• Title/Summary/Keyword: Management Information

Search Result 41,945, Processing Time 0.052 seconds

Knowledge Management, Information Infrastructure and Expert on Information (지식경영과 정보인프라, 정보전문가의 관계)

  • 노정란
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.9 no.1
    • /
    • pp.207-220
    • /
    • 1998
  • The international community reached an implicit consensus that knowledge management will be the core of our civilization in the next millenium. This dissertation is to view the knowledge management from the point of information science rather than from the standpoint of the business management, which has been the trends of our academic circle so far. The underlying reason is simple, knowledge is the center of the knowledge management and other factors like humans, organization and culture are merely peripheral elements required to apply knowledge in a more appropriate and efficient manner. This paper looks at knowledge-sharing system as the heart of knowledge management emphasizing significance of the procedures such as validation and valuation and knowledge management processes. Adding to this, I dare to say the term 'Information technology Infrastructure' should be changed into'Information Infrastructure' since knowledge itself and how to express them play a more important role in knowledge management than the information technology does.

  • PDF

Design and Implementation of Enterprise Information Security Portal(EISP) System for Financial Companies (금융회사를 위한 기업 정보보호 포털(EISP) 시스템의 설계 및 구현)

  • Kim, Do-Hyeong
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.101-106
    • /
    • 2021
  • To protect financial information, financial companies establish strategies and plans for information security, operate information security management systems, establish and operate information security systems, check vulnerabilities, and secure information. This paper aims to present an information security portal system for financial companies that can gain visibility into various information security activities being undertaken by financial companies and can be integrated and managed. The information security portal system systemizes the activities of the information security department, providing an integrated environment for information security activities to participate from CEOs to executives and employees, not just from the information security department. Through this, it can also be used as information security governance that can be used by top executives to reflect information security in corporate management.

Food Hazard Awareness and Food Apprehension towards Food Safety Management System Evaluation: Focus on Moderating Effect of Food Safety Information Awareness (식품위해 인식과 식품불안감이 식품안전관리제도평가에 미치는 영향: 식품안전정보 인식의 조절효과를 중심으로)

  • Lee, Seung Sin
    • Human Ecology Research
    • /
    • v.54 no.1
    • /
    • pp.69-81
    • /
    • 2016
  • Consumer anxiety about food safety is increasing, and the ability to make an accurate assessment is inadequate due to the lack of food safety information. This research focuses on relations among main variables, such as food hazard awareness, food apprehension, food safety information awareness, and food safety management system evaluation. In addition, to the moderating effects of food safety information awareness between food hazards awareness, food apprehension, and food safety management system evaluation. First, food hazards awareness and apprehension was slightly higher than the average level, also there was a significant difference in food hazard apprehension according to food hazard awareness. However, the level of food safety information was not high, meaning consumers were not as well informed as expected. We divided food safety management system evaluation into awareness and practice, subsequently, the results of both were at a low level. Food safety information awareness' moderating effect was also confirmed. Consumer organizations and the government need to provide specific and correct information to Korean consumers, that also implement a wide range of consumer education related policies.

Feature Analyze and Research of National Convergence R&D: With Focus on the Text Mining (국가 융합 R&D 특성 분석에 관한 연구: 텍스트분석을 중심으로)

  • Yoo, KiCheol;Lee, TaeHee;Choi, SangHyun;Lee, JungHwan
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.1
    • /
    • pp.59-73
    • /
    • 2020
  • There is a growing interest in convergence. National R & D is also providing various policies and institutional support to promote convergence research. Convergence research, however, does not clearly specify its characteristics at the academic and government levels. This research proceeds with the process of collecting, refining, analyzing, modeling, verifying and visualizing national R & D data through the National Science and Technology Information Service (NTIS). The method is to derive the convergence research characteristics and to derive through text mining, focusing on the unstructured information of national R & D project data. The study confirmed that there was a difference in perception between the definition of converged research and the research site. In order to improve this, the research suggested that convergence among research subjects, collaboration among research topics reflecting various backgrounds and characteristics of researchers, and analysis of characteristics of convergence research using information were suggested in the process of establishing convergence policy.

