• Title/Summary/Keyword: Information Technology Supervision

Search Result 84, Processing Time 0.023 seconds

Development of an Information System for managing the Service Performances in Public Construction Technique Fields (공공건설기술의 용역실적관리를 위한 정보시스템 개발)

  • Kim, Seong-Jin;Kim, Nam-Gon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5993-5999
    • /
    • 2013
  • This study presents the information management item and the business process improvement plan managed all construction technique services of Design, Construction Supervision and Construction Management which is ordered and constracted by the public institution in the field of construction and business steps. In addition, it develped the Management System of Construction Technique Service Performances based on improved processes for the Public Agencies and Construction Service Director to register, review and approve the Service Performance Information. As a result, it would be help transparently managed Technical Engineer's work duplication status of Constuction Company, and checked online without having to submit Company performance data by providing objective and reliable information.

Mechanism of China's Internet Regulation (중국의 인터넷 통제 메커니즘)

  • Kim, Jin Yong
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.61-84
    • /
    • 2013
  • This article examines how the Chinese government blocks the inflow of undesirable information, focusing on the technical aspect of the control mechanism. Unlike Cuba and North Korea, which regulate the whole Internet, China uses both state-of-the-art technological supervision and labor-intensive physical control due to economic reasons in order to prepare for actors who can threaten the Communist party. The Chinese government will not overlook the inflow of information which can be the link between demonstrations and democratization. This is because stronger protests utilizing information technology will trigger the Chinese government's flexible control based on large scale violation and technology. In this article, we first review the concept of universal internet control involved in internet regulation in nations, and then focus on China's internet censorship and its regulatory control from the '90s to the present. Finally, we analyze how the Chinese government actively controls the internet access by utilizing the relationship dynamics between the central and local governments, depending on protest issue. This thesis will assume that it is difficult for China to become democratized due to its information interception, and search how the government manages the internet.

  • PDF

A Study on the Derivation of SME-based Evaluation Items in ISMS-P Authentication Systems (정보보호 및 개인정보보호 관리체계(ISMS-P) 인증 제도에서 중소기업 기반 평가항목 도출에 관한 연구)

  • Park, Hyuk Gyu;Kang, Wan Seok;Shin, Kwang Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.578-579
    • /
    • 2021
  • According to a survey on the infringement of SMEs, the level of technology protection capability is improving every year, but technology leaks and damage continue to occur. This shows that there is a need for a security management and supervision system that can strengthen the security awareness of SME executives and employees and maintain the security level continuously. The Personal Information & Information Security Management System(ISMS-P) authentication systems is the latest related standard, which has the problem of applying the same certification criteria without considering the types of certification target organizations such as ISPs, IDC, hospitals and schools, and SMEs.. In this paper, 73 evaluation items that can be specialized and applied to SMEs were derived by referring to ISMS-P certification and Personal Information Protection Management System (PIMS) certification. The results of the study show that the number of evaluation items decreased by 28.4% compared to the existing ISMS-P certification.

  • PDF

Utilization of Forecasting Accounting Earnings Using Artificial Neural Networks and Case-based Reasoning: Case Study on Manufacturing and Banking Industry (인공신경망과 사례기반추론을 이용한 기업회계이익의 예측효용성 분석 : 제조업과 은행업을 중심으로)

  • Choe, Yongseok;Han, Ingoo;Shin, Taeksoo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.81-101
    • /
    • 2003
  • The financial statements purpose to provide useful information to decision-making process of business managers. The value-relevant information, however, embedded in the financial statement has been often overlooked in Korea. In fact, the financial statements in Korea have been utilized for nothing but account reports to Security Supervision Boards (SSB). The objective of this study is to develop earnings forecasting models through financial statement analysis using artificial intelligence (AI). AI methods are employed in forecasting earnings: artificial neural networks (ANN) for manufacturing industry and case~based reasoning (CBR) for banking industry. The experimental results using such AI methods are as follows. Using ANN for manufacturing industry records 63.2% of hit ratio for out-of-sample, which outperforms the logistic regression by around 4%. The experiment through CBR for banking industry shows 65.0% of hit ratio that beats the statistical method by 13.2% in holdout sample. Finally, the prediction results for manufacturing industry are validated through monitoring the shift in cumulative returns of portfolios based on the earning prediction. The portfolio with the firms whose earnings are predicted to increase is designated as best portfolio and the portfolio with the earnings-decreasing firms as worst portfolio. The difference between two portfolios is about 3% of cumulative abnormal return on average. Consequently, this result showed that the financial statements in Korea contain the value-relevant information that is not reflected in stock prices.

