• 제목/요약/키워드: Research Information Systems

Search Result 12,228, Processing Time 0.046 seconds

Information Technology Implementation in Supply Risk and Performance (공급위험과 성과를 위한 정보 기술 실행)

  • Kim, Minkyun;Chai, Sangmi
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.237-261
    • /
    • 2014
  • This study is to investigate the impact of information technology implementation on supply chain risk and performance. It focuses on how information technology adoption affects supply risk as well as performance. It collected one hundred fifty nine responses from supply executives and supply and purchasing managers of U.S manufacturing firms by applying a survey methodology. The research results provide empirical evidence that the use of information technology in the supply chain mitigates supply risk and improves performance. More importantly, information technology adoption involves three aspects: inbound and outbound communications, internal communications and administration and finally, mitigation of supply risks and improved performance via order taking and procurement. This research emphasizes the importance of IT implementation in supply risk management. It also points out how information technology adoption facilitates the impact of information technology in risk mitigation in the supply chain and in performance. Thus, supply and purchasing managers need to consider IT implementation and adoption when establishing their risk mitigating strategies within the supply chains.

  • PDF

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.

How Are the Direction and the Intensity of Indirect Social Information such as Likes and Dislikes Related to the Deliberative Quality of Online News Content Comments? A Topic Diversity Analysis Using Topic Modeling ('좋아요'와 '싫어요'같은 간접적 사회적 정보의 방향과 강도는 온라인 뉴스 콘텐츠 댓글의 숙의의 질과 어떤 관련이 있는가? 토픽 모델링을 이용한 토픽 다양성 분석)

  • Min, Jin Young;Lee, Ae Ri
    • The Journal of Information Systems
    • /
    • v.30 no.4
    • /
    • pp.303-327
    • /
    • 2021
  • Purpose The online comments on news content have become social information and are understood based on deliberative democracy. Although the related research has focused on the relationship between online comments and their deliberative quality, the social information provided by online comments consists of not only direct information such as comments themselves but also indirect information such as 'likes' and 'dislikes'. Therefore, the research on online comments and deliberative quality should study this direct and indirect information together, and the direction and the degree of the indirect information should be also considered with them. Design/methodology/approach This study distinguishes comments by the attached 'likes' and 'dislikes', identifies highly supported and highly unsupported comments by the intensity of 'likes' and 'dislikes', and investigates the relationship between their existence and the deliberative quality measured as the topic diversity. Then, we applied topic modeling to the 2,390 news articles and their 74,385 comments collected from five news sites. Findings The topic diversities of the supported and unsupported comments are related to the topic diversity of all comments but the degree of the relationship is higher in the case of supported comments. Furthermore, the existence of highly supported and unsupported comments is led to less diversity of all comments compared to the case where those comments are absent. Particularly, when only highly supported comments are present, topic diversity was lower than in the opposite case.

Management Efficiency of Korean Information and Communication Enterprise (국내 정보통신업의 경영효율성)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.1
    • /
    • pp.32-42
    • /
    • 2009
  • Information and communication industry, which has been growing rapidly, is now leading the global economic growth, contributing a ripple effect on general business and economic structure. It is said that information and communication industry enables swift economic growth taking a role as a basic industry of information-oriented society. Especially, rapid technical innovation promotes mutual growth of other related industries and it is technology-intensive. The purpose of this research is to analyze the management efficiency of information and communication industry using DEA method, and finally suggests numerical value for inefficient organizations to improve their efficiency. CCR-I, BCC-I efficiency and RTS(Returns to scale) of 29 companies engaged in information and communication industry was evaluated. With the results, we suggested the model companies for benchmarking in information and communication industry. To summarize, 7 companies were selected with CCR-I efficiency rate 1, and 12 companies with BCC-I efficiency rate 1. RTS was finalized with 8 IRS companies, 10 DRS companies, and 11 CRS companies.

