• Title/Summary/Keyword: Technology Provider

Search Result 532, Processing Time 0.023 seconds

Development of ASP Service Model for Small Retailers According to Their Characteristics (소규모 소매유통업체를 위한 ASP(Application Service Provider) 서비스 모델 개발에 관한 연구)

  • Kim, Gyeung-Min;Lee, Sook-Kyung
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.21-41
    • /
    • 2008
  • The development of POS (Point of Sales) systems for small retailers according to their needs is considered to be important to improve their competitive advantages. However, their financial statuses hinder the adoption of the tailored POS systems. Viewing ASP as a viable solution to provide tailored POS systems for the small retailers, this study develops ASP POS service models for the small retailers. First, this study elicits ASP POS requirements of the small retailers in the following areas: merchandising, pricing, store design and display, customer service, advertising and promotion and personal selling. Then, the requirements are clustered and the clusters are analyzed based on the characteristics of the retailers. Then, ASP service models are proposed according to the needs and profiles of the retailers.

  • PDF

An Study of Information Security Observance Priority for Smartwork Activation using AHP(Analytic Hierarch Process) (계층적 분석기법(AHP)을 이용한 스마트워크 활성화를 위한 정보보호 준수사항 우선순위에 관한 연구)

  • Im, Jung-Kil;Kim, Sang-Chul;Lee, Hyeon-Uk
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.291-300
    • /
    • 2013
  • In this study, divide by a private enterprise and army, 2 organizations about observed priority item among administrator, service provider, user viewpoint about the information security item for smartwork activation and in 3 steps hierarchic according to AHP technique analyzed and decided priority for information security observance item. As a result, importance difference could confirm identified by administrator, service provider, user viewpoint period of about information security observance item recognizing in a private enterprise and army.

Analysis of Cloud Service Providers

  • Lee, Yo-Seob
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.315-320
    • /
    • 2021
  • Currently, cloud computing is being used as a technology that greatly changes the IT field. For many businesses, many cloud services are available in the form of custom, reliable, and cost-effective web applications. Most cloud service providers provide functions such as IoT, machine learning, AI services, blockchain, AR & VR, mobile services, and containers in addition to basic cloud services that support the scalability of processors, memory, and storage. In this paper, we will look at the most used cloud service providers and compare the services provided by the cloud service providers.

A study on the factors influencing the ASP service users' repurchase intent and organization benefits (ASP(Application Service Provider) 서비스 사용자의 재구매 의사와 조직 이익에 미치는 영향요인 연구)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Kim, Su-Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.55-81
    • /
    • 2010
  • ASP service users' needs for flexible and customized services to deal with changes in business environments and user contexts seems to be appealing due to the progress of technology and IT paradigm such as ubiquitous computing and web 2.0. Through the lens of expectancy confirmation and flexibility, we explored factors that influence users' repurchase intent and organizational benefit in ASP services. With an empirical study, we examined information quality, service quality, flexibility, customization, user satisfaction, trust in ASP services can contribute to the repurchase intent and organizational benefit. In addition to, business type and company size are added to the research model as control variables for user satisfaction, trust, and repurchase intent. Our findings suggested that the service quality and flexibility significantly were cruicial determinant of user satisfaction in ASP services. Furthermore, user satisfaction significantly influenceS repurchase intent, and organization benefits were affected by repurchase intent. This study has important implications for academic researchers and practitioners who seek to understand factors that affect ASP service users' repurchase intent and organization benefits.

  • PDF

Operation Strategy for Electronic Commerce Promotion Base on Common Mechanic Industry (ASP기반으로 한 기계산업체간의 성공적 전자상거래 구축을 위한 전략연구)

  • Jeong, Sei-Hyun
    • Journal of Information Technology Services
    • /
    • v.1 no.1
    • /
    • pp.81-117
    • /
    • 2002
  • The generalization of Internet use has been spreaded all over the world and impacted company to introduce intranet and extranet for their operation which dealt with electronic commerce. For these reason, endeavor of implementation of web site system is promotioned and enhanced the possibility of adaptation range for the view of company. Dramatic competition which company faced with the use of internet and request from all over the world made company brought company to various and different type of level. It is necessary to develop website system with experty knowledge to satisfy customer needs. To deal with this situation, works from the level of government should proposed to spread whole country business which propelled through kyungnam mechanic industry information promotion center. With strategic proposal concerning district characteristics to adapt electronic commerce successfully, information promotion should performed. Support of government is needed continuously to realize infra of ASP composed of 4,877 mechanic industry company. It might be possible to deal with international rapid change with cooperation of company and government related department.

Secured Authentication Scheme and Charging & Discharging System Operation for Electric Vehicles (정보보호를 고려한 전기자동차 충방전 시스템의 인증과 운영에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.551-557
    • /
    • 2021
  • With increase of electric vehicle in the road, the number of charging/discharging infrastructure for electric vehicle in public space is also increased rapidly. To charge or discharge the electric vehicle the user of electric vehicle and service provider should verify the each other's identity to minimize security vulnerability. This paper proposes mutual authentication scheme between electric vehicle and charging/discharging service provider with help of hash function and Message Authentication Code(MAC). Also efficient operating scheme for charging/discharging service system is proposed. The analysis shows that the system has robustness against security vulnerability. Also this system can keep the sensitive personal information of service user safely.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Study of Measures to Expand Mobile Payment by Enhancing the Payment Infrastructure for Merchant : Focus on Bluetooth Low Energy(BLE) Technology (가맹점 결제 인프라 개선을 통한 모바일 결제 확대 방안 연구 : 블루투스(BLE) 기술 중심)

  • Bok, Joonghyo;Kim, Byungsu;Gim, Gwangyong
    • Journal of Information Technology Services
    • /
    • v.16 no.4
    • /
    • pp.33-46
    • /
    • 2017
  • Increasing popularity of smartphone is creating many changes in payment market sector also. The new fin-tech and simple mobile payment service have provided convenience as well as various benefits and value-added services to create new payment culture. However, the infrastructure of offline shops is too poor for users to use the simple mobile payment services in Korea. There are several reasons why the support of simple mobile payment services by offline shops has reached the limit in Korea. They include the reluctance of shop owners due to highly priced devices, the failure of NFC of the leading offline payment infrastructure to support iOS, the services that are biased to the specific manufacturers and smartphones (Samsung Pay and LG Pay), prefer large shops (SSG Pay and L PAY), and focus on online transactions. This study used the Bluetooth technology that is the standard feature built in all smartphone to expand the offline shops that accept the simple mobile payment services ensuring universality and scalability from the convenience of customer's and service provider's aspects. Applying the same payment scene as the existing NFC payment method from the user's aspect and the Bluetooth technology from the service provider's aspect enables support of all smartphones and offering value-added services such as electronic receipt and promotions through the large-capacity bidirectional data transfer. This study is intended to review the simple mobile payment services in Korea and other countries, propose the simple mobile payment service model for Korea by analyzing the Bluetooth technology and preceding studies of payment services using BLE technology, and develop the pilot system using the BLE technology to verify the proposed system with actual shops.

A Link Protection Scheme with a Backup Link Spanning Tree for Provider Backbone Bridged Networks and Implementation (프로바이더 백본 브리지 망을 위한 백업링크 스패닝트리 기반 링크장애 복구기능과 구현)

  • Nam, Wie-Jung;Lee, Hyun-Joo;Yoon, Chong-Ho;Hong, Won-Taek;Moon, Jeong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.58-68
    • /
    • 2010
  • In this paper, we propose an efficient link protection switching scheme for provider backbone bridge systems with a spanning tree for backup links exclusively, and evaluate its performance. The proposed scheme offers guaranteed QoS flows even when a link fault occurrs in the primary link by flooding the flows over the profiled spanning tree. The flooding mechanism over the spanning tree can also provide low latency and remove the loopback flows. We also derive the efficiency of bandwidth usage for the normal flows and the number of lost frames during the link restoration. For evaluating its feasibility, we implement a prototype of PBB-TE systems based on the Linux bridge codes, which can support both link protection switching capability with CCM and MAC-in-MAC encapsulation. A related protocol analyzer is also developed. One can see that the proposed scheme and the prototype can be useful for developing carrier class Ethernet systems based on PBB-TE.