• Title/Summary/Keyword: Research Information Systems

Search Result 12,224, Processing Time 0.043 seconds

Design and Implementation of a Distributed Transactional Workflow Monitoring System (분산 트랜잭션 워크플로우 모니터링 시스템의 설계 및 구현)

  • Min Jun-Ki;Kim Kwang-Hoon;Chung Joong-Soo
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.139-146
    • /
    • 2006
  • This paper describes the design and implementation details of a distributed transactional workflow monitoring system. There have been prevalent research and development trends in the workflow literature - workflow systems tend to be completely distributed architectures to support very large-scale workflow applications on object-oriented and internet-based infrastructures. That is, the active (object), distributed (architecture), system-oriented (transaction), and large-scale (application) workflow systems are the key targets in terms of the research and development aspects. While the passive, centralized, human-oriented, and small/medium scale workflow systems are the typical instances of the traditional workflow systems. Unlike in the traditional (the client-server architecture) workflow systems, the workflow monitoring features should not be easily supported in the recent (the fully distributed architecture) workflow systems. At the same time, they need a set of additional monitoring features, such as gathering and displaying statistical (or overload status) information of the workflow architectural components dispersed on the internet. We, in this paper, introduce the additional workflow monitoring features that are necessarily required for the recent workflow systems, and show how to embed those features into a web-based distributed workflow system.

A Study on Perception of Project Risk Factor - Comparison between Software Package and Development with Program Language in Information System Project - (프로젝트 위험요인 인식에 관한 비교 연구 - 정보시스템 구현 프로젝트에서 소프트웨어 패키지 적용과 순수 개발하는 경우 -)

  • Park, Song-Mee;Chae, Myung-Sin
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.243-268
    • /
    • 2007
  • It is critical to manage risks to complete IS(Information Systems) projects successfully. Identifying risk factors would be the first step for the project risk management. Previous research has discussed the issue with various points of view, such as different risk factors based on project types and roles involved in their projects. This paper empirically explored how people perceive different risk factors by project development methodology, between self-developing IS using programming language like C, Visual Basic and adapting software package already developed by software venders like ERP, CRM packages. There are researches regarding project risk factors for project management in the several point of views. And there are also researches regarding comparison between self-developing and adapting software packages methodology in IS project. However, there are no study on project risk factors comparison between self-developing IS using programming language and adapting software packages already developed by software venders in IS project. This research can be differentiated from previous ones, because it was considered both point of project risk management and development methodology in IS project. This research results implied meaningful messages to enterprise company to be planned IS projects and people who involved in IS projects. They should consider and need to prepare differently according to each development methodology for preventing project risks. It makes them reduce project risks in each case and complete successfully IS projects. Especially, if they have no experiences for implementing software packages, they can forecast the project risks and prepare them in advance.

  • PDF

Evaluation of Agricultural Drought Disaster Vulnerability Using Analytic Hierarchy Process (AHP) and Entropy Weighting Method (계층화분석 및 엔트로피 가중치 산정 방법에 따른 농업가뭄재해 취약성 평가)

  • Mun, Young-Sik;Nam, Won-Ho;Yang, Mi-Hye;Shin, Ji-Hyeon;Jeon, Min-Gi;Kim, Taegon;Lee, Seung-Yong;Lee, Kwang-Ya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.3
    • /
    • pp.13-26
    • /
    • 2021
  • Recent drought events in the South Korea and the magnitude of drought losses indicate the continuing vulnerability of the agricultural drought. Various studies have been performed on drought hazard assessment at the regional scales, but until recently, drought management has been response oriented with little attention to mitigation and preparedness. A vulnerability assessment is introduced in order to preemptively respond to agricultural drought and to predict the occurrence of drought. This paper presents a method for spatial, Geographic Information Systems-based assessment of agricultural drought vulnerability in South Korea. It was hypothesized that the key 14 items that define agricultural drought vulnerability were meteorological, agricultural reservoir, social, and adaptability factors. Also, this study is to analyze agricultural drought vulnerability by comparing vulnerability assessment according to weighting method. The weight of the evaluation elements is expressed through the Analytic Hierarchy Process (AHP), which includes subjective elements such as surveys, and the Entropy method using attribute information of the evaluation items. The agricultural drought vulnerability map was created through development of a numerical weighting scheme to evaluate the drought potential of the classes within each factor. This vulnerability assessment is calculated the vulnerability index based on the weight, and analyze the vulnerable map from 2015 to 2019. The identification of agricultural drought vulnerability is an essential step in addressing the issue of drought vulnerability in the South Korea and can lead to mitigation-oriented drought management and supports government policymaking.

Who Cares More about Security?: Effects of Personality Traits on PC Security Intention (누가 보안에 더 신경을 쓰는가?: 성격특성이 PC보안의도에 미치는 영향)

  • June-Young Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • Technical measures for computer security are essential, but they are not a sufficient condition for security. Therefore, a personal approach to user's security behavior should be developed. Personality, which is a human aspect, is a behavioral characteristic that characterizes each individual and facilitates prediction of how an individual will behave in certain situations. Protection motivation theory has been used extensively in the security research on human behavior. The present study discusses how protection motivation was formed from personality traits. Thus, organizations can refer the result of this study for their HRD and HRM concerns.

