• Title/Summary/Keyword: Information Sharing Cost Model

Search Result 74, Processing Time 0.032 seconds

eMRA: Extension of MRA Considering the Relationships Between MDR Concepts (eMRA: MDR의 개념간 관계성을 고려한 MRA 확장)

  • Joo, Young-Min;Kim, Jangwon;Jeong, Dongwon;Baik, Doo-Kwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.3
    • /
    • pp.161-172
    • /
    • 2013
  • Metadata registry (MDR) is the international standard, developed by ISO/IEC for exchange and sharing data between databases. Many MDR systems are used in diverse domains such as medical service, bibliography, environment for sharing and integrating data. However, those systems have different physical structures individually because the MDR standard defines only the metamodel for registering and storing metadata. It causes heterogeneity between the system structures and requires additional cost to maintain interoperability. ISO/IEC 13249-8 Metadata Registry Access (MRA) is developing as an international standard to provide a consistent access facility to data stored in different metadata registries. However, MRA does not consider the relationships between the concepts (classes) defined in the MDR specification. It causes that incorrect query results returned from MDR systems. It also requires additional cost of modeling and rewriting queries to reflect each physical model. Therefore, this paper suggests eMRA which considers the relationships between the concepts in MDR. The comparative evaluations are described to show the advantages of eMRA. eMRA has superior performance in query modeling and referential integrity than MRA defined by the relationship between the concept of MDR.

The Design and Implementation of e-BCOS as Web based Component Repository (웹 기반 컴포넌트 저장소 e-BCOS 설계 및 구현)

  • Kim, Guk-Boh
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.211-223
    • /
    • 2005
  • The current software development type is based on CBD (Component Based Development). However, it requires a new component model that can support rapid and accurate component information on the web due to the cost increase of building new components using CBD. The purposed of this paper is to promptly develop an application on the web which fulfills users' demand and to provide specific interface regarding the small scales of distributed component in business domains. The e-BCOS(e-Business Component System) is the agent system for the users to register distributed components and to search component information, which would increase reusability through the e-business component development of distributed components in business domains and help the users understand the information about the component. Moreover, XML is employed for specification which allows smooth specification sharing and delivery to satisfy users' variable demands.

Construction and Applications of the Virtual Automotive Plant for a Victual Manufacturing (가상생산기술 적용을 위한 자동차 가상플랜트 구축 및 활용)

  • No, Sang-Do;Lee, Gyo-Il;Son, Chang-Yeong;Han, Hyeong-Sang;Park, Yeong-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.25 no.10
    • /
    • pp.1627-1635
    • /
    • 2001
  • Virtual manufacturing is a technology facilitating effective development and agile manufacturing of products via sophisticated computer models representing physical and logical schema and behavior of real manufacturing systems including manufacturing resources, environments, and products. For the successful application of this technology, a virtual plant as a well-designed and integrated environment is essential fur sharing information and engineering collaboration among diverse engineering activities. The systematic approaches and effective methods for construction and application of a virtual plant are proposed in this paper, such as a 3-D CAD modeling, cell and line simulations, databases and some information technologies. Measuring and 3-D CAD modeling technologies of many equipments, facilities and structures of the building are developed, and effective information management system managing CAD models, related files and data is implemented in WWW environments. Finally, precise simulations of unit cell lines and the whole plant are performed. For the beginning of implementing a Virtual Automotive Plant, the Virtual Plant fur the Body Shop of a Korean automotive company is constructed and implemented. We could obtain the benefit of savings in time and cost in many manufacturing preparation activities in the new car development processes.

Pairwise Key Agreement Protocols Using Randomness Re-use Technique (난수 재사용 기법을 이용한 다중 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.949-958
    • /
    • 2005
  • In the paper we study key agreement schemes when a party needs to establish a session key with each of several parties, thus having multiple session keys. This situation can be represented by a graph, tailed a key graph, where a vertex represents a party and an edge represents a relation between two parties sharing a session key. graphs to establish all session keys corresponding to all edges in a key graph simultaneously in a single session. A key agreement protocol of a key graph is a natural extension of a two-party key agreement protocol. We propose a new key exchange model for key graphs which is an extension of a two-party key exchange model. using the so-called randomness re-use technique which re-uses random values to make session keys for different sessions, we suggest two efficient key agreement protocols for key graphs based on the decisional Diffie-Hellman assumption, and prove their securities in the key exchange model of key graphs. Our first scheme requires only a single round and provides key independence. Our second scheme requires two rounds and provides forward secrecy. Both are proven secure In the standard model. The suggested protocols are the first pairwise key agreement protocols and more efficient than a simple scheme which uses a two-party key exchange for each necessary key. Suppose that a user makes a session key with n other users, respectively. The simple scheme's computational cost and the length of the transmitted messages are increased by a factor of n. The suggested protocols's computational cost also depends on n, but the length of the transmitted messages are constant.

