• Title/Summary/Keyword: New IT Service

Search Result 4,403, Processing Time 0.032 seconds

A Study on Service Philosophy for New Economy and Society (신경제사회 중심사상으로서의 서비스철학 연구)

  • Kim, Hyunsoo
    • Journal of Service Research and Studies
    • /
    • v.9 no.4
    • /
    • pp.1-17
    • /
    • 2019
  • This study was conducted to establish a service philosophy as a major ideology in the New Economy and Society. The service philosophy, which is the ideological foundation to lead the service economy era, should be an idea that can develop the new economy society, reflecting the nature principle of the universe and human being. The service philosophy was derived based on the study of the human representative ideology and the study of the new economy and service essence. A good idea must be consistent with the principles of the universe and be consistent with the essence of the human representative ideology, so that it reflects the core principles of the universe and the core of human representative ideas. In addition, the central idea should reflect the changes of the New Economy Society in the future. Therefore, the essence of the service and the change of the New Economy Society were analyzed. We analyzed the social and philosophical significance of the macroscopic cosmology and the microscopic quantum theory of modern physics. We analyzed the essence of Oriental and Western representative ideas and derived implications of these ideas from the viewpoint of modern society where service is central. Based on the essence principle of the universe and human, we have established the service philosophy structure and derived the human, historical, social, economic, and managerial aspects of service philosophy. The structure of the derived service philosophy was presented, and discussions were conducted for future research.

A Study on Win-Win Growth Strategy for Large and Mid-sized IT Service Enterprises (IT서비스 대·중소기업 동반성장 전략 연구)

  • Kim, Hyunsoo
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.177-190
    • /
    • 2012
  • The purpose of this research is to find a better win-win growth strategy of Large and mid-sized IT service enterprises. Efficient win-win growth for large and mid-sized enterprises is essential for acquiring a solid global competitiveness in IT service industry. However, previous studies lack generalized and detailed findings, and therefore past strategies were based on fragmented analysis. To develop an efficient win-win growth for Large and mid-sized enterprises, global benchmarking and an in-depth analysis on deep-rooted problems in IT service industry has been conducted. Past and present policies on IT service industry have been reviewed based on desirable co-growth structure. Based on research, current policies are unable to support co-growth, and collaborative efforts between Large and mid-sized enterprises as well as square deals are necessary for win-win growth. A new policy paradigm has been derived and a roadmap for efficient co-growth strategy has been suggested. The results of this research can be used for building a better IT service industry polices. In future studies, a longitudinal analysis on the proposed co-growth strategy can be conducted.

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

Definition of New SIBs for Service Description and Implementation of SCE in Intelligent Network (지능망에서 서비스 기술을 위한 새로운 SIB들의 정의와 SCE의 구현)

  • 김연중;이지영;마영식;안순신
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.209-220
    • /
    • 2004
  • The Goals of Intelligent Network(IN) provide the methods that create, test and apply the various hinds of services to satisfy the user's need. In this environments, we can create new IN service by description of GSL(Global Service Logic) using that SCE(Service Creation Environment). In the ITU-T CS-2, the various SIBs(Service Independent Building-blocks) are defined to develop the services. There are limitations to develop the various services using the SIBs defined in recommendation. So, in this paper, we define the new SIBs and implement the SCE. The new SIBs are defined in this paper are Connect SIB and BCSM Event SIB. The Connect Call SIB provides the connectivity between SLPI(Service Logic processing Program Instance) and call after connecting the calling party to called party. The BCSMEvent SIB provides the functions that request SSF to report the call processing event and receive it. In this paper, we design and implement the SCE that supports the SIBs defined by recommendation and this paper, provides GUI environment to specify GSI, and generates the code used by SCP.