A Study on the Revision of Man-day Cost Calculation Method for Information and Communication Facilities Construction Supervision (정보통신설비공사 감리대가 품셈개정에 관한 연구)

  • Lee, Jin-Ho;Kang, Byeong-Gwon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The standardized procurement of supervisory cost for the construction of domestic Information and Communication Technology(ICT) facilities, which is announced by the Korea Engineering and Construction Association in May 2009, has been applied in the public institutions and private industries. However, the previous standardized procurement is not widely applied in recent years because the ICT and social economic environment have been rapidly changed and the previous equations to calculate the supervisory cost is not simplified. As results, the needs for a new standardized procurement has been increased and the Ministry of Industry, Commerce and Energy has published a notice with new standard procurement. In this paper, we provide the explanation of the background and the derivation process of the notice based on authors' experiences of project participation. As research method, we compare the previous mad-day cost of ICT construction and that of another area including electric facility construction, and then we explain a new procurement equation based on WBS(Work Breakdown Structure).

Building Underground Facility Management System of Power Transmission and Power Distribution using GIS (지리정보체계를 이용한 송배전 지하시설물관리시스템 구축)

  • Jang, Yong-Gu;Kang, In-Joon;Kim, Sang-Seok;Yang, Seung-Tae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.2
    • /
    • pp.69-77
    • /
    • 2004
  • Now, there are some problems to manage underground facilities in domestic. Specially, in the case of KEPCO(Korea Electric Power Corporation), it is so difficult to manage electronic line more stably and detailedly because the geographic information and attribute information being built is not easy to be updated in the field. KEPCO officials who are accompanying management and supervision in earthwork do not have sufficient knowledge and information about GIS but they grasp the information of geography and property which coincide with the field. Therefore they have to refer their business analysis contents sufficiently for more efficient lines management in the KEPCO, but it is problem that the existing information of electronic lines management system is not. In this study, we constructed power transmission and power distribution underground facility management system for the user to manage and maintain underground facilities more easily and safely using the information of geography and property about power transmission and power distribution underground facility which have been built by KEPCO.

  • PDF

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

Real-time monitoring of grab dredging operation using ECDIS (ECDIS에 의한 grab 준설작업의 실시간 모니터링에 관한 연구)

  • Jung, Ki-Won;Lee, Dae-Jae;Jeong, Bong-Kyu;Lee, Yoo-Won
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.43 no.2
    • /
    • pp.140-148
    • /
    • 2007
  • This paper describes on the real-time monitoring of dredging information for grab bucket dredger equipped with winch control sensors and differential global positioning system(DGPS) using electronic chart display and information system(ECDIS). The experiment was carried out at Gwangyang Hang and Gangwon-do Oho-ri on board M/V Kunwoong G-16. ECDIS system monitors consecutively the dredging's position, heading and shooting point of grab bucket in real-time through 3 DGPS attached to the top bridge of the dredger and crane frame. Dredging depth was measured by 2 up/down counter fitted with crane winch of the dredger. The depth and area of dredging in each shooting point of grab bucket are displayed in color band. The efficiency of its operation can be ensured by adjusting the tidal data in real-time and displaying the depth of dredging on the ECDIS monitor. The reliance for verification of dredging operation as well as supervision of dredging process was greatly enhanced by providing three-dimensional map with variation of dredging depth in real time. The results will contribute to establishing the system which can monitor and record the whole dredging operations in real-time as well as verify the result of dredging quantitatively.

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.