A Study of Family Caregiver's Burden for the Terminally III Patients (지역사회 말기질환자 가족 부담감에 관한 연구)

  • Han, Sung-Suk;Ro, You-Ja;Yang, Soo;Yoo, Yang-Sook;Kim, Sek-Il;Hwang, Hee-Hyung
    • Journal of Home Health Care Nursing
    • /
    • v.10 no.1
    • /
    • pp.58-72
    • /
    • 2003
  • The purpose of this study was to describe the perceived burden of the terminally III patients's caregiver and to analyze relationship between the perceived burden and the various demographics, illness characteristics, family relationships, and economic factor of the family & patients. The sample of 132 caregivers who care for the terminally III patients Kyung-Gi province, Seoul, Korea. The period of this study was from August to September, 2002. The perceived burden of the family caregiver was measured by the burden scale(20 items, 4 point scale) developed by Montgomery et al. (1985). The Data was analyzed using SAS-program by t-test and ANOVA. The results were as follows; 1. The mean of the family caregiver's burden score was 3.02. The score showed that caregivers perceive severe the level of burden. The hight items of the family caregiver's burden were' I feel it is painful to watch patient's diseases'(3.77). 'I feel afraid for what the future holds for my patients'(3.66), 'I feel it reduced to amount of privacy time'(3.64). 2. The caregiver's burden was significantly related to patient's gender(F=3.17, p= 0.0020), patient's job(F=2.49, p=0.0476), caregiver's age(F=4.29, p=0.0030), and caregiver's job(F=2.49, p=0.0476). 3. The caregiver's burden according to illness characteristics showed no significant difference. 4. The caregiver's burden was significantly associated with patient's family relationship (F=4.05, p=0.0041), patient's care mean period in a day(F=47.18,

  • PDF

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

A Study on the establishment of IoT management process in terms of business according to Paradigm Shift (패러다임 전환에 의한 기업 측면의 IoT 경영 프로세스 구축방안 연구)

  • Jeong, Min-Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.151-171
    • /
    • 2015
  • This study examined the concepts of the Internet of Things(IoT), the major issue and IoT trend in the domestic and international market. also reviewed the advent of IoT era which caused a 'Paradigm Shift'. This study proposed a solution for the appropriate corresponding strategy in terms of Enterprise. Global competition began in the IoT market. So, Businesses to be competitive and responsive, the government's efforts, as well as the efforts of companies themselves is needed. In particular, in order to cope with the dynamic environment appropriately, faster and more efficient strategy is required. In other words, proposed a management strategy that can respond the IoT competitive era on tipping point through the vision of paradigm shift. We forecasted and proposed the emergence of paradigm shift through a comparative analysis of past management paradigm and IoT management paradigm as follow; I) Knowledge & learning oriented management, II) Technology & innovation oriented management, III) Demand driven management, IV) Global collaboration management. The Knowledge & learning oriented management paradigm is expected to be a new management paradigm due to the development of IT technology development and information processing technology. In addition to the rapid development such as IT infrastructure and processing of data, storage, knowledge sharing and learning has become more important. Currently Hardware-oriented management paradigm will be changed to the software-oriented paradigm. In particular, the software and platform market is a key component of the IoT ecosystem, has been estimated to be led by Technology & innovation oriented management. In 2011, Gartner announced the concept of "Demand-Driven Value Networks(DDVN)", DDVN emphasizes value of the whole of the network. Therefore, Demand driven management paradigm is creating demand for advanced process, not the process corresponding to the demand simply. Global collaboration management paradigm create the value creation through the fusion between technology, between countries, between industries. In particular, cooperation between enterprises that has financial resources and brand power and venture companies with creative ideas and technical will generate positive synergies. Through this, The large enterprises and small companies that can be win-win environment would be built. Cope with the a paradigm shift and to establish a management strategy of Enterprise process, this study utilized the 'RTE cyclone model' which proposed by Gartner. RTE concept consists of three stages, Lead, Operate, Manage. The Lead stage is utilizing capital to strengthen the business competitiveness. This stages has the goal of linking to external stimuli strategy development, also Execute the business strategy of the company for capital and investment activities and environmental changes. Manege stage is to respond appropriately to threats and internalize the goals of the enterprise. Operate stage proceeds to action for increasing the efficiency of the services across the enterprise, also achieve the integration and simplification of the process, with real-time data capture. RTE(Real Time Enterprise) concept has the value for practical use with the management strategy. Appropriately applied in this study, we propose a 'IoT-RTE Cyclone model' which emphasizes the agility of the enterprise. In addition, based on the real-time monitoring, analysis, act through IT and IoT technology. 'IoT-RTE Cyclone model' that could integrate the business processes of the enterprise each sector and support the overall service. therefore the model be used as an effective response strategy for Enterprise. In particular, IoT-RTE Cyclone Model is to respond to external events, waste elements are removed according to the process is repeated. Therefore, it is possible to model the operation of the process more efficient and agile. This IoT-RTE Cyclone Model can be used as an effective response strategy of the enterprise in terms of IoT era of rapidly changing because it supports the overall service of the enterprise. When this model leverages a collaborative system among enterprises it expects breakthrough cost savings through competitiveness, global lead time, minimizing duplication.

