• Title/Summary/Keyword: Research Information Systems

Search Result 12,210, Processing Time 0.041 seconds

What's Next? Connecting the Past and Future of Business-IT Alignment Research

  • Joshy K. X.;Rahul Thakurta
    • Asia pacific journal of information systems
    • /
    • v.32 no.2
    • /
    • pp.395-434
    • /
    • 2022
  • The importance of Business-IT alignment has been well emphasized, and the topic has been a top management concern for the past four decades. The current business environment demands in response to digitalization have made Business-IT alignment even more challenging. We take on the challenge in this research by presenting a comprehensive review of the domain of Business-IT alignment, based on a conceptual model which we propose, to facilitate future theoretical work. The review brought out multiple representations of the concept of Business-IT alignment and the characterization of its antecedents, nature, and outcomes. Based on the treatment of the domain in the extant literature, we chart out possible areas of future explorations. By doing so, this research lays a foundation for continuing inquiry on Business-IT alignment and facilitating future theoretical work.

Hybrid Genetic Algorithm or Obstacle Location-Allocation Problem

  • Jynichi Taniguchi;Mitsuo Gen;Wang, Xiao-Dong;Takao Yokota
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.191-194
    • /
    • 2003
  • Location-allocation problem is known as one of the important problem faced in Industrial Engineering and Operations Research fielde. There are many variations on this problem for different applications, however, most of them consider no obstacle existing. Since the location-allocation problem with obstacles is very complex and with many infeasible solutions, no direct method is effective to solve it. In this paper we propose a hybrid Genetic Algorithm (hGA) method for solving this problem. The proposed hGA is based on Lagrangian relaxation method and Dijkstra's shortest path algorithm. To enhance the proposed hGA, a Fuzzy Logic Controller (FLC) approach is also adopted to auto-tune the GA parameters.

  • PDF

Development of a Secure Electronic Payment System based on the Analysis of Current Korean Electronic Payment Systems (우리나라 전자지불시스템 현황 분석을 통한 안전한 전자지불시스템의 연구)

  • 송용욱;이재규;황재훈
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.93-108
    • /
    • 2003
  • As Electronic Commerce is popularized, crimes related to Electronic Commerce are also increasing, Electronic shopping malls and payment gateways focus their attention on network security of payment information or the sizes of encryption keys, In real world, however, the payment-related crimes in electronic shopping malls are not based on the security hole of encryption mechanism of the payment systems, but on the customers carelessness or the insecurity of server systems of merchants or financial institutes. So, this research analyzes the structure of current electronic payment systems, investigates the payment-related crimes, addresses the structural problems of the Korean electronic payment systems, and suggests an alternative general architecture for secure payment systems by incorporating the concept of separation of order information and payment information.

  • PDF

A Study of Influencing Factors Upon Using C4I Systems: The Perspective of Mediating Variables in a Structured Model (C4I 시스템 사용의 영향 요인에 관한 연구: 구조모형의 매개변수의 관점에서)

  • Kim, Chong-Man;Kim, In-Jai
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.73-94
    • /
    • 2009
  • The general aspects for the future warfare shows that the concept of firepower and maneuver centric warfare has been replacing with that of information and knowledge centric warfare. Thus, some developed countries are now trying to establish the information systems to perform intelligent warfare and innovate defense operations. The C4I(Command, Control, Communication, Computers and Intelligence for the Warrior) systems make it possible to do modern and systematic war operations. The basic idea of this study is to investigate how TAM(Technology Acceptance Model) can explain the acceptance behavior in military organizations. Because TAM is inadequate in explaining the acceptance processes forcomplex technologies and strict organizations, a revised research model based upon TAM was developed in order to assess the usage of the C4I system. The purpose of this study is to investigate factors affecting the usage of C4I in the Korean Army. The research model, based upon TAM, was extended through a belief construct such as self-efficacy as one of mediating variables. The self-efficacy has been used as a mediating variable for technology acceptance, and the variable was included in the research model. The external variables were selected on the basis of previous research. The external variables can be classified into following: 1) technological, 2) organizational, and 3) environmental factors on the basis of TOE(Technology-Organization-Environment) framework. The technological factor includes the information quality and the task-technology fitness. The organizational factor includes the influence of senior colleagues. The environmental factor includes the education/train data. The external variables are considered very important for explaining the behavior patterns of information technology or systems. A structured questionnaire was developed and administrated to those who were using the C4I system. Total 329 data were used for statistical data analyses. A confirmatory factor analysis and structured equation model were used as main statistical methods. Model fitness Indexes for measurement and structured models were verified before all 18 hypotheses were tested. This study shows that the perceived usefulness and the self-efficacy played their roles more than the perceived ease of use did in TAM. In military organizations, the perceived usefulness showed its mediating effects between external variables and dependent variable, but the perceived ease of use did not. These results imply that the perceived usefulness can explain the acceptance processes better than the perceived ease of use in the army. The self-efficacy was also used as one of the three mediating variables, and showed its mediating effects in explaining the acceptance processes. Such results also show that the self-efficacy can be selected as one possible belief construct in TAM. The perceived usefulness was influenced by such factors as senior colleagues, the information quality, and the task-technology fitness. The self-efficacy was affected by education/train and task-technology fitness. The actual usage of C4I was influenced not by the perceived ease of use but by the perceived usefulness and selfefficacy. This study suggests the followings: (1) An extended TAM can be applied to such strict organizations as the army; (2) Three mediation variables are included in the research model and tested at real situations; and (3) Several other implications are discussed.

