• 제목/요약/키워드: Information Provider

검색결과 1,242건 처리시간 0.028초

제3자물류의 실태분석 및 활성화 방안에 관한 연구 (A study on the current status and ways of activating 3PL)

  • 이충규;김준석
    • 한국항만경제학회지
    • /
    • 제18권2호
    • /
    • pp.65-90
    • /
    • 2002
  • Despite the importance and necessity, the 3PL has not been activated to date. Among many views, customers claim that logistics service provider(LSP) are not prepared or capable of offering satisfactory 3PL services, while LSP emphasize the lack of mutual trust, closed corporate culture of the customer and excessive demand for reducing the costs. With this keeping in mind, it surveyed difference of perception between users and providers of 3PL services in terms of the actual status of using 3PL services, the degree of satisfaction and key factors for selecting 3PL provider through the questionnaire. As shown in this study, 43.3% of the respondents outsourced logistics services. However, Most company outsourced only inland transportation (49.5%) which is a simple and limited scope of 3PL services, but it also indicated that the percentage of users have ranged was less then 10% in outsourcing their whole logistics sector to 3PL provider and employing other logistics functions. Among respondents, a majority of the service provider stated that they offered satisfactory cost-saving to the customers, while users felt that the degree of satisfaction for using 3PL services was evaluated as at an average level and they more highly regarded the strong partnership of their 3PL provider rather than the saving of cost and improvement of customer's services. Moreover, in contrast to the 3PL providers which regard the most important factor for selecting 3PL service provider is the logistics cost quoted, users of 3PL services felt that the quality of services was more significant than the reduction of cost, and this tendency for selecting 3PL providers was shown in more advanced countries. While users of 3PL services indicated that the main reason for not using 3PL services was to avoid disclosing information of their business and it costs much for employing 3PL providers than doing themselves, 3PL providers thought it was due to reluctancy of opening information and resistance from the logistics division engaged in logistics activities concerned. Accordingly, providers and users of 3PL services should trust each other and prepare plan to activate 3PL services under the collaborative relationships as soon as possible.

  • PDF

프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론 (A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development)

  • 권오병
    • Asia pacific journal of information systems
    • /
    • 제18권1호
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Target Market Determination for Information Distribution and Student Recruitment Using an Extended RFM Model with Spatial Analysis

  • ERNAWATI, ERNAWATI;BAHARIN, Safiza Suhana Kamal;KASMIN, Fauziah
    • 유통과학연구
    • /
    • 제20권6호
    • /
    • pp.1-10
    • /
    • 2022
  • Purpose: This research proposes a new modified Recency-Frequency-Monetary (RFM) model by extending the model with spatial analysis for supporting decision-makers in discovering the promotional target market. Research design, data and methodology: This quantitative research utilizes data-mining techniques and the RFM model to cluster a university's provider schools. The RFM model was modified by adapting its variables to the university's marketing context and adding a district's potential (D) variable based on heatmap analysis using Geographic Information System (GIS) and K-means clustering. The K-prototype algorithm and the Elbow method were applied to find provider school clusters using the proposed RFM-D model. After profiling the clusters, the target segment was assigned. The model was validated using empirical data from an Indonesian university, and its performance was compared to the Customer Lifetime Value (CLV)-based RFM utilizing accuracy, precision, recall, and F1-score metrics. Results: This research identified five clusters. The target segment was chosen from the highest-value and high-value clusters that comprised 17.80% of provider schools but can contribute 75.77% of students. Conclusions: The proposed model recommended more targeted schools in higher-potential districts and predicted the target segment with 0.99 accuracies, outperforming the CLV-based model. The empirical findings help university management determine the promotion location and allocate resources for promotional information distribution and student recruitment.

B3G 네트워크에서 SLA 기반 QoS 매핑을 위한 연구 (A Study of QoS Mapping based on SLA in B3G Networks)

  • 문현주;이진관;정규철;이종찬;박상준;신성윤
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권3호
    • /
    • pp.157-165
    • /
    • 2011
  • B3G 네트워크에서 SLA 기반 QoS 관리방안은 서비스 이용자와 서비스 제공자 사이에서 이루어지는 협약으로 서비스 제공자는 협약된 사항을 근거로 사용자에게 통신 서비스를 제공하게 된다. 서비스 제공자는 협의된 서비스 레벨을 유지하기 위한 QoS 방안을 제공하며 이는 정책레벨에서 시스템 레벨까지의 세부방안을 포괄하여 다룬다. 협약된 서비스 정책에 의하여 서비스 제공자는 서비스 사용자와의 협약에 맞추어 정해진 QoS를 제공하며, 따라서 서비스 사용자는 신뢰적으로 서비스를 제공받을 수 있다. 따라서 본 논문에서는 B3G 네트워크에서 SLA 기반에서 이루어질 수 있는 서비스 협약을 통하여 사용자 서비스 제공을 위한 융합 망의 QoS 매핑에 대한 방안을 제안한다.

