• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.047 seconds

Medical Information Processing System based on Wireless Network using RFID (RFID를 이용한 무선 네트워크 기반 의료정보처리 시스템)

  • Kim, Jae-Joon;Cho, Kyu-Cheol;Kim, Jong-Wan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.1-9
    • /
    • 2006
  • The general medical information service in hospital recently has been turned into ubiquitous environment. A key requirement in ubiquitous environment is the ability for communication between image viewer realized by DICOM standard and a server supporting medical information to make it possible. In order to apply the proposed scheme, we first realized the server/client networking in mobile terminal environment. Second, we realized DICOM viewer using a PDA to be capable of wireless communication in ubiquitous environment. Third, MIPS(Medical Information Processing System) utilized RFID system to apply the patient's information efficiently. In particular, it showed the capability to communicate image based system unlike previous text based communication.

  • PDF

A Research on Information Security Risk-based Antecedents Influencing Electronic Commerce User's Trust (전자상거래 사용자의 신뢰에 영향을 미치는 정보보안위험 기반의 선행요인 연구)

  • Kim, Jong-Ki;Lee, Dong-Ho
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.65-96
    • /
    • 2005
  • It is generally believed that, compared to traditional commerce, Electronic Commerce(EC) is more difficult to gain and sustain customers. One of the major reasons that customers do not use EC is lack of trust. Previous researches on the EC user's trust suggested that risk is an antecedent of trust and the concept of trust is highly related to risk. This study proposed a combined model in which includes the factors based on generic information security risk analysis methodology and trust factors in EC. The objectives of this study are follows; first, investigating the relationship between trust and risk that are antecedent factors of purchase intention, and second, examining the validity of information security risk analysis approach in EC environment. Based on the survey results of 143 MBA students statistical analysis showed that factors like threats and controls were significantly related to risk, but assets did not have statistically significant relationship with risk. Controls and knowledge of EC had meaningful effect on user's trust. This study found that risk analysis methodology which is generally used at organizational level is practically useful at user level on EC environment. In conclusion, the results of this study would be applied to generic situation of information security for analyzing and managing the risk. Besides, this study emphasized that EC vendors need to pay more attention to the information security risk to gain customer's trust.

Developing Information Security Management Model for SMEs: An Empirical Study (중소기업 정보보호관리 모델의 개발: 실증 연구)

  • Lee, Jung-Woo;Park, Jun-Gi;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.

An Advanced Model for Week Point Analysis and Evaluation on Important Information Communication Infrastructures (주요 정보통신 기반시설 취약점 분석 및 평가절차 모델 개선 연구)

  • Choi, Woong Gyu
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.43-48
    • /
    • 2012
  • As the major information communication infrastructure had been getting more important, 'Act on the Protection of Information and Communications Infrastructure'(APICI) was legislated in Korea 2001. Consequently, the major information system, nationwide monitering service systems and government administration operation & management systems have been registered and managed under the APICI. The authorized organizations related to above service and system, perform vulnerability analysis and evaluation for chief communication infrastructures by themselves or registered agencies. In this research, we propose an advanced model for vulnerability analysis and evaluation and apply it to the main information and communication infrastructures through the case study. We hope each related organization could apply this model for analysis and evaluation of vulnerability in these infrastructures.

Robust Design of Coordinated Set Planning with the Non-Ideal Channel

  • Dai, Jianxin;Liu, Shuai;Chen, Ming;Zhou, Jun;Qi, Jie;Liang, Jingwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1654-1675
    • /
    • 2014
  • In practical wireless systems, the erroneous channel state information (CSI) sometimes deteriorates the performance drastically. This paper focuses on robust design of coordinated set planning of coordinated multi-point (CoMP) transmission, with respect to the feedback delay and link error. The non-ideal channel models involving various uncertainty conditions are given. After defining a penalty factor, the robust net ergodic capacity optimization problem is derived, whose variables to be optimized are the number of coordinated base stations (BSs) and the divided area's radius. By the maximum minimum criterion, upper and lower bounds of the robust capacity are investigated. A practical scheme is proposed to determine the optimal number of cooperative BSs. The simulation results indicate that the robust design based on maxmin principle is better than other precoding schemes. The gap between two bounds gets smaller as transmission power increases. Besides, as the large scale fading is higher or the channel is less reliable, the number of the cooperated BSs shall be greater.

