• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.038 seconds

A Study on the Decision Making Model for the Introduction of the Financial Institution's Cloud Systems (금융기관 클라우드 시스템 도입을 위한 의사결정 모델에 대한 연구)

  • Lee, Hee-Seok;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.743-763
    • /
    • 2018
  • It has been 10 years since the concept of cloud system has emerged. Despite the fact that the cost-effectiveness and security of cloud systems has been proven, financial companies are reluctant to adopt cloud systems. Financial institutions are reluctant to adopt the cloud system because of the strong regulation of financial authorities in relation to the leakage of customer information However, more important reason why financial institutions hesitate to introduce cloud systems is the lack of direction and standards for the introduction of cloud systems by financial institutions. This study examines the legal and institutional constraints on the introduction of cloud systems in financial institutions and suggests decision models for determining whether cloud systems can be applied and how cloud systems are configured when financial institutions construct IT systems. We hope that this research will be helpful for establishing direction of cloud system introduction of many financial institutions.

Evaluation and Implementation Strategy Analysis on Information Infrastructure of Small and Medium Firms (중소기업 정보인프라 진단 및 구축전략분석)

  • Sung, Tae-Kyung;Chu, Seok-Jin;Kim, Joong-Han;Kim, Jae-Kyeong
    • Asia pacific journal of information systems
    • /
    • v.8 no.3
    • /
    • pp.75-100
    • /
    • 1998
  • The paper empirically examines relationships among information infrastructure, competitive advantage of information technology, and corporate performance of small and medium manufacturing firms. Effects of competitive advantage of information technology on the linkage between information infrastructure and corporate performance are investigated. The fact that SME's (Small and Mediem-sized Enterprises) are having difficulties in building their own information infrastructure due to the limitation of capital investment, technology, and manpower is the main motive for the study. Research results confirm that information technology provides several traits of strategic advantages such as efficiency, threat, functionality, preemptiveness, and synergy and significantly contributes to corporate performance. But linkage between information infrastructure and competitive advantage of information technology is proved to be weak and this result suggests that systematic and effective information strategy or planning is required to deliver expected advantages of information technology from information infrastructure investments. Also control effect of competitive advantage of information technology on information infrastructure-corporate performance linkage is not strongly recognized.

  • PDF

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm

  • Dahane, Amine;Berrached, Nasr-Eddine;Loukil, Abdelhamid
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.205-228
    • /
    • 2015
  • In this paper, we present a virtual laboratory platform (VLP) baptized Mercury allowing students to make practical work (PW) on different aspects of mobile wireless sensor networks (WSNs). Our choice of WSNs is motivated mainly by the use of real experiments needed in most courses about WSNs. These experiments require an expensive investment and a lot of nodes in the classroom. To illustrate our study, we propose a course related to energy efficient and safe weighted clustering algorithm. This algorithm which is coupled with suitable routing protocols, aims to maintain stable clustering structure, to prevent most routing attacks on sensor networks, to guaranty energy saving in order to extend the lifespan of the network. It also offers a better performance in terms of the number of re-affiliations. The platform presented here aims at showing the feasibility, the flexibility and the reduced cost of such a realization. We demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs.

A Study on the Development of Internet Purchase Support Systems Based on Data Mining and Case-Based Reasoning (데이터마이닝과 사례기반추론 기법에 기반한 인터넷 구매지원 시스템 구축에 관한 연구)

  • 김진성
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.135-148
    • /
    • 2003
  • In this paper we introduce the Internet-based purchase support systems using data mining and case-based reasoning (CBR). Internet Business activity that involves the end user is undergoing a significant revolution. The ability to track users browsing behavior has brought the vendor and end customer's closer than ever before. It is now possible for a vendor to personalize his product message for individual customers at massive scale. Most of former researchers, in this research arena, used data mining techniques to pursue the customer's future behavior and to improve the frequency of repurchase. The area of data mining can be defined as efficiently discovering association rules from large collections of data. However, the basic association rule-based data mining technique was not flexible. If there were no inference rules to track the customer's future behavior, association rule-based data mining systems may not present more information. To resolve this problem, we combined association rule-based data mining with CBR mechanism. CBR is used in reasoning for customer's preference searching and training through the cases. Data mining and CBR-based hybrid purchase support mechanism can reflect both association rule-based logical inference and case-based information reuse. A Web-log data gathered in the real-world Internet shopping mall is given to illustrate the quality of the proposed systems.

