• 제목/요약/키워드: evaluation of information from the government

검색결과 243건 처리시간 0.03초

정부의 정보 보안 대책 법제화의 사전 효과성 분석 방법 (An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure)

  • 심우현
    • 한국전자거래학회지
    • /
    • 제20권4호
    • /
    • pp.241-256
    • /
    • 2015
  • 기업의 정보 보안을 보장하기 위해, 많은 정부가 다양한 보안 관련 대책을 의무화해오고 있다. 하지만 이러한 보안 대책의 실행에 앞서, 이의 잠재적 효과성을 분석하는 연구는 부족한 실정이다. 본 연구는 안전벨트의 착용 법제화가 자동차 사고 사망자 감소에 미치는 효과에 대한 연구를 응용하여, 정부의 다양한 보안 대책의 사전 효과성 평가가 가능한 모형을 개발하는 것을 목적으로 한다. 또한, 인터넷 진흥원의 정보보호실태조사(기업편) 데이터를 개발된 모형에 적용하여 어떠한 보안대책의 법제화가 사회 및 산업 전반의 보안위험을 줄이는데 효과적인지 사전평가를 시행하였다. 그 결과 보안교육의 법제화가 다른 보안대책에 비해 효과적임을 확인하였다.

국책 연구개발 프로그램에 대한 외국평가사례 분석 및 평가지침 개발 (Evaluations of national innovation/R&D programs in the developed countries and its implications)

  • 이무신;엄기용;심덕섭
    • 경영과학
    • /
    • 제11권2호
    • /
    • pp.207-235
    • /
    • 1994
  • Regarding the study in innovation/R&D programs evaluation, twelve cases from the U.S ., U. K., Germany, France, Sweden, Australia, Japan, and EC are analyzed, and its implications to Korean situation are investigated. From the analysis of the cases, some valuable guidelines for Korea are developed. Some of the guidelines are: the evaluation must be treated as an integral part of the Government supported programs, specialists in evaluation should be raised, the long-term effects and non-economic/social effects should also be included in the evaluation, various efforts to acquire more exact and versatile information necessary for quality evaluation should be made, and additional effort is required for the evaluation to be actualized.

  • PDF

Improvement Plans of the Parliamentary Inspection System in the Information Society

  • Park, Jong-Ryeol;Lee, Young-Woo
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권3호
    • /
    • pp.181-190
    • /
    • 2019
  • Today, in the information society, since the government administration of all countries places importance on clarity and efficiency, the authority concentration of the administration is inevitable. Therefore, the Parliament, which is a legislative body, is at a time when the policy control function to check and monitor it is becoming more important. In particular, due to the emergence of parliamentary democracy, in the reality that the people must elect representatives and represent their own opinions, the parliamentary inspection system is very valuable in that it satisfies the right of the people to know and ultimately enables the people to democratically control the administration. The role of the Parliament moves from the inherent legislative function to the information collection and disclosure of government administration, discussion and resolution of political issues, and observation and supervision of the administration. And it can be seen as the global trend. As a result of this trend, status and role of the National Assembly is being strengthened from the legislative body to the control agency of government administration. Thus, the most substantive authority of Article 61 of the Constitution can be deemed the parliamentary inspection system. The parliamentary inspection system is a system that let exercise the legislation, budget, and authority to control of state administration by identify the challenges and policy implementation of each country's institutions through the audit of the executive administration's overall government administration performance outside the National Assembly. However, due to the amendment of Constitution in 1988, the parliamentary inspection right and investigation of state administration right had reinstated and the parliamentary inspection system, which is being implemented annually, is the 31st year of the year in 2019. However, the general evaluation of the public is negative and insufficient time for inspections, lack of sanctions on nonattendance witnesses, excessive data submission, and refusal to submit materials by the administration were pointed out as the problem. Therefore, in this paper, the researcher tries to point out the overall problems of the parliamentary inspection system and to summarize the effective improvement plans.

