• Title/Summary/Keyword: Information systems investments

Search Result 132, Processing Time 0.101 seconds

A Study on Methods to Increase the Efficiency of Natural Disaster Early Warning Systems (자연재해 예·경보시스템의 효율성 제고방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.19-27
    • /
    • 2013
  • Damage on assets and lives caused by natural disasters can be minimized by the provision of early warning information and preventive activities. In this sense, the importance of a disaster early warning system continues to increase. This study specifies the kinds of early warning systems depending on the type of natural disasters such as typhoon, flood and heavy snow. The mechanism for information transmission and status of early warning operations are analyzed. Through this analysis, the urgent need to establish a national integrated early warning transmission system is emphasized. In addition, this study offers methods to prevent unnecessary overlapping of investments by establishing an organic mechanism among individual early warning systems. Based on the standardization of disaster-related information, this study also provides methods to improve the efficiency of disaster early warning systems by organizing a permanent team for handling the systematic management and operation of the system.

Risks and Network Effect upon Cloud ERP Investments: Real Options Approach (위험 및 네트워크 효과가 클라우드 ERP 투자에 미치는 효과에 대한 연구)

  • Seunghyeon Nam;Taeha Kim
    • Information Systems Review
    • /
    • v.20 no.4
    • /
    • pp.43-57
    • /
    • 2018
  • We propose network effects upon the investment decision of cloud-based ERP. Using the survey data collected from 82 companies in 2015, we examine whether IT managers have an intention to adopt real options in order to manage the risk of cloud-based ERP investments and how the network effects influence upon the intention to adopt real options. Based on prior literature, we propose a research model with 4 hypotheses. We find partial support of the hypotheses from the empirical analysis: technological risks has a positive impact upon the adoption of real options such as defer, contract, and abandon. In contrast, we find no significant impact of security risks upon real options. We validate positive network effects upon the adoption of real options such as defer, contract, and abandon. This work empirically find that IT managers in Korean middle and small sized firms have an intention to adopt real options when the managers realize economic, technological, and relationship risks and when they expect network effects.

A Study on the Strategic Adoption of Internet based Customer Relationship Management (인터넷 기반 고객관계관리의 전략적 도입에 관한 연구)

  • Roh Kyung-Ho
    • Management & Information Systems Review
    • /
    • v.5
    • /
    • pp.61-79
    • /
    • 2000
  • This research suggests the strategic adoption methodology of Customer Relationship Management. The backgrounds of CRM is the business environment changing that Market power is shifting to the customer who has unprecedented powers of choice today. The strategic adoption of Customer Relationship Management determines the value, needs and preferences of each customer or customer segment. Customer Relationship Strategy is an explicitly defined plan for how a company has decided to connect with, relate to, and focus on its chosen customers to create value. Deliberate decisions must be made, often involving trade-offs, so that investments are aligned with customer needs and value. Plan defined in terms of target customers value proposition, role in value delivery, and risk/reward sharing. All customers are not created equal; specific customers and/or customers segments are more desirable/valuable to pursue. Key premise of CRM is that value can be created by changing company's business model to better connect with customers. Area of service of Customer Relationship Management are as follows. Portfolio strategy, Market Opportunity Assessment, Brand Equity, Market Positioning, Pricing, Channel Strategy, Market Segmentation. Target Market Identification, Customer LifeTime Value Analysis, Customer Profitability, Customer Connections Economics Analysis. The objects of CRM are maximizing customer service effectiveness, improving customer loyalty, increasing customer service efficiency, optimizing intelligence about customer behaviors and preferences.

  • PDF

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors (핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

The Global Knowledge Linkage Structures of the Agricultural Sector Pertinent to Information Technology: A Triple Helix Perspective

  • Hossain, Md. Dulal;Moon, Junghoon;Choe, Young Chan
    • Agribusiness and Information Management
    • /
    • v.3 no.1
    • /
    • pp.23-37
    • /
    • 2011
  • The development of informatization impacts all sectors, including agriculture. Agricultural informatization builds the knowledge linkage structures of agricultural innovation systems globally. This study investigated the global knowledge linkage structures in agricultural innovation pertinent to information technology (IT) for agricultural research and development (R&D) investments and activities. We explored the longitudinal trend of systemness within the networked research relationships in the triple helix (TH) of the university, industry and government (UIG). We collected data from publications in the Science Citation Index (SCI), the Social Sciences Citation Index (SSCI), and the Arts and Humanities Citation Index (A&HCI) to analyze the TH network dynamics. We also performed a scientometrics analysis to quantitatively identify the knowledge and insights of global agricultural innovation structures. These results could be informative for individual countries. Our findings reveal that the global knowledge linkage structures in the agricultural sector that are pertinent to IT fluctuate widely and fail to increase the capacity of agricultural innovation research due to a neglect of the network effects of the TH dynamics of UIG.

