• Title/Summary/Keyword: Access management

Search Result 3,352, Processing Time 0.032 seconds

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory (오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여)

  • Choi, Junghong;Choi, Joohee;Lee, Hye Sun;Hwangbo, Hwan;Lee, Inseong;Kim, Jinwoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.

Radiation Oncology Digital Image Chart 8nd Digital Radiotherapv Record System at Samsung Medical Center (디지털 화상 병력 시스템과 디지털 방사선치료 기록 시스템의 개발과 사용 경험)

  • Huh Seung Jae;Ahn Yong Chan;Lim Do Hoon;Cho Chung Keun;Kim Dae Yong;Yeo Inhwan;Kim Moon Kyung;Chang Seung Hee;Park Suk Won
    • Radiation Oncology Journal
    • /
    • v.18 no.1
    • /
    • pp.67-72
    • /
    • 2000
  • Background :The authors have developed a Digital image chart(DIC) and digital Radiotherapy Record System (DRRS). We have evaluated the DIC and DRRS for reliability, usefulness, ease of use, and efficiency. Materials and Methods :The basic design of the DIC and DRRS was to build an digital image database of radiation therapy Patient records for a more efficient and timely flow of critical image information throughout the department. This system is a submit of comprehensive radiation oncology management system (C-ROMS) and composed of a picture archiving and communication system (PACS), a radiotherapy information database, and a radiotherapy imaging database. The DIC and DRRS were programmed using Delphi under a Windows 95 environment and is capable of displaying the digital images of patients identification photos, simulation films, radiotherapy setup, diagnostic radiology images, gross lesion Photos, and radiotherapy Planning isodose charts with beam arrangements. Twenty-three clients in the department are connected by Ethernet (10 Mbps) to the central image server (Sun Ultra-sparc 1 workstation). Results :From the introduction of this system in February 1998 through December 1999, we have accumulated a total of 15,732 individual images for 2,556 patients. We can organize radiation therapy in a 'paperless' environment in 120 patients with breast cancer. Using this system, we have succeeded in the prompt, accurate, and simultaneous access to patient care information from multiple locations throughout the department. This coordination has resulted in improved operational efficiency within the department. Conclusion :The authors believe that the DIC and DRRS has contributed to the improvement of radiation oncology department efficacy as well as to time and resource savings by providing necessary visual information throughout the department conveniently and simultaneously. As a result, we can also achieve the 'paperless' and 'filmless' practice of radiation oncology with this system.

  • PDF

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

An Empirical Analysis of Fixed Asset Investment Smoothing Effects of Working Capital (운전자본의 고정자산투자 스무딩효과의 실증적 분석)

  • Shin, Min-Shik;Kim, Soo-Eun;Kim, Gong-Young
    • The Korean Journal of Financial Management
    • /
    • v.25 no.4
    • /
    • pp.25-51
    • /
    • 2008
  • In this paper, we analyse empirically the fixed asset investment smoothing of working capital of firms listed on Korea Securities Market. The main results of this study can be summarized as follows. Firms will seek to lower long-term cost by smoothing fixed asset investment and maintaining stationary investment with working capital. Working capital is not only an important use of fund, but also a source of liquidity that should be used to smooth fixed asset investment relative to cash flow shocks if firms face financial constraints. Working capital investment is more sensitive than fixed asset investment to cash flow fluctuations. If firms face financial constraints, working capital investment will compete with fixed asset investment for the limited pool of available cash flows. So, fixed asset investment will have negative relationship with working capital investment. However, criticism that the positive correlation between cash flows and fixed asset investment could arise simply because cash flows is proxy variable for investment demand. Finally, controlling for the fixed asset investment smoothing effects of working capital results in a much larger estimate of the long run impact of financial constraints. Financial constraints is measured by dividend payout ratio and market access level. Fazzari et al. (1988), Fazzari and Petersen (1993), and Faulkender et al. (2008) emphasize that low dividend firms or market unaccessible firms are more likely to face financial constraints, and rarely make use of new equity issuing. The results from empirical analysis show that financial constraints can be better explained using 'adjustment cost' concept. Specifically, the results show that financial constraints exist and that in order to measure financial constraint effects more succinctly, fixed asset investment smoothing effects with working capital should be considered.

  • PDF

A Comparative Study about Industrial Structure Feature between TL Carriers and LTL Carriers (구역화물운송업과 노선화물운송업의 산업구조 특성 비교)

