• Title/Summary/Keyword: information and communication technology investment

Search Result 119, Processing Time 0.028 seconds

A Proposal of Business Model Development System for National Research and Development: Case of Korean Land Spatialization Group (국가 연구개발에 대한 비즈니스 모델 개발 체계 제안: 지능형국토정보기술혁신사업을 중심으로)

  • Hong, Jin-Won;Park, Seung-Wook;Bae, Sang-Keun;Kim, Young-Su
    • Information Systems Review
    • /
    • v.12 no.2
    • /
    • pp.167-187
    • /
    • 2010
  • The governmental R&D projects have put a great emphasis on returns on R&D investment through development of market- and customer-oriented technologies and their commercialization. A successful commercialization of the technology developed from a R&D project relies on development of the technology intriguing customers, establishment of effective commercialization strategies throughout the stages of R&D planning and development, and interactive communication between the technology developer and a private company that will do a business with the technology. The business modeling helps accomplish the requirements for the successful commercialization. The past literature about technology commercialization does not provide a systematic procedure in developing a business model for the governmental R&D project. In this study, we proposed a systematic procedure developing a business model integrating peculiar characteristics of governmental R&D and viewpoints of technology developers and professionals of technology commercialization. It can be a useful guideline for developing a business model for the governmental R&D project.

Feature Selection Using Submodular Approach for Financial Big Data

  • Attigeri, Girija;Manohara Pai, M.M.;Pai, Radhika M.
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1306-1325
    • /
    • 2019
  • As the world is moving towards digitization, data is generated from various sources at a faster rate. It is getting humungous and is termed as big data. The financial sector is one domain which needs to leverage the big data being generated to identify financial risks, fraudulent activities, and so on. The design of predictive models for such financial big data is imperative for maintaining the health of the country's economics. Financial data has many features such as transaction history, repayment data, purchase data, investment data, and so on. The main problem in predictive algorithm is finding the right subset of representative features from which the predictive model can be constructed for a particular task. This paper proposes a correlation-based method using submodular optimization for selecting the optimum number of features and thereby, reducing the dimensions of the data for faster and better prediction. The important proposition is that the optimal feature subset should contain features having high correlation with the class label, but should not correlate with each other in the subset. Experiments are conducted to understand the effect of the various subsets on different classification algorithms for loan data. The IBM Bluemix BigData platform is used for experimentation along with the Spark notebook. The results indicate that the proposed approach achieves considerable accuracy with optimal subsets in significantly less execution time. The algorithm is also compared with the existing feature selection and extraction algorithms.

Digital Transformation of Agriculture Supply Chain in Vietnam: Current Status and Proposal of Roadmap

  • Quoc Cuong Nguyen;Hoang Tuan Nguyen
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.249-257
    • /
    • 2024
  • As the main driver of economic growth and employment, the agricultural sector plays an important role in Vietnam's economy. However, in recent years, the sector has faced new challenges and also presented new investment opportunities to stimulate agricultural growth. Many Vietnamese agricultural producers currently lack the modern technology and decision support tools needed to maintain and improve productivity in a rapidly changing environment. Other stakeholders in the agricultural value chain, such as input suppliers, distributors, and consumers, also face significant challenges, including disrupted value chains, transportation costs. The cost of transporting goods across the supply chain continues to increase and information exchange remains fragmented. A potential solution to address these challenges is the application of digital transformation in agricultural supply chains. Farmers and other value chain participants can improve the production of their goods and procedures by utilizing new and cutting-edge technologies that are integrated into a unified system as part of the digital transformation of agricultural supply chains. In this study, we evaluate the current status of digital transformation in the supply chain of the agriculture industry by finding and examining pertinent publications from key agencies as well as prior research. From there, in the framework of the digital economy, this study suggests a digital transformation roadmap for the agricultural supply chain.

Distribution Efficiency of E-services in the Health Insurance Sector : The Case of Botswana

