• Title/Summary/Keyword: Information systems of the public sector

Search Result 168, Processing Time 0.028 seconds

A Study on the Need of Unified Cyber Crisis Management System:Around Comparison about Policies and Systems of USA and Korea (통합적 사이버 위기관리 체계의 필요성에 관한 연구 : 미국과 한국의 제도 및 정책 비교를 중심으로)

  • Kim, Min-Sik;Park, Sang-Don;Kwon, Hun-Yeong;Kim, Il-Hwan;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.29-37
    • /
    • 2009
  • According to Homeland Security Act of 2002, DHS in USA is comprehensively responsible for execution of protection methods on the public and private sectors against cyber attack for USA cyber crisis management. There are different laws and organizations according to the sector that is the public, the private, CII(Critical Information Infrastructure, or Non-CII in Korea. In this paper, we show the unified cyber crisis management of USA makes korea realize the importance to integration and systematization for the national cyber crisis management system.

  • PDF

A Study on the Awareness of Applying Blockchain to the Fisheries (수산분야 블록체인기술 도입에 관한 인식도 연구)

  • Go, Dong-Hun;Kim, Jong-Cheon
    • The Journal of Fisheries Business Administration
    • /
    • v.52 no.1
    • /
    • pp.65-82
    • /
    • 2021
  • This study utilizes the IPA (Importance-Performance Analysis) method to assess the importance, possibility, and urgency of using blockchain technology for fisheries sectors and the related policies. Based on a field survey targeting experts and stakeholders in the fisheries and blockchain technology sectors, the following major results and corresponding implications are drawn. First of all, the respondents of our survey have an outlook that the introduction and utilization of blockchain will be required in four major parts. These parts include i) the seafood' information system managed by the government or public institutions, ii) traceability and certification process for domestic and foreign seafoods, iii) meeting the need of seafood safety from consumers, and iv) taking prompt actions to seafood safety related accidents. Next, the seafood information system managed by the government or public institutions has been limited in maintaining information consistency and continuity once the fisheries ministries and departments are integrated, closed or partially transferred. Thus, it is assessed that the technology will be able to improve consistency and continuity of the seafood information in case of applying blockchain to the seafood information management system. This result that blockchain is necessary for the seafood information system have a significant implication in Korea's seafood management which has been independently controlled until now. Lastly, the application of blockchain to seafood traceability and certification systems has the most well-known cases through international and domestic pilot projects, and the results of our survey reflect this reality. Our results contribute to showing an additonal characteristics of blockchain in the fisheries sector, resulting in the possiblity that blockchain can be used for taking swift steps in the event of seafood safety accidents and meeting the need of seafood consumers for safety.

Analysis of Climate Change Adaptation Researches Related to Health in South Korea (한국의 건강 분야 기후변화적응 연구동향 분석)

  • Ha, Jongsik
    • Journal of Climate Change Research
    • /
    • v.5 no.2
    • /
    • pp.139-151
    • /
    • 2014
  • It is increasingly supported by scientific evidence that greenhouse gas caused by human activities is changing the global climate. In particular, the changing climate has affected human health, directly or indirectly, and its adverse impacts are estimated to increase in the future. In response, many countries have established and implemented a variety of mitigation and adaptation measures. However, it is significant to note that climate change will continue over the next few centuries and its impacts on human health should be tackled urgently. The purpose of this paper is to examine domestic policies and research in health sector in adaptation to climate change. It further aims to recommend future research directions for enhanced response to climate change in public health sector, by reviewing a series of adaptation policies in the selected countries and taking into account the general features of health adaptation policies. In this regard, this study first evaluates the current adaptation policies in public health sector by examining the National Climate Change Adaptation Master Plan(2011~2015) and Comprehensive Plan for Environment and Health(2011~2020) and reviewing research to date of the government and relevant institutions. For the literature review, two information service systems are used: namely, the National Science and Technology Information Service(NTIS) and the Policy Research Information Service & Management(PRISM). Secondly, a series of foreign adaptation policies are selected based on the global research priorities set by WHO (2009) and reviewed in order to draw implications for domestic research. Finally, the barriers or constraints in establishing and implementing health adaptation policies are analyzed qualitatively, considering the general characteristics of adaptation in the health sector to climate change, which include uncertainty, finance, technology, institutions, and public awareness. This study provides four major recommendations: to mainstream health sector in the field of adaptation policy and research; to integrate cross-sectoral adaptation measures with an aim to the improvement of health and well-being of the society; to enhance the adaptation measures based on evidence and cost-effectiveness analysis; and to facilitate systemization in health adaptation through setting the key players and the agenda.

