• Title/Summary/Keyword: Private Company System

Search Result 183, Processing Time 0.023 seconds

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

A Model for Improving Performance Structure of Build-Transfer-Lease in Small Public Educational Facilities (소규모 공공교육 시설 임대형 민자사업(BTL)의 수행구조 개선모델)

  • Kim, Seung-Sup;Jung, Sang-Min;Koo, Choong-Wan;Koo, Kyo-Jin;Hyun, Chang-Taek;Hong, Tae-Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.3
    • /
    • pp.116-124
    • /
    • 2007
  • It is Increasing that requirements of social infrastructure which includes educational, welfare, cultural facilities for public. Government introduced BTI(Build-Transfer-Lease) as a PFI(Private Financial Initiative) system. This research is about BTL projects in small public educational facilities. Some problems when BTL system is applied to small public educational facilities are identified, and the reason of those problems are examined. This research proposes alternatives in a institutional way and it proposes improvements in contractual structure of consortium when BTL system is applied. Based on reasonable system, it promotes creativeness and effectiveness of a project, and it makes local minor construction companies participate in BTL project without difficulties as mentioned.

An assessment model for PL-product companies based on the Analytic Hierarchy Process (AHP 기반 PL상품 업체 평가모델)

  • Choi, So-Young;Kim, Yong-Min;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.99-112
    • /
    • 2014
  • This paper addresses an assessment model for selecting PL(Private Level) product companies. The proposed model extracts the weights of evaluation elements based on AHP(Analytic Hierarchy Process). These evaluation elements are from real-world instances in a domestic hyper market. Especially, the model points at food products which constitute a large portion of entire profits in the market. In this model, we first classify the 54 evaluation elements into 4 layers and secondly carry out a survey with relevant specialists based on them. We also estimate the weights of evaluation elements according to pairwise comparisons from the survey, and propose them as a quantitative alternative which can be applied in real-world problems. Finally, the pilot-study is conducted to compare the proposed model with the existing simple summation method. From this study, HACCP system assessment and Review(0.279281), Transportation(0.117706) and Fundamental law observance(0.066392) are presented as the key evaluation elements for selecting PL product companies. The proposed model facilitates the company selection among those candidate companies which is not easy to determine the superiority by reflecting the importance of evaluation elements.

A Study on the Application of SPA brand to BI Color and User Preference (SPA 브랜드의 BI 색채 적용 현황과 사용자 선호도 조사)

  • Park, Han Na;Paik, Jin Kyung
    • Design Convergence Study
    • /
    • v.17 no.2
    • /
    • pp.45-57
    • /
    • 2018
  • Sales for SPA brand names of private label apparels are on the rise in the domestic clothing market. The aim of this study is to analyze the characteristics of SPA brands and how each color system is proposed within the BI system. In this study, 8 brands were selected as the most popular SPA brands in Korea and abroad with stores based on brand power and sales and preference by consumers. Therefore, among information factors such as brand identity (BI) and color characteristic. sign system, package, and environmental factors, buildings facade and interior design of eight brands were investigated. Research into color application of BI revealed that four brands used red colors with different tones with different identity differentiation. For the other four brands, the company applied BI designs that gained the brand's character such as a black-and-white or dark blue one. Thus, it is considered important to select BI color in order to differentiate and enhance preferences in brand identity.

A study on approach thesis of protection martial arts (경호기법에 입각한 경호무도의 학문적 접근)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.103-122
    • /
    • 2003
  • Protection sciences are new science. therefore, protection martial arts sciences are will studied be based on study of protection in order to supply high level by request. Moreover, It is reconstruction that protection martial arts masters education, systematic manage, certificate system, protection martial arts recognition certificate, protection martial arts equipment, practice of protection martial arts. Protection martial arts occurs on the unforeseen accident and body guarding, therefore martial arts concept of protection martial arts different general martial arts and sport. In order to develope of protection martial arts First, scientific thesis need of protection martial arts learning. Especially, aims of present protection martial arts is not protect oneself, protect the VIP to safely from all dangers is different thing with aims of general martial arts. Instinct that VIP protect rather than oneself should study and develop. Second, techniques and model of protection martial arts spread to who in connection with security service by systematic and organized. Preferentially, study of protection martial arts Techniques and model possible the protection martial arts learned society, found laboratory and endowed protection martial arts society organize and prevention for random of protection martial arts and must make the original protection martial arts. Third, protection martial arts official certificate and license system must organize in order to training and manage of protection martial art master, Match director(First Second), life physical director(First, Second, Third) is systematically manage by Ministry of Culture & Tourism Republic of Korea. Like this protection martial arts also classify the certificate by scholarship and experience. Fourth, In union to university, private security service company, public institution, police and system that possible leaning to protection martial arts certificate course important. In addition, destroy the commercial character of present martial arts and cultivate the pure martial arts mind, should develop to martial arts in order to improve the humanism and temperament of right body guard.

  • PDF

Suggestion from Trade 2.0 Paradigm of Global Business Education for Strategic Trade in Korea (무역2.0 교육 도입과 전략무역의 제안)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.89-114
    • /
    • 2008
  • It is said that global business education in Korea must be a kind of good investment on the future of Korea, because Korea's degree of dependence upon global trade is very high. But, despite great significance of trade in economic aspect, education system on global business in Korea still remains in old paradigm focused mainly on trade in goods. The purpose of this paper is to analyse key environment of trade in Korea relating to global business education system, and to suggest some trade-friendly measures to improve the global economic environment being worse. Methodology used in this study depends on descriptive analysis by literature study. As all the paradigm of global business has shifted from 20C's trade environment to that of 21C's and still more borderless trend has progressed, it is high time Korea to design the new education system of global business to conform with the trade mode of Korea, and to execute the mode of strategic trade which is new conception of trade strategy derived from Web 2.0 trend. Major findings of this study can be summarized as follows : It is suggested that Korea should convert basic composition of trade strategy to strategic trade irrespective of company size, nationality, public or private sector, etc., and launch new instructional model considering the trade 2.0 concepts. Also, Korea's trade policies which have been based on 'trade in goods' should be changed to the frame of strategic trade so that can include various trade process such as trade in services, trade in technology, cultural contents, global investment(TRIMs), TRIPS, etc.

  • PDF

A Study on the Model for Construction Records Classification System (건설기록물 분류체계 모형에 관한 연구)

  • Park, Yong-Boo;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.3
    • /
    • pp.83-101
    • /
    • 2011
  • The international standards, ISO 15489 and Family Code, recommend using functional classification method both in public and private organizations. In this study made a comparative analysis of the details of classification systems through case studies on records classification systems of a total of seven comprehensive construction companies in Korea including three large corporations and four small and medium-size businesses. Findings of this study suggester the direction of developing construction records classification system and its methodology. By summarizing classification standards derived from these case studies, key construction records classification standards were presented.

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.