• Title/Summary/Keyword: 비즈니스 프로세스 융합

Search Result 51, Processing Time 0.041 seconds

A Study on UX-centered Smart Office Phone Design Development Process Using Service Design Process (서비스디자인 프로세스를 활용한 UX중심 오피스 전화기 디자인개발 프로세스 연구)

  • Seo, Hong-Seok
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.41-54
    • /
    • 2022
  • The purpose of this study was to propose a "user experience (UX)-centered product development process" so that the product design development process using the service design process can be systematized and used in practice. In a situation in which usability research on office phones is lacking compared to general home phones, this study expands to a product-based service design point of view rather than simple product development, intending to research ways to provide user experience value through office phone design in smart office. This study focused on extracting UX-centered user needs using the service design process and developing product design that realizes user experience value. In particular, the service design process was applied to systematically extract user needs and experience value elements in the product development process and to discover ideas that were converged with product-based services. For this purpose, the "Double Diamond Design Process Model," which is widely used in the service design field, was adopted. In addition, a product design development process was established so that usability improvement plans, user experience value elements, and product-service connected ideas could be extracted through a work-flow in which real users and people from various fields participate. Based on the double diamond design process, in the "Discover" information collection stage, design trends were identified mainly in the office phone markets. In the "Define" analysis and extraction stage, user needs were analyzed through user observation, interview, and usability survey, and design requirements and user experience issues were extracted. Persona was set through user type analysis, and user scenarios were presented. In the "Develop" development stage, ideation workshops and concept renderings were conducted to embody the design, and people from various fields within the company participated to set the design direction reflecting design preference and usability improvement plans. In the "Deliver" improvement/prototype development/evaluation stage, a working mock-up of a design prototype was produced and design and usability evaluation were conducted through consultation with external design experts. It is meaningful that it established a "UX-centered product development process" model that converged with the existing product design development process and service design process. Ultimately, service design-based product design development process was presented so that I Corp.'s products could realize user experience value through service convergence.

ICT Utilization for Optimization of SME Decision Making (중소기업 의사결정 최적화를 위한 ICT 활용 방안)

  • Park, Ji-Young;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.275-280
    • /
    • 2018
  • Companies are now rapidly entering the realm of the realtime economy named 'Now Economy'. 'Now Economy' features the measurement and assessment, accelerating speed of decision making about business. According to this, companies intend to change their disposition to be able to make quick and accurate decision by gathering informations rapidly and correctly, and then by processing that. Applications of ICT can be possible to change the new decision system of companies. In this thesis, the new decision system through amalgamations of BPMS, Mobile, Cloud Service, Hadoop, BI and AI is presented. It will be able to make decision quickly and accurately by collecting all information between the most efficiently managed process and formal and informal data inside company through this, and then by combining changes with situations outside company.

Review of change and response strategies for ESG management (ESG 경영을 위한 변화 및 대응 전략 검토)

  • Choe Yoowha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.75-79
    • /
    • 2023
  • ESG management means to thoroughly consider the investor's perspective when evaluating corporate value, and environmental, social, and governance issues are continuous and strategic monitoring issues in identifying risk and opportunity factors related to corporate management activities. In other words, the perspective of value creation is reflected in business relationships. The fundamental purpose of ESG management is continuous business value creation and thorough management of investment risks and business transactions in contractual relationships. It is also a requirement of linked investors. The field that Korean companies are currently experiencing the most is the recognition that 'ESG information collection is necessary and maintenance must be prioritized' in investor IR and global sales and marketing departments, and the primary need for this is emerging. In addition, as the legal affairs office, environmental safety department, and human resources department, which conduct compliance management, carry out related tasks, clarity at the organizational level must precede in order to properly establish an information integration and management system. It covers the scope of securing new market opportunities such as management, disclosure and communication. Therefore, in regard to the newly emerging ESG management and response methods, it is necessary to review and implement it repeatedly so that sustainable exchange profits can be created by simultaneously managing non-financial risks as well as efforts to enhance corporate value for financial returns.

Development of the Logistics Network Diagnostic Assessments and Monitoring Service to promote Eco-driving Behaviors for Truck Drivers (화물 운전자의 에코 드라이빙을 위한 물류 네트워크 진단평가 모니터링 서비스 개발)

  • Song, Byung Jun;Ahn, Hyejeong
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.15-19
    • /
    • 2011
  • The transportation and logistics industries, the constructions of a green transport methods for logistics systems are presented. They aims the greenhouse gas emissions 37% savings compared to BAU(Business As Usual) for a green growth of national strategy by 2020. An eco-driving training for truck drivers is a typical way. However there are few studies such as the integrated data collection automatically and the diagnostic Assessments and monitoring methods of logistics network status to show the effects of the eco-driving. To solve this problem, this paper provides previous research on logistics network diagnostics assessments and monitoring service and eco-driving. Then this paper shows developments of the logistics network diagnostic assessments and monitoring service business flow to promote eco-driving behaviors for truck drivers based on a smart phone application. Also, it shows an efficiency through an application results in field test.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

A Study on Context Aware Agent Development for Mobile Convergence (모바일 컨버전스를 위한 상황인식 에이전트 개발에 관한 연구)

  • Kwon, Kyu-Heum;Shin, Ho-Jun;Kim, Seong-Won;Kim, Haeng-Kon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.271-274
    • /
    • 2005
  • 현재 무선인터넷의 중요성이 강조되면서 모바일 단말 장치는 모바일 비즈니스 프로세스에서 중요한 역할을 담당한다. 특히 모바일 장비는 차세대 기술인 임베디드와 유비쿼터스 컴퓨팅의 주요 단말 장치이며 개발 대상이다. 앞으로 차세대 이동통신망 중심의 융합 및 이동 단말의 컴퓨팅 능력이 고도화되면 언제, 어디서나, 누구와도 모든 정보를 이용할 수 있는 고속 멀티미디어 통신 환경 즉, 유비쿼터스 환경이 구축될 것이며 향후 이러한 환경에서 모바일 컨버전스 서비스는 특정 시점의 사용자 상황에 적절한 서비스를 제공하는 상황인식의 특성을 가지게 될 것이다. 따라서, 본 논문에서는 모바일 컨버전스를 위한 상황인식 에이전트 개발을 위한 컴퓨팅 아키텍처를 정의하고 개발을 용이하기 위해 재사용 가능한 컴포넌트를 기반으로 하여 모바일 컨버전스에 대한 분석 및 설계에 관하여 제시하였다. 이를 통해 모바일 환경에서 재사용성 및 이식성과 에이전트 개발에 대한 시간과 비용에 대한 절감을 기대할 수 있다.

  • PDF

Differences Between Client's and Supplier's receptions of IT Outsourcing Risks (IT아웃소싱 위험에 대한 고객과 공급업체와의 인식 차이)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.237-242
    • /
    • 2018
  • Researchers have suggested successful risk management as a key factor in successful IT outsourcing projects implementation. The documented investigations, however, have mainly addressed risk management only from a single perspective of either clients or IT vendors. This study explored the potential perception inconsistency regarding the risks between the client and the vendor for IT outsourcing projects by using a quasi-Delphi approach. The analysis results indicated some inconsistencies in the risks perceived by the two parties: (1) the clients regarded (a) lack of vendor commitment to the project and (b) poor vendor selection criteria and process as top critical risks but the vendors didn't; and (2) on the other hand, the vendors perceived (a) unclear requirements and (b) lack of experience and expertise with project activities as significant risks but the clients didn't. Insights into how the client and the vendor perceive risks may help both parties determine how to partner and manage project risks collaboratively to succeed in outsourcing.

A Framework for Success of Industrial Clusters: The Fusion of Online and Offline Businesses (온라인과 오프라인이 융합된 성공적 산업클러스터의 프레임워크)

  • Yi Jung-Sub;Jang Hyeong-Wook
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.96-107
    • /
    • 2006
  • This paper explores the benefits provided by the adoption and implementation of electronic commerce in a particular SME-intensive productive environment: the geographical cluster. This study develops a conceptual framework that highlights the six types of benefits obtained by integrating online business with offline business. Using data from 73 traditional companies in Korean port clusters, factor analysis was used to figure out six benefits including sharing information, cost savings, value-added service, customer relationship, enhanced trust, and marketing efficiency. The six empirically derived critical benefit factors were then used to examine how they improve management performance of the traditional offline companies in the cluster measured by Balanced Scorecard(BSC). According to the results, we concluded that the offline firms in the cluster can take advantages of extending to online business.

  • PDF

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.

Different Perceptions of Motivational Factors between Sharing Economy Service Types (공유경제 서비스 유형별 동기요인 분석)

  • Shim, Su-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.110-122
    • /
    • 2019
  • IT innovation, cultural revolution based on smart and social networks diversified sharing economy services. Due to the rising of business utilizing the sharing economy concept, it is important to better understand the motivational factors that drive and deterrent sharing economy services in the marketplace. Based on responses from 809 adult users, 3 drivers and 2 deterrents affecting intention to use of sharing economy services were identified. Then this study categorized sharing economy services as three types of segments based on consumer perceptions and subjectivity, and analyzed differencies of perceptions on motivational factors between groups. As a result, redistribution market group has shown meaningful different average scores on economic benefit, sustainability and social risk with other groups. Based on the empirical evidence, this study suggests several propositions for future studies and implications for sharing economy businesses on how to formulate optical strategies and manage users.