• Title/Summary/Keyword: information and communication technology investment

Search Result 118, Processing Time 0.027 seconds

The Influence of IS Technology and Communication Uncertainty on IS Voice Behavior: The Role of Susceptibility to Informational Influence of Employee (정보보안 기술 및 커뮤니케이션 불확실성이 제언 행동에 미치는 영향: 개인의 정보 영향 민감성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.165-175
    • /
    • 2023
  • As the reduction of information exposure threats by organization insiders contributes to achieving information security(IS) goals, organizations are establishing strict IS policies applicable to insiders and increasing investment in IS systems. However, since IS incidents cause damage to an organization even by malicious information exposure by one person, psychological support for strengthening IS compliance behavior by insiders. This study aims to confirm how the uncertain organizational environment related to IS affects individual IS-related behavior. We surveyed insiders of organizations operating IS policies and tested the hypothesis using 440 samples. As a result, IS technology and communication uncertainty reduced IS voice behavior through IS prospective anxiety, and individuals' susceptibility to information influence moderated the relationship between IS technology, communication, and prospective anxiety and IS voice behavior. Our results suggest the necessity and direction of supplementing the uncertain IS environment in practice.

An Analysis on Export Competitiveness of Korea Manufacturing Industries in the U.S.A. Market (한국제조업의 대미 수출경쟁력 변화분석)

  • Son, Yong-Jung
    • International Commerce and Information Review
    • /
    • v.8 no.4
    • /
    • pp.89-104
    • /
    • 2006
  • Though weight manufacturing has in national gross production is decreasing, it has still a decisive role in economic growth of Korea, and foreign competitiveness of manufacturing has a great influence on our whole economy. Therefore, as this study speculates export competitiveness of manufacturing item by item, the results can be used for selection of strategic export-oriented products. The results of the analysis are summarized as follows: first, products that are found as competitive through analysis of trade specialization indexes are plastic, rubber, fabric, home electronic appliances, computers, communication equipment, automobiles and their spare parts. Second, electronic-electric industry such as semi-conduits, communication equipment, home electronics, computers was decided as advantageous through analysis of comparative advantages at present, while paper, print and publishing, and leather industries were classified as comparatively disadvantageous. Its political implications are presented as follows: Private corporations should develop more advanced technology and government should give more support to secure export competitiveness of manufacturing toward America. Governmental policies should be prepared to induce consistent and daring investment to technology-intensive products for export products with high-added value.

  • PDF

A Design of University Information System Operation Audit Model based on ITIL V3

  • Kim, Hee-Wan;Kang, Bo-Ra;Kim, Dong-Soo;Moon, Song-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.3
    • /
    • pp.29-41
    • /
    • 2018
  • The purpose of constructing university information system is for improvement in diversification and throughput of information, streamlines business processes, rapid exchange of information, sharing of information, decision-making information, and securing educational facilities. Similar to business information technology system, university information system does not have a review system for sharing and overlapping investment of information. Due to the lack of project management for outsourcing and vulnerability of system suitability, system audit is absolutely needed for the university information system. This paper especially focuses on an operational phase in the audit of university information system. Additionally, we proposed operating model and checklists of the university information system based on Management Guidelines of ITIL V3 Operational and Information System. We derived the checklists of operation audit by each domain of service strategy, service design, service transition, service operation, and continual service improvement. As the result, this study appear to have more than average satisfaction the suitability results were.

Impact of Negative Word of Mouth on Firm Value

  • Jeon, Jaihyun;Kim, Byung-Do;Seok, Junhee
    • Asia Marketing Journal
    • /
    • v.22 no.3
    • /
    • pp.1-28
    • /
    • 2020
  • With the development of information and communication technology and spread of smart devices, online information exchange has become a daily routine. Accordingly, the management and utilization of online word of mouth (WOM) has become an important issue for companies. Numerous studies have examined the impact of online WOM on firm performance. This study analyzes the impact of negative word of mouth (NWOM) on firm value, considering the influence of corporate social responsibility (CSR) activity and research and development (R&D) investment. Using a hierarchical linear model, we find that 1) NWOM has a negative impact on firm value, 2) CSR activities do not significantly influence this impact, and 3) R&D investment reduces this negative impact. This study contributes by demonstrating the effect of NWOM on firm value, examining the influence of CSR activities and R&D investment on the impact of NWOM, and confirming that the hierarchical linear model can be applied effectively to panel data in empirical studies. As a practical implication, companies must prevent and manage NWOM, whose impact, when caused by an unavoidable incident, can be alleviated by proactively announcing that the company is striving for competitiveness, for instance, by investing in R&D.