Designing a Mobile Based Library Information and Service Delivery System: A Model Plan for Libraries of Bangladesh

  • Elahi, Md. Hasinul
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.3
    • /
    • pp.57-70
    • /
    • 2016
  • Purpose The purpose of the study is to identify the need of a mobile based library information and service delivery system in developing countries, identify the services that are possible to provide with the help of mobile phones and their applications, design a mobile based library information and service delivery system, and identify major challenges regarding mobile based library information and service delivery systems.Design/ Methodology/ Approach The research is exploratory in nature. This paper is based on a review of literature, survey information, and on the author’s own viewpoints. A comprehensive search of scientific literature has been done along with a survey for validating the necessity of designing mobile based library information and service delivery systems. Responses to closed-ended questions in particular on 7-point Likert scales were analyzed using the descriptive analysis techniques of SPSS 20.0 and responses to other closed-ended questions were analyzed using general statistics.Findings The research indicates that users of academic libraries, especially students and faculty members, have a positive notion regarding designing and implementing a mobile based library information and service delivery system. It also reveals user opinions regarding the possible problems associated with the design and implementation of a mobile based library information and service delivery system.Originality The paper explores mobile based library information and service delivery systems for better and faster service provision to its potential users.

GML-Style Traffic And Tracking Services Based On Web GIS System

  • Kim Do-Hyun
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.280-282
    • /
    • 2004
  • According as IT environment changes from client/server system to the open system based on web service technologies, the exchange of data and services between independent applications and service servers in web environment is observed Recently. In this points, it is necessary that Geographic Information Systems, Spatial Imagery Information Systems, Intelligent Transportation Systems, and Global Navigation Satellite Systems based on the location and geometry information are inter-related each other. But, the inter-relation of these systems is very difficult because of the closed system architecture, different information format, and the absence of interoperability technologies. In this Paper, we describe 4S integration system based web service technologies that accept the international standard as WFS, WCS, WRS of OGC (OpenGIS Consortium) and UDDI, SOAP, WSDL of W3C. In detail, we study the system architecture design and implementation of traffic information service, routing service, and tracing service. These services are consisting of the data schema based on XML and GML, various functions of each layered service, each server platform, and web server. Specially, we represent that GML is being applied to a wide range of location-based services, telematics, and intelligent transportation

  • PDF

An Analysis of the Influence of Knowledge Management Factors on Knowledge Transfer (지식이전에 대한 지식경영 요인의 영향 분석)

  • Oh Jay-In
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.191-213
    • /
    • 2006
  • The purpose of this research is to identify the structure among determining factors focusing on knowledge transfer and analyze and prove the causal relation on knowledge transfer in Korean companies and public corporations. The results from the analysis of data collected in this study are as follows. First, forum among organization related factors has the positive relation with uncertainty in a significant level. Second, the higher the knowledge presentation and the ease of use are among information systems related factors, the lower the ambiguity and uncertainty are. Third, among process related factors, unification has the negative relation with ambiguity and uncertainty in a significant level. Fourth, a better manpower employment contributes to a worse ambiguity and uncertainty. Fifth, ambiguity has a negative relation with knowledge transfer. In conclusion, the factors that lower the ambiguity and facilitate knowledge transfer include information systems, unification, and manpower employment. These factors, however, influence on uncertainty, which turns out to be nothing to do with knowledge transfer.

  • PDF

Lie Detection Technique using Video from the Ratio of Change in the Appearance

  • Hossain, S.M. Emdad;Fageeri, Sallam Osman;Soosaimanickam, Arockiasamy;Kausar, Mohammad Abu;Said, Aiman Moyaid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.165-170
    • /
    • 2022
  • Lying is nuisance to all, and all liars knows it is nuisance but still keep on lying. Sometime people are in confusion how to escape from or how to detect the liar when they lie. In this research we are aiming to establish a dynamic platform to identify liar by using video analysis especially by calculating the ratio of changes in their appearance when they lie. The platform will be developed using a machine learning algorithm along with the dynamic classifier to classify the liar. For the experimental analysis the dataset to be processed in two dimensions (people lying and people tell truth). Both parameter of facial appearance will be stored for future identification. Similarly, there will be standard parameter to be built for true speaker and liar. We hope this standard parameter will be able to diagnosed a liar without a pre-captured data.

A Design of Secure Communication Architecture Applying Quantum Cryptography

  • Shim, Kyu-Seok;Kim, Yong-Hwan;Lee, Wonhyuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.123-134
    • /
    • 2022
  • Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD and PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.

Continuance Intention Toward Second-generation Mobile Instant Messaging App of LINE in Taiwan

  • Bao Q. Duong;Charlie Chen;Craig Van Slyke
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.899-933
    • /
    • 2023
  • The second-generation mobile instant messaging (SMIM) proliferates with various relationship management functions: group chats, audio/video chats, file sharing, real-time location sharing, and nonverbal graphics, such as emojis and stickers. This study integrates the important but often overlooked affordances theory into innovation diffusion and proposes an SMIM continuance intention model. SMIM is a social affordance platform for users to develop new friendships and maintain their relationships. Integrated diffusion of innovation and affordance theoretical frameworks, this study investigates the influence of four factors on the success of using SMIM apps to improve friendship development and relationship management. Data were collected from 231 participants using a survey questionnaire in a public university in Taiwan. The findings confirm the effects of friendship development and relationship maintenance on the intention of users to continue using SMIM apps. Implications for research and practice are discussed.