  • 민승기
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.1
    • /
    • pp.101-114
    • /
    • 2001
  • Transportation enterprises should maintain constant and qualitative operation. Thus, in short period, transportation enterprises don't change supply in accordance with demand. In the result, transportation enterprises don't reduce operation in spite of management deficit at will. In freight transportation type, less-than-truckload(LTL) has more relation with above transportation feature than truckload(TL) does. Because freight transportation supply of TL is more flexible than that of LTL in correspondence of freight transportation demand. Relating to above mention, it appears that shortage of road and freight terminal of LTL is larger than that of TL. Especially in road and freight terminal comparison, shortage of freight terminal is larger than that of road. Shortage of road is the largest in 1990, and improved after-ward. But shortage of freight terminal is serious lately. So freight terminal needs more expansion than road, and shows better investment condition than road. Freight terminal expansion brings road expansion in LTL, on the contrary, freight terminal expansion substitutes freight terminal for road in TL. In transportation revenue, freight terminal's contribution to LTL is larger than that to TL. However, when we adjust quasi-fixed factor - road and freight terminal - to optimal level in the long run, in TL, diseconomies of scale becomes large, but in LTL, economies of scale becomes large. Consequently, it is necessary for TL to make counterplans to activate management of small size enterprises and owner drivers. And LTL should make use of economies of scale by solving the problem, such as nonprofit route, excess of rental freight handling of office, insufficiency of freight terminal, shortage of driver, and unpreparedness of freight insurance.

  • PDF

A Study on the Online Newspaper Archive : Focusing on Domestic and International Case Studies (온라인 신문 아카이브 연구 국내외 구축 사례를 중심으로)

  • Song, Zoo Hyung
    • The Korean Journal of Archival Studies
    • /
    • no.48
    • /
    • pp.93-139
    • /
    • 2016
  • Aside from serving as a body that monitors and criticizes the government through reviews and comments on public issues, newspapers can also form and spread public opinion. Metadata contains certain picture records and, in the case of local newspapers, the former is an important means of obtaining locality. Furthermore, advertising in newspapers and the way of editing in newspapers can be viewed as a representation of the times. For the value of archiving in newspapers when a documentation strategy is established, the newspaper is considered as a top priority that should be collected. A newspaper archive that will handle preservation and management carries huge significance in many ways. Journalists use them to write articles while scholars can use a newspaper archive for academic purposes. Also, the NIE is a type of a practical usage of such an archive. In the digital age, the newspaper archive has an important position because it is located in the core of MAM, which integrates and manages the media asset. With this, there are prospects that an online archive will perform a new role in the production of newspapers and the management of publishing companies. Korea Integrated News Database System (KINDS), an integrated article database, began its service in 1991, whereas Naver operates an online newspaper archive called "News Library." Initially, KINDS received an enthusiastic response, but nowadays, the utilization ratio continues to decrease because of the omission of some major newspapers, such as Chosun Ilbo and JoongAng Ilbo, and the numerous user interface problems it poses. Despite these, however, the system still presents several advantages. For example, it is easy to access freely because there is a set budget for the public, and accessibility to local papers is simple. A national library consistently carries out the digitalization of time-honored newspapers. In addition, individual newspaper companies have also started the service, but it is not enough for such to be labeled an archive. In the United States (US), "Chronicling America"-led by the Library of Congress with funding from the National Endowment for the Humanities-is in the process of digitalizing historic newspapers. The universities of each state and historical association provide funds to their public library for the digitalization of local papers. In the United Kingdom, the British Library is constructing an online newspaper archive called "The British Newspaper Archive," but unlike the one in the US, this service charges a usage fee. The Joint Information Systems Committee has also invested in "The British Newspaper Archive," and its construction is still ongoing. ProQuest Archiver and Gale NewsVault are the representative platforms because of their efficiency and how they have established the standardization of newspapers. Now, it is time to change the way we understand things, and a drastic investment is required to improve the domestic and international online newspaper archive.

A Study on the Meaning of Zelkova serrata as a Medium of Place Memory - Focused on the Natives of the Village and the Migrant of Keangnam Apartment in Dogok-dong - (장소기억의 매개로서 느티나무의 의미 고찰 - 역말 원주민과 도곡동 경남아파트 이주민을 중심으로 -)

  • Hamm, Yeon-Su;Sung, Jong-Sang
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.39 no.3
    • /
    • pp.42-55
    • /
    • 2021
  • This study investigated the memories of the natives and the migrants who had been living with the 760-year-old Zelkova serrata located in the Keangnam Apartment Complex in Dogok 1-dong. Place memory is a newly illuminated concept since the 1980s, and is also used as a new research methodology for studying and recording multi-layered memories left in a place based on feelings and traces of vivid memories. The urban development of Gangnam, which began in the 1970s, quickly changed rural to apartment complexes. The natives of Yeokmal were scattered throughout the country, and new migrants moved in. In the process, zelkova serrata was managed in different ways from time to time, and residents also establish relationship in different ways. Natives used to take a rest in the tree or swing at Dan-o, and recognized it as a place to receive the god during the village ritual. In other words, they shared the entire process of life and death and were given various roles depending on the lives of the residents. It is also a direct experience that was experienced in detail and a place where collective memories of residents are melted. On the other hand, with the construction of Keangnam Apartment, the management of zelkova tree has become stricter, making it impossible for migrants to access. Migrants have come to enjoy zelkova serrata visually, and the annual Yeokmal Traditional Festival makes common memories in the city. In addition, many people personified trees and received mental comfort. In addition, the nature of the old big tree was highlighted in the background of the city, and the symbol of "uniqueness and speciality" was newly formed, which led to the formation of pride and attachment. Through the memories of the two subjects' zelkova tree, we were able to examine the memories of the tree value, and management of protected tree in the city.