• Title/Summary/Keyword: Information Technology Audit

Search Result 110, Processing Time 0.234 seconds

The Method of Construction and Operation for Information System Audit Framework (정보시스템 감리프레임워크 구축 및 운영 방안)

  • Sim, Seung-Bae;Choi, Heon-Jun
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.383-389
    • /
    • 2003
  • 정보시스템의 효과적인 개발 및 운영을 지원하기 위한 활동에는 품질 보증, 감리 등이 있다. 이중에서 감리는 정보시스템의 전체 개발 수명주기에 걸쳐서 시스템의 품질을 개선시키기 위한 핵심활동이라고 할 수 있다. 현재 공공 정보시스템 감리는 기존의 정보시스템감리기준(정보통신부고시제1999-104호)를 활용하여 수행하고 있지만, 감리영역이나 점검사항이 현재 IT 환경과 맞지 않고 실제 감리에 적용하기 어렵다. 또한, 정보시스템 개발수명주기에 걸쳐서 감리를 수행해야함에도 불구하고, 현실은 그렇지 않으며 수명주기별 감리기준도 명확하지가 않다. 본 연구에서는 ISACA(Information Systems Audit and Control Association)의 COBIT(Control Objectives for Information and related Technology)와 IT 관련 국제 표준들을 벤치마킹하여 정보시스템 감리프레임워크를 제시하였고, 이의 운영 및 활용 방안을 제안하였다.

  • PDF

Project Failure Main Factors Analysis using Text Mining in Audit Evaluation (감리결과에 텍스트마이닝 기법을 적용한 프로젝트 실패 주요요인 분석)

  • Jang, Kyoungae;Jang, Seong Yong;Kim, Woo-Je
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.468-474
    • /
    • 2015
  • Corporations should make efforts to recognize the importance of projects, identify their failure factors, prevent risks in advance, and raise the success rates, because the corporations need to make quick responses to rapid external changes. There are some previous studies on success and failure factors of projects, however, most of them have limitations in terms of objectivity and quantitative analysis based on data gathering through surveys, statistical sampling and analysis. This study analyzes the failure factors of projects based on data mining to find problems with projects in an audit report, which is an objective project evaluation report. To do this, we identified the texts in the paragraph of suggestions about improvement. We made use of the superior classification algorithms in this study, which were NaiveBayes, SMO and J48. They were evaluated in terms of data of Recall and Precision after performing 10-fold-cross validation. In the identified texts, the failure factors of projects were analyzed so that they could be utilized in project implementation.

A Case Study on IT Audit Issue for e-Business Pilot Project in Public Fields (공공분야 전자상거래 시범사업의 정보기술.감리 관점의 사례분석 연구)

  • Lee, Jae-Du
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.329-338
    • /
    • 2007
  • As the roles and interests or audit are growing with ITA law in operation from 2006, the interests about the way which makes project qualifies to improve is increasing through it. In this point of view, this study is trying to find the issue that can promote the efficiency and effectiveness of IT projects decreasing some trials and errors relevant to IT, when government or some public agency field promote e-Business. For this purpose, this study analyze IT application result about e-business project in some public agency field. And the case study will be checked out and evaluated by the quality-contents analysis study method on the point of view of the IT audit. The study result is expected to provide a more practical policy implications than traditional researches based on specific-element technology or business process model by making use of major review areas and improvement methods. In thus, it is expected that it will be helpful not only references of IT quality improvement but also policy promotions when the public promotes IT projects related with e-Business.

An Empirical Study on Success Model of the Introduction of Responsible Supervision of Information Systems (정보시스템 책임감리 도입의 성공모델에 관한 실증연구)

  • Kim, Young-Ho;Kim, Jong-Bae
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.39-50
    • /
    • 2012
  • With the obligation of information system supervision and an increase in supervision demands, the quality improvement in information system supervision has been of significance, and the supervision system has been enhanced in the way of preventing information systems from being poorly established. In the meantime, recently the supervision industry has received administrative punishment due to violation of supervision guidelines and false reports. As a result, the introduction of the responsible supervision of information systems to strengthen the rights and duties of supervisors and supervision corporations has been discussed by supervision corporations. Therefore, this work was intended to propose success factors to introduce responsible supervision in the information system supervision sector, and thereby contribute to the introduction of responsible supervision system that plays a successful role in preventing poor supervision and establishing information system business. The success factors of the responsible supervision of information systems, proposed in this work, were categorized into legal system, standardization of supervision work, those concerned with supervision. And, detailed success factors of each category were proposed, and on the basis of that, the success model to introduce responsible supervision successfully was proposed.

Development of On-site Heat Loss Audit and Energy Consulting System for Greenhouse

  • Kwon, Jin Kyung;Kang, Geum Choon;Lee, Seong Hyun;Sung, Je Hoon;Yun, Nam Kyu;Moon, Jong Pil;Lee, Su Jang
    • Journal of Biosystems Engineering
    • /
    • v.38 no.4
    • /
    • pp.287-294
    • /
    • 2013
  • Purpose: Greenhouses for a protected horticulture covered with a plastic or glass are easy to have weakness in a heat loss by deterioration, damage, poor construction, and so on. To grasp the vulnerable points of heat loss of the greenhouses is important for heating energy saving. In this study, an on-site heat loss audit and energy consulting system were developed for an efficient energy usage of a greenhouse. Method: Developed system was mounted with infrared thermal and visual cameras to grasp the heat loss from the greenhouse quickly and exactly, and a trial calculation program of heating load of greenhouse to provide farmers with the information of heating energy usage. Results: Developed system could print out the reports about the locations and causes of the heat losses and improvement methods made up by an operator. The mounted trial calculation program could print out the information of the period heating load and fuel cost according to the conditions of greenhouse and cultivation. The program also mounted the databases of the information on the 13 horticultural energy saving technologies developed by the Korea Rural Development Administration and simple economic analysis sub-program to predict the payback period of the technologies. Conclusion: The developed system was expected to be used as the basic equipment for an instructors of district Agricultural Technology and Extension Centers to conduct the energy consulting service for the farmers within the jurisdiction.

A Study on Implementation of IMSAS and Response Plan of the Republic of Korea (IMO 회원국감사제도의 시행과 대한민국의 대응 방안에 대한 고찰)

  • Chae, Chong-Ju
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.717-725
    • /
    • 2018
  • IMO developed VIMSAS for effective application of IMO instruments related to maritime safety and environmental protection and was implemented from 2006 to 2016. Based on this, the purpose and procedures of VIMSAS applied to IMO member states by trial, and IMSAS was enforced from January 1st 2016. IMSAS was implemented to ensure that IMO Member States, such as flag states, coastal states and port states that ratified the IMO Convention, are properly performing their given responsibilities and to ensure the effective implementation of the IMO instruments through the improvement of identified non-conformities. In this study, the auditing contents and procedures were verified based on IMO documents in order to prepare for the IMSAS audit of Republic of Korea scheduled for 2020. For this purpose, this study proposed an update of a directory, development of monitoring system for information reporting required by IMO instruments, designation of relevant experts, preparation of an English version of related national laws, training of IMSAS auditors and establishment of an IMSAS audit response team for audit of IMSAS in 2020 by referring to the results of the VIMSAS for Republic of Korea, major findings of the VIMSAS of other IMO member states, and Consolidated Audit Summary Report (CASR), which was submitted at the 5th IMO III sub-committee.

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

The Measurement Model for the Evaluation of Information Systems Service : The Case of Chinese SI Company (정보시스템 서비스 평가를 위한 측정모형의 개발 및 실증적 검증 : 중국 SI 기업 사례)

  • Lee, Sang-Jae;Lim, Gyoo-Gun
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.141-162
    • /
    • 2011
  • The controls of Information Systems (IS) have been an more critical issue controls as the sophistication and integration of IS is more proceeded. ITGI (The Information Technology Governance Institute) of ISACA (Information Systems Audit and Control Association) has suggested COBIT (Control Objectives for Information and related Technology) and this has been widely recognized the evaluation model of IS controls. In COBIT, IS was evaluated in terms of process, information quality, and IT resources. This study used COBIT in order to suggest and empirically test an evaluation model of IS service. The data was collated from one major Chinese SI (Systems Integration) company in four domains of processes : planning and organization, acquisition and implementation, delivery and support, and monitoring. Seven factors are extracted using an exploratory factor analysis as follows : Overall IT planning process, technological assessment process in IT planning of IT, cost-benefit assessment process in IT planning, implementation process, support process, monitoring process, post-implementation evaluation process. The results of confirmatory analysis of three alternative measurement models indicated that the measurement model with one inherent or conceptual variable has greater model fitness than the other models. This study suggests the logical and general way to test and apply COBIT in evaluating IS services.