• Title/Summary/Keyword: Information Technology Audit

Search Result 110, Processing Time 0.027 seconds

A Characteristic Analysis for Quality Competitiveness Excellent Company (품질경쟁력 우수기업의 특성분석)

  • Park, Dong Joon;Yun, Yeboon;Kang, In Seon;Yoo, Eun Jae;Kim, Ho Gyun;Yoon, Min
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.3
    • /
    • pp.95-108
    • /
    • 2019
  • Quality management has become an pervasive philosophy in most sectors of business. Specific movements such as statistical quality control, quality circle, total quality management, and quality management system have become embedded in business organizations. Only the companies with competitive edge can survive in the competition in global market. KSA(Korean Standards Association) established in 1962 has launched all kinds of quality education, quality standard certification service for business, and KNQA(Korean National Quality Award) system. This article considers quality competitiveness excellent company award among KNQA. We performed a statistical analysis of audit data for quality competitiveness excellent company for three years, from 2015 to 2017. By using ANOVA and two sample t-tests, the average scores of 13 evaluation fields were significantly different depending on company size and type. We proposed ways to improve the current hall of fame system. We discovered that the average scores of 13 evaluation fields in the audit data according to years and hall of fame status were not significantly different. We also showed linear relationships among 13 evaluation fields by correlation analysis and obtained an estimated linear regression equation : Business Performance, which is a comprehensive index, as a dependent variable was significantly related to Customer Focus and Product Liability as regressor variables among 13 evaluation fields by regression analysis.

Business Information Visuals and User Learning : A Case of Companies Listed on the Stock Exchange of Thailand

  • Tanlamai, Uthai;Tangsiri, Kittisak
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.11-33
    • /
    • 2010
  • The majority of graphs and visuals made publicly available by Thai listed companies tend to be disjointed and minimal. Only a little over fifty percent of the total 478 companies included graphic representations of their business operations and performance in the form of two or three dimensional spreadsheet based graphs in their annual reports, investor relations documents, websites and so on. For novice users, these visual representations are unlikely to give the big picture of what is the company's financial position and performance. Neither will they tell where the company stands in its own operating environment. The existing graphics and visuals, in very rare cases, can provide a sense of the company's future outlook. For boundary users such as audit committees whose duty is to promote good governance through transparency and disclosure, preliminary interview results show that there is some doubt as to whether the inclusion of big-picture visuals can really be of use to minority shareholders. These boundary users expect to see more insightful visuals beyond those produced by traditional spreadsheets which will enable them to learn to cope with the on-going turbulence in today's business environment more quickly. However, the debate is still going on as to where to draw the line between internal or external reporting visuals.

  • PDF

The Impact of Business Intelligence on the Relationship Between Big Data Analytics and Financial Performance: An Empirical Study in Egypt

  • Mostafa Zaki, HUSSEIN;Samhi Abdelaty, DIFALLA;Hussein Abdelaal, SALEM
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.10 no.2
    • /
    • pp.15-27
    • /
    • 2023
  • The purpose of this research is to investigate the impact of Business Intelligence (BI) on the relation between Big Data Analytics (BDA) and Financial Performance (FP), at the beginning we reviewed the academic accounting and finance literature to develop the theoretical framework of business intelligence, big data and financial performance in terms of definition, motivations and theories, then we conduct an empirical analysis based on questionnaire-base survey data collected. The researchers identified the study population in the joint-stock companies listed on the Egyptian Stock Exchange and operating in the sectors and activities related to modern technologies in information systems, big data analytics, and business intelligence, in addition to the auditing offices that review the financial reports of these companies, and The sector closest to the research objective is the communications, media, and information technology sector, where the survey list was distributed among the sample companies with (15) lists for each company, and (15) lists for each audit office, so that the total sample becomes (120) individuals (with a response rate 83.3%), The results show, First, Big data analytics significantly affect organizations' financial performance, second, Business intelligence mediates (partial) the relationship between big data analytics and financial performance.

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN

  • Emre Karakoc;Celal Ceken
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3003-3029
    • /
    • 2023
  • The rapid evolution of the IoT has paved the way for new opportunities in smart city domains, including e-health, smart homes, and precision agriculture. However, this proliferation of services demands effective SLAs between customers and service providers, especially for critical services. Difficulties arise in maintaining the integrity of such agreements, especially in vulnerable wireless environments. This study proposes a novel SLA management model that uses an SDN-Enabled WSN consisting of wireless nodes to interact with smart contracts in a straightforward manner. The proposed model ensures the persistence of network metrics and SLA provisions through smart contracts, eliminating the need for intermediaries to audit payment and compensation procedures. The reliability and verifiability of the data prevents doubts from the contracting parties. To meet the high-performance requirements of the blockchain in the proposed model, low-cost algorithms have been developed for implementing blockchain technology in wireless sensor networks with low-energy and low-capacity nodes. Furthermore, a cryptographic signature control code is generated by wireless nodes using the in-memory private key and the dynamic random key from the smart contract at runtime to prevent tampering with data transmitted over the network. This control code enables the verification of end-to-end data signatures. The efficient generation of dynamic keys at runtime is ensured by the flexible and high-performance infrastructure of the SDN architecture.

A Study on the Improvement of Efficiency for Quality Assurance Based on Quality-Bill of Material (Q-BOM(Quality-BOM) 기반의 품질보증 효율화 방안 연구)

  • Lee, Chang Hee;Yang, Kyung Woo;Park, Doo Il;Kim, S.
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.3
    • /
    • pp.457-463
    • /
    • 2013
  • Purpose: For effective quality assurance activities, BOM-based quality assurance method is presented. This study introduces various BOM conversions such as Q-BOM, T-BOM, and S-BOM based on M-BOM structure. Methods: Product quality control via Q-BOM manages inspection/audit information, overall supply-chain of product, part requirements, and inventory status. T-BOM manages part traceability, and S-BOM enables statistical control over key process and parts at various hierarchy levels. Results: Quality plan template was developed based on the study results of BOM system including Q-BOM, T-BOM, and S-BOM. Conclusion: Through BOM(Q-BOM, T-BOM, and S-BOM) study and development of quality plan template, more systematic and comprehensive quality management plan is achieved.

The Measurement of Road Alignment Using GPS-IMU System (GPS-IMU 통합 시스템을 이용한 도로기하구조 측정에 관한 연구)

  • Park, Jae-Hong;Yun, Duk-Geun;Sung, Jung-Gon;Lee, Jun-Seok
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.5
    • /
    • pp.61-69
    • /
    • 2012
  • It is important for highway maintenance and safety assessment to get the accurate highway geometric information. However, it is difficult to acquire good highway geometric information due to missing blueprints or deteriorated highway sections. This research, to get highway geometric information rapidly, has developed a highway geometric analysis algorithm that uses data from vehicles with GPS-IMU integrated system. In conclusion, the result shows that 3.38% of error-ratio for the horizontal alignment and 0.083 absolute value difference for vertical grade comparing with highway drawings. Therefore, the result suggest that the developed method can be applied to the road safety inspection or road safety audit.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

Power Quality Monitoring with Electronic Watt-hour meter and Wireless communication module (전자식 전력량계와 무선모듈을 이용한 전력품질 표시 및 모니터링)

  • Jung, Deug-Il;Son, Young-Dae
    • Proceedings of the KIEE Conference
    • /
    • 2007.10c
    • /
    • pp.172-174
    • /
    • 2007
  • An electronic watt-hour meter with high-precision measurement technology can provide many valuable metering data of a real-time system measurements, such as per-phase voltage, ampere, active power, reactive power, apparent power, power factor, and system frequency. Also many of accumulated metering data such as active energy, reactive energy, apparent energy, and load profile can be gettable from an electronic watt-hour meter[1]. This paper presents an approach of the small-sized AMR (Automatic Meter Reading) that provides customers with a very valuable electrical service. This AMR service transmits lots of a valuable metering data by using ZigBee communication module, so that users resided in their premises can use the information to audit a power quality and improve their electrical conditions by using the PQ monitoring device equipped with ZigBee receiver. This PQ monitoring device shows metering data on LCD and transmits to the PC through an internal network. Also, the device can keep the valuable meter data into a built-in non-volatile memory. The final goal of this paper is to better understand the power quality of electrical systems and offer the power qualify information for the convenience of all power consumers.

  • PDF

Implementation of Surveillance System using Motion Tracking Method based on Mobile (모바일 기반의 동작 추적 기법을 이용한 감시 시스템의 구현)

  • Kim, Hyeng-Gyun;Kim, Yong-Ho;Guen, Bae-Yong
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.164-169
    • /
    • 2008
  • This paper is using motion tracking by image segmentation to monitor intruders and to confirm based on mobile the relevant information. First, detect frame in animation that film fixed area, and make use of image subtraction between two frame that adjoin, segment fixed backing and target who move. Segmental foreground object to the edge detecting the location specified by the edge of the median estimate extracted by analyzing the motion of the intruders to monitor. When a motion is detected, the detected image is transmitted by using the W AP pull basis image transmission method on the mobile client data terminal.

  • PDF