• Title/Summary/Keyword: implementation of information systems

Search Result 3,802, Processing Time 0.029 seconds

A study on Design & Implementation of Supply Chain Management adopting Object-Oriented design methodology for auto-part manufacture company (객체지향 UML을 활용한 자동차부품제조업체의 공급사슬관리망 설계.구현 연구)

  • Na, Sang-Gyun;Lee, Jun-Su;You, Tai-Woo;Jeong, Byung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.73-84
    • /
    • 2007
  • This paper was concerned about design and implementation of supply chain management for auto-part company by adopting a UML(Unified Modeling Language). The part of SCM and e-business have interested by larger company, researcher and academic professor. There has been known about a little implementing SCM and it's initiatives for SME(small-medium sized enterprise). We, in this paper, dealt with design and implementing the SCM on supply chain auto part SMEs. The UML is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems. It simplifies the complex process of software design, making a blueprint for the SCM implementation. In this paper, we also adopt some methods for the systematic system analysis, design, and implementation by applying UML to a SCM system.

Standard Implementation for Privacy Framework and Privacy Reference Architecture for Protecting Personally Identifiable Information

  • Shin, Yong-Nyuo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.3
    • /
    • pp.197-203
    • /
    • 2011
  • Personal Identifiable Information (PII) is considered information that identifies or can be used to identify, contact, or locate a person to whom such information pertains or that is or might be linked to a natural person directly or indirectly. In order to recognize such data processed within information and communication technologies such as PII, it should be determined at which stage the information identifies, or can be associated with, an individual. For this, there has been ongoing research for privacy protection mechanism to protect PII, which now becomes one of hot issues in the International Standard as privacy framework and privacy reference architecture. Data processing flow models should be developed as an integral component of privacy risk assessments. Such diagrams are also the basis for categorizing PII. The data processing flow may not only show areas where the PII has a certain level of sensitivity or importance and, as a consequence, requires the implementation of stronger safeguarding measures. This paper propose a standard format for satisfying the ISO/IEC 29100 "Privacy Framework" and shows an implementation example for privacy reference architecture implementing privacy controls for the processing of PII in information and communication technology.

Automatic identification of Java Method Naming Patterns Using Cascade K-Medoids

  • Kim, Tae-young;Kim, Suntae;Kim, Jeong-Ah;Choi, Jae-Young;Lee, Jee-Huong;Cho, Youngwha;Nam, Young-Kwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.873-891
    • /
    • 2018
  • This paper suggests an automatic approach to extracting Java method implementation patterns associated with method identifiers using Cascade K-Medoids. Java method implementation patterns indicate recurring implementations for achieving the purpose described in the method identifier with the given parameters and return type. If the implementation is different from the purpose, readers of the code tend to take more time to comprehend the method, which eventually affects to the increment of software maintenance cost. In order to automatically identify implementation patterns and its representative sample code, we first propose three groups of feature vectors for characterizing the Java method signature, method body and their relation. Then, we apply Cascade K-Medoids by enhancing the K-Medoids algorithm with the Calinski and Harrabasez algorithm. As the evaluation of our approach, we identified 16,768 implementation patterns of 7,169 method identifiers from 50 open source projects. The implementation patterns have been validated by the 30 industrial practitioners with from 1 to 6 years industrial experience, resulting in 86% of the precision.

조직시민행동이 정보시스템 사용성과에 미치는 영향: 흡수능력의 매개역할을 중심으로

  • Gil, Jin-Ho;Gwak, Gi-Yeong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.525-540
    • /
    • 2008
  • With the competitive pressure and the development of information and communication technology, many organizations have introduced various kinds of enterprise-wide systems like enterprise resource planning (ERP) systems as strategic tools for the purpose of improving organizational performance. Despite their promised strategic benefits, however, their implementation has suffered from a high failure rate and difficulty in realizing the anticipated benefits. Previous studies have indicated that one of the most critical failure reasons is the lack of knowledge sharing and utilization across organizations. As a consequence, many information systems (IS) researchers have paid attention to examining the effect of absorptive capacity closely associated with knowledge sharing and transferring on IS usage performance. ERP systems implementation involves changes not only in systems but also in processes and other social dimensions, which can be related to organizational citizenship behavior (OCB) requiring appropriate communications and interactions among organizational members. A lack of communications and interactions due to a lack of OCB might lead to weak absorptive capacity and thus negatively influence knowledge sharing across organizations, because OCB facilitates a successful collaboration among functional units and positively impacts individual's attitude toward radical organizational change. With this motivation, this study has two research objectives. First, it introduces and tests a theoretical model accounting for the relationships among performance of ERP system usage, absorptive capacity, and OCB. Second, it examines a mediating role of absorptive capacity between OCB and performance of EPR system usage. Theoretical and practical implications of the study ware discussed, along with its limitations.

