• Title/Summary/Keyword: Enterprise Information System

Search Result 1,167, Processing Time 0.032 seconds

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

Public Shared Service Centers for Collaborative Government: A Case Study of the United States and the United Kingdom (협업정부 구현을 위한 행정공유서비스센터 도입방안 연구 - 정부 공유서비스센터 선진국 사례연구를 기반으로 -)

  • Hong, Kil Pyo;Chung, Choong Sik;Kim, Pan Suk
    • Informatization Policy
    • /
    • v.21 no.3
    • /
    • pp.33-55
    • /
    • 2014
  • Public Shared Service Centers (PSSC) consolidate functions such as human resources, information technology, financial management or accounting into one office to serve an organization. A prominent example from the United States is the Federal Information Technology Shared Services Strategy. It supports mission, administrative, and infrastructure-related IT functions through providing organizations in the Executive Branch of the Federal Government (Federal Agencies) with policy guidance on the full range and lifecycle of intra- and inter-agency information technology (IT) shared services. This study looks at the Federal Information Technology Shared Services Strategy in order to draw lessons for fostering collaborative government through the use of PSSC. It finds the following factors are critical for success when implementing IT shared services: (1) agency leadership must be solidly behind their IT shared service plan, or the needed changes will not happen at the business unit, program, or system levels; (2) there must be a move away from internally-centered, program-specific thinking, and a move toward a paradigm of consuming and providing IT shared services with multiple groups whenever possible; and (3) successfully managing "loss of control" issues is central, and optimizing business processes is essential to move from stove-piped workflows to processes that work across the agency enterprise and beyond. Therefore, the study suggests that a Korean model of PSSC implementation be introduced, and that good IT Governance is a crucial component of PSSC strategies.

An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability (핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구)

  • Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

Development of a Web-based User Experience Certification System based on User-centered System Design Approach (사용자 중심의 웹 기반 제품 사용경험 인증·평가 시스템 개발)

  • Na, Ju Yeoun;Kim, Jihee;Jung, Sungwook;Lee, Dong Hyun;Lee, Cheol;Bahn, Sangwoo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.29-48
    • /
    • 2019
  • Recently, product design innovation to improve user experience has been perceived as a core element of enterprise competitiveness due to the fierce market competition and decrease of the technological gap between companies, but there is insufficient services to support the product experience evaluation of small and medium-sized companies (SMCs). The aim of this study is to develop a web-based product user experience evaluation and certification system supporting product design practices for SMCs. For system interface design, we conducted systematic functional requirement elicitation methods such as user survey, workflow analysis, user task definition, and function definition. Then main functions, information structure, navigation method, and detailed graphic user interfaces were developed with consideration of user interactions and requirements. In particular, it provides the databases for evaluation efficiency to support the evaluation process above a certain level of performance and efficiency, and knowledge databases to utilize in the evaluation and product design improvement. With help of the developed service platform, It is expected that the service platform would enhance SMCs' product development capability with regard to the user experience evaluation by connecting the consulting firms with SMCs.

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.

TRIZ Analysis to Bullwhip Effect and a Survey on Studies (채찍효과에 대한 트리즈 분석과 연구현황 고찰)

  • Song, Chang-Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.3
    • /
    • pp.109-117
    • /
    • 2016
  • Recently, corporate environment is faced with uncertainty that did not suffer in the past. In addition, as the supply chain was expanded and lengthened, the flow of information and material was complicated. Increase in complexity which amplifies the variability of the individual steps in supply chains further adds to the uncertainty. The bullwhip effect that refers the phenomenon where order variability increases as the orders move upstream in the supply chain became serious. The bullwhip effect is more and more important especially for the enterprise in the supply chain. So, there are many studies now since it was observed about 100 years ago. The aim of this paper is to analyze how to solve the bullwhip effect by using TRIZ (Teoriya Resheniya Izobretatelskikh Zadach). TRIZ is one of the most famous tools for creative solving that applied in many fields ranging from management as well as engineering. Among problems, the dilemma needs creative solutions that require handling the contradictions inherent in that. Among various kinds of problem solving techniques, TRIZ provides the concept of physical contradiction as a common problem solving principle. This study provides a simple process of solving problem explains a case of solving problem in the management field and shows the availability of theory in the inventory control. In accordance with the proposed solving process, the paper analyzes the bullwhip effect by applying the TRIZ tools and then identifies the solution directions. Next, the current studies are classified by the above analysis and important managerial concepts are proposed. Lastly, directions for future research on this area are suggested.

P2P Business Process Modeling Based on Service Oriented Architecture (SOA기반 P2P 비즈니스 프로세스 모델링)

  • Lee, Myung-Hee;Yoo, Cheol-Jung;Chang, Ok-Bae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.18-25
    • /
    • 2008
  • The traditional a roaches to software development, such as XP, UP, CBD and other CASE tools, are useful for constructing various software components. However, they are not designed to face the challenges of open environments that focus on service. The Service-Oriented Architecture(SOA) is a component architecture that interconnects an application's different functional units, called services. SOA provides a good way to integrate the business process through well-defined interfaces and contracts between business services. In this paper, we propose a method of business process modeling based on SOA with a P2P approach. Also, A P2P business process modeling system is presented. This, results in admitting the reality of enterprise that changes on the basis of services, and suggests more efficient and visual direction for the process integration between enterprises.

Business Process Monitoring under Extended-GMA Environment with Complex Event Handling (확장된 GMA 환경 하에서 복합 이벤트 처리를 통한 비즈니스 프로세스의 모니터링)

  • Kim, Min-Soo;Ock, Young-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2256-2262
    • /
    • 2010
  • The requirements for automated handing of business process and its monitoring usually have a proprietary form for each enterprise. Unlike the conventional database transaction, business process takes long time for its completion and incorporates very complex handling logics along with business situations. Since those handling logics are frequently changing in accordance with the business policies or environment, enterprises want to integrally capture the whole business semantics while monitoring those process instances. In this paper, we adopted GMA(Grid Monitoring Architecture) for the integrated monitoring of business processes. The GMA(Grid Monitoring Architecture) is a very scalable architecture to effectively monitor and manage monitoring information under the heterogeneous environment. By introducing complex event handling features into GMA to support various processing logics, we could implement a system that enables automated execution and high-level monitoring of business processes.

Assessment Guidelines for Decision Making of Implementation Strategy in Web Services Development Process (웹서비스 개발 프로세스에서 구현전략 결정을 위한 평가 지침)

  • Kim Yu-Kyung;Yun Hong-Ran;Park Jae-Nyun
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.5
    • /
    • pp.460-469
    • /
    • 2006
  • To integrate heterogeneous distributed systems, there exist various researches and developments for the purpose of its adoption into enterprise environment. However, when web service technologies are applied, it is difficult to adopt directly existing software system development methodologies, because of the peculiar architecture of web services, such as service provider, service requester, and service repository. M4WSD(Method for Wes Services Development) is a web service development process model and involves procedures and guidelines to develop web services based on a Use Case model that is elicited from a business domain in requirement analysis. In this paper, we focus on how to determine key realization decisions for each service. The assessment guidelines help you to structure the problem of determining implementation strategy.