A Study on the Key Factors for Activating Enterprise Architecture in the Public Sectors: A Perspective of IT Governance (공공부문 Enterprise Architecture 활성화에 영향을 미치는 핵심요인에 관한 연구: IT Governance 관점에서)

  • Kim, Choong Nyoung;Oh, Seung Woon
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.423-433
    • /
    • 2013
  • The purpose of this research is to propose a practical guideline for activating EA which has been operated in the public institutions. For this purpose, how EA is being operated in the public sector, was analyzed from the viewpoint of IT Governance and on the basis of the result, key activities for EA managers could be developed. The key activities were also compared between the two different groups in terms of EA Maturity Level and the difference in the key activities between the two were examined. As a result, it was found that the use of EA has effect on building and improving IT management systems. It is suggested that the Relational Mechanism should be better understood and recognized as necessary activities for activating EA. In addition, the higher the level of EA maturity is, the more likely such various effects as the enhancement of IT management system, user satisfaction, IT utilization, and the improvement of business can be produced. This result could be interpreted that such desired outcomes of EA could be realized only when EA is actively utilized.

Optimal MIFARE Classic Attack Flow on Actual Environment (실제 환경에 최적화된 MIFARE Classic 공격 절차)

  • Ahn, Hyunjin;Lee, Yerim;Lee, Su-Jin;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2240-2250
    • /
    • 2016
  • MIFARE Classic is the most popular contactless smart card, which is primarily used in the management of access control and public transport payment systems. It has several security features such as the proprietary stream cipher Crypto 1, a challenge-response mutual authentication protocol, and a random number generator. Unfortunately, multiple studies have reported structural flaws in its security features. Furthermore, various attack methods that target genuine MIFARE Classic cards or readers have been proposed to crack the card. From a practical perspective, these attacks can be partitioned according to the attacker's ability. However, this measure is insufficient to determine the optimal attack flow due to the refined random number generator. Most card-only attack methods assume a predicted or fixed random number, whereas several commercial cards use unpredictable and unfixable random numbers. In this paper, we propose optimal MIFARE Classic attack procedures with regards to the type of random number generator, as well as an adversary's ability. In addition, we show actual attack results from our portable experimental setup, which is comprised of a commercially developed attack device, a smartphone, and our own application retrieving secret data and sector key.

ROBOTICS AND AUTOMATION IN CONSTRUCTION INDUSTRY

  • Younus Khan;G. Chandra Sekhar Reddy;V.S.S. Kumar
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.527-532
    • /
    • 2005
  • The construction industries are facing problems of productivity, quality of work, safety, and the completion of projects in time. In construction industry a worker is exposed to hazardous environment, and has to do more physical work, effecting his health and also productivity. The automation and robotics can offer solution to many problems of the industry. In the past the major barrier to construction automation is the lack of electronic components and systems. This is solved now with the development of information technology, and the current obstacle is the high cost of automated systems, shortage of public money for R&D, and problems of acceptance. The robots employed in construction have followed the same concept as those employed in manufacturing. However, construction industry requires a different kind of robot compared to manufacturing Industry. The robots are stationery and product moves along the assembly line in manufacturing sector, but construction robots have to move about the site because buildings are stationary and of large size. The construction robots must function in adverse weather conditions, including variation in humidity, and temperature and increase the overall construction productivity rate. The major objective of the paper is to review the existing applications of building robots and to assess their implementation in building industry. A case study is considered for the implementation of robots for the painting work of the University Building at Saifabad PG College of Science, Hyderabad, India.

