• Title/Summary/Keyword: information provider

Search Result 1,246, Processing Time 0.03 seconds

A Study on the Effect of Industrial Category and Organizational Characterisitics on the Use of IT Infrastructure Services (산업유형과 조직특성 요인이 정보기술 인프라스트럭처 서비스 이용에 미치는 영향에 관한 연구)

  • Choi, Jae Young;Kim, Hyeon Seop
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.71-87
    • /
    • 2008
  • In order to survive in a competitive environment, many companies are taking much interest in building IT infrastructure and are investing in that area. But, despite of all the interest and investments, many companies are unsatisfied and confused because of the lack of guidance and understandings of IT infrastructure. Therefore the purpose of this study is to prove that the level of IT usage is different according to organizational characteristics and industrial categories, and to give a guideline to companies' planning on newly building IT infrastructure. In conclusion, companies newly planning on building IT infrastructure should consider the amount of information technology functional uses according to the organizational characteristics and industrial category and they follow the below guidelines. On building the IT infrastructure the organization having the characteristics of formalization should consider and provide the standardization function first. The companies having the characteristics of decentralization should consider and provider firstly the application and communication function. And the companies having the characteristics of specialization should consider and provider the security function.

An Explorative Study on the Core Competency of Application Service Providers and its Influence on Business Performance (ASP(Application Service Providers)의 핵심 역량과 성과 탐색)

  • An Joon M.;Lee Jin Sun
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.81-96
    • /
    • 2005
  • ASP (Application service provider) as a new type of information systems service has been popular recently and has taken a much attention of information systems professionals and researchers. One stream of the research on ASP performed by IS community dealt with utilization and benefits of ASP systems use. The other researchers argue the importance of ASP vendors' capability to provide users with appropriate services. Kern, Lacity and Willcock (2002) summarized the components of core competency of service providers based on their extensive case studies on application service providers. Also, Levina and Ross (2003) developed a value delivery process of application service Providers in their case study This study is developing Prepositions and an empirical model based on the theory of core competency from strategic management study. The dimension of core competency is composed of management competency, technical service competency and customer service competency. Each dimension is made up of competency items derived from previous studies and adapted by professionals in ASP industry. The validity of the dimensions and items in each dimension has been checked with factor analytic method for empirical test. The core competency dimensions are correlated with performance factors of application service providers including growth of revenue, asset and customer base.

  • PDF

A Functional Modeling of Composition Manager for Service Composition Based on TINA (개방형 정보통신망 기반의 서비스 컴포지션을 위한 컴포지션 관리자 모델링)

  • 신영석;임선환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.344-351
    • /
    • 2004
  • This paper describes a modeling of service composition manager based on TINA (Telecommunication Information Networking Architecture). The service composition function is mainly motivated by the desire to easily generate new service using existing services from retailers or third party service providers. The TNA-C (Consortium) specification for the service composition does not include the detailed composition procedures and its object models. In this paper, we propose a model of components for the service composition, which adapts a static composition feature in a single provider domain To validate the proposed modeling, we implemented prototype service composition function, which combines two multimedia services; a VOD (Video On Demand) service and a VCS (Video Conference Service) service. As a result, we obtain the specification of the detailed composition architecture between a retailer domain and a third-party service provider domain.

A New Framework of 6lowpan node for Neighboring Communication with Healthcare Monitoring Applications

  • Singh, Dhananjay;Lee, Hoon-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.281-286
    • /
    • 2009
  • The proposed technique uses cyclic frame structure, where three periods such as beacon period (BP), mesh contention access period (MCAP) and slotted period (SP) are in a data frame. This paper studies on a mechanism to allow communication nodes (6lowpan) in a PAN with different logical channel for global healthcare applications monitoring technology. The proposed super framework structure system has installed 6lowpan sensor nodes to communicate with each other. The basic idea is to time share logical channels to perform 6lowpan sensor node. The concept of 6lowpan sensor node and various biomedical sensors fixed on the patient BAN (Body Area Network) for monitoring health condition. In PAN (hospital area), has fixed gateways that received biomedical data from 6lowpan (patient). Each 6lowpan sensor node (patient) has IP-addresses that would be directly connected to the internet. With the help of IP-address service provider can recognize or analyze patient data from all over the globe by the internet service provider, with specific equipments i.e. cell phone, PDA, note book. The NS-2.33 result shows the performance of data transmission delay and data delivery ratio in the case of hop count in a PAN (Personal Area Networks).