콘텐트 제공업

  • 한국데이터베이스진흥센터
    • 디지털콘텐츠
    • /
    • 12호통권67호
    • /
    • pp.24-34
    • /
    • 1998
  • 인터넷의 거센 물결에 국내 PC통신 환경이 변화하고 있다. 텍스트 위주의 정보 제공에서 멀티미디어 요소를 겸비한 콘텐트 중심으로 형태가 바뀌고 있는 것이다. 이런 변화의 물결 속에 정보제공업자의 명칭도 IP(Information Provider)에서 CP(Content Provider)로 바뀌고 있으며, 넷츠고와 채널아이 등 CP를 중심으로 한 통신사들이 기존 통신사를 위협하고 있다.

  • PDF

클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인 (Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective)

  • 박수경;조지연;이봉규
    • 한국IT서비스학회지
    • /
    • 제14권3호
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구 (A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server)

  • 정명규;박만곤
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

3차원 GIS 데이터제공자 시스템의 설계 및 구현 (Design and Implementation of a 3-dimensional GIS Data Provider System)

  • 남광우;이성호;박종현
    • Spatial Information Research
    • /
    • 제12권1호
    • /
    • pp.1-12
    • /
    • 2004
  • 이 논문에 설계된 데이터제공자는 2차원과 3차원 공간 데이터 및 시간 데이터를 저장, 검색할 수 있도록 설계되었다. 데이터제공자 시스템은 이미 수집, 구축된 2차원 및 3차원 공간 데이터를 특정 지리정보시스템에 종속적인 형태로 수정하거나 변환해야하는 추가적인 작업을 생략할 수 있도록 표준 인터페이스를 제공한다. 이 시스템은 다양한 GIS 또는 소프트웨어들이 동일한 방법으로 3차원 공간 데이터와 시간 정보에 접근할 수 있도록 메타정보를 관리하고 데이터베이스와 연결하는 데이터제공자 컴포넌트와 데이터소비자를 위해 3차원 혹은 시간차원이 포함된 GIS 데이터에 대한 인덱스 관리와 공간 연산을 담당하는 데이터접근자 컴포넌트를 포함한다. 이 3차원 데이터제공자 시스템은 다양한 3차원 공간 연산과 분석기능을 제공한다.

  • PDF

사용자의 익명성을 제어하는 신원 위탁 방식 제안 (The Proposals of Identity Escrow Scheme to Control User's Anonymity)

  • 황보성;이임영
    • 한국멀티미디어학회논문지
    • /
    • 제3권6호
    • /
    • pp.617-624
    • /
    • 2000
  • 사용자가 서비스 제공자에게 인증받는 단계에서 사용자의 익명성을 제공하기 위해 키 위탁의 응용인 신원위탁 방식을 이용한다. 신원 위탁 방석은 발행자에게 사용자의 정화한 신원을 제공하고 그에 따른 인증정보를 받는다. 사용자가 서비스 제공자에게 접근시 그의 정확한 신원을 주지 않고, 단지 이 인증정보만을 제공함으로써 사용자는 익명성을 유지한 체로 인증받을 수 있다. 하지만 사용자가 불법적 행동을 했을 경우, 서비스 제공자는 법 기관에게 익명성 제거를 요청한다. 법기관은 발행자와 협력을 통해 사용자의 정확한 신원을 드러낸다. 본 논문에서는 인증 절차시 사용자의 익명성을 제공하고 유사시 법기관과 발행자와의 협력을 통해 사용자의 익명성을 제거할 수 있는 새로운 신원 위탁 방식들을 제안한다.

  • PDF

우리나라 전화서비스 시장의 경쟁확립을 위한 요금정책 연구 (A Study on Pricing Policy for Consolidata Competition on the Telephone Service Market in Korea)

  • 조용환;옥주영;최승묵
    • 한국통신학회논문지
    • /
    • 제23권6호
    • /
    • pp.1627-1638
    • /
    • 1998
  • 본 논문에서는 현재 우리나라의 상황에서 경쟁체제에 적합한 효과적인 전화요금정책을 외국의 사례로부터 도출해 보았다. 특히 비대칭 요금규제 정책의 목표가 신구 사업자의 시장점유율에 있다고 보았을 때, 주어진 목표의 달성을 위해 지배적 사업자와 신규 사업자간의 요금격차가 어느 수준이어야 하는가를 경험적 분석을 통해 알아보았다. 시뮬레이션 결과는 우리나라의 통신산업 구조하에서 빠른 시일 내에 지배적 사업자가 존재하지 않는 시장구조가 되기 위해서는 급속한 전화서비스 수요의 증가가 이루어져야 함을 보였다. 또한 경쟁확립을 위해서는 지배적 사업자인 한국통신을 시급히 민영화하여야 하고 이와 더불어 시내전화 사업과 시외전화 사업을 회계분리 하여야 한다.

  • PDF