관을 가지고 있다. 우리는 시스템과 신고자의 관점에서 부정절차 신고에 관한 전체적인 구조를 설계하고, 추가적인 신고 세부방법에 대한 설계를 덧붙이고자 한다.

  • PDF

NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations

  • Gookyi, Dennis Agyemanh Nana;Kanda, Guard;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • 제17권2호
    • /
    • pp.253-270
    • /
    • 2021
  • In January 2013, the National Institute of Standards and Technology (NIST) announced the CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest to identify authenticated ciphers that are suitable for a wide range of applications. A total of 57 submissions made it into the first round of the competition out of which 6 were announced as winners in March 2019. In the process of the competition, NIST realized that most of the authenticated ciphers submitted were not suitable for resource-constrained devices used as end nodes in the Internet-of-Things (IoT) platform. For that matter, the NIST Lightweight Cryptography Standardization Process was set up to identify authenticated encryption and hashing algorithms for IoT devices. The call for submissions was initiated in 2018 and in April 2019, 56 submissions made it into the first round of the competition. In August 2019, 32 out of the 56 submissions were selected for the second round which is due to end in the year 2021. This work surveys the 32 authenticated encryption schemes that made it into the second round of the NIST lightweight cryptography standardization process. The paper presents an easy-to-understand comparative overview of the recommended parameters, primitives, mode of operation, features, security parameter, and hardware/software performance of the 32 candidate algorithms. The paper goes further by discussing the challenges of the Lightweight Cryptography Standardization Process and provides some suitable recommendations.

Quality Variable Prediction for Dynamic Process Based on Adaptive Principal Component Regression with Selective Integration of Multiple Local Models

  • Tian, Ying;Zhu, Yuting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권4호
    • /
    • pp.1193-1215
    • /
    • 2021
  • The measurement of the key product quality index plays an important role in improving the production efficiency and ensuring the safety of the enterprise. Since the actual working conditions and parameters will inevitably change to some extent with time, such as drift of working point, wear of equipment and temperature change, etc., these will lead to the degradation of the quality variable prediction model. To deal with this problem, the selective integrated moving windows based principal component regression (SIMV-PCR) is proposed in this study. In the algorithm of traditional moving window, only the latest local process information is used, and the global process information will not be enough. In order to make full use of the process information contained in the past windows, a set of local models with differences are selected through hypothesis testing theory. The significance levels of both T - test and χ2 - test are used to judge whether there is identity between two local models. Then the models are integrated by Bayesian quality estimation to improve the accuracy of quality variable prediction. The effectiveness of the proposed adaptive soft measurement method is verified by a numerical example and a practical industrial process.

토털 아웃소싱 환경 하에서 IT서비스 수준관리(Service Level Management) 프로세스 성숙도가 정보시스템 성공에 미치는 영향에 관한 분석적 사례연구 (The Impact of Service Level Management(SLM) Process Maturity on Information Systems Success in Total Outsourcing: An Analytical Case Study)

  • 조근수;안준모;민형진
    • Asia pacific journal of information systems
    • /
    • 제23권2호
    • /
    • pp.21-39
    • /
    • 2013
  • As the utilization of information technology and the turbulence of technological change increase in organizations, the adoption of IT outsourcing also grows to manage IT resource more effectively and efficiently. In this new way of IT management technique, service level management(SLM) process becomes critical to derive success from the outsourcing in the view of end users in organization. Even though much of the research on service level management or agreement have been done during last decades, the performance of the service level management process have not been evaluated in terms of final objectives of the management efforts or success from the view of end-users. This study explores the relationship between SLM maturity and IT outsourcing success from the users' point of view by a analytical case study in four client organizations under an IT outsourcing vendor, which is a member company of a major Korean conglomerate. For setting up a model for the analysis, previous researches on service level management process maturity and information systems success are reviewed. In particular, information systems success from users' point of view are reviewed based the DeLone and McLean's study, which is argued and accepted as a comprehensively tested model of information systems success currently. The model proposed in this study argues that SLM process maturity influences information systems success, which is evaluated in terms of information quality, systems quality, service quality, and net effect proposed by DeLone and McLean. SLM process maturity can be measured in planning process, implementation process and operation and evaluation process. Instruments for measuring the factors in the proposed constructs of information systems success and SL management process maturity were collected from previous researches and evaluated for securing reliability and validity, utilizing appropriate statistical methods and pilot tests before exploring the case study. Four cases from four different companies under one vendor company were utilized for the analysis. All of the cases had been contracted in SLA(Service Level Agreement) and had implemented ITIL(IT Infrastructure Library), Six Sigma and BSC(Balanced Scored Card) methods since last several years, which means that all the client organizations pursued concerted efforts to acquire quality services from IT outsourcing from the organization and users' point of view. For comparing the differences among the four organizations in IT out-sourcing sucess, T-test and non-parametric analysis have been applied on the data set collected from the organization using survey instruments. The process maturities of planning and implementation phases of SLM are found not to influence on any dimensions of information systems success from users' point of view. It was found that the SLM maturity in the phase of operations and evaluation could influence systems quality only from users' view. This result seems to be quite against the arguments in IT outsourcing practices in the fields, which emphasize usually the importance of planning and implementation processes upfront in IT outsourcing projects. According to after-the-fact observation by an expert in an organization participating in the study, their needs and motivations for outsourcing contracts had been quite familiar already to the vendors as long-term partners under a same conglomerate, so that the maturity in the phases of planning and implementation seems not to be differentiating factors for the success of IT outsourcing. This study will be the foundation for the future research in the area of IT outsourcing management and success, in particular in the service level management. And also, it could guide managers in practice in IT outsourcing management to focus on service level management process in operation and evaluation stage especially for long-term outsourcing contracts under very unique context like Korean IT outsourcing projects. This study has some limitations in generalization because the sample size is small and the context itself is confined in an unique environment. For future exploration, survey based research could be designed and implemented.

  • PDF

Hazardous Factors and Accident Severity of Cabling Work in Telecommunications Industry

  • Kim, Yang Rae;Park, Myoung Hwan;Jeong, Byung Yong
    • 대한인간공학회지
    • /
    • 제35권3호
    • /
    • pp.155-163
    • /
    • 2016
  • Objective: This study aims to draw the characteristics of occupational accidents occurred in cabling work, and assess accident severity based on occupational injury data. Background: Accident factors and accident risk are different by the place of work in cabling work. Field managers require information on accident prevention that can be easily understood by workers. However, there has been a lack of studies that focus on cabling work in Korea. Method: This study classifies 450 injured persons caused in cabling work by process, and analyzes the characteristics of occupational injuries from the aspects of age, work experience and accident type. This study also analyzes accident frequency and severity of injury. Results: Results show that preparing/finishing (33.3%) was the most common type of cabling process in injuries, followed by maintenance (28.4%), routing/income (23.1%) and wiring/installation (15.1%) process. The critical incidents in the level of risk management were falls from height in the routing/incoming process, and falls from height in the maintenance process. And, incidents ranked as 'High' level of risk management were slips and trips, fall from height and vehicle incident in the preparing/finishing process, and fall from height in the wiring/installation process. Conclusion and Application: The relative frequency of accident and its severity by working process serve as important information for accident prevention, and are critical for determining priorities in preventive measures.

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권3호
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF