• Title/Summary/Keyword: Enterprise Search

Search Result 85, Processing Time 0.027 seconds

The Effect of Quality Management System and Absorptive Capacity on the Competitiveness of Small and Medium Venture Manufacturing Company in Electric and Electronic Industry (품질경영시스템과 흡수역량이 전기전자분야 중소벤처 제조기업의 경쟁력에 미치는 영향)

  • Jin, Sung-Han;Lee, Cheol-Gyu;Lee, Dong-Myung
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.2
    • /
    • pp.292-304
    • /
    • 2011
  • This study is to search for the core factors of improving competitiveness of small and medium venture manufacturing company in electric and electronic industry and to do an in-depth analysis of the relations with management performance through systematic approach and to provide implications of importance of the management for the improvement factors for the domestic small and medium venture manufacturing company in electric and electronic industry. The report is analyzed how the relationship between the quality management system that was discussed in existing literature and the core factors of absorbing capability impact to the enterprise management performance.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Multi-Dimensional Keyword Search and Analysis of Hotel Review Data Using Multi-Dimensional Text Cubes (다차원 텍스트 큐브를 이용한 호텔 리뷰 데이터의 다차원 키워드 검색 및 분석)

  • Kim, Namsoo;Lee, Suan;Jo, Sunhwa;Kim, Jinho
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.63-73
    • /
    • 2014
  • As the advance of WWW, unstructured data including texts are taking users' interests more and more. These unstructured data created by WWW users represent users' subjective opinions thus we can get very useful information such as users' personal tastes or perspectives from them if we analyze appropriately. In this paper, we provide various analysis efficiently for unstructured text documents by taking advantage of OLAP (On-Line Analytical Processing) multidimensional cube technology. OLAP cubes have been widely used for the multidimensional analysis for structured data such as simple alphabetic and numberic data but they didn't have used for unstructured data consisting of long texts. In order to provide multidimensional analysis for unstructured text data, however, Text Cube model has been proposed precently. It incorporates term frequency and inverted index as measurements to search and analyze text databases which play key roles in information retrieval. The primary goal of this paper is to apply this text cube model to a real data set from in an Internet site sharing hotel information and to provide multidimensional analysis for users' reviews on hotels written in texts. To achieve this goal, we first build text cubes for the hotel review data. By using the text cubes, we design and implement the system which provides multidimensional keyword search features to search and to analyze review texts on various dimensions. This system will be able to help users to get valuable guest-subjective summary information easily. Furthermore, this paper evaluats the proposed systems through various experiments and it reveals the effectiveness of the system.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

A Framework for Dynamic Growing of Web Service Applications based on ESB and Agent (웹 서비스 애플리케이션의 동적 성장을 위한 ESB와 에이전트 기반 프레임워크)

  • Lee, Chang-Ho;Kim, Jin-Han;Lee, Jae-Jeong;Lee, Byung-Jeong
    • The KIPS Transactions:PartA
    • /
    • v.14A no.7
    • /
    • pp.409-420
    • /
    • 2007
  • Software adaptation may be required to interact between heterogeneous platforms and to react to rapid change of environment in ubiquitous computing. Web service provides a way to use heterogeneous and distributed services or resources to utilize and organize them. But it is not easy to retrieve appropriate services when we search services because web service lacks of semantic information. Semantic web service provides additional information of services, but it does not support a method to match them in various ways. We can adapt and extend web applications by using web service, but a method for management and administration is still needed. Therefore in this paper, we propose a framework for dynamic growing of web service applications based on ESB(Enterprise Service Bus) and agent and provide a prototype to show its usefulness.

A Study on the implementation Strategy of the Next Generation Cadastral Information Service - Focus on the Case of Korea Cadastral Survey Corporation - (차세대 지적정보서비스 구현 전략 연구 - 대한지적공사 사례를 중심으로 -)

  • Lee, Bo-Mi;Lee, Yong-Mun
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.101-112
    • /
    • 2008
  • This study aims to show why we have to introduce SOA paradigm in the Cadastral Information System for coping with domestic and foreign IT environments flexibly and strengthening inner capability. We search the trend of up-to-date IT paradigm such as Enterprise GIS, SOA and etc. from this, we worked out the concept of Cadastral Information System. we also could see the introduction case of the domestic and foreign next generation Cadastral Information System, there is implications for us. also, we analysis the general condition about information system which KCSC(Korea Cadastral Survey Corporation) own in a general way and estimate the SOA level degree for each information system. and on that base, we set up SOA loadmap for implementation the next generation of Cadastral Information Service. This is an important step for building ideal future information systems which KCSC hope to be. For realizing this, we focus our inner capability on integration without duplicate and re-using the inner information infra.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

A Study on the Support Policy for Digital Transformation of Small Businesses (소상인 디지털 전환 지원 정책에 관한 연구)

  • Lee, Chul-Sung;Kim, Young-Ki;Kim, Seung-Hee
    • Journal of Distribution Science
    • /
    • v.16 no.2
    • /
    • pp.89-99
    • /
    • 2018
  • Purpose - In this study, we discuss the current status and barriers of digital transformation focused on small businesses. More specifically, this study consists of two studies. The purpose of study 1 is to investigate the effect of digitization of small businesses on the sales of stores and the number of visiting customers. The purpose of Study 2 is to examine the status and obstacles of online channels use by small businesses. Research design, data, and methodology - In Study 1, we will examine the changes in sales and visitor numbers of stores that are rapidly adapting to digital transformation among small business. For this, we utilize the actual situation of store management survey conducted by the Small Enterprise and Market Service. Specifically, multiple regression equations were used to determine whether blogs and online shopping malls were operating, and the proportion of credit cards to sales as independent variables and sales and number of visiting customers as dependent variables. Next, in Study 2, we surveyed the 15 small business owners in the latest survey on the actual situation of store management survey conducted in 2015, and conducted an in-depth interview to examine the barriers to the use of online channels by small business. Results - As a result of study 1, it is found that the small business who run the blogs have higher sales and visits than the small business who do not. However, there is no difference in the sales and the number of visiting customers between the stores that operate the online shopping malls and those that do not. Second, the higher the proportion of credit cards, the higher the sales and the number of visiting customers. In study 2, we analyzed the barriers to the expansion of online channels by in-depth interviews. Interviews show that barriers to access to online channels are limited by search neutrality, high commission burden, and low bargaining power. These problems are caused by the insufficiency of small business compared to online and mobile portal and O2O platform vendors. Conclusions - This study suggests that small business who have difficulty in establishing direct online channels need digital transformation of small business. In addition, when using such an external platform, we have identified the problems that small business face.

A Design of the OOPP(Optimized Online Portfolio Platform) using Enterprise Competency Information (기업 직무 정보를 활용한 OOPP(Optimized Online Portfolio Platform)설계)

  • Jung, Bogeun;Park, Jinuk;Lee, ByungKwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.493-506
    • /
    • 2018
  • This paper proposes the OOPP(Optimized Online Portfolio Platform) design for the job seekers to search for the job competency necessary for employment and to write and manage portfolio online efficiently. The OOPP consists of three modules. First, JDCM(Job Data Collection Module) stores the help-wanted advertisements of job information sites in a spreadsheet. Second, CSM(Competency Statistical Model) classifies core competencies for each job by text-mining the collected help-wanted ads. Third, OBBM(Optimize Browser Behavior Module) makes users to look up data rapidly by improving the processing speed of a browser. In addition, The OBBM consists of the PSES(Parallel Search Engine Sub-Module) optimizing the computation of a Search Engine and the OILS(Optimized Image Loading Sub-Module) optimizing the loading of image text, etc. The performance analysis of the CSM shows that there is little difference in accuracy between the CSM and the actual advertisement because its data accuracy is 99.4~100%. If Browser optimization is done by using the OBBM, working time is reduced by about 68.37%. Therefore, the OOPP makes users look up the analyzed result in the web page rapidly by analyzing the help-wanted ads. of job information sites accurately.

Analysis of the influence of food-related social issues on corporate management performance using a portal search index

  • Yoon, Chaebeen;Hong, Seungjee;Kim, Sounghun
    • Korean Journal of Agricultural Science
    • /
    • v.46 no.4
    • /
    • pp.955-969
    • /
    • 2019
  • Analyzing on-line consumer responses is directly related to the management performance of food companies. Therefore, this study collected and analyzed data from an on-line portal site created by consumers about food companies with issues and examined the relationships between the data and the management performance. Through this process, we identified consumers' awareness of these companies obtained from big data analysis and analyzed the relationship between the results and the sales and stock prices of the companies through a time-series graph and correlation analysis. The results of this study were as follows. First, the result of the text mining analysis suggests that consumers respond more sensitively to negative issues than to positive issues. Second, the emotional analysis showed that companies' ethics issues (Enterprise 3 and 4) have a higher level of emotional continuity than that of food safety issues. It can be interpreted that the problem of ethical management has great influence on consumers' purchasing behavior. Finally, In the case of all negative food issues, the number of word frequency and emotional scores showed opposite trends. As a result of the correlation analysis, there was a correlation between word frequency and stock price in the case of all negative food issues and also between emotional scores and stock price. Recently, studies using big data analytics have been conducted in various fields. Therefore, based on this research, it is expected that studies using big data analytics will be done in the agricultural field.