• Title/Summary/Keyword: 거래관계

Search Result 1,179, Processing Time 0.025 seconds

A Method of Mining Visualization Rules from Open Online Text for Situation Aware Business Chart Recommendation (상황인식형 비즈니스 차트 추천기 개발을 위한 개방형 온라인 텍스트로부터의 시각화 규칙 추출 방법 연구)

  • Zhang, Qingxuan;Kwon, Ohbyung
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.83-107
    • /
    • 2020
  • Selecting business charts based on the nature of the data and the purpose of the visualization is useful in business analysis. However, current visualization tools lack the ability to help choose the right business chart for the context. Also, soliciting expert help about visualization methods for every analysis is inefficient. Therefore, the purpose of this study is to propose an accessible method to improve business chart productivity by creating rules for selecting business charts from online published documents. To this end, Korean, English, and Chinese unstructured data describing business charts were collected from the Internet, and the relationships between the contexts and the business charts were calculated using TF-IDF. We also used a Galois lattice to create rules for business chart selection. In order to evaluate the adequacy of the rules generated by the proposed method, experiments were conducted on experimental and control groups. The results confirmed that meaningful rules were extracted by the proposed method. To the best of our knowledge, this is the first study to recommend customizing business charts through open unstructured data analysis and to propose a method that enables efficient selection of business charts for office workers without expert assistance. This method should be useful for staff training by recommending business charts based on the document that he/she is working on.

Analyzing the Interdependent Role of Network Centrality, Motivation and Ability in Knowledge Sharing (네트워크 중심성, 자율적 동기, 그리고 능력 간의 상호의존적 관계가 지식공유에 미치는 영향에 관한 연구)

  • Jung, Sangyoon;Rho, Sangkyu
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.49-78
    • /
    • 2019
  • In the context of knowledge sharing, network position has been a controversial subject. A central position in the network provides access to non-redundant knowledge, leading to more opportunities of knowledge sharing. On the other hand, as "bridging" relationships, its characteristics as a "weak tie" suggest innate lack of trust and reciprocity which is considered an impediment to share knowledge. This paper attempts to enlighten the underlying dynamic by examining the interaction between network centrality, motivation and ability in knowledge sharing. Furthermore, this paper examines the concept of knowledge sharing ability in depth by operationalizing the construct into three aspects: extensive and diverse knowledge, social media utilization ability and self-efficacy. The results show a partially supported three-way interaction, where the highest level of knowledge provision is reported when the employee has low network centrality, high autonomous motivation and high knowledge sharing ability, i.e. extensive and diverse prior knowledge. Though all models indicate strong associations between network centrality and knowledge sharing, this suggests an even greater power of motivation and ability that gives the strength to overcome unfavorable environments of peripheral position. Therefore, this paper offers an alternative explanation to the existing debate whether network centrality positively or negatively influences knowledge sharing.

Study of Strategic Alliance and Anti-Trust Immunity on Airline Industry (전략적 제휴와 독점금지예외조항에 관한 연구)

  • Hong, Seock-Jin;Kim, Je-Chul
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.37-56
    • /
    • 2004
  • As part of the ongoing global process of airlines forming strategic alliances, Korean Air has become a member of the SkyTeam Alliance, while Asiana has joined the Star Alliance. However, as something akin to the Anti-Trust Immunity(ATI) initiative has not been ratified domestically, these two airlines have seen their roles within these strategic alliances significantly reduced. In keeping with its domestic airline liberalization policy the U.S. government has instituted a mechanism through which foreign airlines that join such strategic alliances with their American counterparts can be exempt from the U.S. antimonopoly law. As a result, U.S. airlines have been able to forge wide ranging cooperative relations with foreign airlines, and thus increased their competitiveness within the air transport industry. This study analyzes the applicability of this Anti-Trust Immunity initiative to the domestic environment.

  • PDF

Metadata Ontology Design for B2B Business Process Registries (기업간 비즈니스 프로세스 등록저장소를 위한 메타데이터 온톨로지 설계)

  • Kim, Jong-Woo;Kim, Hyoung-Do;Yun, Jung-Hee;Jung, Hyun-Chul
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.435-446
    • /
    • 2007
  • B2B registries are information systems to register B2B related business information such as companies' profiles, business documents, business processes, and services and to provide query facilities to find information about potential business partners. Focusing on the design of the registry for B2B business processes, in this paper, a metadata ontology is designed to register B2B business processes. In practice, there are several competitive business process definition languages such as ebXML BPSS (Business Process Specification Schema), WSBPEL (Web Service Business Process Execution Language), BPMN (Business Process Modeling Notation), and so on. In order to register heterogeneous business processes based on different representation frameworks, the proposed metadata ontology consists of three layers, common metadata, language-specific metadata, and interrelationship metadata. To show the usefulness of the proposed metadata ontology, two examples which are represented by ebXML BPSS and WSBPEL respectively are described in order to show how the proposed metadata ontology is used to registry B2B business processes. To implement the proposed metadata ontology using ebXML registry, metadata mapping scheme to ebRIM (ebXML Registry Information Model) is also suggested.