Information and Analytical Support of Anti-Corruption Policy

  • Novak, Anatolii;Bashtannyk, Vitalii;Parkhomenko-Kutsevil, Oksana;Kuybida, Vasyl;Kobyzhcha, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.134-140
    • /
    • 2021
  • The development of technology speeds up the process of obtaining information and its analysis to track the level of corruption in different countries and develop countermeasures. This study examines the role of information and analytical support of anti-corruption policy as a tool for government accountability and analysis, evaluation, combating corruption in Eastern Europe. The purpose of the article is to identify the components of the information-analytical system that help reduce the level of corruption. The research methodology is based on a qualitative content analysis of the functioning of information and analytical systems of Ukraine used by anti-corruption bodies. A quantitative analysis of the CPI score was conducted, according to Transparency International, to identify the effectiveness of anti-corruption policies in developing countries. The results show similar trends in countries developing on the effect of the use of information and analytical systems in the implementation of anti-corruption policies, strategies and measures. The strategy to combat corruption mainly involves increasing the independence and powers of anti-corruption bodies. Therefore, the development of information and analytical support is aimed at automating the processes of pre-trial investigations and criminal proceedings, information protection. As a tool for accountability, information and analytical systems may be ineffective due to the abuse of power by higher anti-corruption bodies due to political pressure from elite structures. Restrictions on political will are a major problem for the effectiveness of anti-corruption policies.

Index Transitivity and Transformation of Separable Systems (분리가능 시스템의 지수 추이성과 변환)

  • 변석우
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.658-666
    • /
    • 2004
  • Separable systems are defined in term rewriting systems, respecting the notion of separability in the λ-calculus. In this research, we generalize separable systems of term rewriting systems, which was studied in restrictive systems such as constructive systems. We also associate separability with index-transitivity and with forward branching Separability is identified with forward branching, and strong sequentiality with index-transitivity satisfies separability. These are such good properties that enable us to describe the procedure of pattern-matching as an index tree, which is a sort of automata, and to transform separable systems into a constructor system with a simple pattern. Separable systems, in particular, can be translated into the λ-calculus. This research can serve a theoretical basis which allows functional languages to be explained by the λ-calculus, since functional languages such as ML and Haskell belong to a subclass of separable systems.

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

Design and Implementation of The Efficient Andong Bus Route System using a Location Information (위치정보를 이용한 효율적인 안동 시내버스 노선 검색 시스템의 설계 및 구현)

  • Jang, Soo-Young;Lim, Yang-Won;Lim, Han-Kyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.45-54
    • /
    • 2011
  • Currently various applications related to bus route are used on smart devices to obtain bus arrival times, and route information. However, applications are unable to provide various ways for users to provide their destination. This study has designed an algorithm based on user's six patterns. An Android application and a server that communicate with each other have been based on the algorithm. The applications and the server use the Google Maps service and location-based information to provide users with possible routes from the starting place to the destination. They also provide user's with users' current position and any transfer information. They provide practical and efficient information, and are easy to use.

An Exploratory Study on Development of Information Security Manpower (정보보안 인력양성을 위한 탐색적 연구: 정부, 기업, 학계, 인력 관점 기반)

  • Seo, Kyung-Jin;Choi, Jee-Eun;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.24 no.2
    • /
    • pp.73-96
    • /
    • 2015
  • Purpose Information security industry is rapidly growing, but has been confronted with many challenges in a business environment. One of them is the imbalance between supply and demand of information security manpower, which has caused an insecure market situation. Therefore, this study has derived factors of promoting and hindering information security manpower from governance, academics, corporations, and workforce perspectives, and has analyzed a sequence of cause and effect of each factor. Design/methodology/approach This study is an exploratory research based on the interviews. The causal loop diagram (CLD) was developed to deduce key issues and propose alternatives. Findings The result of this study is expected to help the development of information security manpower in Korea, by minimizing the potential negative effects as well as maximizing the positive effects. This study found out the dynamic causes and effects of the security manpower system in each stakeholder's perspective. The cause-and-effect relationships between the stakeholders will be able to contribute to solve the imbalance of supply and demand in security manpower system.

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.