• Title/Summary/Keyword: key questions

Search Result 337, Processing Time 0.028 seconds

A Study on the Evaluation Model of Strategic Information Systems Planning (정보시스템 전략계획 평가모형에 관한 연구)

  • 김동태;문용은;이재범
    • Korean Management Science Review
    • /
    • v.15 no.1
    • /
    • pp.149-178
    • /
    • 1998
  • Strategic Information Systems Planning(SISP) has gained considerable interest among researchers and practitioners in recent years Which has instigated various related research. Neverthless, only 24 percent of the projects recommended as a result of SISP are ultimately performed. This statistics raise the questions for the need of SISP. This study provides the framework that may enable SISP to be more effectively utilized by studying factors for consideration from the review of pertinent literature. These factors will then be validated by case studies of domestic companies and by simultaneously inducing key characteristics and solutions of SISP. The result of the study indicate some inconsistency between literal factors and the case study. The factors added through case study were considered to be actual factors of SISP. This study emphasized the role of the senior manager, the quality of the implementation of the state plan, change management and the capability of the planning team. As a key characteristics of domestic companies considered was the general lack of ability to collect and analyze data. In addition, the domestic companies have little consideration of the organizational contingency factors.

  • PDF

정보시스템 전략계획 평가에 관한 연구

  • 김동태;문용은;이재범
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.245-249
    • /
    • 1996
  • Strategic Information Systems Planning(SISP) has gained considerable interest among researchers and practitioners in recent years which has instigated various related research. Nevertheless, only 24 percent of the projects recommended as a result of SISP are ultimately performed. This statistics raise the questions for the need of SISP. This study provides the framework that may enable SISP to be more effectively utilized by studying factors for consideration from the review of pertinent literature. These factors will then be validated by case studies of domestic companies and by simultaneously inducing key characteristics and solutions of SISP. The result of the study indicates some inconsistency between literal factors and the case study. The factors added through case study were considered to be actual factors of SISP. This study emphasized the role of the senior manager, the quality of the implementation of the state plan and the capability of the planning team. As key characteristics of domestic companies considered were the general lack of ability to collect and analyze data. In addition, the domestic companies have little consideration of the organizational contingency factors.

  • PDF

An Empirical Investigation of Task-Technology Fit: Context of RFID in Disaster Management

  • Ahmed, Ashir
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.345-370
    • /
    • 2014
  • The notion of technological adoption such as Radio Frequency Identification (RFID) has been examined in various domains such as supply chain management, inventory management and health care. However, there are several unanswered questions surrounding how this technology is adopted in disaster management. This study attempts to explore the potential of RFID in disaster management. The notion of Task-Technology Fit (TTF) is deemed suitable for this purpose and thus used as the theoretical framework that is further validated by employing multiple case studies. The empirical findings indicate that there are six key factors influencing the decision to adopt RFID in disaster management. Some relate to aspects of RFID when it is put into practice, namely cost, compatibility, standardisation, implementation and locatability; while the other key factor relates to privacy and security aspect of information. It is hoped that the findings of this research will inform disaster management organizations to better plan the adoption of RFID for their operations.

Reviews on Customer Knowledge Management Researches

  • Lu, Qi-Cheng;Feng, Wei
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.202-208
    • /
    • 2007
  • As one of the key strategic resources, the customer knowledge not only improves the performance of customer relationship management, but fosters the sustained competitive advantages as it creates values for customers with customer knowledge management. On the basis of the general introduction of research on customer knowledge management, this paper develops the research on customer knowledge management from the perspective of strategic management, and discusses further relevant studies concerning concepts of customer knowledge and customer knowledge management, studying perspectives, key questions as well as development directions for research, and so on.

  • PDF

Analysis of Authentication Methods for Smartphone Banking Service using ANP

  • Park, Keon Chul;Shin, Jae Woo;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2087-2103
    • /
    • 2014
  • What is an ideal authentication method for smartphone banking services? And what are the critical elements to be considered when designing it? To provide valuable insight for these questions, this study investigates various authentication requirements to be considered in smartphone banking service with the aspect of security, convenience and cost. By applying Analytic Network Process (ANP), this study first analyzes priorities among the requirements and then draws an ideal authentication method for smartphone banking service. Moreover, a sensitivity analysis has been conducted by varying the relative importance of several requirements. The results from the judgment of 72 experts revealed that, although Korean government has obliged the use of Public Key certificate, OPT and biometric alternatives may prove to be more appropriate for the smartphone banking service. These results will contribute to the provision of more secured and convenient smartphone banking services.

Schema- and Data-driven Discovery of SQL Keys

  • Le, Van Bao Tran;Sebastian, Link;Mozhgan, Memari
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.3
    • /
    • pp.193-206
    • /
    • 2012
  • Keys play a fundamental role in all data models. They allow database systems to uniquely identify data items, and therefore, promote efficient data processing in many applications. Due to this, support is required to discover keys. These include keys that are semantically meaningful for the application domain, or are satisfied by a given database. We study the discovery of keys from SQL tables. We investigate the structural and computational properties of Armstrong tables for sets of SQL keys. Inspections of Armstrong tables enable data engineers to consolidate their understanding of semantically meaningful keys, and to communicate this understanding to other stake-holders. The stake-holders may want to make changes to the tables or provide entirely different tables to communicate their views to the data engineers. For such a purpose, we propose data mining algorithms that discover keys from a given SQL table. We combine the key mining algorithms with Armstrong table computations to generate informative Armstrong tables, that is, key-preserving semantic samples of existing SQL tables. Finally, we define formal measures to assess the distance between sets of SQL keys. The measures can be applied to validate the usefulness of Armstrong tables, and to automate the marking and feedback of non-multiple choice questions in database courses.

