• Title/Summary/Keyword: Organizational Design

Search Result 735, Processing Time 0.024 seconds

Design and Implementation of eduroam Authentication-Delegation System (eduroam 사용자 대리인증 시스템의 설계 및 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1730-1740
    • /
    • 2016
  • This paper introduces a guest identity provider system for eduroam which is a global Wi-Fi service targeting users enrolled in higher education and research institutions. Developed eduroam AND (AutheNtication Delegation) system enables users to create their eduroam user accounts and to access eduroam regardless of their locations. Users with no organizational eduroam account therefore can freely access eduroam using the system. A federated authentication model is implemented in the system, and thus the system has merits of having high accessibility, indirectly verifying users and organizations possible, saving management overhead. Status monitoring is essential because authentication request and response messages are routed by eduroam network. eduroam AND performs active monitoring to check service availability and visualizes the results, which increases operational and management efficiency. We leveraged open-source libraries to implement eduroam AND and run the system on KREONET (Korea REsearch Open NETwork). Lastly, we present implementation details and qualitively evaluate the system.

Treemapping Work-Sharing Relationships among Business Process Performers (트리맵을 이용한 비즈니스 프로세스 수행자간 업무공유 관계 시각화)

  • Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.69-77
    • /
    • 2016
  • Recently, the importance of visual analytics has been recognized in the field of business intelligence. From the view of business intelligence, visual analytics aims for acquiring valuable insights for decision making by interactively visualizing a variety of business information. In this paper, we propose a treemap-based method for visualizing work-sharing relationships among business process performers. A work-sharing relationship is established between two performers who jointly participate in a specific activity of a business process and is an important factor for understanding organizational structures and behaviors in a process-centric organization. To this end, we design and implement a treemap-based visualization tool for representing work-sharing relationships as well as basic hierarchical information in business processes. Finally, we evaluate usefulness of the proposed visualization tool through an operational example using XPDL (XML Process Definition Language) process models.

On the Study of Key Management in Mobile Ad Hoc Networks (이동 임시무선망에서의 키 관리 기법에 관한 연구)

  • Kim Si-Gwan;Shin Yoon-Shik;Lim Eun-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.4
    • /
    • pp.90-98
    • /
    • 2004
  • This paper covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers, and stable communication links and in the form of an organizational or administrative infrastructure. Another difficulty lies in the highly dynamic nature of ad hoc networks since new nodes can join and leave the network at any time. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and efficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key management systems cannot be used. These issues are covered and we also present a new efficient key management solutions. Finally we show that the proposed method is more efficient than the previous works through simulations.

  • PDF

A Design on Security Governance Framework for Industry Convergence Environment (산업융합환경을 위한 보안 거버넌스 프레임워크 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.33-40
    • /
    • 2015
  • According to arriving convergence environment which can create new value-added converged between industry and ICT technology, It has made economic growth and improve the quality of life. However this convergence environment provide not only advantage but also various security problems resulting from generating converged security threats. For resolving this security problem, we need to approach to security problem in the integrated view not the fragmentary view which cover only technical approach. So This study developed security governance framework which can manage trustful security governance in multidimensional view which cover strategy, managerial/operational and technical view. Therefore this framework can construct trustful security management system which can help top management team to engage in security management directly and organizational member to perform security activities and have responsibility for themselves as suggesting single standard for security management.

Practical Connector Patterns for Designing Component Frameworks (컴포넌트 프레임워크 설계를 위한 실용적인 커넥터 패턴)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.43-53
    • /
    • 2004
  • Component-based development(CBD) has acquired a substantial acceptance in both academia and industry as an effective inter-organizational reuse technology. A component framework in product line engineering(PLE) which consists of related components, connectors and their semantics has a greater potential for reusability than components. In frameworks, components are glued with association, dependency and connections. Problems occur like affecting the implementation code of components when they are glued and replaced because the association and dependency relationships between COTS components which are acquired for application development do not match exactly. Especially, a connector may not only connect related components, but also mate partially-matched COTS components fit together. However, little has been studied to date about connectors that can be used practically. In this paper, we present a meta-model for connectors and show how a connector can be designed and implemented in practice. We propose five main patterns of connectors. Proposed major patterns Provide design guidelines for practical and efficient connector configuration based on component framework. And also, applying techniques and applied case studies of the major patterns show greatly increased applicability and reusability of the component without component modification.

Cultural Differences impact on the ERP System Implementation (문화 차이가 ERP 시스템 구현에 미치는 영향)

  • Kim, Kyung-Ihl;Park, Ji-Young
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.1-9
    • /
    • 2016
  • In the modern business environment, ERP System is a tool for efficient use of the resources of the company. Implementation of the ERP System is not a simple introduction of the unit system. The changes and innovation of the company will be made through the BPR. And then, the BPR is made based on the system design and implementation. Cultural difference creates a difference in the attitudes and relationships of members of company. and, Cultural difference produce differences in organizational culture and operating principles. Cultural differences can mention the differences in the cultures of East and West, and can mention the difference between each country within the same culture. In the paper, we determine the impact of cultural differences on the implementation of the ERP System. Cultural differences affect the implementation process and the decision-making process, user interface.