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • 제26권5호
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

군수품 정부품질보증 위험성 평가제도 개선을 위한 제언 (Proposal for Government Quality Assurance Risk Assessment System for Military Supplies)

  • 안남수
    • 품질경영학회지
    • /
    • 제51권2호
    • /
    • pp.155-170
    • /
    • 2023
  • Purpose: Nowadays, the risk assessment system is widely used in many industrial and public areas to reduce the possible risks. The system is used to determine the priorities of the government quality assurance works in Defense Agency for Technology and Quality. However, as the risk assessment system is used for other purposes, there are some items that need improvement, and in this study, we propose improvement plans by benchmarking the risk assessment systems of other institutions. Methods: In this paper, first, the procedures of risk assessment system used in many industrial sites were reviewed, and how each institution specialized and applied the system. Afterwards, by benchmarking various risk assessment systems, an improvement plan on how to operate the risk assessment system in the case of government quality assurance for centrally procured military supplies was presented, and practical application cases were presented to prove the usefulness of the improvement plan. Results: The proposed risk assessment system differs from the existing system in five major aspects. First, inputs, outputs, and key performance indicators were specified from the systematic point of view. Second, risk analysis was analyzed in four dimensions: probability of occurrence, impact, detection difficulty. Third, risk mitigation measures were classified, control, transfer, and sharing. Fourth, the risk mitigation measures were realized through document verification, product verification, process verification, and quality system evaluation. Finally, risk mitigation measures were implemented and the effectiveness of the risk mitigation measures was evaluated through effectiveness evaluation. Conclusions: In order for the risk assessment procedure proposed in this study to be applied to actual work, it is necessary to obtain the consent of the person involved in the work due to the increased time for risk identification and preparation of the government quality assurance log, and a change in the information system that performs the actual work is required. Therefore, the authors of this study plan to actively perform internal seminar presentations and work improvement suggestions to apply these research outputs to actual work.

정보시스템 아웃소싱 위험요인 평가 프레임?의 개발: 비영리 조직을 중심으로 (Development of the Evaluation Framework for the Risk Management of Information Systems Outsourcing : Focusing on Nonprofit Organizations)

  • 김창수;백명기
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제13권1호
    • /
    • pp.39-57
    • /
    • 2004
  • As a result of the fast development of Information communication technology, the competitive advantage of companies and the service quality of nonprofit organizations has been largely changed. Corresponding to this kind of change, companies have tried to make production improvement, competitive strengthening, and organizational innovation. Meanwhile, the nonprofit organizations directed by the government are pursuing the service innovation from general administration area to the public service for civilians. In relation to this, risk management of the company's information systems outsourcing has largely been studied until now. However, the study of risk management for nonprofit organization information systems outsourcing has rarely been made. In this paper, to provide the theoretical base for further research, we have attempted to develop the evaluation framework for risk management of information systems outsourcing considering the characteristics of nonprofit organizations.

  • PDF

Feasibility Evaluation of High-Tech New Product Development Projects Using Support Vector Machines

  • 신택수;노전표
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2005년도 공동추계학술대회
    • /
    • pp.241-250
    • /
    • 2005
  • New product development (NPD) is defined as the transformation of a market opportunity and a set of assumptions about product technology into a product available for sale. Managers charged with project selection decisions in the NPD process, such as go/no-go choices and specific resource allocation decisions, are faced with a complicated problem. Therefore, the ability to develop new successful products has identifies as a major determinant in sustaining a firm's competitive advantage. The purpose of this study is to develop a new evaluation model for NPD project selection in the high -tech industry using support vector machines (SYM). The evaluation model is developed through two phases. In the first phase, binary (go/no-go) classification prediction model, i.e. SVM for high-tech NPD project selection is developed. In the second phase. using the predicted output value of SVM, feasibility grade is calculated for the final NPD project decision making. In this study, the feasibility grades are also divided as three level grades. We assume that the frequency of NPD project cases is symmetrically determined according to the feasibility grades and misclassification errors are partially minimized by the multiple grades. However, the horizon of grade level can be changed by firms' NPD strategy. Our proposed feasibility grade method is more reasonable in NPD decision problems by considering particularly risk factor of NPD in viewpoints of future NPD success probability. In our empirical study using Korean NPD cases, the SVM significantly outperformed ANN and logistic regression as benchmark models in hit ratio. And the feasibility grades generated from the predicted output value of SVM showed that they can offer a useful guideline for NPD project selection.

