Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea society of IT services
Journal Basic Information
Journal DOI :
The Korea Society of Information Technology Services
Editor in Chief :
Lim Gyu Geon
Volume & Issues
Volume 3, Issue 2 - Nov 2004
Selecting the target year
The Analysis on the Forecasting Demand & the Implementation of IT Systems for SMEs
Hyoung, Jun-Ho ; Kim, Moon-Sun ; Hwang, Soon-Hwan ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 1~8
Recently, most managers of Small & Medium Enterprises(SMEs) think that all problem of a company is solved if only implementation of ERP or e-business. But it's too risky. Technology of IT is developing so radical, so managers didn't have enough time to consider what system is appropriate in their business process and how implement information system is when they establish Information System. This Study addresses the present Information System that operating and needed for SMEs based on the Value Chain of IS. Thus through the prediction on the consequence of IS implementation, we could cut down unnecessary investment cost and support core competence of a company. Next time, the study on the classification of more detail IS associated in SME's performance is required.
An Exploratory Study on Capacity Sizing Method for Information System: Focus on H/W Sizing in Pubic Sector
Ra, Jong-Hei ; Choi, Kwang-Don ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 9~23
Interest about Information infrastructure construction is enlarged socially according to arrival of information age, and various information systems are constructed for efficient business processing, customer service in public sector. According to subjective method for performance improvement for information system of public sector and engine that propel information system construction because it is no definite hardware sizing guidelines for information system caterer, is calculating resource volume of information system. It is situation that problem of excess of scale or reduce sizing is happening and is causing various kind of problems that is waste of information budget and service decline thereby. In this research, we proposed hardware sizing framework for information system that is applied to pubic sector.
A Study for Governmental Support to Building Information Systems of Small and Medium-sized Enterprises
Suh, Chung-Woo ; Kim, Eun-Hong ; Ahn, Sung-Mahn ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 25~37
SME's(Small and Medium-sized Enterprises) have limited resources to build information systems on their own. They do not have effective information systems and not utilize e-business technology enough. The government thus have provided various supports for SME's IT developments. However, those supports do not seem so effective that SME's can operate appropriate information systems and do e-business well. The objective of this study is to develop conceptual policies for the government. We suggest an integrated government support which consists of three core stratigies: one-stop service center, outsourcing of public service, and triggering strategy. In order for the government support to be effective, the government should serve SME's needs continuously and professionally.
The Approach for ERP Courses into University Curriculum
Yoon, Cheol-Ho ; Kim, Sang-Hoon ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 39~51
Based on investigating and analyzing the cases of advanced foreign universities that have already included ERP courses in their education systems, this study proposed the ways of incorporating ERP courses into Korean universities' curriculums in terms of the following three areas: 1) development of ERP courses, 2) establishment and maintenance of ERP education environment, 3) continuous evaluation and improvement of ERP education implementation. As reasonable ERP courses, "Introduction to ERP" targeted to educating overall basic concepts in ERP system and business administration, "ERP System Implementation" for fostering business process design and system implementation skills, "ERP Programming" such as ABAP for the purpose of customizing ERP system, and "Strategic Use of ERP" dealing with ERP package selection and implementation methodologies of effective utilization of ERP systems were suggested. Regarding the establishment and maintenance of ERP education environment, single server architecture model that contained both database and application was proposed with the intention of set-up cost saving and maintenance efficiency. As for the evaluation and improvement on ERP education implementation, its methodologies were introduced through analyzing the advanced cases. Finally in addition to the above three areas, critical success factors for effectively launching ERP education in the universities were suggested through reviewing the previous case studies.
