• Title/Summary/Keyword: Internet Maturity

Search Result 64, Processing Time 0.024 seconds

A study on the mobile Internet portal service types (무선인터넷 포털서비스의 유형과 유망 컨텐츠 분석 이동전화를 통한 무선인터넷을 중심으로)

  • 김주성;김태성;고석하
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.4
    • /
    • pp.151-164
    • /
    • 2002
  • This paper predicts how mobile Internet portal services will go ahead and what contents will be needed at the portal site. Mobile Internet interface needs to be concise and compressed because of the size of terminals Thus mobile internal service wants integrated portal service We study the service strategy for mobile internet portal Service according to the product life cycle Many Korean people who have used 'wired and fixed' Internet services and mobile phones want the mobile Internet portal to provide many attractive functions and high quality of service Thus we consider the current Korean mobile Internet service as the maturity phase of its life cycle The maturity phase needs the strategy of diversifying and focusing on, thus we recommend the hub portal model for Korean mobile Internet service, In this paper, we survey contents of mobile Internet portal service as a case study. With the result of the analysis, we present the promising contents as follows: video conference service, financial service, stock trading service, traffic information service, location map service, emergency rescue service, and so on.

  • PDF

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

A Study for Influencing Factors of Organizational Performance: The Perspective of the Mediating Effect of Information Security Maturity Level (조직성과에 미치는 영향요인에 관한 연구: 정보보호 성숙도의 매개효과를 중심으로)

  • Park, Jeong Kuk;Kim, Injai
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.99-125
    • /
    • 2014
  • Internet environment and innovative ICT(information and communication technology) have brought about big changes to our lifestyle and industrial structure. In spite of the convenience of Internet, various cyber incidents such as malicious code infection, personal information leakage, smishing(sms + phishing), and pharming have frequently occurred. Information security must be recognized as a key and compulsory element for surviving in a global economy. Strategic roles of information security have recently been increasing, but effective implementation of information security is still a major challenge to organizations. Our study examines the influencing factors of information security and investigates the causal relationship between information security maturity level and organizational performance through an empirical survey. According to the results of our study, personal, organizational, technical, and social factors affect organizations's information security maturity level altogether. This result suggests that when dealing with security issues, the holistic and multi-disciplinary approaches should be required. In addition, there is a causal relationship between information security maturity level and organizational performance, and organizations aim to establish the efficient and effective ways to enhance information security maturity level on the basis of the results of this study.

A Reference Model for Audit and Project Management in the Information Technology using the CMM (CMM 기반 정보기술 프로젝트 관리 및 감리 참조 모델에 관한 연구)

  • 김태달
    • Journal of Internet Computing and Services
    • /
    • v.2 no.2
    • /
    • pp.11-22
    • /
    • 2001
  • For the effective and efficient management of the information system development project. the domestic market is also required to manage the project and set up the information system audit items, which are applicable to the actual project using CMM(Capability Maturity Model). With this thesis, we suggest a reference model complimenting the project. by letting a project manager recognize beforehand the present maturity status, within an organization as well as step-by-step management items and audit indicators for the future capability maturity improvement.

  • PDF

Towards Enacting a SPEM-based Test Process with Maturity Levels

  • Dashbalbar, Amarmend;Song, Sang-Min;Lee, Jung-Won;Lee, Byungjeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1217-1233
    • /
    • 2017
  • Effective monitoring and testing during each step are essential for document verification in research and development (R&D) projects. In software development, proper testing is required to verify it carefully and constantly because of the invisibility features of software. However, not enough studies on test processes for R&D projects have been done. Thus, in this paper, we introduce a Test Maturity Model integration (TMMi)-based software field R&D test process that offers five integrity levels and makes the process compatible for different types of projects. The Software & Systems Process Engineering Metamodel (SPEM) is used widely in the software process-modeling context, but it lacks built-in enactment capabilities, so there is no tool or process engine that enables one to execute the process models described in SPEM. Business Process Model and Notation (BPMN)-based workflow engines can be a solution for process execution, but process models described in SPEM need to be converted to BPMN models. Thus, we propose an approach to support enactment of SPEM-based process models by converting them into business processes. We show the effectiveness of our approach through converting software R&D test processes specified in SPEM in a case study.