A Study on the Improvement of the Raw and Institution for Construction and Operation of u-City Service (u-City 서비스 구축 및 운영을 위한 법제도 개선에 관한 연구)

  • Park, Soon-Hyung
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.449-452
    • /
    • 2009
  • The vision of u-City is an implementation of ubiquitous environments that makes anybody to be able to access the source of information and knowledge in anywhere and anytime with any methods. It is necessary to study the law and institution of u-City about a role of the government and local governments to have a new growth power. We need to improve the related law and institution with standardization of u-City service to regulate and coordinate diversity of main organ and business area. In this paper, we select service modes to consider the priority order of service and suggest a reform measure of law and institution classified by service models

  • PDF

Korea's G7 Project - Broadband Integrated Service Digital Network(B-ISDN)- Completion Target Year 2001 (2001년 완성목표의 우리나라 G7 Project - 광대역종합통신망(B-lSDN) -)

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.27 no.2
    • /
    • pp.42-54
    • /
    • 1994
  • Nowadays communication network is steadily changing from a main body of telephone to a network which is creating new services such as multimedia etc. Jhis article introduces a bud of new service and new network which are able to sustain the above service. Including Korea, world advanced countries have been digitatizing their network with N-ISDN (narrowband ISDN) by e.g. 64K b/s and 1.5M b/s. New service by N-ISDN are extraordinary, though it can not solve all kinds of services. To solve these problems, a solving platform should be constituted. B-ISDN(broadband ISDN), as a platform has to be built to deal with almost all uinds of services, whatever the communication speed, communication mode or communication quality may be. Korea Telecommunication Authority(KTA) opened the narrowband ISDN(N-ISDN) at the end of 1993. This was one step previous opening of the broadband ISDN(B-ISDN) service scheduled to be rendered in 2001. B-ISDN, receiving and transmitting by far more information with high speed than the N-NSDN does, is one of G-7 Progects which the Korean government is driving foreward to raise the national scientific power to seven advan ced countries. This is also linked with an extremely high speed information network scheduled to be built by the Ministry of Communications in 2015.

  • PDF

The Empirical Analysis on the relevancy between the IT competency of the Group Enterprises, and the IT Service Firms' Management Performance (국내 대형 그룹사 IT수준 및 계열 IT서비스사 경영 성과의 관련성에 관한 실증 연구)

  • Ahn, Yeon-S.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.109-116
    • /
    • 2010
  • In this paper, we analyse empirically the relation between the IT competency of the Group enterprises, and the management performance of the subsidiary IT service firms in Korea. The 24 IT service firms and relative Group enterprises are included for analysis. The various hypotheses established are validated by t-test method statistically. The results shows that IT competency level of the Group enterprises was affected by not only their sales volumes, new investment volume of IT service, but system management(SM) and inner captive market's sales volume of subsidiary IT service firms also. Additionally the sales volume of IT service firms was affected positively by their inner-captive market's sales, system management sales volume, and the sales volume of their Group enterprise. The service competency of the subsidiary IT service firms is shown as more high in the lower intensity of outer-captive and system integration(SI) business, as well as in the upper intensity of inner-captive and SI business.

A Study on according Convergence to an Infrastructure and Environment Variation of Digital Contents Service (디지털콘텐츠서비스의 산업구조와 환경변화에 따른 융합에 관한 연구)

  • Joo, Heon-Sik
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.588-592
    • /
    • 2009
  • The latest advances in great revolution for digital media and contents industries with Ubiquitous era. Because of spread and supply of various multimedia devices with combination digital with network, we need various type of digital contents. The Digital contents consists of Middleware industries, network business, contents service presenters and users. For supporting digital media. contents and media devices have been converging Digital contents convergence has been proceeding rapidly in media, broadcast and communication field. And also, whole Environment for these industries has been changing, too. Wee need another digital contents convergence for new type of products and services because of convergence of IT and broadcast. In addition, new business trends is very important about these new industrial change and developments with digital contents convergence.

  • PDF

Using Contingent valuation Methods to Measure the Potential Demand for a New Cable Television Service (케이블TV 방송 신제품의 잠재적 가치평가;조건부 가치측정법의 적용을 중심으로)

  • 원중호
    • Journal of Korea Technology Innovation Society
    • /
    • v.3 no.1
    • /
    • pp.113-126
    • /
    • 2000
  • The purpose of this paper is to introduce and test an extension of dichotomous choice contingent valuation(DC-CV) methods of pre-test-market evaluation using the specific case of a cable telev-ision service. Specifically we used a double-bounded DC-CV approach. On the whole respondents accepted the contingent market and were willing to contribute a significant amount on average. This willingness varies according to individual characteristics and concerns about the service. It is concluded that the methods are potentially a useful tool for decision-makers in measuring the po-tential demand for a new cable television service and considering the provision of the service.

  • PDF

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.