The Factors Affecting Breadth and Depth of Diffusion for Knowledge Management Systems (지식관리시스템의 수직적 확산과 수평적 확산에 관한 실증적 연구)

  • Suh, Chang-Kyo;Seol, Jin-Young
    • Knowledge Management Research
    • /
    • v.9 no.3
    • /
    • pp.77-105
    • /
    • 2008
  • This study primarily aims at identifying what factors significantly affect the diffusion of knowledge management systems(KMS) and finding out how these identified factors can be effectively managed, especially for Korean companies. The research model is derived based on previous researches on innovation diffusion, information systems implementation, and KMS. The model is used to examine the role of determinants in influencing the extent to which KMS is diffused within organizations. Independent variables of this research are composed of technical characteristics, organizational characteristics and environmental characteristics. 'Breadth of diffusion' and 'depth of diffusion' concept are used to measure the extent of KMS diffusion which is the dependent variable of this model. The 101 companies of total 1,000 samples responded to the survey. To analyze tile results of this empirical study, we performed the multiple regression analysis. As a result, it was shown that the relative advantage, complexity, information system maturity, size, top management support, champion, competitive pressure have influences on both the breadth and the depth diffusions. On the other hand, the organizational culture, valuation and compensation, and uncertainty of environmental factors were not verified to be significant. This empirical study will provide Korean companies with insights into effective ways to diffuse the KMS and succeed in business competition.

  • PDF

The Study of the SOA Enabled ERP Systems Implementation in Service Industry: Case Study

  • Kim, Gyu-C.
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.1
    • /
    • pp.73-93
    • /
    • 2012
  • The primary objective of this research is to explain how to implement the Service Oriented Architecture (hereafter SOA) enabled Enterprise Resource Planning (hereafter ERP) system successfully for service industries. An implementation of the ERP system help many organizations to alleviate the difficult job of supporting inflexible or legacy systems that in most cases result in cost increases, data redundancy and inaccuracy, and various inefficiencies. However, the ERP system is losing its market share rapidly to the cloud computing system which utilizes the Software-as-a-service (hereafter SaaS) and SOA. The SOA is an approach to integrate various types of IT resources to leverage existing ERP system, while at the same time building an infrastructure that can readily respond to new business environment and offer new dynamic applications. The companies that implement this system have less of a need for the kinds of all-in-one ERP system that have dominated the back office for decades and can move freely to best-of-breed applications. This research will identify the benefits and costs of the SOA enabled ERP system through case studies and its impact on competitive priorities such as cost, quality, delivery, and flexibility.

Finding Subjects for Automated Container Terminal Development by Systems Approach (시스템적 접근에 의한 자동화컨테이너터미널 개발 과제 도출)

  • 박창호;노홍승;정의균
    • Journal of Korean Port Research
    • /
    • v.12 no.2
    • /
    • pp.243-250
    • /
    • 1998
  • This study is to find subjects for the Automated Container Terminal(ACT) development and container terminal system. Also we analyze the present condition of the container terminal system in Pusan port and its automation level by systems approach. And this paper aims at evaluating on the priority of R&D investment until the beginning of the second stage of New Pusan Port Project(2006). In this process we have considered 8 evaluation indexes(cost, labor, area, time, volume, reliability. safety, convenience) to analyze 6 subsystems. The priority of R&D until target year by sub-systems is as follow: 1. Cargo Handing System, 2. Transfer System, 3. Port Entry System, 4. Storage System (Distribution & Manufacturing System included), 5.Inland Transport System, 6.Port Management & Information System.

  • PDF

A Study on Urban Land Use Analysis using Land Information Systems (토지정보체계를 활용한 토지이용분석에 관한 연구)

  • 이우종
    • Spatial Information Research
    • /
    • v.2 no.2
    • /
    • pp.117-134
    • /
    • 1994
  • The problems of urban land use are becoming worse by the increase of population and facilities. Land use planning is the major part of comprehensive city plan¬ning. Understanding and forecasting the present and future conditions of land use are the main process of land use planning. In order to comprehend the various phenomena which occured on the land, collecting accurate land information is the most important thing for the effective management of land use. Therefore, it is necessary for us to establish the land information systems. In this study, theories of functions, objectives, components and applications of land information systems were investigated as the basis of this research. Case studies of Korea and Japan were examined, not only for the desirable selection of input data items, but also for the effective land use anslysis in land information systems. Through this kind of study, we can anslize and understand the changing patterns of land use over time, and we can also prepare a more desirable and adjustable land use plan-ning programs for the future.

  • PDF

An Empirical Study on the Effect of Informatization of Small and Medium Manufacturers on Business Performance (중소제조기업의 정보화가 기업 성과에 미치는 영향에 관한 실증연구)

  • Joo Seok-Jeong;Park Seong-Kyu;Kim Na-Rang;Hong Soon-Goo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.2
    • /
    • pp.86-97
    • /
    • 2006
  • From the mid 1990's, the scale of IS had been growing, which resulted in increasing number of failure projects. As a result, the measurement of IS performance was a growing concern. Moreover, the need for research on the relation between IT investment and performance that isfd the concern of CEOs has been raised. In this study, the correlation between the IS functionality and investment was discovered based on the IS success model suggested by DeLone & McLean(1992), a business information system evaluation model by Lee Kuk Hie(1992), a balanced score card by Kaplan & Norton(1992). As a result of the LISREL analysis, the investment in the IS has a positive impact on the quality of both information systems and information. In turn, the quality of both information systems and information have a positive impact on the end-user satisfaction, the end-user satisfaction on the financial performance, customer satisfaction, and internal business processes. This study showed that sufficient investment in IS improved business performance

  • PDF

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.