Seed collection strategies for plant restoration with the aid of neutral genetic diversity

  • CHUNG, Mi Yoon;SON, Sungwon;MAO, Kangshan;LOPEZ-PUJOL, Jordi;CHUNG, Myong Gi
    • Korean Journal of Plant Taxonomy
    • /
    • v.49 no.4
    • /
    • pp.275-281
    • /
    • 2019
  • One key step in the plant restoration process is the collection of seeds from the field. For the selection of source populations of target plant species for translocation purposes (reintroduction or reinforcements), several approaches are possible. A practical method involves the use of data from reciprocal transplant studies. If no direct data are available, knowledge of population genetics and the phylogeography of the target species can serve as an alternative. In this short review, we briefly propose guidelines for those collecting seeds for plant species restoration based on population genetics theory, focusing on two main questions: Where does the plant material come from and how are sources designated, and how are seeds efficiently collected from local populations? While genetic data on a larger scale (phylogeography and population genetics) are needed to form a reply to the first question, similar data on a smaller scale (fine-scale genetic structures within populations) are necessary to shed light on the second issue.

Neuronal function and dysfunction of CYFIP2: from actin dynamics to early infantile epileptic encephalopathy

  • Zhang, Yinhua;Lee, Yeunkum;Han, Kihoon
    • BMB Reports
    • /
    • v.52 no.5
    • /
    • pp.304-311
    • /
    • 2019
  • The cytoplasmic FMR1-interacting protein family (CYFIP1 and CYFIP2) are evolutionarily conserved proteins originally identified as binding partners of the fragile X mental retardation protein (FMRP), a messenger RNA (mRNA)-binding protein whose loss causes the fragile X syndrome. Moreover, CYFIP is a key component of the heteropentameric WAVE regulatory complex (WRC), a critical regulator of neuronal actin dynamics. Therefore, CYFIP may play key roles in regulating both mRNA translation and actin polymerization, which are critically involved in proper neuronal development and function. Nevertheless, compared to CYFIP1, neuronal function and dysfunction of CYFIP2 remain largely unknown, possibly due to the relatively less well established association between CYFIP2 and brain disorders. Despite high amino acid sequence homology between CYFIP1 and CYFIP2, several in vitro and animal model studies have suggested that CYFIP2 has some unique neuronal functions distinct from those of CYFIP1. Furthermore, recent whole-exome sequencing studies identified de novo hot spot variants of CYFIP2 in patients with early infantile epileptic encephalopathy (EIEE), clearly implicating CYFIP2 dysfunction in neurological disorders. In this review, we highlight these recent investigations into the neuronal function and dysfunction of CYFIP2, and also discuss several key questions remaining about this intriguing neuronal protein.

Technological Convergence Strategy and Growth Policy of SMEs in Korea: Network Analysis on IT and BT Convergence (국내 중소기업의 기술융합 전략 및 성장 정책: IT & BT 융합기술 기반 네트워크 분석)

  • Lee, Sang-Hoon;Kwon, Sang-Jib
    • Knowledge Management Research
    • /
    • v.16 no.2
    • /
    • pp.113-137
    • /
    • 2015
  • Many scholars have addressed the technological convergence of small-medium sized firms in Korea and their impact on the economic growth of nation. Nevertheless, most studies have been investigated the relationship between entrepreneurship and venture creation, and a few studies have analyzed the innovation and technological convergence of SMEs. The purpose of this research is to gain industrial insight into the technological convergence and to suggest a dynamic growth policy for entrepreneurs of SMEs to improve their convergence performance based on IT and BT. Therefore, we intend to propose solutions to these key questions in convergence such as; what are the key patterns in the process of technological convergence of SMEs on IT and BT, and what kinds of strategy do their need? In order to answer these research questions, we adopt network analysis using patent citation information. Results of network analysis revealed that building ecosystem based on government and universities is one of the most important factors for the future growth of SMEs in Korea. Also, the fit between technological convergence direction of SMEs and division of convergence structure of government and universities will be positively associated with dynamic growth of SMEs in Korea. In conclusion, this research extends the current studies on important aspects of SMEs in the technological convergence process by proposing their growth in convergence process to a newly converging context, IT and BT, and shed light on the integrative perspectives of crucial roles of SMEs on innovation performance in the IT and BT technological convergence.

Implementation of Fuzzy Comprehensive Evaluation System for Multi-level Decision Making (다층 의사결정을 위한 퍼지 포괄 평가 시스템 구축)

  • Park, Yong Kuk;Lee, Min Goo;Jung, Kyung Kwon;Won, Young-Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.169-177
    • /
    • 2015
  • This paper described a fuzzy comprehensive evaluation method and implemented assessment system for multi-layer decision making. The proposed method is a assessment before bidding through the key questions using fuzzy comprehensive evaluation method and the entropy weights. The key questions are given by the wider investigation of major sports event organizers. The paper carried out evaluation of single factor and fuzzy comprehensive evaluation from low layer to high layer step by step. In order to verify the effectiveness of proposed method, we built the sports event management service platform (SEMSP) for assessment of applicant city. This method represents a unified one of the quantitative results and the qualitative results based on the judgment of experts.