Exploring on Risk Factors of SI Project Escalation and SI Project De-escalation
Kim, Sang-Yoon ; Baek, Seung ; Choi, Duck-Sun ; Oh, Soo-Jin ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 53~64
For many reasons, SI(Systems Integration) projects can fail. Sometimes, they can result in considerable financial losses to the organizations that undertake them. These projects are abandoned or redirected. However, the cost of project abandonment or redirection can represent a tremendous waste of organizational resources. By managing failure factors carefully, project managers can prevent projects from failing. Types of project failure can be categorized into escalation and de-escalation. Project escalation is that, as projects progress, the project scopes keep increasing. Project de-escalation is that, as projects progress, the project scopes keep decreasing. This study examine relative importance of risk factors that cause project escalation and de-escalation.
A Field Study on the Loss Factors of IS Development Project in the Public Sector: Perspectives of Project Management
Jang, Sung-Bong ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 65~84
This research analyzes the causes of delay and resulting additional expenses on the IS project in the public sector, and then proposes some solutions to the problem. Through a field study, the research found that the causes include employer's attitude, the leadership and risk management ability of the project manager, and qualifications of project members. In order to avoid those problems, the project manager should secure various communication channels and good relationship between the employee and the contractor.
The Implementation of A XML/PKI based Digital Tax Invoice System
Kim, Jin-Cheol ; Oh, Young-Whan ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 85~98
As the e-Commerce based on the XML technology is getting bigger, user authentication, integrity, non-repudiation and confidentiality has become important for security. Since the XML technology is widely used for exchanging information among the Internet e-business systems, the security of XML documents is essentially required and XML digital signature should be supported. To support the digital signature of XML documents, W3C proposed the XML-Signature specification as an international standard that describes five transform algorithms. In this paper, we design and implement a XML/PKI based digital tax invoice system. Our system supports the five transforming algorithms defined in the XML-Signature specification and exchanges digital tax invoices among enterprises securely. We design and implement the flexible and efficient system consists of reusable components using CBD(Component Based Development).
A Study on the Implementation of a D-Class Computation Package based on Java
Lim, Bum-Jun ; Han, Jae-Il ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 99~104
Conventional and public-key cryptography has been widely accepted as a base technology for the design of computer security systems. D-classes have the potential for application to conventional and public-key cryptography. However, there are very few results on D-classes because the computational complexity of D-class computation is NP-complete. This paper discusses the design of algorithms for the efficient computation of D-classes and the Java implementation of them. In addition, the paper implements the same D-class computation algorithms in C and shows the performance of C and Java programming languages for the computation-intensive applications by comparing their execution results.
The Roadblocks and Chances of Component-Based Development Business in Korea SI Industry: a Case of BOK-WIRE System
Kim, Kang-Suk ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 105~118
Since Component-Based Development, or CBD, struck Korea SI industry a heavy blow several years ago, many major SI companies in Korea have implemented the CBD practices in real world, leveraging supports from the government and academic world. The result, however, falls short of their expectations. The major reason is that they have mainly focused on CBD processes and technical issues around it, although it is necessary as well to deal with other non-technical issues in order to make business values from CBD. This paper begins with reminding us what CBD tries to achieve indeed in terms of software development processes, then recognizes what we have achieved so far introducing a recent CBD project case, BOK-WIRE system. Thereafter, it reveals the chances that SI companies must take in order to make their CBD efforts succeed, pointing out what are the roadblocks really.
Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking
Park, Bae-Hyo ; Lee, Jae-Il ; Hahn, Gene-Beck ; Nyang, Dae-Hun ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 119~127
A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.
An Applicable Study on the Architecture Framework in the MND
Kim, Young-Do ; Seo, Min-Woo ; Son, Tae-Jong ;
Journal of the Korea society of IT services, volume 3, issue 2, 2004, Pages 129~140
Traditional information systems in the Ministry of National Defense(MND) are insufficient about interoperability between all kinds of them. Also there is no the applicable architecture framework to develop information systems. The Architecture Framework(AF) is to provide guidance for describing architectures for both warfighting operations and business operations and processes in the MND. Therefore, in this paper we propose the MND AF to develop and manage information systems in the MND.