• Title/Summary/Keyword: Research Information Systems

Search Result 12,210, Processing Time 0.05 seconds

A Study on a Model of University Information Systems for e-Business Era (e-비즈니스 시대의 대학정보시스템 구축 모델에 관한 연구: K 대학교 사례를 중심으로)

  • Kwon Moon Taek
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.133-145
    • /
    • 2004
  • The two main purposes of this paper are to 1) investigate critical components of university information systems for information resources management, 2) develop a comprehensive framework model of university information systems for e-Business Era. Through a literature review and by employing group decision making techniques with managers of K University, critical components for developing university information systems were identified. The critical components of university information systems are 1) academic affaires. 2) general administration. (3) research administration. (4) information services. (5) management support, (6) cyber education. (7) knowledge management, (8) e-library. (9) mobile service. and (10) IT infrastructures. In the second stage. by employing IT experts in K University and other institutes. a comprehensive framework of university information systems for e-Business era was developed. The comprehensive framework shows that major components for university information resources management are (1) information infrastructure. (2) common operating environments. (3) applications/information services. The results of this study expect to help managers. who are in charge of university information systems. plan to develop information systems based on the framework proposed in this paper.

  • PDF

Software Testing/Evaluation Strategy and Plan for the Military Information Systems (군용정보시스템의 소프트웨어 시험평가 전략 및 계획 - “차세대 한국형 워게임 모델”중심으로 -)

  • 김화수
    • Journal of the military operations research society of Korea
    • /
    • v.24 no.2
    • /
    • pp.57-74
    • /
    • 1998
  • This paper is aimed to propose an testing and evaluation strategy and plan in Military Information Systems, especially focusing on development an“New-generation Wargame Model”. Through this research, we concluded that the effective and efficient testing/evaluation strategy/plan can aid the productivity, maintainability, availability, etc., of the Militray Information Systems. Highlights of the proposed testing and evaluation strategy and plan for Military Information Systems are as follows. First, in the unit and module integration testing phase, hybrid of black-box and white-box testing techniques are available for Military Information Systems and progressive approach for module integration phase should be considered because of the complexity. Second, in the system testing phase, integrated module should be tested with respect to the function and performance that should be satisfied with the user requirements, specifications, risk analysis, etc., Third, in the acceptance testing phase, reliability, interoperability, maintainability, availability, integrity, etc., must be considered in the actual or mini-operational environments for testing efficiently and effectively.

  • PDF

An Analysis of the Tactical Information Exchange between Unmanned Air Vehicles and Ground Fighting Vehicles (무인기 체계와 지상전투차량 간 전술정보 연동 검토)

  • Choi, Il-Ho;Lim, Kyung-Mee;Baek, In-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.794-802
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAVs) have been considered as valuable aerial reconnaissance systems and our army wants capability-enhanced UAVs installed in our territory, hoping that the UAVs will provide enemy information in detail. The enemy information acqcuired by UAVs would be shared by our army's legacy systems. In this article, we made a research on the interoperability between UAVs and Ground Fighting Vehicles (GFVs), laying emphasis on what kinds of tactical information could be exchanged by two different weapon systems. Also, it needs to be addressed that their upper-level commanding systems play a significant role in such operation.

AN INTERNAL STRUCTURE OF INFORMATION SYSTEMS FAILURE; What really constitutes IS failure\ulcorner

  • Kim, Jong-Uk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.4
    • /
    • pp.1-15
    • /
    • 2000
  • Information systems (IS) failures still continue and are prevalent everywhere. When considering an enormous amount of budget currently invested on IS technology in many organizations, these continuing failures can be critical culprits to failures of the organizations themselves. However, the meaning and definition of IS failures are not unified among IS researchers as well as IS practitioners although there have been a lot of conceptual research regarding the concept of IS failures. Previous empirical studies are not enough yet and thus we anticipate further empirical studies to be performed which will validate previous conceptual research. In this regards, by analyzing IS practitioners perception toward IS failures in a more detailed manner, this research extends conceptual and empirical research in the past which previously identified the structure of information systems (IS) failures. Further, this current study identified the interrelationships among the categories. The data was analyzed using a multidimensional scaling program and fourteen categories of problems were identified as to constitute the IS failure structure. It was found that about a half of categories identified were related to technical failures such as network and system infrastructure, costs, data/information, and program errors. The other remaining categories were related with organizational or social problems such as business success, human resources, relationships, communication, and user skills.

