• Title/Summary/Keyword: National Informatization Agency

Search Result 318, Processing Time 0.021 seconds

Study on Conflicts and Coordination in Smart Grid (스마트그리드 갈등양상 및 조정방안 연구)

  • Park, Chan-Kook;Yong, Tae-Seok
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.27-45
    • /
    • 2012
  • Smart grid, which is a sort of convergence of numerous technologies, can be deployed only with cooperation and fair competition among various stakeholders. If the interest conflicts were not coordinated properly, related business and investment would become delayed and inactive. Therefore, this study analyzes the causes of interest conflicts and related issues in smart grid sector and suggests policy directions by issue. As the result of AHP analysis, the majority of respondents surveyed said that ambiguity of the role and authority is the key problem causing conflicts of interest in smart grid deployment process. Differences in values, communications problems, etc. are pointed as additional main reasons of the interest conflicts. To resolve interest conflicts in smart grids, the Korean government should enhance its leadership in the coordination of stakeholders' interests. Government should make efforts to coordinate the various interests in terms of the development of the smart grid market and win stakeholders' sympathy of their desirable roles in the smart grid market.

  • PDF

A Study on the i-PIN Policy Implementation Process for the i-PIN Revitalization (i-PIN의 활성화를 위한 정책집행 과정 분석)

  • Kim, Min Chen;Song, Keun Won;Chung, Choong Sik
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.43-62
    • /
    • 2010
  • Mandatory use of resident registration number in Korean websites is likely to result in an violation of privacy. The Korea government introduced i-PIN (Internet Personal Identification Number) to solve this problem in Oct of 2006. But the implementation of i-PIN has failed to decrease violation of privacy. Therefore, we must open our eyes to problems of i-PIN and the importance of privacy protection. This study analyzes the policy failures of i-PIN and considers countermeasures for protecting privacy on the Internet, and explores policy alternatives to secure privacy on the Internet by analyzing the implementation process of I-PIN. In conclusion, this study stresses the urgent need for a well-thought-out policy in order to solve the problems of i-PIN on the Internet. It expects that the i-PIN will make a big stride for the realization of secure electronic government.

  • PDF

Use and non-use of ICTs: the case of three urban ghettos in Seoul Metropolitan City (도시판자촌지역 주민의 정보통신기술 이용 및 비이용에 대한 탐색적 연구 - 서울 개미마을, 녹천마을, 백사마을 중심으로 -)

  • Choi, Younghoon;Jung, Jinkyung
    • Informatization Policy
    • /
    • v.19 no.2
    • /
    • pp.39-56
    • /
    • 2012
  • The authors utilized two contested perspectives on the use and non-use of ICTs, especially the Internet, to verify three assumptions of urban ghettos as fundamentally excluded from the ICT structure, ghetto people as behaving in the same way, and deficiency as the sole explanatory variable of their non-use. The first assumption that the urban ghettos would be fundamentally excluded from the urban ICT structure can be nullified by our finding about the prevalence of ICTs in that area, albeit apparent lower level of access to ICTs compared to that of the urban core. The second assumption that the urban ghetto residents would display the same information behaviors would be challenged by our finding that the availability and usages of the Internet would be hardly consistent by gender, age, occupation, family size, and locational characteristics. The third assumption that deficiency would capture the Internet non-use by ghetto residents was found very tenable but could be rivaled by the choice perspective that use or non-use is simply a result of situated choice. Theoretical and practical implications were suggested.

  • PDF

The Impact of The Maturity of IT Management Standard Processes on IT Outsourcing Performance: A Field Case Study (IT 아웃소싱 서비스 관리를 위한 표준 프로세스 성숙도가 성과에 미치는 영향에 관한 탐색적 현장 사례연구)

  • An, Joon M.;Kim, Kyoung M.;Kim, Yong J.
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.102-119
    • /
    • 2010
  • This study explores the effects of standardized management processes such as COBIT and ITIL on the success of IT outsourcing by utilizing an exploratory case study. The exploratory model includes the maturity of ITIL and COBIT process and success of IT outsourcing. For each construct of the model, several measures are developed from preceding researches and confirmed in the context of the cases utilized for this study. It is found that the maturity of the processes supported by ITIL and COBIT is critical for the success of IT outsourcing in this study. This results confirm the current popularity of the standardized process adopted in practice and also require further research endeavors in this control or management process in the future. It should include any other processes and related activities to the control process in the relationship of IT outsourcing.

  • PDF

Analysis of Government R&D Contribution to the IT Industry (공공부문의 R&D 투자가 IT 산업에 미치는 파급효과 분석)

  • Seo, Hwanjoo;Hong, Pilky
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.63-77
    • /
    • 2010
  • This paper investigates the impact of the government R&D expenditure on the IT industry in Korea. The analysis of such impact can be used to derive the policy implications for the IT industry. The contribution of government R&D to the IT industry was analyzed based on the input-output table of the year 1990-1995-2000. The results show that the amount of the government R&D expenditure induced the IT industry to book twice greater production than it would have been in the absence of such government R&D expenditure during the period under investigation. It is also shown that job creation was strongly encouraged in the broadcasting equipment, software and computer-related services. During the period under the study, the composition of the workers in the IT hardware industry remained unchanged while the production increased significantly, which confirms the jobless growth in the IT hardware industry. The results of this study suggest that the government R&D should focus on improving the competitiveness of the intermediate good and parts industry.

