• Title/Summary/Keyword: Enterprise Information System

Search Result 1,169, Processing Time 0.03 seconds

A Change Management Strategies for Each Phase of the Implementation of ERP System for Based on Domestic Corporation Cases

  • Kim, Yeong-Real;Kang, Tae-Gu
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.97-102
    • /
    • 2007
  • Currently, many organizations introduce ERP system as a key enabler of business strategic accomplishment and it can improve productivity and efficiency of organizations by integration and managing enterprise resources. Already many organizations have introduced ERP systems and the number of introduced ERP system is increasing steadily. Unfortunately, even though organizations have invested much money, previous studies showed the ERP systems had not always turned in good result. It is easy to find many studies that suggest that successful implementing strategies for ERP systems. This study reviewed the previous literature on strategic use of change management in enterprise. In order to establish a successful implementation of ERP, this paper suggests proper solutions to conduct change management according to implementation phase with activity and output, especially analyzing successful organizations in implementing ERP system through consistent change management.

  • PDF

Cooperative Transmission Scheme for OFDMA Based Enterprise Femtocell Networks (OFDMA 기반의 기업형 펨토셀 네트워크를 위한 협력 통신 기법)

  • Kim, Seung-Yeon;Lee, Sang-Joon;Ryu, Seung-Wan;Cho, Choong-Ho;Lee, Hyong-Yoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.338-347
    • /
    • 2012
  • In this paper, we propose the cooperative transmission scheme (CTS) for system throughput maximization in OFDMA based enterprise femtocell networks. In our scheme, the user equipment (UE) can receive the desired signal from serving femtocell BS (fBS) as well as an adjacent fBS. Thus, UE achieves an improved signal to interference plus and noise ratio (SINR) by the synchronized two signals. The performances of this strategy consider not only the call-level quality of service (QoS) but also the packet-level QoS. We first measure the call blocking probability and utilization for the downlink resources for various offered load in femtocell. Based on that, the outage probability and effective throughput of the system are simulated. Simulation results show that the proposed scheme can reduce the outage probability for enterprise femtocell compared with conventional systems.

A Study on the Selection of Enterprise Resource Planning System Considering IS Risk Elements under E-business (e-비즈니스 환경에서의 위험요인을 고려한 ERP 선정에 관한 연구)

  • Ju Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.319-329
    • /
    • 2005
  • Rapid business and technology changes drive many organizations to seek better solutions and many of them believe that Information Technology is an essential tool to cope with turbulent environment. Companies began to think ERP system as an effective alternative for IT-based process innovation and integrated information system. But each ERP system has a specific business model and technical structure, unlike in-house developed systems. Moreover implementation of ERP system accompanies transformation of business processes at company level including radical changes in information technology. Therefore, to implement ERP system successfully appropriate and careful selection of ERP system which is adequate for company's objectives and environment must be considered. In this research, four types of changes expected by ERP implementation were suggested. Each type of changes was determined by desired level of changes in business process and information technology.

  • PDF

A Study Of EIS Build Method by ISP Base for Large Scale Enterprise Associate Company (대기업 협력 업체를 위한 ISP 기반의 EIS 구축 방법에 관한 연구)

  • Kim, Soo-Kyum;Ha, Soo-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.159-166
    • /
    • 2010
  • It is noteworthy that EIS Consulting Method by ISP based on ERP Linkage Type for Large Scale Enterprise Associate Company. In this thesis, IT Strategy plan and methodology are suggested in order to solve the several problems including standardization on implementation of EIS Introduction and operation between large-small enterprise. Integration of business and information technical is made by Business management group's continuous IT concern and future information strategy. Also this paper proposes ISP Planning method (environment analysis, present analysis, IT analysis, target IT plan etc..), EIS Construction (based ERP Real data/time). In addition to, we suggest to use electron industry model and LCD/LED field in this system.

Smartphone NFC based Access Control System (스마트폰 NFC 기반의 출입관리 시스템)

  • Bae, Sang-Jung;Jeon, Soon-Yeong;Lee, Sang-Hwa;Lee, Chan-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.596-597
    • /
    • 2016
  • Recently a variety of companies as the growing importance of big data are in the process of research and development for large-scale data collection and management. In addition, a situation that collects all necessary data inside and outside the enterprise to improve the manufacturing environment and the service environment. In this paper, we collect to ingest the mouth-time work for companies within the temple. Also, in conjunction with the NFC tag of the smart phone and employee information stored in the database. Utilizing this determines whether or not the employee attendance and the authority to automatically access to the database or resource within the enterprise. The proposed system is considered to be able to increase the accessibility and efficiency of a database or a resource in the enterprise.