  • PDF

근골격계질환 예방관리 프로그램에 대한 구조 분석 및 실무자 요구 사항 조사 (Structural Analysis and Practitioner Needs Survey for a WMSD Prevention Program)

  • 정기효;이상기;권오채;유희천;김대성
    • 대한인간공학회지
    • /
    • 제24권3호
    • /
    • pp.35-41
    • /
    • 2005
  • The KOSHA codes H-31 and H-30 provide general guidelines to establish a prevention program for work-related musculoskeletal disorders(WMSD). Understanding of the components and practitioner needs for a WMSD prevention program is necessary for effective revision and implementation of the KOSHA codes. The present study established a comprehensive structure for a WMSD prevention program and surveyed practitioner needs for the KOSHA codes. The comprehensive prevention program structure, consisting of 7 parts(organization, education, risk management, medical management, program evaluation, and record keeping) and 90 items, was constructed by analyzing WMSD prevention guidelines published by various government agencies such as KOSHA, OSHA and NIOSH. Next, 20 practitioners, from four industry sectors(auto manufacturing, auto part manufacturing, shipbuilding, and machinery), working in a safety and health department or labor union, were interviewed to collect opinions for the KOSHA codes in terms of relevance, government support, and additional information needed. Guidelines of the KOSHA codes requiring modifications and government supports were identified, which can be used to revise the KOSHA codes and to establish a government policy to promote the implementation of the KOSHA codes. Lastly, the survey revealed that integrated, customized, quantitative, and case information for WMSD prevention is additionally needed, which can be used as design guidelines for a WMSD prevention program manual for practitioners.

Focus Group Based Evaluation of Social Media Usage in Indonesia's Digital Government

  • Kartikawangi, Dorien
    • Asian Journal for Public Opinion Research
    • /
    • 제8권1호
    • /
    • pp.41-58
    • /
    • 2020
  • This article attempts to explain social media use within the relationship between the public and government of Indonesia in the era of digital government, as well as to consider public opinion on this matter. This research is based on the application of social media logic and the theory of dialogic communication and action. A qualitative descriptive approach was used to observe the general behavior of social media use by 34 ministries in Indonesia, including interviews with the resource persons within the ministries and focus group discussions with members of the public and observers. The research shows that the relationship between the public and government is accommodative and in line with social media logic. The public sector implemented social media as its platform, which has been further adopted by all ministries. The public sector cannot avoid social media, as it has become part of basic connectivity, even though the use of social media by the government still tends to be in the form of presenting public information. There are advantages and disadvantages of the usage of social media by the government. The advantages include allowing the government to be more open via social media so that communication between the government as the ruling organization and its public can be more fluent. Social media provides space to the public sector in the practice of digital government. Some disadvantages arise as logical consequences that usage of social media cannot be separated from the implementation of digital government. The adaptive behavior of social media by the government can be found by following social media logic as part of digital government implementation. Social media logic causes the government to follow the rules of social media. In this context, the strength and power of the country seems to be regulated by social media. Therefore, more studies on how social media is managed in the context of its usage as digital government support is needed.

행정정보소재안내서비스(GILS) 평가 및 개선방안에 관한 연구 (A Study on the Evaluation and Generating Improvement Plan of the Government Information Locator Service(GILS))

  • 이지연;박성재
    • 한국문헌정보학회지
    • /
    • 제40권2호
    • /
    • pp.281-297
    • /
    • 2006
  • 행정정보소재 안내 서비스는 정보원에 대한 내용적 기술뿐만 아니라 위치정보, 접근 방법 등 외부적인 요소까지 기술함으로써 이용자의 정보에 대한 접근 및 이용을 가능하게 한다. 서비스 개선을 위해 현재 전자정부에서 제공하고 있는 소재정보안내시스템을 분석한 결과 다음과 같은 문제점이 발견되었다. 첫째, 인터페이스적인 측면에서 검색결과 화면의 오류나 레코드 항목명을 이해하기 어려웠다. 둘째, 레코드 항목 중 내용이 기입되지 않은 항목이 다수 발견되었다. 셋째, 정보접근 방식에 대해 구체적으로 제시하지 않았다. 넷째, 비공개 혹은 제한적 공개 사유에 대한 근거를 명확히 제시하지 않았다. 따라서 발견된 문제점을 해결하여 정보소재안내 서비스를 활성화하기 위해서는 레코드 수집방법을 개선하고 소재 레코드 항목을 재구성하며 적극적인 홍보활동 및 인터넷을 이용한 정보접근 방법을 강화해야 한다.