Online Channel Strategies of Hybrid Firms and Social Cost

  • Cho, Su-Mi;Lee, Sang-Ho
    • Management Science and Financial Engineering
    • /
    • v.13 no.1
    • /
    • pp.55-72
    • /
    • 2007
  • We consider the product differentiation model of online channel competition and examine the strategies of hybrid firms in terms of efficiency. After measuring the social cost of online business strategies, we show that (i) online channel of hybrid firm under blockaded entry may increase the social cost if the firms' delivery cost is sufficiently smaller than the consumer's transportation cost, and (ii) online competition under free entry may increase the social cost if the firms' delivery cost is sufficiently larger than the consumer's transportation cost. Finally, we discuss the strategic incentive of hybrid firms to reduce delivery cost and investigate the effect of the Internet maturity on the social cost.

Balance Algorithm for Long-term Bond First of Cash Flow Matching Problem (자금흐름 일치 문제의 장기채권 우선 잔고 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.167-173
    • /
    • 2023
  • The cash flow matching problem(CFMP) aims to minimize the initial investment by paying the total amount due for the T-year in principal and interest of bonds or bank deposits without paying the full amount in cash. Linear programming(LP) is the only known way to solve CFMP. The linear programming method is a problem that optimizes T linear functions, and it cannot be solved by handwriting, so LINGO, which is a solution to the linear programming method, is used. This paper proposes an algorithm that obtains the solution of CFMP solely by handwriting without the help of LINGO. The proposed algorithm determines the amount of bond purchases by covering payments until the previous year of the next maturity bond in the order that the maturity date falls from the longest to the short term. In addition, until the year before the maturity of the shortest maturity bond, the amount of deposit covered by the principal and interest of the bank deposit was determined. As a result of applying the proposed algorithm to two experimental data, it was shown that more accurate results can be obtained compared to the linear programming method.

The Differences of Social Influence on Information Technology Adoption by Knowledge Work and IT Maturity (정보기술 수용에 있어서 사용자 특성과 정보기술 특성에 따른 사회적 영향의 차이)

  • Yang, Hee-Dong;Moon, Yun-Ji
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.97-120
    • /
    • 2005
  • As information systems are introduced in organizations, user attitudes toward IS are crucial factors for the success of such systems. Hence, understanding what affects user attitudes should be a major concern in MIS research. The purpose of this study is to improve the understanding of social influence on IS adoption. Social influence construct is stretched to include four items: subject norm, image, visibility, and voluntariness. Also, this paper examines the roles of two moderators regarding social influence: user characteristics and IT maturity. We could find that 1) social influence has a significant impact on perceived usefulness(PU), perceived ease of use(PEU), and intention, 2) the social influence on PU is more noticeable for knowledge worker than for undergraduate student, and 3) social influence on knowledge worker's PU is stronger for emerging IT(e.g., wireless internet services) than for mature IT(e.g., spreadsheet software).

A Study on the Effect of the Internet Banking Service Quality on Trust of Bank (인터넷뱅킹의 서비스 품질이 은행의 신뢰에 미치는 영향에 관한 연구)

  • Lee, Jong-Ok;Seo, Young-Sang
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.19-40
    • /
    • 2009
  • In case of korea, it is said that the service of internet banking is in maturity regarding the number of transactions that internet banking process. So it is necessary to find out the factors that influence customer's trust on bank with the use of internet banking, to preserve existing customers. The purpose of this study is to investigate the effects of the internet banking service quality on trust of banks. For this purpose, eight hypotheses are empirically tested using logistic regression. The empirical results indicated that responsiveness, easy of use, and accuracy from the six dimensions of internet banking service quality factors take significant effect on trust of bank.

  • PDF

A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis (사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구)

  • Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM for security engineering, engineering, assurance, risk is divided into three elements of the process maturity assessment model and the level of information security presented. Maturity measurement of privacy, vulnerability diagnosis and risk analysis methodologies is used in practical field for present a comprehensive conclusion. The common cyber services are internet banking, mobile banking, telephone banking and the like. Transaction structure, a kind of cyber-banking system, information security maturity of the existing measurement methodologies for research purposes, vulnerability diagnosis and risk analysis methodologies to be used in practical field present a comprehensive conclusion. To ensure safety and convenience for the user, convenient to deal with cyber environment is the key to the activation of cyber trading. Particularly by measuring the maturity of cyber banking system to ensure the safety of the practice field much effects are expected as a result.