Table 2. Evaluation metrics for defense informatization level.

Item Metric
IT infrastructure – Defense information network(A)
 Speed(A.1) <A-1-1>Average speed among main nodes
<A-1-2> Average speed between main node and secondary node (branch line)
<A-1-3> Average speed between secondary node and user
 Traffic(A.2) <A-2-1> Average traffic among main nodes
<A-2-2> Average traffic between main node and secondary node (branch line)
<A-2-3> Average traffic between secondary node and user
 Availability/recovery time (A.3) <A-3-1> Network availability
<A-3-2> Recovery time
IT infrastructure – Computer systems(B)
 Server utilization(B.1) <B-1-1> Average (maximum) CPU use ratio
<B-1-2> Average storage use ratio
 Server availability (B.2) <B-2-1> Server availability
<B-2-2> Server recovery time
 Server throughput (B.3) <B-3-1> Average tpmC (Transaction per minute by council)
<B-3-2> Average response time
 Work efficiency (B.4) <B-4-1> Input automation level (Input interface level)
IT infrastructure – Interoperability and standardization(C)
 Interoperability among ISs(C.1) <C-1-1> Average interoperability level among battlefield management information systems (MISs)
<C-1-2> Average data interconnection ratio among battlefield MISs
<C-1-3> Average interoperability level between battlefield MIS and resource MIS
<C-1-4> Average data interconnection level between battlefield MIS and resource MIS
<C-1-5> Average interoperability level among resource MISs
<C-1-6> Average data interconnection level among resource MISs
 Standardization of reference information (master data) (C.2) <C-2-1> Standardization ratio of reference information/code data (master data)
 Interoperability between weapon systems and IS (C.3) <C-3-1> Average interoperability level between weapon systems and battlefield MIS
<C-3-2> Average data interconnection ratio between weapon systems and battlefield MIS
IT infrastructure – Information security(D)
 Detection level (capability) of infringement incident(D.1) <D-1-1> Intrusion detection ratio in advance
 Response level (capability) of infringement incident(D.2) <D-2-1> Number of intrusion incidents per year
<D-2-2> Intrusion incident response time
 Recovery of infringement incident(D.3) <D-3-1> Trace ratio of infringement incidents
<D-3-2> Recovery time after infringement incident
Informatization environment(E)
 Efforts to improve informatization capability(E.1) <E-1-1> Annual time of informatization education
 Informatization master plan(E.2) <E-2-1> Informatization master plan
 Efficient execution of budget(E.3) <E-3-1> Efficiency of budget execution
IS use(F)
 Business informatization (F.1) <F-1-1> Ratio of tasks implemented by IS
 Business use(F.2) <F-2-1> Business use