  • PDF

The Analysis on the Forecasting Demand & the Implementation of IT Systems for SMEs (중소기업 정보시스템 활용실태와 수요 전망)

  • Hyoung, Jun-Ho;Kim, Moon-Sun;Hwang, Soon-Hwan
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.1-8
    • /
    • 2004
  • Recently, most managers of Small & Medium Enterprises(SMEs) think that all problem of a company is solved if only implementation of ERP or e-business. But it's too risky. Technology of IT is developing so radical, so managers didn't have enough time to consider what system is appropriate in their business process and how implement information system is when they establish Information System. This Study addresses the present Information System that operating and needed for SMEs based on the Value Chain of IS. Thus through the prediction on the consequence of IS implementation, we could cut down unnecessary investment cost and support core competence of a company. Next time, the study on the classification of more detail IS associated in SME's performance is required.

Network Implementation for automobiles using CAN (CAN을 이용한 자동차용 Network 구현)

  • Hur Hwa-Ra
    • Management & Information Systems Review
    • /
    • v.2
    • /
    • pp.335-354
    • /
    • 1998
  • In this study I construct CAN(Controller Area Network) for automobiles similar to LAN(Local Area Network) and build communication modules in the major part of an automobile to link several sub-systems. Since each station replaces the communication function of sub-systems and has various types of sensor, actuator, controller, and switch, every information about automobile's status is obtained from the network. The manufactured system showed a superior capability. The following is the contents of study. 1. The definition of communication packet through the analysis of CAN protocol. 2. The Design of modules using micro-controller 80C196CA. 3. The Network configuration.

  • PDF

Protocol Implementations for Web Based Control Systems

  • Shoo Sugoog
    • International Journal of Control, Automation, and Systems
    • /
    • v.3 no.1
    • /
    • pp.122-129
    • /
    • 2005
  • We describe the MiniWeb[7] TCP/IP stack (mIP), which is an extremely small implementation of the TCP/IP protocol suite running 8 or 32-bit micro controllers intended for embedded control systems, and satisfying the subset of RFC1122 requirements needed for host­to-host interoperability over different platforms. Our TCP/IP implementation does sacrifice some of TCP's mechanisms such as fragmentation, urgent data, retransmission, or congestion control. Our implementation is applicable to web based controllers. The network protocols are tested in operational networks using CommView and Dummynet where the various operational parameters such as bandwidth, delay, and queue sizes can be set and controlled.

User Resistance in the Adoption of Open Source Software

  • Aung, Hnin Hnin;Kim, Hee-Woong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.17-22
    • /
    • 2008
  • The emergence of open source software (OSS) with its successful projects and its most prominent advantages creates a vast interest among academics and practitioners. However, it has been found that focusing on the developments of OSS to be successful is not adequate and the adoption of OSS by uses is also very important. Although there are a great number of useful and easy to use OSS has been developed, the adoption of OSS and usage in the market is very low. Based on the technology equity implementation model (EIM), this study examines user resistance in the adoption of OSS (i.e., switching from the current system to OSS). A survey has done regarding the adoption of Linux as the case of study. We have found that user resistance to change has negative effect on adoption intention, and switching benefits, switching costs and perceived value have significant relationships with user resistance to change.

  • PDF

The Design and Implementation of Internet Auction System Support Bidding Trace (입찰 추적을 지원하는 인터넷 경매 시스템 설계 및 구현)

  • Kim, Chung-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1719-1725
    • /
    • 2000
  • Since the advance of WWW, internet related fields have been growing very rapidly. Especially, the development of electronic commerce ares have changed even or life style. This paper is about the design and implementation of an internet auction system, which is considered as on of the most attractive internet services. An internet auction system has more complex processes compared with other electronic commerce systems. In auction systems, bids and a successful bid are required in trading all goods. In this paper, I designed and implemented all processes of an internet auction system, in which a bid tracing systems is included for the first time. The bid tracing system is implemented using only HTTP in maintain compatibility in WWW environment. I also used th JAVA blocking concept to simulate two-way communication. The proposed system is implemented on Windows NT environment using JAVA, ASP, and the Oracle database.

  • PDF