• Title/Summary/Keyword: Strategic use of IT

Search Result 528, Processing Time 0.028 seconds

Knowledge Management with IS/IT Practice in Organizations: A Multilevel Perspective

  • Tae Hun Kim
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.151-167
    • /
    • 2022
  • This paper is motivated by social influence theory implying the multilevel nature of knowledge management (KM) in an organization. Organizational knowledge is generated and distributed by individuals from different groups across organizational boundaries. Its transfers are supported by IS/IT practice, i.e., the individual and collective use of the technology available in the organization. I propose a multilevel perspective to explain how IS/IT practice supports multilevel KM capabilities to manage organizational knowledge successfully and how the effectiveness of multilevel KM capabilities expands into the improvement of multilevel task-related organizational performance. The multilevel KM theory extends the knowledge-based view of the firm by describing the dynamic process through which strategic values of knowledge are generated by IS/IT practice across the organizational levels. This paper also discusses multilevel insights on the strategic value of organizational learning based on the social context of organizations.

A Strategic Plan for the Effective Utilization of the Third Party Logistics (기업경쟁력(企業競爭力) 강화(强化)를 위한 제(第)3자물류(者物流)의 추진전략(推進戰略))

  • Lee, Young-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.389-409
    • /
    • 2000
  • Recent demands of market forces are causing considerable attention to be forced on logistics functions and revitalizing interest in outsourcing them. The need to efficiently and economically adjust support to meet market demands is growing significantly. Logistics is playing a role it has never played before. In light of this, outsourcing to third parties has become a strategic issue demanding greater attention in corporate boardrooms. From the perspective of TPL users, this paper focuses on how best to make a strategic plan for the effective utilization of TPL. And the results are as follows : First, after deciding their logistics outsourcing, the companies have to set up the aim of TPL through development of logistical strategies. Second, the companies must decide service provider that fits to their business environment and conditions. Third, they have to conclude a contract with logistics service provider. Fourth, after doing the preparatory implementation they carry into effect the original implementation. Fifth, they use the result of original implementation to fix a partnership.

  • PDF

One Improved RLWE-based FHE and Fast Private Information Retrieval

  • Song, Wei-Tao;Hu, Bin;Zhao, Xiu-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6260-6276
    • /
    • 2019
  • With the rapid development of cloud computing, it raises real questions on privacy protection, which greatly limits the use of cloud computing. However, fully homomorphic encryption (FHE) can make cloud computing consistent with privacy. In this paper, we propose a simpler FHE scheme based on ring LWE problem, with a smaller size of ciphertext and a lower noise-expansion factor for homomorphic multiplication. Then based on our optimized RLWE-based FHE scheme, we propose a fast single-database private information retrieval protocol, combining with batching and number theoretic transform technology.

A Case Study on Strategic Planning in NASA In the Perspective of Strategic Planning in Publicly funded R&D Organizations (미 항공우주국 (NASA)의 전략기획에 대한 사례 연구 - 공공 연구개발 조직의 전략기획의 관점에서)

  • Kwon Ki-Seok;Lee Kyu-Hyun
    • Journal of Science and Technology Studies
    • /
    • v.4 no.2 s.8
    • /
    • pp.103-127
    • /
    • 2004
  • This paper analyzes the strategic planning process of NASA (National Aeronautics and Space Administration) including its center, GSFC (Goddard Space Flight Center) in the framework of strategic planning in publicly funded R&D organizations. To construct this framework, theories have been considered mainly focused on strategic management and planning, its application on public sector, and characteristics of R&D activities. As a result, the framework could be set up in accordance with the process of strategic planning. Also, as a case study, we explored the practice of strategic planning process and organizational implementation of NASA and GSFC. During the analysis on the strategic process of NASA and GSFC, we could draw some lessons out as follows: First, we should consider the differences between private and public sectors when we establish strategic planning in public sector. Second, the stakeholder analysis should be involved in setting the mission, goals, and strategies of an organization. Third, it is necessary to identify and assess the socio-economic effects or public benefits by R&D programs of the organization and use the feedback on its goal. Fourth, to implement strategic planning effectively, planning process should be closely integrated with the management process such as setting goals, securing budgets, and evaluating the organization. Conclusively, the analysis on NASA and GSFC contribute to implementing strategic planning in publicly funded R&D organizations by providing the appropriately modified framework. As an extension of this study, more deliberate analysis on various practices of strategic planning and performance indicators should be followed.