  • PDF

A Link Protection Scheme with a Backup Link Spanning Tree for Provider Backbone Bridged Networks and Implementation (프로바이더 백본 브리지 망을 위한 백업링크 스패닝트리 기반 링크장애 복구기능과 구현)

  • Nam, Wie-Jung;Lee, Hyun-Joo;Yoon, Chong-Ho;Hong, Won-Taek;Moon, Jeong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.58-68
    • /
    • 2010
  • In this paper, we propose an efficient link protection switching scheme for provider backbone bridge systems with a spanning tree for backup links exclusively, and evaluate its performance. The proposed scheme offers guaranteed QoS flows even when a link fault occurrs in the primary link by flooding the flows over the profiled spanning tree. The flooding mechanism over the spanning tree can also provide low latency and remove the loopback flows. We also derive the efficiency of bandwidth usage for the normal flows and the number of lost frames during the link restoration. For evaluating its feasibility, we implement a prototype of PBB-TE systems based on the Linux bridge codes, which can support both link protection switching capability with CCM and MAC-in-MAC encapsulation. A related protocol analyzer is also developed. One can see that the proposed scheme and the prototype can be useful for developing carrier class Ethernet systems based on PBB-TE.

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.

A Study on Application of Integrated Marketing Communication (IMC) Strategy for the Efficiency in Information Services of a Public Information Service Institution (공공정보서비스기관의 정보서비스 효율화를 위한 IMC 전략 적용 방안에 관한 연구)

  • Kim, Chan-Ho;Park, Kyong-Seok;Song, Hye-Eun;You, Yong-Bok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.516-530
    • /
    • 2004
  • With the advent of knowledge-based society where knowledge generates power, the importance of information is growing than ever before. However, it is not easy to find necessary information in time. Collecting, processing and disseminating valuable information is getting more and more important. If those information include scientific and technical issues, it is more difficult to connect the sender and receiver, provider and consumer and also creates various factors and situation. This study aims to provide an application method of IMC(Integrated Marketing Communication) Strategy for efficient information services of science and technology which is one of KISTI's major functions. An analysis was proceeded in 3 categories with provider and receiver, and medium and message. The current problem in system was reviewed through each analysis and a feasible plan for the realization of IMC Strategy in future is proposed.

  • PDF

Design and Implementation of Java Crypto Provider for Android Platform (안드로이드 플랫폼을 위한 자바 보안 프로바이더 설계 및 구현)

  • Son, Mikyung;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.851-858
    • /
    • 2012
  • Java crypto library such as SUN JCA/JCE or BC JCE is generally used to implement secure applications for smart devices using Android platform. Programming functions written by Java language are launched and executed inside Java Virtual Machine (JVM), thereby difficult to use system hardware specific functionalities and degrading performance as well. In case of crypto primitive, few secure applications can use crypto primitive executing in JVM because both amount of computing and complexity of such primitives are very high. From the aspect of performance, in particular, time sensitive real time applications such as streaming services or secure application frequently applying public key based crypto algorithm cannot use Java crypto library. To solve the problem, we design and implement crypto library which employ JNI and NDK methods to directly access functions that implemented by native language such as C or C++. The proposed Java Crypto provider supports faster execution. Also developer can use our provider in the same way by writing traditional Java crypto library.

SLA (Service Level Agreement) Metrics in IT Operation Outsourcing (정보체계 운영 아웃소싱에 있어서의 서비스 수준 측정 메트릭)

  • 김용수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.69-79
    • /
    • 2004
  • For the successful IT operation outsourcing there need appropriate metrics on which both of the service clients and provider agree. The metrics are used to set up the service level objectives, which are manifested in the service level agreement with price. A study of metrics is necessary for the following reasons: First, most of the metrics used today were introduced in the early years of computers and are not satisfactory to both of the service providers and clients. Second, metrics represent the performance of system components but not end-user satisfaction. Third, because the service provider leads the outsourcing agreement, the objectives are specified more favorable to the provider. The objectives should be based on metrics that both sides fully understand and agree on.

  • PDF

A Conceptual Model for an Administrative and Legal Process Provider of Urban Regeneration using Construction Interactive Electronic Technical Manual (전자매뉴얼을 활용한 도시재생사업의 법.행정절차 제공 시스템의 개념적 모형)

  • Park, Moon-Seo;Jeong, Jin-Wook;Lee, Hyun-Soo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.3
    • /
    • pp.33-42
    • /
    • 2010
  • Recently construction industry has faced new era as following the advances of IT technology. It becomes possible that information and knowledge among people are exchanged actively thanks to computer-based tools. In fact, the tools, PMIS(Project Management Information System) and KMS(Knowledge Management System) already have been introduced to constuction industry successfully. Lately IETM(Interactive Electronic Technical Manual) is tried to be one of these systems. This trying is being enlarged that the IETM's concept is changed to administrative and legal process provider throughout the lifespan of construction projects. However, it is hard to define construction IETM in mega-scale project like urban regeneration project because construction projects are complex and have diverse stakeholders. These properties may make the IETM ambiguous system. To do define IETM as a administrative and legal process provider, this research will conduct survey and interview, then analyze its own properties and find out design strategies. Based on the properties and strategies, suggesting IETM's system demands and architecture of urban regeneration processes.