  • PDF

A Cognitive Study on the Diagrammatic Representation of Hierarchical Structure (도형을 이용한 계층구조 표현 방식에 대한 실증적 연구)

  • Kim, Jin-Woo;Mok, Jin-Hee
    • Asia pacific journal of information systems
    • /
    • v.9 no.1
    • /
    • pp.193-209
    • /
    • 1999
  • Developing Information Systems is a process of decomposing the entire systems into sub systems and identifying a hierarchical structure among the sub systems. Diagrammatic representation of hierarchy is an essential part of systems development since the identified hierarchical structures are usually presented in diagrams. The main goal of this research is to identify the most effective ways of representing system structures using diagrams. In order to achieve the main goal, this study performed three phases of research. In the first step, a theoretical model was constructed to conceptually explain users' comprehension on diagrams. Then visual factors of diagrammatic representations were identified based on the diagrams used in systems development. Finally, three consecutive experiments were conducted to identify the impacts of visual factors on the level of users' comprehension. The results indicate that familiarity and affordance of diagrams affect the degree of comprehension about the diagrams, which is in turn influenced by the complexity of tasks and the types of hierarchies. This paper concludes with the limitations of the study results and implications in the development of information systems.

  • PDF

Korean Dependency Parsing Using Statistical/Semantic Information (통계/의미 정보를 이용한 한국어 의존 파싱)

  • Jang, Myung-Gil;Ryu, Pum-Mo;Park, Jae-Deuk;Park, Dong-In;Myaeng, Sung-Hyun
    • Annual Conference on Human and Language Technology
    • /
    • 1997.10a
    • /
    • pp.313-319
    • /
    • 1997
  • 한국어 의존 파싱에서는 불필요한 의존관계의 과다한 생성과 이에 따른 다수의 구문분석 결과 생성에 대처하는 연구가 필요하다. 본 논문에서는 한국어 의존 파싱 과정에서 생기는 불 필요한 의존관계에 따른 다수의 후보 의존 트리들에 대하여 통계/의미 정보를 활용하여 최적 트리를 결정하는 구문 분석 방법을 제안한다. 본 논문의 구문 분석에서 사용하는 통계/의미 정보는 구문구조부착 말뭉치(Tree Tagged Corpus)를 이용하여 구축한 술어 하위범주화 정보 사전에서 얻었으며, 이러한 정보를 활용한 구문 분석은 한국어 구문 분석의 모호성 해소에 적용되어 한국어 구문 분석의 정확도를 높인다.

  • PDF

Analysis on the Trend of The Journal of Information Systems Using TLS Mining (TLS 마이닝을 이용한 '정보시스템연구' 동향 분석)

  • Yun, Ji Hye;Oh, Chang Gyu;Lee, Jong Hwa
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.289-304
    • /
    • 2022
  • Purpose The development of the network and mobile industries has induced companies to invest in information systems, leading a new industrial revolution. The Journal of Information Systems, which developed the information system field into a theoretical and practical study in the 1990s, retains a 30-year history of information systems. This study aims to identify academic values and research trends of JIS by analyzing the trends. Design/methodology/approach This study aims to analyze the trend of JIS by compounding various methods, named as TLS mining analysis. TLS mining analysis consists of a series of analysis including Term Frequency-Inverse Document Frequency (TF-IDF) weight model, Latent Dirichlet Allocation (LDA) topic modeling, and a text mining with Semantic Network Analysis. Firstly, keywords are extracted from the research data using the TF-IDF weight model, and after that, topic modeling is performed using the Latent Dirichlet Allocation (LDA) algorithm to identify issue keywords. Findings The current study used the summery service of the published research paper provided by Korea Citation Index to analyze JIS. 714 papers that were published from 2002 to 2012 were divided into two periods: 2002-2011 and 2012-2021. In the first period (2002-2011), the research trend in the information system field had focused on E-business strategies as most of the companies adopted online business models. In the second period (2012-2021), data-based information technology and new industrial revolution technologies such as artificial intelligence, SNS, and mobile had been the main research issues in the information system field. In addition, keywords for improving the JIS citation index were presented.

Application of Empirical Research Methods in Information Systems Research: Gaining Lessons Through Evaluation (경영정보학 연구에 나타난 실증적 연구방법 적용상의 문제: 평가를 통해 얻은 교훈)

  • Kang, Shin-Cheol;Lee, Zoon-Ky;Choi, Jeong-Il
    • Asia pacific journal of information systems
    • /
    • v.16 no.2
    • /
    • pp.1-25
    • /
    • 2006
  • Application of appropriate research methods has assumed an important role in knowledge accumulation endeavors in the scientific research community. The current study reported here summarizes how we used the empirical methods in IS research, what we need to improve in using empirical study as research methodology through the set of comprehensive research guideline. From the survey and review of seminal and classical research guidelines, we developed our own 28 checklist for research design, statistical analysis, and conclusion, which can be commonly applied to all articles that employ inferential statistical methods in IS research. Then, we critically evaluated the usage of empirical research methods in major IS journals by using the checklist, with the goal of improving the quality of academic papers. In this study, we scrutinized four major IS journals which published empirical papers from 1991 to 2000: MIS Quarterly, Journal of MIS, Information Systems Research, and Decision Sciences. As a result of intensive evaluation work, we could highlight many areas that are lagging and call for greater attention with regard to the proper usage of empirical study in IS research. The research findings in this study can be referred as checklist and guideline when IS researcher applies the empirical method.

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.