  • PDF

Comparative Study on Knowledge Protection in Public and Private Organizations (정부조직의 지식보호 - 민간기업과의 비교를 중심으로 -)

  • Lee, Hyangsoo
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.78-101
    • /
    • 2010
  • Unlike knowledge sharing or knowledge transfer, knowledge protection has received little attention in the literature. Knowledge protection play a very important role in keeping organization competitive. This study explores the differences in knowledge protection between public and private organizations by T-test and regression analysis. The results of this study shows that the level of knowledge protection in public organizations is lower than that in private organizations. There is even larger difference in the level of access to key knowledge from outside between the two sectors. Such difference can be explained by the unique characteristics of public sector organizations. Understanding why the level of knowledge protection differs between the public and private sector is very important. This study presents lessons and implications for management leadership.

  • PDF

An Exploratory Study of Collective E-Petitions Estimation Methodology Using Anomaly Detection: Focusing on the Voice of Citizens of Changwon City (이상탐지 활용 전자집단민원 추정 방법론에 관한 탐색적 연구: 창원시 시민의 소리 사례를 중심으로)

  • Jeong, Ha-Yeong
    • Informatization Policy
    • /
    • v.26 no.4
    • /
    • pp.85-106
    • /
    • 2019
  • Recently, there have been increasing cases of collective petitions filed in the electronic petitions system. However, there is no efficient management system, raising concerns on side effects such as increased administrative workload and mass production of social conflicts. Aimed at suggesting a methodology for estimating electronic collective petitions using anomaly detection and corpus linguistics-based content analysis, this study conducted the followings: i) a theoretical review of the concept of collective petitions, ii) estimation of electronic collective petitions using anomaly detection based on nonparametric unsupervised learning, iii) a content similarity analysis on petitions using n-gram cosine angle distance, and iv) a case study on the Voice of Citizens of Changwon City, through which the utility of the proposed methodology, policy implications and future tasks were reviewed.

Convergence and Substitutability between IPTV and Digital Cable TV on Subscribers (IPTV와 디지털 케이블 TV 간의 융합과 대체성 강화에 따른 가입자 변동)

  • Hwang, In Young;Park, J. Hun
    • Informatization Policy
    • /
    • v.22 no.2
    • /
    • pp.19-34
    • /
    • 2015
  • Due to rapid convergence trends in the digital pay TV market, differentiation among the competing medias decreases and substitutability is increasing. The current study aims to explain the effect of service substitutability among competing media on the size of domestic digital pay TV subscribers. For the analysis, the Lotka-Volterra model, an ecological competitive diffusion model, was used to obtain the basic model for a simulation study. A simulation was performed by adjusting independent variables of substitutability to estimate the size of subscriber for particular media. The relationship between the digital cable TV and the IPTV is identified as a predator-prey relationship and the digital cable TV is found to be superior to the IPTV. The simulation results showed that the increase of convergence and substitutability result in the decrease of the entire media market. Especially, the IPTV is estimated to face the greatest loss in this context.

A Review of Research on Big Data Security (빅데이터 보안 분야의 연구동향 분석)

  • Park, Seokyee;Hwang, K.T.
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.3-19
    • /
    • 2016
  • The purpose of the study is to analyze the existing literature and to suggest future research directions in the big data security area. This study identifies 62 research articles and analyses their publication year, publication media, general research approach, specific research method, and research topic. According to the results of the analyses, big data security research is at its intial stage in which non-empirical studies and research dealing with technical issues are dominant. From the research topic perspective, the area demonstrates the signs of initial research stage in which proportion of the macro studies dealing with overall issues is far higher than the micro ones covering specific implementation methods and sectoral issues. A few promising topics for future research include overarching framework on big data security, big data security methods for different industries, and government policies on big data security. Currently, the big data security area does not have sufficient research results. In the future, studies covering various topics in big data security from multiple perspectives are anticipated.

Information Security and Its Awareness in Local Governments (지방자치단체의 정보보호 현황 및 인식의 변화 분석)

  • Noh, Jae In;Seo, Jin-Wan
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.20-37
    • /
    • 2016
  • As the numbers of various cyber-crimes have sharply increased, the importance of securing information has also been emphasized. Despite the government's constant efforts to solve the issue, they hardly work in practice, and cases related to information security are still on the rise. This study investigates the reasons for the discrepancy that occurs when a solution is put to action. The research analyzes the recent shift in the administrative system with regard to information security and officials' awareness of the shift, focusing on members of local government. The results of the study confirm a steady attempt including changes in institutions at the level of the central government. However, there is still a lack of personnel and budget support at the local government level as well as not much change in the awareness of information security.