IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > IT ÅëÁ¦/º¸Áõ Àü¹®¿ë¾î
  IT-enabled business investment (IT-enabled ºñÁî´Ï½º ÅõÀÚ)
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 07-06-24 23:37     Á¶È¸ : 4574     Ãßõ : 2     Æ®·¢¹é ÁÖ¼Ò
s
IT-enabled ºñÁî´Ï½º ÅõÀÚ´Â ÇÙ½ÉÀûÀÎ IT ¿ä¼Ò¸¦ Áö´Ñ ºñÁî´Ï½º¸¦ Áö¼Ó½ÃÅ°°í, ¼ºÀå½ÃÅ°°í ±×¸®°í º¯È­½ÃÅ°´Â ÅõÀÚ¸¦ ¸»ÇÑ´Ù.
 
¿¹¸¦ µé¸é, e-businessÀÇ ´ëÇ¥Àû »ó¡ÀÎ SCM, CRM, e-banking, e-trading, µîµî ÀÌ´Ù.
 
<ºÎ¿¬ ¼³¸í>
 
¿¹Àü¿¡, 'IT °Å¹ö³Í½º ¼Ö·ç¼Ç'À̶ó°í À߸ø ¾Ë·ÁÁø ITIL ¸ðµ¨ÀÇ ÀϺθ¦ ±¸ÇöÇÑ ¼Ö·ç¼ÇÀº ´ÜÁö SM (system management) »ç¾÷À» ¿µÀ§ÇÏ´Â ¾÷üµéÀÇ ÇÙ½É ÀÀ¿ë(mission-critical application)¿¡ ºÒ°úÇÑ °ÍÀÌ´Ù.
 
¸¸¾à, À¯»çÇÑ ¼Ö·ç¼ÇÀ» SM »ç¾÷À» ¿µÀ§ÇÏÁö ¾Ê´Â ±â¾÷ÀÇ ³»ºÎ IT Á¶Á÷¿¡¼­ ±¸ÇöÇÑ´Ù¸é, ÈξÀ Áß¿äµµ°¡ »ó´ëÀûÀ¸·Î ³·Àº ¾ÖÇø®ÄÉÀ̼ǿ¡ ºÒ°úÇÒ °ÍÀÌ´Ù.
 
°á·ÐÀûÀ¸·Î, IT °Å¹ö³Í½º ¼Ö·ç¼ÇÀº ¾ø´Ù. ´Ù¸¸, IT °Å¹ö³Í½ºÀÇ ÁÖ¿ä ¼­ºê ÇÁ·Î¼¼½º(Àü·« ¿¬°è, °¡Ä¡ Á¦°ø, À§Çè °ü¸®, ÀÚ¿ø °ü¸®, ¼º°ú °ü¸® µî)¸¦  Áö¿øÇϴ ¸Þ¼Òµå ȤÀº µµ±¸ ¸¸ÀÌ ÀÖÀ» »ÓÀÌ´Ù.

ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
Governance of IT Services (IT ¼­ºñ½º °Å¹ö³Í½º) (14) ½ÅÀÎö 09-05-12 27590 39
¹ø¿ª¾î ¼º¸³°úÁ¤ (13) ½ÅÀÎö 07-03-26 27376 24
75 IT-enabled business investment (IT-enabled ºñÁî´Ï½º ÅõÀÚ) ½ÅÀÎö 07-06-24 4575 2
74 a control deficiency (´ÜÀÏ ÅëÁ¦ ¹ÌºñÁ¡) ½ÅÀÎö 07-06-20 3898 2
73 IT general control (IT ÀÏ¹Ý ÅëÁ¦) ½ÅÀÎö 07-06-20 5122 4
72 application control (ÀÀ¿ë ÅëÁ¦, ¾ÖÇø®ÄÉÀÌ¼Ç ÅëÁ¦) ½ÅÀÎö 07-06-20 5180 1
71 COBIT¡¯s Information Criteria (COBIT¡¯s Á¤º¸ ±âÁØ) (1) ½ÅÀÎö 07-06-16 3910 1
70 issue (Çö¾È, À̽´) ½ÅÀÎö 07-06-09 3871 0
69 problem (¹®Á¦, ¹®Á¦Á¡) ½ÅÀÎö 07-06-09 3899 10
68 procedure (ÀýÂ÷) ½ÅÀÎö 07-06-09 4157 1
67 operational risk (¿î¿µ À§Çè) ½ÅÀÎö 07-05-29 4370 4
66 Inherent Limitations (Å»ýÀû ÇÑ°è) (1) ½ÅÀÎö 07-05-25 13267 3
65 Accreditation (Àΰ¡) ½ÅÀÎö 07-05-25 4610 10
64 certification (ÀÎÁõ) ½ÅÀÎö 07-05-25 3853 15
63 Deterrent control (¾ïÁ¦ ÅëÁ¦) ½ÅÀÎö 07-05-23 3939 9
62 directive control (ÁöÇâ ÅëÁ¦) ½ÅÀÎö 07-05-23 4163 10
61 vulnerability (Ãë¾à¼º) ½ÅÀÎö 07-05-21 3826 11
 1  2  3  4  5  6  7  8  9  10