• Title/Summary/Keyword: Digital Information Management

Search Result 5,539, Processing Time 0.03 seconds

A Study on the Operational Performance by the Investment Level of Companies Information Security in the Digital Transformation(DX) Era (디지털 전환(DX) 시대에 기업의 정보보안 투자 수준에 따른 운영성과에 관한 연구)

  • Jung Byoungho;Joo Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.119-131
    • /
    • 2024
  • The purpose of this study is to examine the operational performances by the investment level of information security in companies. The theoretical background summarized the meaning of information security, management information security, and network security. The research process was carried out in four stages. As a result of the analysis, the level of information security was classified into four groups, and the difference in operational performance was confirmed. According to the categorical regression analysis of the three dependent variables, independent variables such as network threats, non-network threats, executive information security awareness, industry, organizational size, and information security education all affected information security regulations, in-house information security checks, and information security budget investments. The theoretical implications of this study have contributed to updating the latest information security theory. Practical implications are that rational investments should be made on the level of information security of companies.

Construction of Preservation Metadata Package for Digital Archiving (디지털 아카이빙을 위한 보존 메타데이터 패키지 구축)

  • Lee, Seungmin
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.3
    • /
    • pp.21-47
    • /
    • 2015
  • The construction of preservation metadata is a prerequisite for the preservation of digital information. In the current approaches to digital archiving, however, there is no metadata structure optimized to describe preserved digital objects. This research proposed metadata packages that can support the description of digital objects from the perspective of the core processes of digital archiving. The proposed metadata packages consist of 4 wrapper elements and 25 sub-elements. They can provide detailed descriptions required to preserve digital objects in accordance with the core processes of digital archiving. Therefore, the proposed metadata package can be applied to digital archiving as a better approach to the description of digital objects compared to the approaches to information package.

A Digital ID Wallet User-oriented Mechanism in a Mobile Environment (모바일 환경에서 사용자 중심의 전자ID지갑 운용 메커니즘)

  • Song, Dong-Ho;Lim, Sun-Hee;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.57-64
    • /
    • 2007
  • As a ubiquitous environment approaches and the use of the wireless Internet using the mobile terminals is on the increase. Therefore, the users have to undergo the inconvenience of repeatedly input the same information for the user registration and the ID certification. The information the users have to put in to register in on-line services range from the basic personal information to the more other private information such as financial information. Accordingly the user can be in control of users personal information and safely manage the information by conveniently selecting from the Digital ID Wallet the Ticket that holds various information including the basic, financial or payment certification-related information. Consequently, we propose a digital identity management mechanism to control one's personal information in a mobile environment.

A Study on Weighting for Digital Maturity Model & Indicators based on AHP Technique: Focusing on Digital Curation Maturity Model of Korea Institute of Science and Technology Information (AHP 기법 기반 디지털 큐레이션 성숙도 모델·지표 가중치 연구: 한국과학기술정보연구원 디지털 큐레이션 성숙도 모델을 중심으로)

  • Seonghun Kim;Jinho Park
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.2
    • /
    • pp.243-262
    • /
    • 2023
  • In the rapidly developing information technology environment, information management organizations need to effectively evaluate their digital maturity and clarify the direction of improvement to effectively respond to rapidly changing environments. This study derived weights for the digital curation maturity model developed by KISTI from the perspective of digital transformation to facilitate effective evaluation and direction setting of information management organizations. Relative importance was derived as a weight in the major and middle categories of the model through the AHP technique. Summarizing the results, when the major categories of the entire model are measured on the basis of 100 points, technology is 27 points, data is 24 points, strategy is 19 points, organization (manpower) is 16 points, and (social) influence is calculated as 14 points. In addition, weights for each subcategory were presented for each major classification based on a perfect score of 100 points. It is expected that a more objective and reasonable evaluation will be possible by applying the weights for each area derived from this study to the digital transformation maturity evaluation model.

Risk Management of Digital Information Resources Preservation in University Libraries (디지털 정보자원 보존의 위험관리 분석: 대학도서관 전자정보실 중심으로)

  • 서은경
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.5-29
    • /
    • 2003
  • University libraries have developed digital information resources for digital services and have tried to preserve valuable digital information. Because digital preservation raises challenges of a fundamentally different nature which we added to the problems to preserving traditional format materials, it is necessary that preserving digital resources must be discussed and researched actively. This study conducts risk management for exploring preserving technologies and assessing tools. It is found that most university libraries have used format conversion frequently and do not use the emulation technology. It is also found that medium refreshing has the lowest risk probability and isk impact, but information migration and emulation technology have the highest in the risk probability and in the risk impact individually and the absence of full-time professional staff causes high risk.

