• Title/Summary/Keyword: Information systems of the public sector

Search Result 170, Processing Time 0.025 seconds

A Case of Evaluation of the G2B System by Analysing Operational DB Data (DB운영 데이터 분석을 통한 G2B 시스템 평가 사례)

  • Lim, Gyoo-Gun;Lee, Dae-Chul
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.243-258
    • /
    • 2012
  • The G2B system is one of the important information systems in the e-government implementation. It is difficult to measure the cost reduction effect of the system introduction because there are many participants in the complex procurement processes. Previous approaches of the performance evaluation of such processes have been based on conducting some surveys and interviews with statistical methods. Therefore there have been some limitations in the verification of feasibility. Therefore this study tries to suggest a case of performance evaluation about the cost reduction in using of the G2B system by analyzing operational DB data from the G2B system. This study analyzed the procurement processes of G2B system according to 'goods' and 'facilities/services' and classified the procurement processes into 12 sub-processes. By developing an evaluation model for the cost reduction of e-procurement, we derived the whole cost reduction effect was 8,000 billon Won for the use of Korea KONEPS G2B system in 2008. Specially the cost reduction in the private sector was 6,600 billion Won. It was mainly due to the decrease of the offline visits to the related organizations to participate a bidding process. Moreover, the cost reduction of using shopping mall was 1,000 billion Won among the total 1,400 billion Won in the whole public sector. The main contribution of this paper is to show the more objective evaluation result of the use of e-procurement, which verifies the necessity of G2B system.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

The Research of BSC Method for Public's Service Product (공공기관서비스 산업에 대한 BSC성과분석 방안 연구 및 적용)

  • Hwang, Doo-Hong;Shin, Min-Soo
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.75-81
    • /
    • 2007
  • The BSC methodology has recently increased its capability to apply the all of industries. However, this methodology would be inappropriate for the business innovation of public organizations. The major reason is that the profit is not the main issue for the public sector, where the financial perspectives are not clearly stated or formulated. This difference compared to profit organizations influences other perspectives such as study and growth, process. Therefore, a new approach is needed to solve these problems. The purpose of this study is to investigate a pertinent scheme for the public innovation, the method to integrate the process, and its expected effectiveness. Our research also covers the analysis configuration, approach to the process, and its related benefits

  • PDF

A Study on the Appling National ITS Standardization for Advanced Traffic Information System (통합교통정보체계 추진을 위한 표준안 활용방안 연구)

  • Cho Young-Sung;Lee Sang-Keon;Moon Young-Jun;Jung Hee-Woon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.15-24
    • /
    • 2003
  • While public institutions and privite coperations have constructed the data collecting infrastructure and commercialized it to service traffic information, inaccuracy with information, insufficiency with the public sector, overapping investment and the rest are arising from the differences of data treatment, offering method, communication protocal and the like. For these reasons, we need standardization it as a national enterprise. In this paper, we would like to present the unity management and joint method of traffic information based on the present position of system construction and national ITS standardization. At first, we presented the relation between data elements and message sets and then analyzed how message sets have been used to message sets to share traffic information so far in public institutions and private coperations like Korea freeway cooperation-ITS model city-Cheonan-Nonsan expressway, In-cheon international airport expressway-Korea freeway cooperation and Seoul metropolitan police agency-Seoul metropolitan government. As the results of analyzing message sets, it had disclosed that data transmission is impossible or a system is unchangeable because data form and each items to transmission were different from each other and its own address and link IDS were not determined yet. Also it showed these message sets did not abidy by The Draft of National ITS Standards. First of all, we proposed data basic form and elements which were form by items used in each center in common and the elements to manage traffic information suggested by Standards based on the results of analyses.

  • PDF

A Exploratory Study on Analyzing the Multi-Dimensional Effectiveness of Broadband Network of Korea (국내 초고속정보통신망의 파급효과분석에 관한 탐색적 연구)

  • Jeong, Yong-Gwan;Kim, Yoo-Jung
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.1-24
    • /
    • 2004
  • This paper develops a framework for analyzing the effectiveness of broadband network from the value chain view. The value chain of broadband network is composed of activities such as broadband network building, application/equipments development, information systems utilization. The effectiveness from the interaction between these activities are defined as the effectiveness of informatization(private and public sector) and the effectiveness of IT Industry(effects on production on inducement of broadband carriers, IT equipments and service market creation, online digital contents market creation). For testing its real-world applicability, a case study is performed on the broadband network of Korea and the effectiveness of the framework for analyzing the effectiveness of broadband network is demonstrated.

Systems Biology and Emerging Technologies Will Catalyze the Transition from Reactive Medicine to Predictive, Personalized, Preventive and Participatory (P4) Medicine