  • PDF

A Study on IT Governance Critical Success Factors in Korean Government Integrated Data Center (정부통합전산센터의 IT 거버넌스 핵심성공요인 도출에 관한 연구)

  • Lee, Seok-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.45-53
    • /
    • 2013
  • The Korean Government Integrated Data Center (GIDC) was established as a comprehensive solution to integrate information systems spread across each government agency in 2005. In the process of building and operating the GIDC, various IT governance issues are potential. To implement the effective IT governance in an organization, it is important to confirm some critical success factors (CSFs) of each issue. However, there are few studies on this subject in the public sector. This study tried to draw several CSFs through literature review and expert panel opinions and provide some practical implications. The results of this research are expected to contribute to the establishment of good IT governance in the GIDC.

The Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy of Firms: Setting Up Innovativeness as the Moderator (클라우드 컴퓨팅 서비스의 도입특성이 기업의 인지된 기대성과에 미치는 영향: 기업의 혁신채택성향을 조절변수로)

  • Jae Su Lim;Jay In Oh
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.75-100
    • /
    • 2017
  • Today, firms are constantly transforming and innovating to survive under the rapidly changing business environment. The introduction of cloud computing services has become popular throughout society as a whole and is expected to result in many changes and developments not only in firms and but also in the public sector subject to innovation. The purpose of this study is to investigate the effect of the characteristics of cloud computing services on the perceived expected performance according to innovativeness based on innovation diffusion theory. The results of the analysis of the data collected from this research are as follows. The convenience and understanding of individuals' work as well as the benefits of cloud computing services to them depend on the innovative trend of cloud computing services. Further, the expectations for personal benefit and those for organizational benefit of cloud computing services are different from each other. Leading firms in the global market have been actively engaged in the utilization of cloud computing services in the public sector as well as in private firms. In consideration of the importance of cloud computing services, using cloud computing services as the target of innovation diffusion research is important. The results of the study are expected to contribute to developing future research models for the diffusion of new technologies, such as big data, digital convergence, and Internet of Things.

A Comparative Analysis of IRM-Related Laws with US (정보자원관리 관련 법체계 분석: 미국과의 비교 분석을 중심으로)

  • Kim, Sung-Kun;Ahn, Nam-Kyu;Lee, Jin-Sil
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.21-40
    • /
    • 2005
  • IT investment is continuously increasing. Its outcome, however, is not accomplished as easily as originally expected. There have a variety of efforts to overcome this dilemma. In public sector, information resource management (IRM) was suggested as one of the most effective approach for information & IT management. Accordingly, United States has been incorporating the IRM principles into information-related laws since 1980s. However, such efforts were insufficient in Korea. In this study we attempt to compare our information-related laws with United States laws with respect to major components of IRM. Based on this finding, we go one-step further to suggest ways to arrange a new legislation where the IRM would be a foundation for information & IT management.

A Case of Evaluation of the G2B System by Analysing Operational DB Data (DB운영 데이터 분석을 통한 G2B 시스템 평가 사례)

  • Lim, Gyoo-Gun;Lee, Dae-Chul
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.243-258
    • /
    • 2012
  • The G2B system is one of the important information systems in the e-government implementation. It is difficult to measure the cost reduction effect of the system introduction because there are many participants in the complex procurement processes. Previous approaches of the performance evaluation of such processes have been based on conducting some surveys and interviews with statistical methods. Therefore there have been some limitations in the verification of feasibility. Therefore this study tries to suggest a case of performance evaluation about the cost reduction in using of the G2B system by analyzing operational DB data from the G2B system. This study analyzed the procurement processes of G2B system according to 'goods' and 'facilities/services' and classified the procurement processes into 12 sub-processes. By developing an evaluation model for the cost reduction of e-procurement, we derived the whole cost reduction effect was 8,000 billon Won for the use of Korea KONEPS G2B system in 2008. Specially the cost reduction in the private sector was 6,600 billion Won. It was mainly due to the decrease of the offline visits to the related organizations to participate a bidding process. Moreover, the cost reduction of using shopping mall was 1,000 billion Won among the total 1,400 billion Won in the whole public sector. The main contribution of this paper is to show the more objective evaluation result of the use of e-procurement, which verifies the necessity of G2B system.