  • PDF

The Effect of User Characteristics on the User Involvement in EA Implementation : Focusing on Public Sectors in Korea (사용자 특성이 EA 활용에 대한 사용자 관여(User Involvement)에 미치는 영향에 관한 연구 : 국내 공공기관을 대상으로)

  • Cho, So-Yun;Lee, Young-Joo;Yang, Jung-In
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.93-105
    • /
    • 2010
  • Enterprise Architecture has become a key tool for transforming business process, data, IT and application resources. The "Efficient Adaptation and Management of Information System Act" was established to support the planning and development of the information system in order for the public sector to adopt Information Technology Architecture (EA) into its organization through the act. Until now, the study of EA has been mainly focused on concepts, methodologies and success factors for the implementation of EA. User involvement, which is one of the critical factors in adopting information systems, has been rarely studied in the field of EA research. The purpose of this study is to identify the effects of user characteristics on user involvement in EA implementation. After discussing intrinsic motivators and situational motivators as predictors of user involvement, a research model were developed and tested using survey data. The results showed that among intrinsic motivators, perceived competence had a strong positive effect on user involvement. Some implications were discussed for implementing and utilizing EA for public agencies.

The Service-Oriented Metaphor Deciphered

  • Draheim, Dirk
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.4
    • /
    • pp.253-275
    • /
    • 2010
  • In this article we review the metaphor of service-oriented architecture for enterprise computing. In typical definitions service-oriented architecture appears as a single message and a consistent roadmap for building flexible software system landscapes. But it is not. Different communities have elaborated different SOA (service-oriented architecture) concepts to address different problem areas, i.e., enterprise application integration, business-to-business, business process management, and software productizing. If software architects and software managers are aware of these strands of SOA when talking about SOA in their projects they can avoid misunderstandings and detours better. This article contributes a clarification of the different strands of SOA concepts and technologies and their mutual dependencies and identifies particular SOA concepts as instances of more general software engineering principles.

A HELPDESK system design for communication network service (데이터 통신서비스를 위한 EJB기반 통합 HELPDESK 설계에 관한 연구)

  • 조동권
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.661-666
    • /
    • 2002
  • We need the flexible method for communication network configuration and fault management business procedure. Therefore development of systematic integrating fault management system is essential to meet on these requests. We must design the integrating fault management system so that can run the repair processing for both data communication network management and new next generation data communication network of various type. In general it is effective that the system is consisted of decentralized module to be accessibele for business logic and datum to remote area. To Solve these problem, a method is to use object-oriented design technique. That is, it is to abstract reusability objects and make component module using the abstracted objects. In this paper, we propose a fault management system of communication network service using object-oriented design techniques which are UML(Unified Modeling Language) and EJB(Enterprise Java Bean).

The Study on Corporate Information Security Governance Model for CEO (최고경영자를 위한 기업 정보보호 거버넌스 모델에 대한 연구)

  • Kim, Do Hyeong
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.39-44
    • /
    • 2017
  • The existing enterprise information security activities were centered on the information security organization, and the top management considers information security and enterprise management to be separate. However, various kinds of security incidents are constantly occurring. In order to cope with such incidents, it is necessary to protect information in terms of business management, not just information security organization. In this study, we examine the existing corporate governance and IT governance, and present an information security governance model that can reflect the business goals of the enterprise and the goals of the management. The information security governance model proposed in this paper induces the participation of top management from the planning stage and establishes information security goals. We can strengthen information security activities by establishing an information security plan, establishing and operating an information security system, and reporting the results to top management through compliance audit, vulnerability analysis and risk management.

Design and Implementation of Electronic Approval System using Encryption (암호화를 이용한 전자결재 시스템의 설계 및 구현)

  • Jang, Young-Chul;Oh, Teh-Sok;Oh, Moo-Song
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.2060-2069
    • /
    • 1997
  • Information processing using computer in generalized in the office automation. In spite of to be integrate and concise form of document through computer network, signature of document with hand have processed as ever. The security on document flow out severely unjust by reason of increment inverse function of computer. Because of revelation secret of enterprise result from unjust outflow, lots of loss of self-enterprise is occured. In this paper, we used efficiently document using the method, electronic approval system with encryption, for the resolving above problems. Also we persue maintenance of security for the important document and process document signature rapidly. Finally, we design and implementation of electronic approval system that take one's share of function between server and client using to be transformed Vernam's encryption technique in stored document.

  • PDF