• Title/Summary/Keyword: E-Governance

Search Result 148, Processing Time 0.026 seconds

A Research on the Development of Information Security Governance Framework (정보보호 거버넌스 프레임워크 개발에 관한 연구)

  • Lee, Seong-Il;Hwang, Kyung-Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.2
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.

A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies (공공기관 정보보호 거버넌스 수준에 영향을 미치는 요인에 관한 연구)

  • Song, Jeong-Seok;Jeon, Min-Jun;Choi, Myeong-Gil
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.133-151
    • /
    • 2011
  • To solidate information security, Korea government introduces information security governance. The public institutions and agencies in korea have begun to recognize the importance of information security governance. For solidating information security governance, the government has tried to establish and solidate an information security policy and information security systems. This study suggests factors affecting the level of information security governance in the public agencies and institutions through the factor analysis and the linear regression analysis. The results of this study show that the CEO's support is able to elevate the level of information security governance. The level of information security governance has relation with the number of the staff in information departments, and the budget in the public agencies and the institutions. This study provides directions for the public agencies and the institution for elevating the levels of information security governance.

Analysis and New Agenda of e-Government program (전자정부의 의의와 추진실적 및 향후 과제)

  • HwangBo, Yeoul
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.141-158
    • /
    • 2003
  • This paper examines new phenomenon and transformation that arise from the expansion of knowledge-based economy, envisions the meaning of e-government through comparing traditional administration with new governance, formulates the e-government model, and presents a direction for next e-government for the conclusion. These new phenomenon include a transformation to product and service convergence model, cyber sovereignty dilemma, privacy and information security threats, and various others. Also, there is a gradual transformation from government-oriented administrative approach to a new governance model that strengthens the role of NGO. And, e-government must work together to realize this new governance ideology. New e-government must be transformed where government and citizens can implement and manage e-government together. Therefore, expanding applications of Public Key Infrastructure (PKI) technologies, promotion of e-Democracy, and improvement of user interface to improve usability must be emphasized.

A Study of IT Governance Model for Enterprise Information Management : Focused on Case Company (EIM(Enterprise Information Management)을 위한 IT 거버넌스 모델 연구 : 사례 기업을 중심으로)

  • Ahn, Jong-Chang;Kang, Youn-Chol;Lee, Ook
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.95-117
    • /
    • 2011
  • Today, IT governance has also become a subject of attention along with recent technologies such as ITSM (IT Service Management), PPM (Project Portfolio Management) and Compliance. At the national level, the market is fairly recent. and therefore, lacks detailed research in the field. Models specifically related to EIM has not yet been presented to this day, hence, firms that are considering EIM as a potential part of their information management system may fall into a state of disorder in the process of its implementation. To this end, this research attempts to construct an IT governance model for EIM based on existing models, surveys and interviews. In particular, E-discovery has been applied as means of protecting information assets and its use as evidence. In addition, by applying the research model to a particular global firm and then assessing its documentation management system, the overall feasibility of the research model has been tested.

A Study on the e-Governance Network in the Development Process of Public Mask Applications for COVID-19 (COVID-19 공적 마스크 앱 개발과정에서의 e-거버넌스 네트워크 연구)

  • Lee, Jung-Yong;Lee, Jung-Hyun;Kim, Yong-Hee
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.23-48
    • /
    • 2021
  • ICT technology development has led to a breakthrough change in government decision making by improving mutual communication between various stakeholders. The formation of ICT-based cooperation network between public organizations and civic tech developers to solve the problem of masks in the COVID-19 pandemic serves as a milestone. The purpose of this study is to examine the properties of e-Governance and analyze the dynamic network structure of the communication process for chat rooms created during the development of public mask apps. First, as a result of the analysis, the possibility of online-based e-Governance can be identified. In addition, the combination of expertise to solve social problems interacted organically within the network. Emotional communication for cooperation between key actors was marked as important for the successful operation of the network.

A Study on the Influence of the Components Related to Information Security Governance on the Perception and Behavior of Employees (정보보안 거버넌스의 구성요소가 종업원의 보안 인식과 행위에 미치는 영향에 관한 연구)

  • Kim, Young-Gon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.935-950
    • /
    • 2010
  • The purpose of this study is to try to find out the relationship between the perception and behavior of employees and the Information Security Governance (ISG) which consists of leadership and governance, security management and organization, security policies, security program management, user security management, and technology protection and operations. Some effective suggestions from the verification of research hypotheses and the analysis of the most appropriate model were drawn out.

Data Design Strategy for Data Governance Applied to Customer Relationship Management

  • Sangwon LEE;Joohyung KIM
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.3
    • /
    • pp.338-345
    • /
    • 2023
  • Nowadays, many companies are striving to turn customer value into business value. Customer Relationship Management is a management system that develops effective and efficient marketing strategies by classifying customers in detail based on their information, i.e. databases, and consists of various information technologies. To implement this management system, a customer integration database must be established, and customer characteristics (buying behavior, preferences, etc.) must be analyzed with the databases established and the behavior of each customer must be predicted. This study aims to systematically manage a large amount of customer data generated by companies that apply Customer Relationship Management, in order to develop data design and data governance strategies that should be considered to increase customer value and even company value. We mainly looked at the characteristics of customer relationship management and data governance, and then explored the link between the field of customer relationship management and data governance. In addition, we have developed a data strategy that companies need to perform data governance for customer relationship management.

A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents

  • Halder, Tanmoy;Karforma, Sunil;Mandal, Rupali
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.261-270
    • /
    • 2019
  • In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

A Study of the Trust and Governance Effect on Business-to- Business Electronic Commerce Systems Implementation Level (신뢰와 지배력이 기업간 전자거래시스템 구현정도에 미치는 영향에 관한 연구)

  • 윤중현
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.17-32
    • /
    • 2003
  • A organization confront new information systems and technologies , they often force to make very expensive decisions on the basis of little information about the product's benefits and potential acceptance within the organization. This paper identifies trust and governance factors influencing the implementation of business-to-business electronic commerce systems. The result support between information technology governance and governance in value chain and business-to-business electronic commerce systems implementation, but there is no evidence that trust enabled implementing business-to-business electronic commerce systems.

  • PDF

Building Corporate Information Governance to Prepare in Case of Litigation - Practical Implications of Sedona Conference Principles of Information Governance - (기업 소송에 대비한 정보거버넌스의 구축 방안 - 세도나 정보거버넌스 원칙을 중심으로 -)

  • Seol, Moon-Won
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.4
    • /
    • pp.325-354
    • /
    • 2015
  • Corporate information has great value, but also poses great risk. Information governance is an organization's coordinated, inter-disciplinary approach to satisfying information compliance requirements and managing information risks while optimizing information value. This study aims to suggest the directions of implementing information governance in business firms based on analyses of Sedona Conference Principles of Information Governance. After analysing and reformulating the principles into control standards, and they are investigated and interpreted in terms of practicing information governance.