A Relationship among Service Quality, Trust, Customer Satisfaction and Reuse Intention in Real Estate Information Web-sites (부동산정보 사이트의 서비스품질, 신뢰, 고객만족 및 재이용의도의 영향관계)

  • Lim, Chae-Kwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.125-137
    • /
    • 2011
  • This study empirically examined the structural relationships among service quality of internet real estate information web-sites, trust, customer satisfaction and reuse intention. In order to achieve the purpose, survey method was applied using a sample of 293 real estate information web-site users. The results of this study showed that service quality of real estate web-sites had a significant effect on trust and customer satisfaction. And, the trust of web-sites have influenced on customer satisfaction and reuse intention. Finally, the customer satisfaction of estate information web-sites had a significant positive effect on reuse intention.

A study on the User's Satisfaction and Intention to Re-use the U-Healthcare Services: Focusing on the User's Response of Personalized Medical Information Applications (유헬스케어 서비스 사용자의 만족도와 재사용의도 영향 요인에 대한 연구: 개인용 의료정보 애플리케이션 사용자의 반응을 중심으로)

  • Park, Ji Min;Jo, Eun Hee;Lee, Jong Tae
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.243-263
    • /
    • 2020
  • Purpose The purpose of this study is to analyze the causal relationship between user satisfaction, expected satisfaction, quality of service, perceived value, and expertise that should be emphasized in personalized medical information services for the development of personalized medical information services based on big data analysis and the spread of their demand. Design/methodology/approach This study established research models and hypotheses on the basis of the theory of reuse intent, and applied the PLS methodology for analysis, the factors that make it applicable to personalized medical services in the theory of service quality and satisfaction. Findings According to the empirical analysis result, this study confirmed that it can be seen that the expertise, perceived value, and quality of medical services did not directly affect the user's intention to reuse, but formed a direct causal relationship through variables such as whether they met expectations.

Vehicle Plate Detection Method by Measuring Plane Similarity Using Depth Information (깊이 정보로 평면 유사도 측정을 통한 자동차 번호판 검출 방법)

  • Lee, Dong-Seok;Kwon, Soon-Kak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.2
    • /
    • pp.47-55
    • /
    • 2019
  • In this paper, we propose a method for vehicle plate detection using depth information which is not influenced by illumination. The 3D camera coordinates of pixels in each block are obtained by using the depth information. Factors of the plane in the block are calculated by 3D coordinates of pixels. After that, the plane similarity between adjacent blocks is calculated by comparing between factors of planes. The adjacent blocks are grouped if the plane similarity is high so that the plane areas are detected. The actual height and width of the plane area are calculated by using depth information and compared with the vehicle plate in order to detect the vehicle plate.

Implemental Model of Customer Relationship Management System for Oriental Hospital Using Customer Segmentation (고객세분화를 통한 한방병원 고객관계관리 시스템 구축모형)

  • Ahn, Yo-Chan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.79-87
    • /
    • 2010
  • This paper is proposed that implemental model of customer relationship management system for oriental hospital is designed by customer segmentation using personal information and medical record of outpatients in existing integrated medical information system database. Proposed model can be practical model at once, because it can construct by partial modification of existing medical information system without additional information technology and infrastructure. And, if we use the proper variable and method of customer segmentation according to marketing strategy, it can be flexible customer relationship management system not only improvement of customer satisfaction but also various marketing supports.

A UML-based Approach towards Test Case Generation and Optimization

  • Shahid Saleem;Saif U. R. Malik;Bilal Mehboob;Roobaea Alroobaea;Sultan Algarni;Abdullah M. Baqasah;Naveed Ahmad;Muhammad Hasnain
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.633-652
    • /
    • 2024
  • Software testing is an important phase as it ensures the software quality. The software testing process comprises of three steps: generation, execution, and evaluation of test cases. Literature claims the usage of single and multiple 'Unified Modeling Language' (UML) diagrams to generate test cases. Using multiple UML diagrams increases test case coverage. However, the existing approaches show limitations in test case generation from UML diagrams. Therefore, in this research study, we propose an approach to generate the test cases using UML State Chart Diagram (SCD), Activity Diagram (AD), and Sequence Diagram (SD). The proposed approach transforms UML diagrams into intermediate forms: SCD Graph, AD Graph, and SD Graph respectively. Furthermore, by integrating these three graphs, a System Testing Graph (STG) is formed. Finally, test cases are identified from STG by using a traversal algorithm such as Depth First Search (DFS) that is an optimization method. The results show that the proposed approach is better compared to existing approaches in terms of coverage and performance. Moreover, the generated test cases have the ability to detect faults at the unit level, integration, and system level testing.