• Title/Summary/Keyword: IT information

Search Result 89,790, Processing Time 0.08 seconds

Study about the Impact of Information Security Systems on Corporate Performance: Based on IT Relatedness Theory (정보보안체계 수립이 Multibusiness 기업 성과에 미치는 영향에 관한 연구: IT Relatedness 이론 관점에서)

  • Koo, Ja Myon;Park, Joo Seok;Park, Jae Hong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.129-149
    • /
    • 2013
  • According to the development of new Information Technologies, firms consistently invest a significant amount of money in IT activities, such as establishing internal and external information systems. However, several anti-Information activities-such as hacking, leakage of information and system destruction-are also rapidly increasing, thus many firms are exposed to direct and indirect threats. Therefore, firms try to establish information security systems and manage these systems more effectively via an enterprise perspective. However, stakeholders or some managers have negative opinions about information security systems. Therefore, in this research, we study the relationship between multibusiness firms' performance and information security systems. Information security indicates physical and logical correspondence of information system department against threats and disaster. Studies on information security systems suggested frameworks such as IT Governance Cube and COBIT Framework to identify information security systems. Thus, this study define that information security systems is a controlled system on enterprise IT process and resource on IT Governance perspective rather than independent domain of IT. Thus, Information Security Systems should be understood as a subordinate concept of IT and business processes. In addition, this study incorporates information capability to information security system literature to show the positive relationship between Information Security Systems and Corporate Performance. The concept of information capability suggested that an interaction of human, information, technical and an effect on corporate performance using three types of capability (IT Practice, Information Management Practice, Information Behaviors and Values). Information capability is about firms' capability to manage IT infrastructure and information as well as individual employees who use IT infrastructure and information. Thus, this study uses information capability as a mediating variable for the relationship between information security systems and firms' performance. To investigate the relationship between Information Security Systems and multibusiness firms' performance, this study extends the IT relatedness concept into Information Security Systems. IT relatedness provides understanding of how corporations cope with conflicts between headquarters and business units to create a synergy effect and achieve high performance using IT resources. Based on the previous literature, this study develops the IT Security Relatedness model. IT Security Relatedness is our main independent variable, while Information Capability and Information Security Performance are mediating variables. To control for the common method bias, we collect each multibusiness firm's financial performance and use it as our dependent variable. We find that Information Security Systems influence Information Capability and Information Security Performance positively, and these two variables consequently influence Corporate Performance positively. In addition, this result indirectly shows that corporations under a multibusiness environment can obtain synergy effects using the integrated Information Security Systems. This positive impact of Information Security Systems on multibusiness firms' performance has an important implication to various stakeholders. Therefore, multibusiness firms need to establish Information Security Systems to achieve better financial performance.

A Study on the Drug Prevention Education of VR Content Model (마약 예방 교육을 위한 가상현실(VR) 콘텐츠 모델 설계)

  • Cho Jae-cheon;Jeon Seong-hwan;Moon Tae-woong;Lee Jae-ho;Jang Sangmin;Kim Junbae;Lee Sang-min;Kim Seungwon;Kang Sangyoon;Yoo Jeong-hyun;Sun-Geo Hong;Seok-Hun Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.401-402
    • /
    • 2023
  • 2023년 기준 대한민국은 전체 마약 사범 가운데 30대 이하의 마약 사범이 전체 마약 사범의 59.7%를 차지하고 있고, 인터넷에 익숙한 청소년이 '다크 웹'이나 SNS를 통한 밀매는 일상이 되고 있는 상황이다. 본 논문에서는 VR로 마약의 부작용을 간접체험할 수 있도록 상대적으로 VR에 친숙한 젊은 층 연령에 맞춰 실제 마약 범죄 사례를 재현하고 이를 통해 가상 현실 내 여러 가지 콘텐츠로 다각도 지식 함향을 할 수 있는 VR 교육 콘텐츠를 제안하고자 한다.

  • PDF

Impact of Corporate Characteristics on Personal Information Breach Accident (기업의 특성이 개인정보 유출 사고에 미치는 영향)

  • Kim, Taek-Young;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.13-30
    • /
    • 2020
  • Not only does it cause damage to individuals and businesses due to the occurrence of large-scale personal information leakage accidents, but it also causes many problems socially. Companies are embodying efforts to deal with the threat of personal information leakage. However, it is difficult to obtain detailed information related to personal information leakage accidents, so there are limitations to research activities related to leakage accidents. This study collects information on personal information leakage incidents reported through the media for 15 years from 2005 to 2019, and analyzes how the personal information leakage incidents occurring to companies are related to the characteristics of the company. Through the research results, it is possible to grasp the general characteristics of personal information leakage accidents, and it may be helpful in decision making for prevention and response to personal information leakage accidents.