A Socio-Technical Model for Open Government Data Research

  • Cruza, Ruth Angelie B.;Lee, Hong Joo
    • Asia pacific journal of information systems
    • /
    • v.26 no.3
    • /
    • pp.339-366
    • /
    • 2016
  • National and local governments around the world have been allowing access to administrative data to increase transparency, motivate civic engagement of citizens, and improve collaboration between the public and the government. This study reviews and classifies existing literature on open government data (OGD). To create a structure to organize the existing studies, the researchers devised a framework based on socio-technical theory and summarized the significance of studies along four major points: (1) readiness, (2) implementation, (3) emerging effects, and (4) actors of open data. Studies in OGD have been growing steadily in the recent years because of the rapid development of adoptable technologies that have enabled easier access to government data. Nonetheless, an examination of existing research not only shows a disparity in research and development of OGD across countries in the Open Government partnership program but also reveals pertinent issues that have arisen in different stages of the OGD initiative. The growing number of studies and expanding body of knowledge show the importance of organizing existing literature. This step is timely and significant to map out the current breadth and depth of OGD research. According to existing research, current open governments fall short in encouraging citizen participation and collaborations among citizens and the government. This study pointed out how studies on OGD actors might be the reason as well as the solution to existing findings. This paper aims to provide a framework for organizing OGD studies, present the status of OGD research, and provide recommendations on current gaps that must be addressed.

A Development of Thin Client based Video Guide Service Using Video Virtualization and WebRTC (영상 가상화와 WebRTC를 이용한 고사양 저가 단말 기반 화상 안내 서비스 개발)

  • Kim, Kwang-Yong;Jung, Il-Gu;Ryu, Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.500-504
    • /
    • 2013
  • In this paper, we have developed the application of a remote multi-lingual video guide that allows interaction with Set Top Box of a thin client by using the WebRTC, an web browser-based communication method. A server accesses a web camera in conjunction with digital information display of a thin client connected remotely and is exchanged guide information with user. This server can be played in thin client STB using virtualization based the high-quality video compression technology. Further, it is not dependent on the performance of the STB and provides a video guide remotely.

A Structured Analysis Model of Customer Loyalty in Online Games (고객 충성도(Customer Loyalty)에 영향을 미치는 온라인 게임의 중요 요소에 대한 LISREL 모델 분석)

  • Choi, Dong-Seong;Park, Sung-June;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.11 no.3
    • /
    • pp.1-21
    • /
    • 2001
  • In recent years, the market for online computer games has become an important part in the entertainment industry. New online games have been introduced every month and the numbers of game players who are playing online games have grown rapidly. However, only a few online games have been successful in making a good profit among many online games. Why are most players playing only a few online games repeatedly? To answer the question, this research focuses on the customer loyalty and their optimal experience(flow) in playing specific online games. This research hypothesizes that customer loyalty for specific online game can be increased by customers' optimal experience(flow) in playing it, and they would feel optimal experience because of mechanic and social interaction in online games. In order to validate the hypothesis, this research analyzes online survey data of players of various online games. According to this survey results, players' optimal experience is affected by their mechanic interaction between a player and an online game system, and their social interaction with other players who participated in the online game. And their optimal experience during playing the online game affects the degree of customer loyalty to the game. This paper ends with conclusions of the survey results and study limits.

  • PDF

A Systematic Literature Review of Social Entrepreneurship: Focusing on the Field of Business Administration (사회적 기업가정신의 체계적 문헌연구: 경영학 분야를 중심으로)

  • Yoo, Hanna;Lee, Sujin;Jeong, EuiBeom
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.5
    • /
    • pp.83-98
    • /
    • 2022
  • As the complexity of social problems and interdependency increased significantly, research on social entrepreneurship(SEship) increased rapidly. In this study, systematic approaches(bibliometrics analysis, citation network analysis, and keyword network analysis) were performed to identify research trends in business administration. To this end, keywords of 883 SEship papers published in prominent journals in the SCOPUS database were collected to investigate the existing research flow. The results of this study can be helpful for grasping the perspective of scholars in the business administration on SEship research and determining research topics through understanding related concepts.

A Study on Privacy Preserving Machine Learning (프라이버시 보존 머신러닝의 연구 동향)

  • Han, Woorim;Lee, Younghan;Jun, Sohee;Cho, Yungi;Paek, Yunheung
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.924-926
    • /
    • 2021
  • AI (Artificial Intelligence) is being utilized in various fields and services to give convenience to human life. Unfortunately, there are many security vulnerabilities in today's ML (Machine Learning) systems, causing various privacy concerns as some AI models need individuals' private data to train them. Such concerns lead to the interest in ML systems which can preserve the privacy of individuals' data. This paper introduces the latest research on various attacks that infringe data privacy and the corresponding defense techniques.

TOSS: Telecom Operations Support Systems for Broadband Services

  • Chen, Yuan-Kai;Hsu, Chang-Ping;Hu, Chung-Hua;Lin, Rong-Syh;Lin, Yi-Bing;Lyu, Jian-Zhi;Wu, Wudy;Young, Hey-Chyi
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.1-20
    • /
    • 2010
  • Due to the convergence of voice, data, and video, today's telecom operators are facing the complexity of service and network management to offer differentiated value-added services that meet customer expectations. Without the operations support of well-developed Business Support System/Operations Support System (BSS/OSS), it is difficult to timely and effectively provide competitive services upon customer request. In this paper, a suite of NGOSS-based Telecom OSS (TOSS) is developed for the support of fulfillment and assurance operations of telecom services and IT services. Four OSS groups, TOSS-P (intelligent service provisioning), TOSS-N (integrated large-scale network management), TOSS-T (trouble handling and resolution), and TOSS-Q (end-to-end service quality management), are organized and integrated following the standard telecom operation processes (i.e., eTOM). We use IPTV and IP-VPN operation scenarios to show how these OSS groups co-work to support daily business operations with the benefits of cost reduction and revenue acceleration.