The Genealogical Study on SWIFTNet Trade Service Utility and Bank Payment Obligation (SWIFTNet TSU BPO의 계보학적 연구)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.3-21
    • /
    • 2016
  • The thesis examines genealogical study of various aspects to overcome lots of problems which come by when we execute SWIFTNet TSU BPO. Practical implications regarding the innovation of electronic trade infrastructure are as follows. First, the shipping documents in the SWIFTNet TSU BPO are directly sent to an importer by an exporter after the baseline is confirmed. With this process itself, therefore, the bank cannot secure the account receivable. When initiating the SWIFTNet TSU BPO deal, it is needed to set regulations on the bank's account receivable security in the contract. Second, the SWIFTNet TSU BPO should also have an institutionally unified sharing platform with security, stability and convenience. It other words, it is needed to develop services which meet e-payment paradigm and international environments through continued analysis on market changes and flow. Third, the SWIFTNet TSU is useful in terms of promptness, reduction of risk in foreign exchange payment, cost reduction. Therefore, the SWIFT should be perfectly united and linked among the banks, importer and exporter to make the SWIFTNet TSU more convenient in countries around the world. Fourth, the SWIFT should be approached from the aspect of expansion of network and creation of a new business model through analysis on these problems with a worldwide perspective. At the same time, it is necessary to build a cooperative system to share information and promote comprehensive management for efficient operation.

  • PDF

A Study on the UIC(University & Industry Collaboration) Model for Global New Business (글로벌 사업 진출을 위한 산학협력 협업촉진모델: 경남 G대학 GTEP 사업 실험사례연구)

  • Baek, Jong-ok;Park, Sang-hyeok;Seol, Byung-moon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.6
    • /
    • pp.69-80
    • /
    • 2015
  • This can be promoted collaboration environment for the system and the system is very important for competitiveness, it is equipped. If so, could work in collaboration with members of the organization to promote collaboration what factors? Organizational collaboration and cooperation of many people working, or worth pursuing common goals by sharing information and processes to improve labor productivity, defined as collaboration. Factors that promote collaboration are shared visions, the organization's principles and rules that reflect the visions, on-line system developments, and communication methods. First, it embodies the vision shared by the more sympathetic members are active and voluntary participation in the activities of the organization can be achieved. Second, the members are aware of all the rules and principles of a united whole is accepted and leads to good performance. In addition, the ability to share sensitive business activities for self-development and also lead to work to make this a regular activity to create a team that can collaborate to help the environment and the atmosphere. Third, a systematic construction of the online collaboration system is made efficient and rapid task. According to Student team and A corporation we knew that Cloud services and social media, low-cost, high-efficiency services could achieve. The introduction of the latest information technology changes, the members of the organization's systems and active participation can take advantage of continuing education must be made. Fourth, the company to inform people both inside and outside of the organization to communicate actively to change the image of the company activities, the creation of corporate performance is very important to figure. Reflects the latest trend to actively use social media to communicate the effort is needed. For development of systematic collaboration promoting model steps to meet the organizational role. First, the Chief Executive Officer to make a firm and clear vision of the organization members to propagate the faith, empathy gives a sense of belonging should be able to have. Second, middle managers, CEO's vision is to systematically propagate the organizers rules and principles to establish a system would create. Third, general operatives internalize the vision of the company stating that the role of outside companies must adhere. The purpose of this study was well done in collaboration organizations promoting factors for strategic alignment model based on the golden circle and collaboration to understand and reflect the latest trends in information technology tools to take advantage of smart work and business know how student teams through case analysis will derive the success factors. This is the foundation for future empirical studies are expected to be present.

  • PDF