  • PDF

Who is responsible for the onus of proof on online fraud transactions? In perspectives of the eCommerce Law and Privacy Investment (온라인 거래에서 사고 발생시 누가 이의 입증책임을 질 것인가?)

  • Chun, Se-Hak;Cho, Woo-Je;Kim, Jae-Cheol
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.699-704
    • /
    • 2007
  • In this study, we examine why there exist different legal systems in electronic commerce or online financial trading. When a fraud online transaction occurs and the online customer disputes the transaction, the online customer takes responsibility for the proof of her/his argument in many European countries while in the U.S., the burden of proof lays on the firm. This paper analyzes how these two different legal systems exist and how these can be applied to electronic commerce law. In particular, this paper intends to find the optimal level of e-commerce firms' investment on security and analyzes how security investments can be related to firm's profits and consumer's welfare depending on IT infrastructure and social trust environment. More on, this paper can be contributed to provide guidelines for regulatory framework on ecommerce online transactions and discuss social welfare implications.

  • PDF

Development of Evaluation System for Defense Informatization Level

  • Sim, Seungbae;Lee, Sangho
    • Journal of Multimedia Information System
    • /
    • v.6 no.4
    • /
    • pp.271-282
    • /
    • 2019
  • There is a description that you cannot manage what you do not measure. The Korea Ministry of National Defense (MND) is conducting evaluations in various fields to obtain meaningful effects from IT investments, and views that the evaluation of the defense informatization sector is divided into defense informatization policy evaluation and defense informatization project evaluation. The defense informatization level evaluation can measure the informatization level of MND and the armed forces or organizations. Since the evaluation system being studied to measure the level of defense informatization is composed mainly of qualitative metrics, it is necessary to reconstruct it based on quantitative metrics that can guarantee objectivity. In addition, for managing the level of change by evaluation objects, the evaluation system should be designed with a focus on homeostasis of metrics so that it can be measured periodically. Moreover, metrics need to be promoted in terms of performance against targets. To this end, this study proposes to measure the level of defense informatization by dividing it into defense information network, computer systems, interoperability and standardization, information security, information environment, and information system use, and suggests their metrics.

Practical Text Mining for Trend Analysis: Ontology to visualization in Aerospace Technology

  • Kim, Yoosin;Ju, Yeonjin;Hong, SeongGwan;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4133-4145
    • /
    • 2017
  • Advances in science and technology are driving us to the better life but also forcing us to make more investment at the same time. Therefore, the government has provided the investment to carry on the promising futuristic technology successfully. Indeed, a lot of resources from the government have supported into the science and technology R&D projects for several decades. However, the performance of the public investments remains unclear in many ways, so thus it is required that planning and evaluation about the new investment should be on data driven decision with fact based evidence. In this regard, the government wanted to know the trend and issue of the science and technology with evidences, and has accumulated an amount of database about the science and technology such as research papers, patents, project reports, and R&D information. Nowadays, the database is supporting to various activities such as planning policy, budget allocation, and investment evaluation for the science and technology but the information quality is not reached to the expectation because of limitations of text mining to drill out the information from the unstructured data like the reports and papers. To solve the problem, this study proposes a practical text mining methodology for the science and technology trend analysis, in case of aerospace technology, and conduct text mining methods such as ontology development, topic analysis, network analysis and their visualization.

Comparing the Impact of IT Investment on Firm Performance in the United States and China

  • Lee, Sang-Ho;Xiang, Jun-Yong;Kim, Jae-Kyeong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.409-414
    • /
    • 2007
  • Over the past three decades, the impact of IT investments on firm performance has been the subject Q{active research. Although many studies have shown positive and significant benefits derived from IT investment, the findings of almost all these studies are based on data collected in developed countries. This study tries to investigate the effects of IT investment on firm financial performance in the Chinese electronics industry, a typical developing country, and compare it with the United States. Findings show that there is a positive impact of IT investment on firm performance in China. Moreover, the impact in China is not different from what occurred in the United States in the direction and the size against the assertion of previous studies and expectation.

  • PDF

Implementation Options and Economics of Phased UMTS Deployment

  • Grillo, Davide;Montagna, Maurizio;Alfano, Franco;Colombo, Antonio;Ricci, Simone
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.282-291
    • /
    • 2002
  • 3GPP (Third Generation Partnership Project) is defining UMTS (Universal Mobile Telecommunication System) releases which span the transition from GSM/UMTS coexistence to All-IP UMTS networks. The deployment of an UMTS network depends, in the first place, on the intended service offerings and the release an operator chooses to start service with. Other key decisions in-fluencing UMTS deployment relate to the timing of the functional enhancements and capacity increases along the economic life of the network. This paper gives an overview on the architectural and technical options for UMTS deployment. It also outlines the methodology underlying the business plan aimed at estimating the returns from investments in the UMTS infrastructure, thus helping to tune operators’ strategies for UMTS deployment.