• Title/Summary/Keyword: e-Business Architecture

Search Result 250, Processing Time 0.025 seconds

The Evolution of IT architecture in Universities: A Case study of Korean Domestic Universities (대학 정보기술 아키텍처 발전방향에 관한 연구: 국내 대학 사례를 중심으로)

  • Yoon, Sung-Chul;Suh, Hyun-Suk;Lee, Seog-Jun
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.111-131
    • /
    • 2002
  • Strategic information systems assist organization with the significant opportunity to gain competitive advantage in executing its business plans and realizing its business goals. The universities establish long-range plan of information systems in an effort to provide just-in-time, useful, efficient and effective information services to their members such as professors, students, and staffs when carrying out various organizational activities. The university information systems started from the primitive computer-based application, extended to the administrative and educational e-transformation, even to the virtual university concept. Through an empirical analysis and complementary case examples, the current study carefully chose three Korean universities according to their chronological importance, that have undergone the information systems planning process years from 1995 to 2001. These universities then, were compared in terms of the information technology architecture: the information architecture, infra architecture, and information management architecture. These three areas of system were cross-examined under the consideration of the evolution of information technology architecture, and its impact on the development of university e-transformation. As part of a fulfillment plan to satisfy the needs of customers of current trend, it is evident that the university e-transformation provides a stepladder to highly competitive, first class university in the market, through achieving the educational advancement, research enhancement, and administrative efficiency. The result of the study analysis indicates that, of the three architectures examined, the weakness showed in the information management architecture. Therefore it is crucial for the university staffs, managers and professors to understand the significance of the successful implementation of the information system and its maintenance. Our study certainly will act as a catalyst for the promotion of the future university e-transformation projects.

A study on the Development Process for e-Business System Development based on Web (웹 기반 e-Business 시스템 개발 프로세스에 대한 연구)

  • 김선영;김지영;김행곤;이수기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.313-315
    • /
    • 2003
  • 인터넷과 웹은 전통적인 비즈니스 모델에 혁신적인 변화를 가져왔고 인터넷/인트라넷 기반의 전자적 서비스를 통해 비즈니스 거래를 가능케하는 전자 상거래를 거쳐 보다 확대된 비즈니스 개념과 모델을 제공하는 동적인 e-Business라는 새로운 환경을 만들어냈다. 이 새로운 환경에 보다 동적인 비즈니스 프로세스를 지원하는 XML기반의 웹표준들의 상호작용하는 응용인 웹서비스가 등장하였다. e-Business 응용은 비즈니스 트랙잭션 제공자와 소비자 측면의 단말 사용자의 자동화를 위한 플랫폼이 기반이 되며 이를 통한 새로운 모델로 비즈니스 프로세스 응용 상호간 실시간 웹서비스가 제공되는 핵심 기술이 요구된다. 본 논문에서는 웹 서비스의 특성을 기반한 e-Business 시스템을 구축하기 위한 기본 기술들을 계층화하여 표현한 재사용 가능한 공통 아키텍쳐(common architecture)를 기술하고 개발 프로세스를 제안하고 CAS(Customer Authentication System)에 개발 프로세스를 적용하여 개발하는 사례를 보여준다.

  • PDF

An Application of the Semantic Web for e-Business Integration (e-비즈니스 통합을 위한 시맨틱 웹의 활용)

  • Chang Tai-Woo;Shin Kitae;Park Jinwoo
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.19-33
    • /
    • 2005
  • In this study, we propose a methodology of mating it easy to integrate the heterogeneous and distributed information of e-Business environments with the semantic web components , knowledge representation, ontology and agents. It is based on a collaborative interoperable environment, which should be constructed by meta-modeling and employing agents , and the syntactic/semantic integration. We adopt OWL(Web Ontology Language) to specify ontology in a layered architecture for each agent to use, which is based on the IRDS (Information Resource Dictionary Standard) framework. And we give an illustrative example using the terms from PSL(Process Specification Language)-ontology. By defining, managing and sharing resources and business-processes on the proposed framework, it could be possible to get rid of the cause of redundancy and inconsistency.

  • PDF

A Study on Requirement Analysis Process that support Enterprise Architecture Design (기업 아키텍처(Enterprise Architecture)를 지원하는 요구사항 분석 프로세스에 관한 연구)

  • 최봉균;임춘성
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.1
    • /
    • pp.35-54
    • /
    • 2003
  • 소프트웨어 개발공정 상의 요구사항 문서적 분석에 치중되어 있던 요구사항 분석에 관한 논의는 기업 통합을 더욱 효과적으로 하기 위해 소프트웨어적 차원을 넘어 기업 아키텍처 기반의 정보시스템 개발 및 통합의 필요성에 대한 논의로 확대되고 있다. 본 연구에서는 궁극적으로 기업 아키텍처의 효과적인 수립을 지원하는 요구사항 분석, 관리 프레임 웍과 분석 프로세스를 제시한다. 요구사항 분석 프로세스는 기업 아키텍처의 개념을 바탕으로 다양한 사용자와 관점이 구별하고, 이를 다시 요구사항 추출을 위해 업무적 관점과 정보시스템 관점으로 구분한다. 이러한 요구사항 분석을 위한 프로세스는 기업 아키텍처의 수립을 효율적으로 지원할 것이다.