Analysis of the Journal of Korean Academy of Nursing Administration for 3 Years (2007-2009) (간호행정학회지 게재논문의 연구동향 분석 (2007-2009))

  • Kim, Jong-Kyung;Jung, Myun-Sook;Jang, Keum-Seong;Kim, Jin-Hyun;Kim, Eun-Kyung;Lee, Hae-Jung;Kim, Young-Mee;Kim, Se-Young;Park, Eun-Jun
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.16 no.4
    • /
    • pp.517-526
    • /
    • 2010
  • Purpose: The purpose of this study was to identify the major trends of research in the Journal of Korean Nursing Administration from 2007 to 2009. Method: Research designs, participants, research domains, and key words were analyzed from the Journal of Korean Nursing Administration. Results: Job satisfaction, organizational commitment, job stress, turnover intention, nursing performance, self-efficiency, leadership, empowerment, nursing informatics, and quality control were the major key words commonly listed in the journal articles. Of the research in the Nursing Administration Journal, quantitative methods were used in 94.5% of the research studies and qualitative methods in only 5.5%. The major participants in the research were nurses, nurse managers, and patients. Statistical methods like ANOVA, correlation, t-test, regression, chi-square test, LISREL were the dominant method of analysis used in the research. The primary domains in the journal articles were directing, organizing, control, planning, and informatics. Conclusion: Through this study, the trend of research in nursing administration can be identified. We recommend that collaboration, nurse work environment, evidence-based practice, scheduling, coaching, patient falls and safety, and positive culture should be included as topics for the future research.

A Journey to Action Research in a Clinical Nursing Context (임상간호현장에서의 실행연구 여정)

  • Jang, Keum Seong;Kim, Heeyoung;Kim, Eun A;Kim, Yun Min;Moon, Jeong Eun;Park, Hyunyoung;Song, Mi-Ok;Baek, Myeong
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.19 no.1
    • /
    • pp.95-107
    • /
    • 2013
  • Purpose: The purpose of this study was to examine the effectiveness of Action Research (AR) approach in nursing. Methods: Participants were 64 perioperative nurses recruited from C hospital in Gwangju, Korea. The nurses were engaged in the project through 2 cycles of planning, acting, observing, and reflecting. A mixed-methods design was used to examine changes in participants and their knowledge management practice. Quantitative data were analyzed using SPSS 20.0 program and qualitative reflection data underwent content analysis. Results: During the project, participants developed standardized pre-operative checklists and opened an Internet Cafe to better manage their perioperative nursing information. At the end of the project, there was a significant increase in nurses' knowledge management (p=.015) and the rate of surgical material prescription errors decreased from 8.0% to 2.9%. Core AR project team members' teamwork skills and organizational commitment increased significantly (p=.040, p=.301, respectively). The main themes that emerged from the qualitative data were learning how to solve problems in practice, facilitating team activities through motivation, barriers of large participation, and rewarded efforts and inflated expectations. Conclusion: The AR project contributed to empowering participants to solve local problems. AR is a useful methodology to promote changes in practices and research participants.

RBAC for multi-organizational Business Process Management (기업간 비즈니스 프로세스 관리에서의 접근 권한 통제)

  • Bae, Hye-Rim;Hur, Won-Chang
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.151-166
    • /
    • 2007
  • As the number of users who are involved in a business process increases, it becomes imperative to effectively control their privileges of accessing sensitive data and information which are usually easily obtained by BPM system. Traditional RBAC (Role-based Access Control) model was first introduced to provide a logical framework to prevent unauthorized users from obtaining confidential, but in more dynamic environment such as B2B and SCM process, it usually lacks in capability of addressing such issues as configurability, customizability, or scalability of user privileges. In this study, we have proposed a privilege-template based RBAC model that can address such issues effectively. We also provided a design of the RBAC model along with illustrative examples and pseudo codes that can be used for implementing a prototype system.

  • PDF

Effect of Online Education on Training Effectiveness: Conceptual Framework and Empirical Validation (온라인 교육이 훈련교과성에 미치는 영향에 관한 실증적 연구)

  • Kim, Jeong-Wook;Nam, Ki-Chan
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.185-209
    • /
    • 2007
  • The development of information technologies has contributed on-line training as one of important education methods. On-line training in firms, which is similar to e-learning or virtual education, provides trainees with more education opportunities in diverse ways. It has developed a range of innovative services with a one-stop solution of education within the electronic sector. Also under the on-line training environment, trainees can undertake customized training packages at anytime and any places. Moreover, information technology allows both the trainers and other trainees to be decoupled in any of the elements of tune, place, and space. Two research questions are investigated : what are the determinants affecting the on-line training effectiveness and how those variables affect the two aspects of training effectiveness: learning performance and transfer performance. Based on the previous literature conducted on the traditional training environment, the determinants of training effectiveness are derived. Eight hypotheses are developed based on literature reviews and tested by questionnaires survey data. The collected data have been analyzed by LISREL. It is found that the relationship between individual, organizational and on-line site design variables and training effectiveness (learning and transfer) are significant. The contribution and limitations of this research are also discussed with future studies.

  • PDF