A Study on Factors Affecting Web Academic Information Service Quality (학술정보 웹 서비스 만족도 향상을 위한 영향 요인에 관한 연구)

  • Park, Cheon-Woong;Lee, Ki-Dong
    • Journal of Digital Convergence
    • /
    • v.7 no.4
    • /
    • pp.91-99
    • /
    • 2009
  • To determine factors affecting scholarly web database service quality, this research is to investigate factors of web academic information service quality, and analyze how these factors influencing on web academic information service quality satisfactions. As a results, three dimensions were identified namely, information retrieval, ease of use and interaction. The scholarly web database service management has more critical problems than information service in these days. It indicates that the qualitative aspect is becoming more important than quantitative in web academic information service management.

  • PDF

Sensor Information Collection Method and System for on-site Management based on Digital-twin (디지털트윈 기반 현장 관리를 위한 센서 정보 수집 기법 및 시스템)

  • Minjae Seo;Jun-woo Ha;Hyeon-kyu Lim;Jihye Jeon
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.9-16
    • /
    • 2023
  • Recently, there is an increasing demand to quickly identify changes in the field by applying Digital-twin for on-site management control and analyzing changes in real-time data transmitted. When technologies such as Digital-twin are applied, early problem response and quick response to situations are possible. However, in order to maximize the advantages of digital twin technology, a method of collecting and managing sensor data that collects field information at an appropriate period is required. need. In addition, it is necessary to consider how sensor information is transmitted to each management domain and how to identify and respond to abnormal situations so that it can be visualized for each management purpose. In this paper, we propose a method for collecting heterogeneous sensor information and related system configuration for on-site inspection management based on digital twin.

Research on the Design and Use of Digital Badges to Increase Educational Value (교육적 가치를 높이는 디지털배지 설계와 활용 연구)

  • Youn A Min;Ji-Eun Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.6
    • /
    • pp.71-86
    • /
    • 2023
  • The rapid change in industry and the technological gap give rise to social demand for upskilling and reskilling and spread of alternative education. Against this backdrop, digital certification and career management tools can be used to manage various types of learning activities comprehensively. Digital badges provide various kinds of history information related to individual learning, and the reliability and transparency of the issued information can be strengthened by applying blockchain technology. There have been various discussions about digital badges for a long time, but due to the lack of standards to support the issuance and distribution of digital badges, they have been partially used in some areas. However, interest in digital badges is increasing due to the development of related technologies, establishment of standards, paradigm changes in higher education, and government policies related to nurturing digital talent. This paper deals with the use of digital badges for efficient and transparent learning management and career management in an online learning environment. The researcher analyzes the technical characteristics and use cases of digital badges, and proposes a plan for use in online higher education based on them.

A Study on the Presence of the Information Management Division and its Effect on the Digital Divide among Different Regions of Korea

  • Park, Woo-seok;Rhee, Cheul
    • Agribusiness and Information Management
    • /
    • v.3 no.2
    • /
    • pp.9-16
    • /
    • 2011
  • With the confirmation of the Free Trade Agreement (FTA) and as cheap foreign agricultural products are beginning to be freely distributed in Korea, the government has taken a greater interest in securing the competitiveness of domestic agriculture. Accordingly, the Korean government has presented plans to advance the interests of 'small but strong farmers' and secure their competitiveness in line with the agricultural conditions in Korea. The government also announced that it will focus on leading these efforts in rural areas. The main thrust of this plan to support 'small but strong farmers' focuses onutilizing advanced peripheral technologies such as IT and BT; however, there are only a few Information Management Division centers currentlyoperating across the nation, and these are mainly in the IT-related divisions of the Agricultural Research and Extension Services and Agricultural Technology Centers. Therefore, in this study, we used the responses from a survey of farmers to identify regional differences in informatization levels and the digital divide among 'small but strong farmers' according to the presence or absence of an Information Management Division center. As a result, we found that the 'small but strong farmers' in regions with an active Information Management Division center received more IT services and had a higher level of informatization. Thus, to increase the use of IT-related peripheral technology by these 'small but strong farmers', it is important to maintain or increase the number of Information Management Division centers.

  • PDF

Protect Digital Contents and Instant Player using PKI (공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구)

  • Ryu, Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.837-842
    • /
    • 2006
  • According to the development of the internet technology, many people can access many kind of digital contents. This approach can infringe the copyright and right owner-ship. Currently many people research the DRM(Digital Rights Management) for protect digital content after digital content downloaded. This paper propose the system that client player witch encrypted using PKI have symmetric key and CCI (copy control information), decrypt digital content witch encrypted when digital content created.