• Title/Summary/Keyword: Information System Type in Public Sector

Search Result 19, Processing Time 0.028 seconds

A Policy Study on the Implementation of Domestic Digital Platform Government: Focusing on the Classification of Domestic and Foreign Cases of Government as a Platform (GaaP) (국내 디지털플랫폼정부 구현을 위한 정책연구: 국내·외 플랫폼 정부 사례의 유형화를 중심으로)

  • Seo, Hyungjun
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.113-137
    • /
    • 2023
  • This study aims to conduct the classification of Government as a Platform (GaaP) in a situation where the concept of GaaP can be diversely recognized. This is because inclusiveness and ambiguity in the concept of GaaP can hinder policy enforcement by working-level officials in the public sector. It drew the criteria for classification for GaaP based on literature and cases for GaaP. In the technical aspect, considering data as an overarching factor, the integrated system platform integrating the information system or websites of the public sector and the data platform as a single portal for open data to external stakeholders were sorted. In the governance aspect considering stakeholder as an overarching factor, the communication platform utilized for interaction between public and private sectors and the co-creation platform that encourages public-private partnership to create innovative outcomes were sorted. It suggested an actual implementation case and the policy implication according to each type of GaaP. Additionally, according to the classification of GaaP, it conducted contents analysis as to which type of GaaP the domestic Digital Platform Government belongs to based on its detailed assignment. Based on the classification of GaaP, it drew balanced implementation for various types of GaaP, plan for promoting the participation and collaboration of stakeholders, and necessity of restructuring and reinventing of the public sector as policy implications for the domestic digital platform government.

A Study on Developing the Model of Reasonable Cost Calculation for Privacy Impact Assessment of Personal Information Processing System in Public Sector (공공기관 개인정보 처리시스템의 개인정보 영향평가를 수행하기 위한 합리적인 대가 산정 모델 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.22 no.1
    • /
    • pp.47-72
    • /
    • 2015
  • According to the progress of national informatization throughout the world, infringement and threaten of privacy are happening in a variety of fields, so government is providing information security policy. In particular, South Korea has enhanced personal impact assessment based on the law of personal information protection law(2011). But it is not enough to effect the necessary cost calculation standards and changeable factors to effect PIA. That is, the budgets for PIA was calculated lower than the basic budget suggested by Ministry of Government Administration Home affairs(2011). Therefore, this study reviewed the cost calculation basis based on the literature review, cost basis of similar systems, and reports of PIA and obtained to the standard with Delphi analysis. As a result, the standards of PIA is consisted to the primary labors and is utilized to how the weights by division of target system, construction and operating costs of target system, type of target systems, etc. Thus, the results of this study tried to contribute to ensure the reliability of PIA as well as the transparency of the budget for privacy in public sector.

A Study of Digital Archiving Policies for National S&T Information Resources (과학기술 분야 디지털 아카이빙을 위한 정책연구)

  • Seol, Moon-Won
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.23-49
    • /
    • 2005
  • The purpose of this study is to suggest the directions for building national digital archiving strategies. This present paper begins with surveying S&T information resources especially in public sector, and analyse the priority criteria for appraising and selecting the resources for long-term preservation. Emphasis is placed on identifying the critical tasks for each type of resources including scientific data, technical reports, theses, journal, web, e-prints, etc. and some levels of organizations in the national digital archiving framework. Based on the analysis, it suggests some strategic agenda for developing national digital archiving system.

An Empirical Study on the Influence on Public Data Usage in Private Business Sectors (민간의 공공데이터 활용을 위한 이용의도에 미치는 영향에 관한 실증적 연구)

  • Cha, Young-Il;Choi, Sung-Kyou;Han, Kyeong-Seok
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.9-17
    • /
    • 2017
  • The opening of public data has been perceived as a critical factor in deciding a country's rise or fall. Since the global economic crisis, countries around the globe have expanded the supply of public data as a new growth engine to create significant economic effects. As a result, there has been a rising demand for a study on the influence of public data in the private sectors. This study attempted to achieve the following objectives. First, the effects of independent variables-system quality, information quality, information security, social influence, innovation and assistance by the public organization- on the intention to use the public data was examined. Second, the effects of the mediating variables - Perceived Ease of Use (PEU) and Perceived Usefulness (PU) - on the independent variables and intention to use (dependent variable) were investigated. Third, after selecting utilization type, frequency of public data usage and frequency of occupational & e-government service usage as moderating variables, their effects on the relationship between the independent variables and dependent variable (intention to use them in the private sector) were studied. It is expected that the study results would be useful in developing strategies aimed to utilize public data in the private sectors.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Schemes for Constructing the System of Environmentally Friendly Agri-policy Governance (친환경농업정책 분야의 거버넌스 체계 구축방안)