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Using Behavior Analysis and Improvement of Bookmark as Web nformation Management Tool (웹 정보 수집 관리 도구로서의 북마크 이용행태 분석을 통한 개선방안 연구)

  • Min, Ji-Yeon;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.4
    • /
    • pp.59-80
    • /
    • 2009
  • As the amount of web information grows, a bookmark has become an important tool to reuse web information effectively which is relevant to users' information needs. Thus, this study aimed to investigate how bookmarks are used as a management tool of web information, and what functions users require concerned with it. For this purpose, semi-structured interviews and observations were carried out from 5 respondents, and a survey was conducted to investigate the relationship between bookmark using behaviors and requirements for function improvement. The users who use bookmark less frequently think bookmark feature essential for the purpose of reusing web information.

Information Security Management System Evaluation Criteria with availability for Korean Smart Grid (한국형 스마트 그리드의 가용성을 고려한 정보보호 관리체계 평가 기준 제안)

  • Heo, Ok;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.547-560
    • /
    • 2014
  • Smart Grid, which maximize the efficiency of energic utilization by applying Information and Communication Technology to Power Grid, requires high availability. Attacks, such as DDoS, which cause suspension of service and lead to social disruptions have recently been increasing so that systematic management over availability becomes more important. In this paper, we presents a new evaluation criteria of Korean Smart Grid by comparing availability assessment items of international standards specified in management system and then overcome the limitations of availability evaluation of existing information security management system.

KSCS(Korean Academy of Crop Science) Online Article Contribution Management System based on KISTI-ACOMS (KISTI-ACOMS를 기반으로 한 한국작물학회 온라인 논문투고관리 시스템)

  • Park Jae Won;Kang Mu Yeong
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2004.04a
    • /
    • pp.42-50
    • /
    • 2004
  • Societies are important sources of new information for users. However, most of these societies still rely on traditional, or rather ancient methods for gathering and servicing the information. Furthermore, most of the societies are trying to electrify processes such as managing members and paper submission as well as the process managing the information for service but are limited due to financial and technical reasons. Therefore, KISTI(Korea Institute of Science and Technology Information) has developed the ${\ulcorner}$KISTl-ACOMS (KISTI-Article Contribution Management System)${\lrcorner}$ as part of the national project for automating the process of processing academic information by societies, in order to convert journals published by academic societies in Korea into an electronic form and make them accessible on the Internet. This system has been developed in the year 2001 and has since been distributed to societies free of charge. The number of societies requesting the service has risen recently, which prompted us to take more recommendations of the societies that adopt this system into account in expanding and standardizing the area of service being provided by the system.

  • PDF

Security Management Model for Protecting Personal Information for the Customer Contact Center (컨택센터의 고객 개인정보 보호 모델)

  • Kwon, Young-Kwan;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.117-125
    • /
    • 2009
  • In this paper, we analyze the Contact Center's specific-security characteristics, including the threat model and weakness and study effective security measures focussing on protecting customer's personal information. Also, we establish the information security management system to reduce the possibility of information leakage from the internal employee in advance. As a result, we propose the "Security management model for protecting personal information for customer Contact Center" that complies with current ISO/IEC JTC 1 ISMS 27000 series standards.

The Design and Implementation of Continuity Health Care Record Management System based on Data Stream System (데이터스트림 처리 시스템에 기반한 연속적인 헬스케어 데이터 관리 시스템 설계)

  • Wu, Zejun;Li, Yan;Shin, Soong-Sun;Kim, Gyoung-Bae;Bae, Hae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1218-1221
    • /
    • 2011
  • The development of the internet and information management has enabled new applications which include: Electronic medical record (EMR), intelligent transportation, environmental monitoring, etc. In this paper, we design and implement the Continuity Care Record(CCR) Data Stream management server that compiled with DSMS and DBMS in EMR system for processing, monitoring the incoming CCR data stream and storing the processed result with high-efficiency. The proposed system enables users not only to query stored CCR information from DBMS, but also enables to execute continue query for the real-time CCR Data Stream. By using of CCR Viewer Application users can view or update their personal health records even compare self health care records with standard health care records in order to monitor the healthy status, and the on line updating information would be minimized and medical error.