A View Interpolation Method for Multi-view Video of Large Disparity (변위 범위가 큰 다시점 비디오에 적합한 영상보간법)

  • Lee, Cheon;Oh, Kwan-Jung;Ho, Yo-Sung
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.55-58
    • /
    • 2006
  • 차세대 방송서비스 개발의 일환으로 관심을 모으고 있는 다시점 비디오 부호화(multi-view video coding, MVC) 방식은 인접한 여러 대의 카메라로 동시에 획득한 영상을 효과적으로 압축하는데 그 목적이 있다. 이때, 중간시전 영상을 생성하여 부호화하는 과정의 참조영상으로 이용할 수 있으며, 이를 위해서는 다시점 비디오 특성에 맞는 영상보간 방법이 필요하다. 기존에 제안되었던 영상보간법은 변위의 검색범위를 초기에 설정하여 블록정합을 이용하여 화소 단위로 변위를 측정하기 때문에 카메라 사이의 거리가 크거나 객체의 움직임이 커서 변위의 변동이 심한 영상에서는 안정적인 화질의 영상을 얻기 어렵다. 또한, 고정된 크기의 블록을 이용하여 전체 변위를 측정하므로 객체의 변위차가 큰 영역에서 변위 오류가 많이 발생한다. 본 논문에서는 이와 같은 문제를 해결하여 보다 개선된 화질의 중간시점 영상을 얻기 위한 새로운 영상보간법을 제안한다. 영역분할을 이용한 초기의 변위측정 과정에서, 처음부터 최대 변위의 범위를 설정하는 대신에 블록 단위로 대략적인 변위륵 측정한 후에, 가변 블록을 이용하여 보다 세밀한 변위를 측정한다. 이 방법은 변위차가 큰 객체의 경계 부분에서 보다 정확하게 변위를 측정 할 수 있으므로, 화소 단위로 변위를 측정할 때 이전에 추한 변위 정보를 바탕으로 각 화소별로 검색 범위를 설정한다. 적응적으로 설정된 검색 범위를 이용하여 화소 단위의 변위를 측정하면 보다 개선된 변위를 얻을 수 있다. 추가적으로, 변위측정 과정에서 발생하는 변위의 오류를 최대한 줄이기 위해 각 단계별로 미디언 필터를 이용하여 변위 오류를 수정하였다. 본 논문에서 제안한 방법으로 실험한 결과 기존의 영상보간 방법보다 화질이 약 $1{\sim}4dB$ 정도 개선되었다.필, 투명도 등을 위성원격탐사 자료와 GIS를 이용하여 공간분석을 실시하고, 공간분포도를 작성함으로써 대상해역의 해양환경을 파악하였다. 본 연구결과, 분석된 위성자료가 현장조사에 의한 검증이 이루어지지 않을 경우, 영상자료분석을 통한 표층수온 추출은 대기 중의 수증기와 에어로졸에 의한 계산치의 오차가 반영되기 때문에 실측치 보다 낮게 평가 될 수 있으므로, 반드시 이에 대한 검증이 필요함을 알 수 있었다. 현지관측에 비해 막대한 비용과 시간을 절약할 수 있는 위성영상해석방법을 이용한 방법은 해양수질파악이 가능할 것으로 판단되며, GIS를 이용하여 다양하고 복잡한 자료를 데이터베이스화함으로써 가시화하고, 이를 기초로 공간분석을 실시함으로써 환경요소별 공간분포에 대한 파악을 통해 수치모형실험을 이용한 각종 환경영향의 평가 및 예측을 위한 기초자료로 이용이 가능할 것으로 사료된다.염총량관리 기본계획 시 구축된 모형 매개변수를 바탕으로 분석을 수행하였다. 일차오차분석을 이용하여 수리매개변수와 수질매개변수의 수질항목별 상대적 기여도를 파악해 본 결과, 수리매개변수는 DO, BOD, 유기질소, 유기인 모든 항목에 일정 정도의 상대적 기여도를 가지고 있는 것을 알 수 있었다. 이로부터 수질 모형의 적용 시 수리 매개변수 또한 수질 매개변수의 추정 시와 같이 보다 세심한 주의를 기울여 추정할 필요가 있을 것으로 판단된다.변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로, 반전거래전략을 활용하는 경우 주식투자기간은 24개월이하의 중단기가 적합함을 발견하였다. 이상의 행태적 측면과 투자성과측면의 실증결과를 통하여 한국주식시장에 있어서 시장수익률을 평균적으로 초과할 수 있는 거래전략은

  • PDF

Partial Dimensional Clustering based on Projection Filtering in High Dimensional Data Space (대용량의 고차원 데이터 공간에서 프로젝션 필터링 기반의 부분차원 클러스터링 기법)

  • 이혜명;정종진
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.69-88
    • /
    • 2003
  • In high dimensional data, most of clustering algorithms tend to degrade the performance rapidly because of nature of sparsity and amount of noise. Recently, partial dimensional clustering algorithms have been studied, which have good performance in clustering. These algorithms select the dimensional data closely related to clustering but discard the dimensional data which are not directly related to clustering in entire dimensional data. However, the traditional algorithms have some problems. At first, the algorithms employ grid based techniques but the large amount of grids make worse the performance of algorithm in terms of computational time and memory space. Secondly, the algorithms explore dimensions related to clustering using k-medoid but it is very difficult to determine the best quality of k-medoids in large amount of high dimensional data. In this paper, we propose an efficient partial dimensional clustering algorithm which is called CLIP. CLIP explores dense regions for cluster on a certain dimension. Then, the algorithm probes dense regions on a next dimension. dependent on the dense regions of the explored dimension using incremental projection. CLIP repeats these probing work in all dimensions. Clustering by Incremental projection can prune the search space largely and reduce the computational time considerably. We evaluate the performance(efficiency, effectiveness and accuracy, etc.) of the proposed algorithm compared with other algorithms using common synthetic data.

  • PDF

Stock Price Prediction Using Sentiment Analysis: from "Stock Discussion Room" in Naver (SNS감성 분석을 이용한 주가 방향성 예측: 네이버 주식토론방 데이터를 이용하여)

  • Kim, Myeongjin;Ryu, Jihye;Cha, Dongho;Sim, Min Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.61-75
    • /
    • 2020
  • The scope of data for understanding or predicting stock prices has been continuously widened from traditional structured format data to unstructured data. This study investigates whether commentary data collected from SNS may affect future stock prices. From "Stock Discussion Room" in Naver, we collect 20 stocks' commentary data for six months, and test whether this data have prediction power with respect to one-hour ahead price direction and price range. Deep neural network such as LSTM and CNN methods are employed to model the predictive relationship. Among the 20 stocks, we find that future price direction can be predicted with higher than the accuracy of 50% in 13 stocks. Also, the future price range can be predicted with higher than the accuracy of 50% in 16 stocks. This study validate that the investors' sentiment reflected in SNS community such as Naver's "Stock Discussion Room" may affect the demand and supply of stocks, thus driving the stock prices.

Real Option Study on Cookstove Offset Project under Emission Allowance Price Uncertainty (배출권 가격 불확실성을 고려한 고효율 쿡스토브 보급사업 실물옵션 연구)

  • Lee, Jaehyung
    • Environmental and Resource Economics Review
    • /
    • v.29 no.2
    • /
    • pp.219-246
    • /
    • 2020
  • From the Phase II (2018~2020) of K-ETS, the offset credit from 'CDM projects that domestic companies and others have carried out in foreign countries' can be used in the K-ETS. As a result, stakeholders in the K-ETS market are actively developing overseas CDM projects, such as the 'high-efficiency cook stove project'. which can secure a large amount of credits while marginal cost is relatively low. This paper develops the investment decision-making model of offset project for the 'high-efficiency cook stove project' using the real option approach. Under the uncertainty of the emission allowance price, the optimal investment threshold (p) is derived and sensitivity analysis is conducted. As a result, in the standard scenario (PoA-S), the optimal investment threshold is 29,054won/ton, which is lower than the stock price (pspot). However, allocation entities are not only economics in the CDM project, but also CDM risk factors such as non-renewable biomass ratio, cook stove replacement ratio, equity ratio with host country, investment period and submission limitation of emission allowance. In addition, offset project developers will be able to derive the optimal investment threshold for each business stage and use it for economic feasibility checks.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

A Study on the Impact of Security Risk on the Usage of Knowledge Management System : Focus on Parameter of Trust (보안위험 수준이 지식관리시스템의 성공에 미치는 영향 : '신뢰'를 매개변인으로)

  • Ahn, Joong-Ho;Choi, Kyu-Chul;Sung, Ki-Moon;Lee, Jae-Hong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.143-163
    • /
    • 2010
  • The purpose of this study is to investigate the user's perception of security risk and examine its impact on the usage of Knowledge Management Systems(KMS). The findings of this study are three-fold. First, the overall user's perception of security risk is not high. However, there is a considerably big difference in the perception of security risk among users. This finding means that user's perception of a security risk is not based on the actual security effects but one's individual perception. Another finding is that user's perception of a security risk has a negative impact on the usage of KMS through "trust", which is a mediating variable in our study. This finding corresponds with the existing theory that security risk is oneof the critical sources of trust, and trust is a critical factor of user's acceptance of KMS. Finally, the result of this study reveals that activities devoted to security do not decrease the effectiveness and productivity of KMS. Our long-held cognition that security activity hinders the effectiveness and productivity of an information system is not particularly applied to the KMS.