  • Galas, David J.;Hood, Leroy
    • Interdisciplinary Bio Central
    • /
    • v.1 no.2
    • /
    • pp.6.1-6.4
    • /
    • 2009
  • We stand at the brink of a fundamental change in how medicine will be practiced. Over the next 5-20 years medicine will move from being largely reactive to being predictive, personalized, preventive and participatory (P4). Technology and new scientific strategies have always been the drivers of revolutions and this is certainly the case for P4 medicine, where a systems approach to disease, new and emerging technologies and powerful computational tools will open new windows for the investigation of disease. Systems approaches are driving the emergence of fascinating new technologies that will permit billions of measurements on each individual patient. The challenge for health information technology will be how to reduce this enormous amount of data to simple hypotheses about health and disease. We predict that emerging technologies, together with the systems approaches to diagnosis, therapy and prevention will lead to a down turn in the escalating costs of healthcare. In time we will be able to export P4 medicine to the developing world and it will become the foundation of global medicine. The "democratization" of healthcare will come from P4 medicine. Its first real emergence will require the unprecedented integration of biology, medicine, technology and computation. as well as societal issues of major importance: ethical, regulatory, public policy, economic, and others. In order to effectively move the P4 scientific agenda forward new strategic partnerships are now being created with the large-scale integration of complementary skills, technologies, computational tools, patient records and samples and analysis of societal issues. It is evident that the business plans of every sector of the healthcare industry will need to be entirely transformed over the next 10 years.and the extent to which this will be done by existing companies as opposed to newly created companies is a fascinating question.

A Study on the Change Management During the Introduction of Information System: A Case of Supreme Court of Korea (정보시스템 도입에 따른 변화관리 사례 연구: 대법원 변화관리 프로젝트를 중심으로)

  • Hong, Young-Sik;Kim, Sang-Deok;Oh, Chang-Gyu
    • Information Systems Review
    • /
    • v.8 no.3
    • /
    • pp.1-20
    • /
    • 2006
  • In recent years change in the business environment has become a way of life. Especially, the revolution of enterprises that utilizes information system is mainly considered as a representative change effort. However, the studies on the IT change management are not sufficient not only in the perspective of practitioners but also those of the scholars. In this study we deduce characteristics, scope, strategies and methods of IT change management from literature studies. And we analyze the change management efforts during the introduction of new information system in Supreme Court of Korea and find some implications. One of the findings is that finding out the right stakeholders of the change and their needs is crucial to the success of the project.

Theoretical Model of Performance Evaluation for Informatization Programs: Focusing on the Public Sector (정보화지원사업의 성과평가를 위한 이론적 모형: 공공부문을 중심으로)

  • Kim, Sang-Hoon;Choi, Jeom-Ki
    • Journal of Information Technology Services
    • /
    • v.6 no.1
    • /
    • pp.101-126
    • /
    • 2007
  • This study aims to construct the integrative performance evaluation model of informatization programs. In order to achieve the purpose of research, first of all, the three major theoretical paradigms (technical/functional, economic/financial, and interpretive/alternative paradigms) are comparatively analyzed concerning their philosophical and methodological perspectives. Also, a number of important studies and research model in the area of IS (Information Systems) evaluation are critically reviewed. And then actual problems and limitations on the process of implementing IS performance evaluation are sought through investigating domestic and foreign practices. Based upon theoretical and practical review of informatization evaluation and logical reasoning, the components of ideal performance evaluation scheme for informatization program are derived, and the integrative performance evaluation model which can comprehensively represent the relationship among the components is conceptually proposed. For researchers, this study provides the theoretical basis for reasonably deriving the performance variables of informatization programs and empirically validating the performance of managing informatization programs. And in real world, the results of this study are very likely to contribute to presenting the practical guideline for desirably implementing performance evaluation of informatization programs.

Work Pressure and Safety Behaviors among Health Workers in Ghana: The Moderating Role of Management Commitment to Safety

  • Amponsah-Tawaih, Kwesi;Adu, Michael Appiah
    • Safety and Health at Work
    • /
    • v.7 no.4
    • /
    • pp.340-346
    • /
    • 2016
  • Background: safety and healthy working environment has received numerous research attention over the years. Majority of these researches seem to have been conducted in the construction industry, with little attention in the health sector. Nonetheless, there are couple of studies conducted in Africa that suggest pressure in hospitals. Therefore the aim of the study was to examine how pressure influence safety behavior in the hospitals. With reference to the relevance of safety behavior in primary health care delivery, there was the need for the study. Method: Data was obtained from 422 public hospital employees. Respondents were assured that all information would be kept confidential to increase the response rate and acquire more accurate information. Collection of questionnaires from participants took four weeks (20 working days), after which the data was analyzed. Results: The result of the study showed that work pressure correlated negatively with safety behavior. General safety climate significantly correlated positively with safety behavior and negatively with work pressure, although the effect size for the latter was smaller. Hierarchical regression analysis showed management commitment to safety to moderate the relationship between work pressure and safety behavior. Conclusion: When employees perceive safety communication, safety systems and training to be positive, they seem to comply with safety rules and procedures than voluntarily participate in safety activities.

The Effect of Information System Audit Quality on Quality Performance of Client Firms (정보시스템 감리의 서비스 품질이 의뢰기관의 품질 성과에 미치는 영향에 관한 연구)

  • Kim, Sojung;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.11-27
    • /
    • 2012
  • The purpose of this study was to suggest a guideline for systematic and practical critical success factors of the External IT audit. For this purpose, an integrated conceptual model is developed considers that the service quality, and the IS(Information Systems) success with a contingency viewpoint. The model is tested using 254 data of IS projects which procured the external IT auditing service in public sector of Korea. The results of this study are as follows. First, service quality attributes of responsiveness, reliability, and tangibility have positive influence on IS implementation process quality. Second, the external IT audit quality obviously contributes to IS implementation success considering both IS implementation process quality and IS system quality. However it has positive influence on the process quality directly and the system quality indirectly.