  • PDF

The function and architecture of electronic payment system (전자 지불 처리 시스템의 기능 및 구조)

  • 송병열;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.2
    • /
    • pp.81-94
    • /
    • 1999
  • This paper shows the architecture of IPS(Intermarket Payment System), an implementation of the electronic payment function for internet-shopping merchant system. Because the original purpose of commerce transaction is the exchange of money for goods or services, it is very important to prepare an exchangeable economic value or method. The electronic payment system is the hardware or software or both to process an electronic payment transaction. It has two type, the broker type and the electronic value type. The broker type means an intermediator between real bank network and internet commerce transaction. The electronic value type means a substitute for money in the real world. This paper shows the architecture and the function to implement the broker type electronic payment system. The system has two parts. One is the mediator part to support multiple payment systems and to offer common access methods for merchant system database. The other is the executor part to implement the payment protocol and to process payment transaction.

  • PDF

System Architecture for Performance Management in ATM Network (ATM 통신망의 성능관리를 위한 시스템구조)

  • Hyeog In Kwon
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.25-38
    • /
    • 2001
  • ATM is the transport method for the broadband integrated services digital networks(B-ISDN). It may replace existing LAN, MAN and WAN technologies such as CSMA/CD, FDDI, Frame relay, X.25, etc. But it is more complicate than existing network technologies. One of the main difficulties in ATM network is performance management. Specifically, the problems are evaluating the performance and tuning the values of the performance parameters, The goal of this paper is to introduce a system architecture designed for ATM network performance management, The major ingredients of the system are generic performance parameters In be measured from ATM network, performance evaluation models and decision criteria concerning the network performance. In this paper, general requirements for performance management application in ATM network are discussed.

  • PDF

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

A Study on the Induction of BPM and its Application Sphere for the Establishment of e-Trade Process (전자무역 프로세스의 확립을 위한 BPM 도입과 적용분야에 관한 연구)

  • Lee, Sang-Jin
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.99-117
    • /
    • 2007
  • The purpose of this study is to explore the application sphere of BPM(Business Process Management) to e-trade process using BPM technology and its service architecture in order to expand the usage of e-trade platform which is developing. After close reviewing the current status of trade process, the possibility of BPM application by e-trade process will be analyzed. The result of analysis is that BPM application to local L/C and purchasing confirmation process could be implemented because those processes are very suitable to apply standardized process and can minimize the risk and confusion of users. BPM application to remaining trade process have to be considered by mid-term and long-term project with the reflection of pilot project performance. Also this study suggests a business management model of e-trade process based on BPM technology which is the new IT technology and integrated interface in view of trade community.

  • PDF

A Study on eDocument Management Using Professional Terminologies (전문용어기반 eDocument 관리 방안에 관한 연구)

  • 김명옥
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.2
    • /
    • pp.21-38
    • /
    • 2002
  • Document retrieval (DR) has been a serious issue for long in the field of Office Information Management. Nowadays, our daily work is becoming heavily dependent on the usage of information collected from the internet, and the DR methods on the Web has become an important issue which is studied more than any other topic by many researchers. The main purpose of this study is to develop a model to manage business documents by integrating three major methodologies used in the field of electronic library and information retrieval: Metadata, Thesaurus, and Index/Reversed Index. In addition, we have added a new concept of eDocument, which consists of metadata about unit documents and/or unit document themselves. eDocument is introduced as a way to utilize existing document sources. The core concepts and structures of the model were introduced, and the architecture of the eDocument management system has been proposed. Test (simulation) result of the model and the direction for the future studies were also mentioned.

  • PDF

Applied Method of Privacy Information Protection Mechanism in e-business environments (e-Business 환경 내 개인정보 보호 메커니즘적용 방안)

  • Hong, Seng-Phil;Jang, Hyun-Me
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.51-59
    • /
    • 2008
  • As the innovative IT are being developed and applied in the e-business environment, firms are recognizing the fact that amount of customer information is providing care competitive edge. However, sensitive privacy information are abused and misused, and it is affecting the firms to require appropriate measures to protect privacy information and implement security techniques to safeguard carparate resources. This research analyzes the threat of privacy information exposure in the e-business environment, suggest the IPM-Trusted Privacy Policy Model in order to resolve the related problem, and examines 4 key mechanisms (CAM, SPM, RBAC Controller, OCM) focused on privacy protection. The model is analyzed and designed to enable access management and control by assigning user access rights based on privacy information policy and procedures in the e-business environment. Further, this research suggests practical use areas by applying TPM to CRM in e-business environment.

  • PDF