  • PDF

Strategic Alliance within the Sugar Industry of Pakistan: A Resource Dependence Perspective

  • AMAN, Rameesha;KHAN, Abdul Rehman
    • Asian Journal of Business Environment
    • /
    • v.11 no.4
    • /
    • pp.31-38
    • /
    • 2021
  • Purpose: This paper uses the resource-dependency theory to present the case of the Pakistan sugar industry to highlight how the industry uses a strategic alliance to gain a powerful bargaining position over its critical dependencies. The case of the Pakistan sugar industry is well-known and it is common knowledge that the alliance or the cartel within it is responsible for frequent price hikes and sugar supply shortages in the country. Research design, data and methodology: We use a case study, qualitative document analysis design to trace how the alliance overcomes its various dependencies, and in doing so, how does it harm various stakeholder interests. Results: This paper finds that the sugar industry alliance maintains its bargaining power by manipulating sugar supply through horizontal alliances, political affiliations, underselling and under-reporting sugar stocks, purchasing sugarcane from the black market, and by gaining billions of rupees in export subsidies by hoarding stock and using its political connections. Conclusion: The paper concludes by providing a summary of the measures which the government has taken to curb this anticompetitive conduct; the most important of which is the removal of protectionist measures for sugar trade and allowing market forces to control the demand and supply of sugar in the local market.

An Empirical Study on the EDI Diffusion and Performance (EDI 시스템의 확산과 성과에 관한 실증적 연구)

  • Lee, Jae-Won;Lee, Young-Hwan
    • Asia pacific journal of information systems
    • /
    • v.10 no.4
    • /
    • pp.1-20
    • /
    • 2000
  • Electronic Data Interchange(EDI) has the potential to improve business operations by expediting the exchange of business documents. It will also provide substantive operational and strategic benefits to the trading firms. However, the successful implementation of EDI systems requires the mutual trust and cooperation between the trading firms. The extent of EDI diffusion and performance depends on inter-organizational, intra-organizational, as well as innovation factors. Researches based on the sociopolitical process framework in the use of IT, organizational theory, resource dependence theory, and innovation diffusion theory have identified 3 inter-organizational variables(transaction climate, dependence, external IS expert support) and 4 intra-organizational variables(strategic IS planning, infrastructure, top management support, education/training,), and 3 innovation variables(compatibility, relative advantage, cost) that affect EDI diffusion. In this study, a multi-dimensional measure on EDI diffusion has been developed to capture the external and internal integration. Then, the influence of these 10 variables on the extent to which the EDI adopting firms pursue diffusion has been examined. Whether more diffusion leads to superior performance has also been studied. International trade managers from 107 firms in the trade industry participated in a field survey. The results based on a structural equation model(SEM), developed using AMOS, provide quite a strong support for the hypothesized relations. Both education/training and IT infrastructure influenced external and internal diffusion of EDI systems. Internal diffusion of EDI enables the adopting firms to improve operational and strategic performance, whereas external diffusion contributes only to operational performance.

  • PDF

A Study on the Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use: From the Perspective of the Innovation Diffusion Theory (클라우드 컴퓨팅 서비스의 도입특성이 조직의 성과기대 및 사용의도에 미치는 영향에 관한 연구: 혁신확산 이론 관점)

  • Lim, Jae Su;Oh, Jay In
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.99-124
    • /
    • 2012
  • Our society has long been talking about necessity for innovation. Since companies in particular need to carry out business innovation in their overall processes, they have attempted to apply many innovation factors on sites and become to pay more attention to their innovation. In order to achieve this goal, companies has applied various information technologies (IT) on sites as a means of innovation, and consequently IT have been greatly developed. It is natural for the field of IT to have faced another revolution which is called cloud computing, which is expected to result in innovative changes in software application via the Internet, data storing, the use of devices, and their operations. As a vehicle of innovation, cloud computing is expected to lead the changes and advancement of our society and the business world. Although many scholars have researched on a variety of topics regarding the innovation via IT, few studies have dealt with the issue of could computing as IT. Thus, the purpose of this paper is to set the variables of innovation attributes based on the previous articles as the characteristic variables and clarify how these variables affect "Performance Expectancy" of companies and the intention of using cloud computing. The result from the analysis of data collected in this study is as follows. The study utilized a research model developed on the innovation diffusion theory to identify influences on the adaptation and spreading IT for cloud computing services. Second, this study summarized the characteristics of cloud computing services as a new concept that introduces innovation at its early stage of adaptation for companies. Third, a theoretical model is provided that relates to the future innovation by suggesting variables for innovation characteristics to adopt cloud computing services. Finally, this study identified the factors affecting expectation and the intention to use the cloud computing service for the companies that consider adopting the cloud computing service. As the parameter and dependent variable respectively, the study deploys the independent variables that are aligned with the characteristics of the cloud computing services based on the innovation diffusion model, and utilizes the expectation for performance and Intention to Use based on the UTAUT theory. Independent variables for the research model include Relative Advantage, Complexity, Compatibility, Cost Saving, Trialability, and Observability. In addition, 'Acceptance for Adaptation' is applied as an adjustment variable to verify the influences on the expected performances from the cloud computing service. The validity of the research model was secured by performing factor analysis and reliability analysis. After confirmatory factor analysis is conducted using AMOS 7.0, the 20 hypotheses are verified through the analysis of the structural equation model, accepting 12 hypotheses among 20. For example, Relative Advantage turned out to have the positive effect both on Individual Performance and on Strategic Performance from the verification of hypothesis, while it showed meaningful correlation to affect Intention to Use directly. This indicates that many articles on the diffusion related Relative Advantage as the most important factor to predict the rate to accept innovation. From the viewpoint of the influence on Performance Expectancy among Compatibility and Cost Saving, Compatibility has the positive effect on both Individual Performance and on Strategic Performance, while it showed meaningful correlation with Intention to Use. However, the topic of the cloud computing service has become a strategic issue for adoption in companies, Cost Saving turns out to affect Individual Performance without a significant influence on Intention to Use. This indicates that companies expect practical performances such as time and cost saving and financial improvements through the adoption of the cloud computing service in the environment of the budget squeezing from the global economic crisis from 2008. Likewise, this positively affects the strategic performance in companies. In terms of effects, Trialability is proved to give no effects on Performance Expectancy. This indicates that the participants of the survey are willing to afford the risk from the high uncertainty caused by innovation, because they positively pursue information about new ideas as innovators and early adopter. In addition, they believe it is unnecessary to test the cloud computing service before the adoption, because there are various types of the cloud computing service. However, Observability positively affected both Individual Performance and Strategic Performance. It also showed meaningful correlation with Intention to Use. From the analysis of the direct effects on Intention to Use by innovative characteristics for the cloud computing service except the parameters, the innovative characteristics for the cloud computing service showed the positive influence on Relative Advantage, Compatibility and Observability while Complexity, Cost saving and the likelihood for the attempt did not affect Intention to Use. While the practical verification that was believed to be the most important factor on Performance Expectancy by characteristics for cloud computing service, Relative Advantage, Compatibility and Observability showed significant correlation with the various causes and effect analysis. Cost Saving showed a significant relation with Strategic Performance in companies, which indicates that the cost to build and operate IT is the burden of the management. Thus, the cloud computing service reflected the expectation as an alternative to reduce the investment and operational cost for IT infrastructure due to the recent economic crisis. The cloud computing service is not pervasive in the business world, but it is rapidly spreading all over the world, because of its inherited merits and benefits. Moreover, results of this research regarding the diffusion innovation are more or less different from those of the existing articles. This seems to be caused by the fact that the cloud computing service has a strong innovative factor that results in a new paradigm shift while most IT that are based on the theory of innovation diffusion are limited to companies and organizations. In addition, the participants in this study are believed to play an important role as innovators and early adapters to introduce the cloud computing service and to have competency to afford higher uncertainty for innovation. In conclusion, the introduction of the cloud computing service is a critical issue in the business world.

  • PDF

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

A Study on the influence of Visual Mental model in human to percept product form (제품형태 지각에 있어서 시각적 멘탈모델의 영향에 관한 연구)

  • 오해춘
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.407-414
    • /
    • 2002
  • Human does information processing more efficiently using mental model at his understanding process. if We know what mental model is, we will know how to percept that. Similarly is it used visual mental model to percept visual object\ulcorner If it is true, we will analysis how man to understand. In this research, we have one experimentation to timid out that is true. So we did experimentation to know how man to understand new products by visual mental model. So we use 2700cc car's side view as stimuli. To A Subjects, we give them to see re\ulcorner size view before 120% ratio. To B Subject, we give them to see 120% ratio. After a experimentation, It is true that we make hypothesis that A Subjects percept this stimuli too long then B Subjects. Accordingly it proves human to use visual mental model to percept visual object. The result of experimentation, a testee use preliminary stimulus as basis of evaluation. It means that he use mental model as basis of evaluation of main stimulus. Accordingly development of new design can afford more strategic approach. Industrial designer who want to strategic approach can forced on high-weighted form attribute as consumer gives.

  • PDF

A Study on Development Proposals for Korea's Export Control System (우리나라 수출통제 법제의 발전방안에 관한 연구)

  • Kang, Ho
    • Korea Trade Review
    • /
    • v.43 no.3
    • /
    • pp.75-100
    • /
    • 2018
  • This study is designed to examine international export control norms, analyze current national export control system and identify the problems thereof, presenting several proposals for development in the system. The Republic of Korea, as a signatory of non-proliferation treaties and multilateral export control regimes, is obligated to comply with the international non-proliferation and export control norms, irregardless of hard or soft laws. Korea's export control system has been implemented in earnest since 2005; however, it contains serious problems in terms of the legal system and objectives of relevant laws and regulations, terms and definitions of the items subject to export controls, catch-all requirements, brokering license, response to the U.S. re-export controls, and so on. Proposals for development in the system include (i) enacting an independent law integrating the current dual-use items export control law and regulations, (ii) making use of the term of "strategic items" as a uniform terminology replacing 'goods etc.', 'strategic goods(inclusive of technology)', 'strategic goods, etc.', 'WMD, etc.' so as to preclude any possibility of misunderstanding, (iii) rewriting the catch-all control requirements, (iv) introducing registration system of brokering firms, (v) including provisions to comply with U.S. reexport controls, and (vi) providing stakeholder with correct and full information on export controls.

  • PDF