A Model for Supporting Information Security Investment Decision-Making Considering the Efficacy of Countermeasures (정보보호 대책의 효과성을 고려한 정보보호 투자 의사결정 지원 모형)

  • Byeongjo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.27-45
    • /
    • 2023
  • The importance of information security has grown alongside the development of information and communication technology. However, companies struggle to select suitable countermeasures within their limited budgets. Sönmez and Kılıç (2021) proposed a model using AHP and mixed integer programming to determine the optimal investment combination for mitigating information security breaches. However, their model had limitations: 1) a lack of objective measurement for countermeasure efficacy against security threats, 2) unrealistic scenarios where risk reduction surpassed pre-investment levels, and 3) cost duplication when using a single countermeasure for multiple threats. This paper enhances the model by objectively quantifying countermeasure efficacy using the beta probability distribution. It also resolves unrealistic scenarios and the issue of duplicating investments for a single countermeasure. An empirical analysis was conducted on domestic SMEs to determine investment budgets and risk levels. The improved model outperformed Sönmez and Kılıç's (2021) optimization model. By employing the proposed effectiveness measurement approach, difficulty to evaluate countermeasures can be quantified. Utilizing the improved optimization model allows for deriving an optimal investment portfolio for each countermeasure within a fixed budget, considering information security costs, quantities, and effectiveness. This aids in securing the information security budget and effectively addressing information security threats.

Research on the Coupling Coordination Relationship between Regional Information Technology Level and Economic Development

  • Li, Jin-yang;kim, Hyung-Ho;Yang, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.153-162
    • /
    • 2022
  • The impact of the information technology industry on economic development is becoming increasingly important. In this study, we take China's provincial-level regions from 2015 to 2020 as the research object, comprehensively evaluates the level of their information technology systems by the entropy weight method, and then measures the coupling coordination relationship between the information technology system and the economic development system by the coupling coordination degree model. As a result, we found that the income of the information technology industry, the investment of talents and science research have the most important influence on the level of the information technology system. During the research period, with increasing values, the coupling degree of the two systems was at a high level. Affected by development strategies, diffusion effects and industrial relocation, the coupling degree in the central and western regions has shown a rapid growth trend. The coordination degree of the two systems is relatively low, and 83.9% of the provinces are in the medium-low coordination stage. The information technology industry has obviously promoted economic development. Besides, relevant policies should be introduced to effectively support and guide the high-quality development of the information technology industry and promote the high-level coordinated development of the two systems.

A Case Study on the Online Fractional Investment Securitization Platform (온라인 분할 투자 증권화 플랫폼 사례 연구)

  • Tae Hyup ROH
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.747-754
    • /
    • 2023
  • With the development of information and communication technology, online fractional investment platforms have emerged through the convergence of online platform technology and new investment techniques for asset-backed derivatives. In this study, the concept and previous studies of the online fractional investment platform business, commercialization models and service processes, market status, and pending discussions and alternatives were presented. Recently, the Securities and Futures Commission's decision on securitization of split ownership has become an important guide to the stable business sustainability of platform operators, but academic research is needed according to the current status and case analysis. To identify specific market issues, examples of representative online fractional investment securitization platform businesses such as "MusiCow" for music copyright, "Tessa" based on art, "Kasa" for real estate, "Piece" based on real assets, and "BangCow" for Korean beef shipments were analyzed. Through the case analysis of this study, the characteristics of the business model according to the basic assets of the online fractional investment platform were compared and presented. Since most business models are judged to be securitic, they must comply with the provisions of the Capital Markets Act or be recognized as the target of innovative financial services. From a practical point of view, it is meaningful in that it presented improvement directions that online fractional securitization platform operators should consider and organized institutional considerations for investor protection.

Comparative Analysis of a Competitive Technology for Major Future Energy Resources

  • Koo Young-Duk;Kim Eun-Sun;Park Young-Seo
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.2
    • /
    • pp.101-104
    • /
    • 2005
  • Recently advanced countries are making every effort to promote the efficiency of electric power production and supply, to deal with the environmental problems, and to develop the new energy. In particular, they are driving forward to develop various technologies for electric power in mid-long term, that are technology for building infrastructure of power transportation, establishing service network for account management using electronic technologies, elevating economic productivity by innovative electronic technologies, control-ling the discharge of global warming gas, using clean efficient energy, and so forth. However, power technology of Korea lagged behind than technology of advanced countries. Also, resources for developing power technology are limited in our country. Therefore, it is necessary to improve the efficiency of R&D investment. For it, our country must compare and analyze with technologies of advanced countries which are taking competitive advantage in the main future energy. Through comparative analysis, limited R&D resources of our country must be concentrated on technologies that can secure competitive advantage from now on.

Diffusion of ICT from the view of ICT generation: The experience in the UK during the 1980s

  • Hwang, Gyu-hee
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2001.05a
    • /
    • pp.205-242
    • /
    • 2001
  • This paper aims to provide a better understanding about how Information and Communication technology (ICT) has diffused. The investigation is conducted with the consideration of ICT evolution in terms of technological change and usage pattern. The definition used is presented as 'the ICT is a process of convergence of technologies between information-processing and information-transforming technologies, mainly due to the advent of microelectronlcs'. After examining technological changes of ICT, the diffusion path of ICT is traced through the usage ratio in total input and/or investment based on Input-Output tables (I-O). It shows that the evolution of ICT from the change of usage pattern is an up-and-down usage pattern rather than a uni-modal usage time path. With this recognition, the diffusion index is prepared. JEL classification : C43, L63, O33.

  • PDF

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.