  • Kim Ho;Heo Seung-Wook
    • Korean Journal of Organic Agriculture
    • /
    • v.14 no.2
    • /
    • pp.159-177
    • /
    • 2006
  • Governance systems are basically an autonomous cooperation type among the government, civil society and market, also a new paradigm for efficient and democratic administration of policies. The governance mainly consists of the central operating body, institutions, operating principles and so on. The constituents are the nation(government), civil society(NGO) and market(firm). Institutional conditions are a legitimate base, financial stability and independency. And as a operating principle, governance systems have common goals and issues from a national and social point of view. This governance has been recently emerged due to financial risk of government, diffusion of new liberalism going with the globalization, localization-decentralization, and development of civil society and information-oriented society. We have to grope fur the framework of participatory agri- policy confronting globalization and localization as well as developing our agriculture and rural village. This agri-policy governance should be theoretically focused on policy network or self-organizing network or multi-lateral governance (MLG) based on NPM. Also, it is proper to have connection of nation-central type and civil society-central type. And it is necessary to have a MLG type with local governance corresponding to localization and decentralization. Governance should have the type whose participants have authority and responsibility as well. Basic directions of environmentally friendly agri-policy governance are as follows : first, its purposes are constructing the democratic and efficient framework of participatory environmentally friendly agri-policy based on consensus of all the related groups, embodying environmentally friendly agri-policy adjusted to local field, raising farmer's real interest, and improving their position. Second, its form should have a council or an agreement system, not an advisory or a consultation organ. Thus, public sector(eg. government) and voluntary sector(eg. farmers' organization) jointly execute agricultural policy and are responsible together. Environmentally friendly agri-policy governance is mainly made up of farmers' organization, cooperative and civil society(NGO). And secondary bodies are agribusinesses and academic groups. Government interacts with the main bodies on administrative execution. And environmentally friendly agri-policy governance has MLG type with a central unit, province and county units. Environmentally friendly agri-policy governance has several main functions such as agri-policy partnership, speaking for farmer's rights and interests, investigation and research on domestic and foreign agricultural streams, and etc. Especially, local unit will play roles in activation for regional agriculture, consulting on technique and management, education and training services, services entrusted by government, and so on.

  • PDF

Development of Proto-type Program for Automatic Change Detection and Cueing of Multi-temporal KOMPSAT-5 SAR Imagery (다중시기 KOMPSAT-5 SAR 위성영상의 자동변화탐지알림 프로토타입 프로그램 개발)

  • Chae, Sung-Ho;Oh, Kwan-Young;Lee, Sungu
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_4
    • /
    • pp.1955-1969
    • /
    • 2022
  • Most of the public and private users who use national satellite information such as the KOMPSAT series mainly use Electro-Optical and Infrared (EO/IR) satellite images, and the utilization of Synthetic Aperture Radar (SAR) images is relatively insufficient. As KOMPSAT-5 currently in operation, KOMPSAT-6 and micro SAR satellite constellation systems are scheduled to be launched in the future, the demand for utilization of SAR satellite information is increasing in various fields. Accordingly, it is necessary to possess core technology for SAR utilization that can support the utilization of SAR satellite information for users. Due to the all-weather properties of SAR system, change detection technology is a key application technology. However, until now, the development of technology that automatic change detection and cueing using SAR images is insufficient. Through this study, the requirements of automatic change detection and cueing function using multi-temporal KOMPSAT-5 SAR satellite images were derived and a prototype program was developed. This prototype program aims to secure independent SAR utilization technology and promote the utilization of domestic SAR satellite information by practitioners in public sector organizations in Korea.

A Framework for Creating Inter-Industry Service Models in the Convergence Era (융합 서비스 모델 개발 방법론 및 체계 연구)

  • Kwon, Hyeog-In;Ryu, Gui-Jin;Joo, Hi-Yeob;Kim, Man-Jin
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.81-101
    • /
    • 2011
  • In today's rapidly changing and increasingly competitive business environment, new product development in tune with market trends in a timely manner has been a matter of the utmost concern for all enterprises. Indeed, developing a sustainable new business has been a top priority for not only business enterprises, but also for the government policy makers accountable for the health of Its national economy as well as for decision makers in what type of organizations. Further, for a soft landing of new businesses, building a government-initiated industry base has been claimed to be necessary as a way to effectively boost corporate activities. However, the existing methodology in new service and new product development is not suitable for nurturing industry, because it is mainly focused on the research and development of corporate business activities instead of new product development. The approach for developing new business is based on 'innovation' and 'convergence.' Yet, the convergence among technologies, supplies, businesses and industries is believed to be more effective than innovation alone as a way to gain momentum. Therefore, it has become more important than ever to study a new methodology based on convergence in industrial quality new product development (NPD) and new service development (NDS). In this research, therefore, we reviewed any restrictions in the existing new product and new service development methodology and the existing business model development methodology. In doing so, we conducted industry standard collaboration analysis on a new service model development methodology in the private sector and the public sector. This approach is fundamentally different from the existing one in that ours focuses on new business development under private management. The suggested framework can be categorized into industry level and service level. First, in the industry level, we define new business opportunities In occurrence of convergence between businesses. For this, we analyze the existing industry at the industry level to identify the opportunities in a market and its business attractiveness, based on which the convergence industry is formulated. Also, through the analysis of environment and market opportunity at the industry level. we can trace how different industries are lined to one another so as to extend the result of the study to develop better insights into industry expansion and new industry emergence. After then, in the service level, we elicit the service for the defined new business, which is composed of private service and supporting service for nurturing industry. Private service includes 3steps: plan-design-do; supporting service for nurturing industry has 4 steps: selection-make environment- business preparation-do and see. The existing methodology focuses on mainly securing business competitiveness, building a business model for success, and offering new services based on the core competence of companies. This suggested methodology, on other hand, suggests the necessity of service development, when new business opportunities arise, in relation to the opportunity analysis of supporting service based on the clear understanding of new business supporting infrastructure optimization. Meanwhile, we have performed case studies on the printing and publishing field with the restrict procedure and development system to assure the feasibility and practical application. Even though the printing and publishing industry is considered a typical knowledge convergence industry, it is also known as a low-demand and low-value industry in Korea. For this reason, we apply the new methodology and suggest the direction and the possibility of how the printing and publishing industry can be transformed as a core dynamic force for new growth. Then, we suggest the base composition service for industry promotion(public) and business opportunities for private's profitability(private).

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF