• Title/Summary/Keyword: IT Business Network

Search Result 1,598, Processing Time 0.027 seconds

A study on the IT application for Freight Train System (화물철도에서 IT 기술 적용 방안)

  • Cho B. K.
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1219-1222
    • /
    • 2004
  • JP freight railway have national network, but to conduct management and work effectively, they need to improve communication infra and centralization of mainstay system. So in this study, the conversion of Host system into Server system and network terminal sharing according to plural system. Besides, to achieve more higher information from a new angle, IT Innovation office was inaugurated. In this study, new method will be considered to correspond administrative high-tech. for example ' E-business of freight station ', ' E-freight train ', ' Information service using IT '

  • PDF

Games in Community Network Businesses (커뮤니티 네트워크 형성게임)

  • Oh, Jeong-Hun
    • Asia pacific journal of information systems
    • /
    • v.11 no.3
    • /
    • pp.91-104
    • /
    • 2001
  • Like other communication networks, the Internet is establishing and reinforcing connections between market participants. By adapting to these networks, market participants are able to obtain the power of network to create new benefits in on-line markets. In this paper, we develop three stage non-cooperative game models to analyze the community related business market in electronic commerce where network externalities are present. It is found that, regardless of its market share, individual firm in a market tends to favor a community network. The analysis also shows there exist some possibilities that these community networks can trap the market in an inferior state when better alternatives are available to yield greater social welfare.

  • PDF

User-Perspective Issue Clustering Using Multi-Layered Two-Mode Network Analysis (다계층 이원 네트워크를 활용한 사용자 관점의 이슈 클러스터링)

  • Kim, Jieun;Kim, Namgyu;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.93-107
    • /
    • 2014
  • In this paper, we report what we have observed with regard to user-perspective issue clustering based on multi-layered two-mode network analysis. This work is significant in the context of data collection by companies about customer needs. Most companies have failed to uncover such needs for products or services properly in terms of demographic data such as age, income levels, and purchase history. Because of excessive reliance on limited internal data, most recommendation systems do not provide decision makers with appropriate business information for current business circumstances. However, part of the problem is the increasing regulation of personal data gathering and privacy. This makes demographic or transaction data collection more difficult, and is a significant hurdle for traditional recommendation approaches because these systems demand a great deal of personal data or transaction logs. Our motivation for presenting this paper to academia is our strong belief, and evidence, that most customers' requirements for products can be effectively and efficiently analyzed from unstructured textual data such as Internet news text. In order to derive users' requirements from textual data obtained online, the proposed approach in this paper attempts to construct double two-mode networks, such as a user-news network and news-issue network, and to integrate these into one quasi-network as the input for issue clustering. One of the contributions of this research is the development of a methodology utilizing enormous amounts of unstructured textual data for user-oriented issue clustering by leveraging existing text mining and social network analysis. In order to build multi-layered two-mode networks of news logs, we need some tools such as text mining and topic analysis. We used not only SAS Enterprise Miner 12.1, which provides a text miner module and cluster module for textual data analysis, but also NetMiner 4 for network visualization and analysis. Our approach for user-perspective issue clustering is composed of six main phases: crawling, topic analysis, access pattern analysis, network merging, network conversion, and clustering. In the first phase, we collect visit logs for news sites by crawler. After gathering unstructured news article data, the topic analysis phase extracts issues from each news article in order to build an article-news network. For simplicity, 100 topics are extracted from 13,652 articles. In the third phase, a user-article network is constructed with access patterns derived from web transaction logs. The double two-mode networks are then merged into a quasi-network of user-issue. Finally, in the user-oriented issue-clustering phase, we classify issues through structural equivalence, and compare these with the clustering results from statistical tools and network analysis. An experiment with a large dataset was performed to build a multi-layer two-mode network. After that, we compared the results of issue clustering from SAS with that of network analysis. The experimental dataset was from a web site ranking site, and the biggest portal site in Korea. The sample dataset contains 150 million transaction logs and 13,652 news articles of 5,000 panels over one year. User-article and article-issue networks are constructed and merged into a user-issue quasi-network using Netminer. Our issue-clustering results applied the Partitioning Around Medoids (PAM) algorithm and Multidimensional Scaling (MDS), and are consistent with the results from SAS clustering. In spite of extensive efforts to provide user information with recommendation systems, most projects are successful only when companies have sufficient data about users and transactions. Our proposed methodology, user-perspective issue clustering, can provide practical support to decision-making in companies because it enhances user-related data from unstructured textual data. To overcome the problem of insufficient data from traditional approaches, our methodology infers customers' real interests by utilizing web transaction logs. In addition, we suggest topic analysis and issue clustering as a practical means of issue identification.

Effect of Brand Personality on the Intention to Send a Job Application

  • Farid, Khemissi;Taha, Chebbi
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.147-154
    • /
    • 2022
  • Actually, brand personality is more and more important in marketing field. Considering the employee as consumer this paper will study the effect of employee brand personality on the intention to send a job application. In this research we tried to make the difference by following the qualitative methodology. we did ten interviews with IT engineering student in terminal classes and after thematique analysis tow thems emerged in relation with the brand personality factors which are sincerity and excitement. people are attracted by firms inspiring confidence and sincerity an exciting environment this is an important finding for firms who want to attract talented people. however, it important for enterprises in the IT filed to focus all their communication actions on the sincerity and excitement

An Analysis of the Effects of Small Business CEO's Competence Types on Business Performance (소기업CEO의 역량유형별 기업성과 영향분석)

  • Kim, Sung-jong
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.47-64
    • /
    • 2019
  • This study analyzed the effects of small business CEO's competencies type on business performance. For this purpose, 4 independent variables(strategic, marketing, management and network competencies) and 2 dependent variables(financial and non-financial performance) were used. 220 data were collected from the field survey questionnaires administered to a convenience sample of small business CEO. For hypothesis testing, the IBM SPSS Statistics 24.0 was used. Frequency analysis, exploratory factor analysis, correlation analysis, and hierarchical regression analysis were conducted. Empirical studies showed as follows. First, this study showed that the four competencies were significant to financial performance and the three competencies(except management competencies) were significant to non-financial performance. The higher small business CEO's competencies, the more likely it affects both the financial and non-financial performance of the company. Second, effects of small business CEO's competencies on financial performance were analyzed in order of network competencies > management competencies > strategic competencies > marketing competencies. Third, effects of small business CEO's competencies on non-financial performance were analyzed in order of network competencies > marketing competencies > strategic competencies. These findings had some implications. In academia, the impact forces of 4 small business CEO's competencies were analyzed for the first time. In practices, successful start-ups or sustainable management requires an interest in the active enhancement of small business CEO's competencies.

Conversations about Open Data on Twitter

  • Jalali, Seyed Mohammad Jafar;Park, Han Woo
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.31-37
    • /
    • 2017
  • Using the network analysis method, this study investigates the communication structure of Open Data on the Twitter sphere. It addresses the communication path by mapping influential activities and comparing the contents of tweets about Open Data. In the years 2015 and 2016, the NodeXL software was applied to collect tweets from the Twitter network, containing the term "opendata". The structural patterns of social media communication were analyzed through several network characteristics. The results indicate that the most common activities on the Twitter network are related to the subjects such as new applications and new technologies in Open Data. The study is the first to focus on the structural and informational pattern of Open Data based on social network analysis and content analysis. It will help researchers, activists, and policy-makers to come up with a major realization of the pattern of Open Data through Twitter.

Internet-based Distributed Control Networks. (인터넷을 이용한 분산제어 구현을 위한 네트워킹)

  • 송기원;최기상;최기흥
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.582-585
    • /
    • 2001
  • Requirements for device networks differ greatly from those of data(business) networks. Consequently, any control network technology which uses a fieldbus protocol is, in general, different from IP network protocol TCP/IP. One needs to integrate fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. This paper suggests a basic concept that can be applied to distributed control over IP network or internet. Specifically, LonWorks technology that uses LonTalk protocol is reviewed as device network. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. It is also addressed that many hardwired PLCs can be replaced by LonWorks devices. Connecting these remote LonWorks networks to the Internet can provide a powerful, integrated, distributed control system.

  • PDF

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

A Survey m Demand and Activation of Mobile Internet Business (무선인터넷 비즈니스 수요조사 및 활성화 방안)

  • 김철환;오광운
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.3
    • /
    • pp.1-19
    • /
    • 2002
  • This research investigates several essential topics of m-business by conducting a questionnaire to the professional experts. The topics include the market structure and business, the demand for available m-business service and its development, the market size and market growth factors, the service fee, the core technologies and technology development prediction. This paper contributes to the development of m-business in that it provides criteria and policies for more active and efficient treatment of m-business market under IMT2000 environment and also offers guides and plans of m-business activation for both government and enterprise.

  • PDF

Big Data Patent Analysis Using Social Network Analysis (키워드 네트워크 분석을 이용한 빅데이터 특허 분석)

  • Choi, Ju-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.2
    • /
    • pp.251-257
    • /
    • 2018
  • As the use of big data is necessary for increasing business value, the size of the big data market is getting bigger. Accordingly, it is important to apply competitive patents in order to gain the big data market. In this study, we conducted the patent analysis based keyword network to analyze the trend of big data patents. The analysis procedure consists of big data collection and preprocessing, network construction, and network analysis. The results of the study are as follows. Most of big data patents are related to data processing and analysis, and the keywords with high degree centrality and between centrality are "analysis", "process", "information", "data", "prediction", "server", "service", and "construction". we expect that the results of this study will offer useful information in applying big data patent.