• Title, Summary, Keyword: 감리 점검항목

Search Result 27, Processing Time 0.029 seconds

Design on Fixed Quantity Analytical Model for Information System Audit (정보시스템 감리의 정량화 분석 모델 설계)

  • Kim, Hee-Wan;Lee, Hae-Man;Kim, Dong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.88-100
    • /
    • 2011
  • This thesis suggests fixed quantity model and detailed performance procedures of an information system audit. In addition, an identification of the check-items with high operating risk and factors that might lead to serious effects on the business are made. Then, this thesis proposes the information system audit model that can grant priorities. By using this model, the orderer can evaluate objectively with digitized mark. The model can improve the effectiveness, reliability, and objectivity of the audit by minimizing the discrepancies of different opinions about audit evaluation results between auditee and the orderer. The proposed model is adapted to an application system and audit projects of the database construction. As a result, the model has received an equal mark from the result of the general reviews, thus the propriety of the proposed model was verified.

The Study of the Integrated Cost Audit Model for the Efficiency of IT project risk management (통합비용감리모델을 통한 IT사업위험관리 효율성에 관한 연구)

  • Yoon, Seong-Jeong;Han, Gi-Jun;Kim, Dong-Su
    • 한국IT서비스학회:학술대회논문집
    • /
    • /
    • pp.266-269
    • /
    • 2009
  • 현재 대한민국 사업(IT Project)수행 시 다양한 관리 방법론이 연구 활용 되고 있다. 그러나 다양한 사업(IT Project)관리 방법론을 적용한다 하더라도 효과 효율성 측면에 대한 실증분석이 필요하다. 왜냐하면 그러한 방법론으로 비용적 측면에서 효과 효율 성을 발휘할 것인지 측정이 없었기 때문이다. 본 논문에서 시뮬레이션 하는 비용측정은 사업초기에 책정한 비용과, 분석/설계가 끝나는 시점의 비용, 사업 종료 후 비용을 측정할 것이다. 이때, 사업관리의 위험관리요소와 통합비용감리모델을 제시하여 감리점검항목을 도출할 것이다. 이를 통하여 효과 효율 성을 도출할 것인지 검증할 것이다. 효과 성 및 효율 성이 본 논문에서 제시한 통합비용감리모델을 통하여 비용에 대한 누수 및 과다산출이 도래를 막을 수 있는지 논하고자 한다.

  • PDF

Audit Checking Items for the Efficient GIS Audit (효율적인 GIS 감리를 위한 감리 점검항목)

  • Cho, Yeong-Ju;Kim, Dong-Oh;Kim, Dong-Soo;Han, Ki-Joon
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.213-228
    • /
    • 2012
  • The construction of the Geographical Information System(GIS) is continuously in progress, and with the diversification and complication of the system, the importance of its audit is further deepened. At this point in time, the information system audit has been obligatory as it has been stipulated in law, and the GIS audit has come to follow the criterion of the information system audit since it belongs to the information system audit category. However, it was found that there was a difference between the current information system audit standard and the former GIS audit standard, and the audit checking items for the efficient GIS audit is necessary. For this reason, this paper surveyed the characteristics of GIS in accordance with this necessity, analyzed the GIS audit checking items found in the audit performance guideline of the GIS audit standard, and studied the GIS development methodology through the related literature. In addition, this paper also elicited and proposed the audit checking items for the efficient GIS audit based on the findings of this paper. Finally, this paper confirmed the efficiency of the GIS audit checking items proposed here through the comparison of the actual cases of GIS audits.

A Study on Security Audit Checking Items for the RFID-Based Information System (RFID 기반 정보시스템을 위한 보안감리 점검항목 연구)

  • Jeon, Sang-Duk;Lim, Ji-Young;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.107-121
    • /
    • 2012
  • The core infra-technology in the ubiquitous era, RFID which has taken action from the public institution with the pilot projects as well as the practical projects is gradually extending its spectrum to the private enterprises. Along with its expansion, the audit required on the RFID-based information system is also growing in the industry. Especially, since RFID-based information systems, especially compared to other information systems, are likely to be exposed to many threats, the security audit for them is being emphasized. This paper suggests security audit checking items for the RFID-based information system, which can be used to perform the efficient security audit. The security audit checking items consist of eight basic checking items, each of which consists of detailed review items and can be applied for each building steps of the system(analysis, design, implementation, testing, and development). Finally, this paper confirmed the efficiency of the security audit checking items proposed in this paper through survey by the experienced auditors and analysis of practical audit cases.

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

A Study on Mission Critical Factors for Software Test Enhancement in Information Technologies Development of Public Sector (Mission Critical 공공 정보화 구축 시험평가 개선 지표 연구)

  • Lee, Byung-hwa;Lim, Sung-ryel
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.97-107
    • /
    • 2015
  • Up until recently, Korea has ranked the first place in UN e-Government Survey for three consecutive years. In keeping with such accomplishment, the size of budget execution has been consistently growing in accordance with Korea's Government 3.0 policy and vision, leading to increase in big-sized informatization projects in the business. Especially in mission critical public sector's infrastructure where it affects many people, growing demand for establishing high-quality information system with new technologies being brought to attention in order to meet the complex needs of citizens. National defense information system, being one of representative domains examples in the concerned area, established high military competency by applying breakthrough technology. Network-oriented national defense knowledge informatization was set as the vision in order to implement core roles in making efficient national defense management; and effort has been made to materialize the vision by making advancement in national defense's information system and its informatization implementation system. This research studies new quality index relevant to test and evaluation (T&E)of informatization business in national defense which is the representative example of mission critical public sector's infrastructure. We studied international standards and guidelines, analyzed actual T&E cases, and applied them to the inspection items that are currently in use, complying with the e-government law (Act No. 12346, Official Announcement Date 2014. 1.28., Enforcement Date 2014. 7.29.) As a result of productivity analysis, based on hypothesis in which suggested model was applied to T&E of the national defense informatization business, we confirmed the possibility of enhancement in the T&E productivity by assessing reliability, expertise, and safety as evaluation factors.