IS/IT Knowledge/Skill sets required by IS/IT Practitioners : findings from Korea

  • Kyung, Won-Hyun;Koh, Seok-Ha
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.343-351
    • /
    • 2005
  • It will not be impossible to develop an Information Systems and Information Technologies (IS/IT) program and a curriculum that represents the true needs of the IS/IT industry until IS/IT educator, reduce the gap perception and IS/IT practitioner's perception of IS/IT knowledge and technical skills that the industry might need. This paper represents and analysis of perceptions about IS/IT knowledge and skills that IS/IT practitioners might consider important. This study is based in Korean. The findings give us a very important lesson for IS/IT academicians that their understanding about the required knowledge and skills for the IS/IT career is not in line with that of IS/IT industry. Classifies the critical knowledge/skill set according to content or domain of knowledge by means of a survey. This is conducted in accordance with what IS/IT practitioners and educators can easily relate. The survey uses this approach and includes four broad categories of critical information Systems and Information technologies (IS/IT) knowledge/skills: IS/IT technology knowledge/skills, organizational and societal knowledge/skills, interpersonal knowledge/skills, and personal trait knowledge/skills.

  • PDF

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

The Effect of Consumer Characteristics on Exploratory Information Search and Information Use Behavior (소비자의 특성이 온라인 정보 탐색과 정보이용행위에 미치는 영향)

  • Kim, Ah-Reum;Kang, Hyunjeong
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.19-37
    • /
    • 2016
  • Advance of the Internet environment is applied not only to information search but also to the area of consumption behavior. Current research analyzes online use behavior and online information search of consumers in terms of users' perception. With the result of the research, it is noticed that promotion focus brings broader variation of information use behavior, and utilitarian value has a beneficial impact on the online exploratory information search. In addition, it is revealed that the more exploratory the information search is, the wider the range of online shopping information search is. Finally, people who have utilitarian shopping value showed more exploratory behavior in online search, especially for the search of informational products, than those who have hedonic shopping value. Present research is believed to improve practical influence of consumers' personality on online use behavior when customers purchase search products online. As a result, it would contribute to consumer research and marketing held online.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

Accounting Education in the Era of Information and Technology : Suggestions for Adopting IT Related Curriculum (기술정보화(IT) 시대의 회계 교육 : IT교과와의 융합교육의 제안)

  • Yoon, Sora
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.91-109
    • /
    • 2021
  • Recently, social and economic environment has been rapidly changed. In particular, the development of IT technology accelerated the introduction of databases, communication networks, information processing and analyzing systems, making the use of such information and communication technology an essential factor for corporate management innovation. This change also affected the accounting areas. The purpose of this study is to document changes in accounting areas due to the adoption of IT technologies in the era of technology and information, to define the required accounting professions in this era, and to present the efficient educational methodologies for training such accounting experts. An accounting expert suitable for the era of technology and information means an accounting profession not only with basic accounting knowledge, competence, independency, reliability, communication skills, and flexible interpersonal skills, but also with IT skills, data utilization and analysis skills, the understanding big data and artificial intelligence, and blockchain-based accounting information systems. In order to educate future accounting experts, the accounting curriculum should be reorganized to strengthen the IT capabilities, and it should provide a wide variety of learning opportunities. It is also important to provide a practical level of education through industry and academic cooperation. Distance learning, web-based learning, discussion-type classes, TBL, PBL, and flipped-learnings will be suitable for accounting education methodologies to foster future accounting experts. This study is meaningful because it can motivate to consider accounting educational system and curriculum to enhance IT capabilities.

A Case on the Evaluation of the Information System Project to Enhance the Performance of DIMS(Defense Material Information System) (국방물자정보시스템 성능개선 사업평가에 대한 사례)

  • Cho, Sung-Rim;Lim, Gyoo-Gun;Lee, Dae-Chul
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.109-123
    • /
    • 2012
  • There are many evaluation models to measure the informatization level of an organization and information system project in the ministry of National Defense of Korea. A information system has to keep up with the environment change as well as the advanced recent information technology (IT). Therefore, the evaluation of an information system project to enhance the performance of the information system should be different from the existing evaluation methods. This study suggests an evaluation case of information system projects to enhance the performance of an information system. In order to achieve the objective of this study, the following steps are taken. First, it reviews the background and the scope of the project to enhance the performance of the Defense Material Information System (DMIS). And it sets up the evaluation logic and develops performance indexes. Then it applies these newly developed performance indexes to the information system project and measures the performance. From this study, we found that both the diffusion and the experience accumulation by its continuous use are significant factors in such evaluations.

Development of Making Green Elementary/Secondary School Model through the Educational Information (교육정보화를 통한 초.중등 녹색학교(GS) 만들기 모델 개발)

  • Park, Sun-Ju;Lee, Seung-Jin;Kim, You-Ho;Kang, A-Young;Oh, Joung-Eun
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.3
    • /
    • pp.355-364
    • /
    • 2010
  • Elementary/secondary school must make the scheme for the Low Carbon Green Growth embodiment because of the environmental problems and the Low Carbon Green Growth Policy for responding to global environmental crisis. This paper proposes a plan to make green elementary/secondary school model through the educational information. It divides into 'Greening of IT Information Resources' and 'Greening of Education Environment' through the educational information'. It is expected to embody Green School if these projects are realized to the elementary/secondary school. 'Greening of IT Information Resources' suggests the guideline necessary to the introduction of IT products, the method to abandon considering recycling IT products and environmental information infrastructure model. 'Greening of Education Environment' proposes the IT green practice method for teachers and students to keep and shows the practice of various educational information service to seek a conversion to low carbon education environment. It is expected to embody Green School if these projects are realized to the elementary/secondary school.

  • PDF