  • Jaiyeoba, Olumide Olasimbo;Chimbise, Totwana Tito;Makanyeza, Charles;Iwu, Chux Gervase
    • Journal of Distribution Science
    • /
    • v.16 no.5
    • /
    • pp.5-15
    • /
    • 2018
  • Purpose - Nowadays customers have become empowered by information communication technologies. This state of customers has brought enormous pressure to bear on organizations, thus, organizations have to stay relevant, market-oriented and profitable. The insurance sector is one that is constantly challenged by its exposure to ICT and the associated need for e-services by myriad customers. With increasing competition in the health insurance environment, it is necessary for the sector to understand customer expectations and how they perceive the services offered. This study seeks to determine the role played by e-services in relation to customer satisfaction in health insurance industry in Botswana where a substantial investment has been made in the sector. Research design, data, and methodology - This study is conducted using two prominent medical aid schemes in Botswana namely BPOMAS and PULA. Subscribers of these medical schemes were the respondents whose views were sourced using both closed and open ended questionnaires. Systemic sampling technique was used to select the participants, while descriptive statistical techniques were mainly used to analyze socio-demographic data of the samples. Results - The results reveal that the level of usage of the medical insurance firm's website and email service is higher for PULA participants than for BPOMAS participants. Conclusions - The findings of this study have practical implications for managers who should understand customers' value perceptions regarding e-service quality in Botswana.

A Study on Authentication Method for Secure Payment in Fintech Environment (핀테크 환경의 안전한 결제를 위한 인증 기법에 관한 연구)

  • Park, Jung-Oh;Jin, Byung-Wook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.25-31
    • /
    • 2015
  • FinTech(Financial Technology) is defined as the technique to create efficient financial services using IT technologies. FinTech is an innovative technology through IT platform and big data, and is expected to improve the security and problems of the conventional banking system. Domestic financial institutions has introduced the technologies and investment in order to provide safe and effective services to users. However, In the financial environment, information disclosure and security incident has occurred so they has lost the trust from their customers. Moreover new variant of the security threats and attack techniques have occurred. Therefore, in this paper, we designed a authentication scheme for secure payment system in FinTech environment. The proposed study evaluated the stability of the existing security systems with respect to attack methods occurred in the financial environment.

Cost Analysis for the Reformation of CCTV Transmission Systems (CCTV 전송방식 전환에 따른 비용 분석)

  • Lee, Dong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.748-755
    • /
    • 2019
  • CCTV Systems have been operated in the variety of serveillance fields of the apartment, transportation, safety, physical security, and so on. And their uses are largely increasing as the CCTV transmission technology has been changed from analog to IP network way. Domestic industry has been working to upgrade from analog CCTV systems to High-Definition(HD) CCTV systems for recent years, which involves a few issues such as mixing with several transmission technologies and duplicated investment in each area because the technological analysis and criteria are specifically not arranged. This paper examines the technical issues of the transmission method between HD analog and HD IP CCTV systems, and induces the criteria of the cost analysis and its weighting factors for HD CCTV reformation. By simulating the cost analysis results of both the HD CCTV systems on apartment environment, this paper proposes the reference for the choice of HD CCTV system reformation.

A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm (머신러닝 알고리즘이 적용된 가상화 내부 환경의 보안 인증벡터 생성에 대한 연구)

  • Choi, Do-Hyeon;Park, Jung Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.33-42
    • /
    • 2016
  • Recently, the investment and study competition regarding machine running is accelerating mainly with Google, Amazon, Microsoft and other leading companies in the field of artificial intelligence. The security weakness of virtualization technology security structure have been a serious issue continuously. Also, in most cases, the internal data security depend on the virtualization security technology of platform provider. This is because the existing software, hardware security technology is hard to access to the field of virtualization and the efficiency of data analysis and processing in security function is relatively low. This thesis have applied user significant information to machine learning algorithm, created security authentication vector able to learn to provide with a method which the security authentication can be conducted in the field of virtualization. As the result of performance analysis, the interior transmission efficiency of authentication vector in virtualization environment, high efficiency of operation method, and safety regarding the major formation parameter were demonstrated.

Development Method of Digital Content Finance-Focused on by Technical Value Evaluation (디지털 콘텐츠 금융 활성화 방안-기술가치 평가를 중심으로)

  • Lee, MyounJae;Khoe, Kyung-Il
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.111-117
    • /
    • 2015
  • Digital content industry is expected to grow due to the development of new devices and technologies, convergence between genres and technologies. However, Financial support system for the field of digital content has not been activated due to the digital content industry has the characteristics of a lot of initial investment costs and an uncertain profitability. This paper deals with the financial plan of activation of digital content businesses using technology evaluation. For this purpose, first, examine status of digital content businesses(status and sales financing, etc). Second, discuss development methods of digital contents finance based on the analysis of the digital content industry. This study is useful for deriving the development methods of digital contents finance using the technology valuation.

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment (캠퍼스 환경에서 적응적인 정보보안을 위한 통합 보안정책의 설계)

  • Ko, Bong-Koo;Park, Jong-Seon;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.617-624
    • /
    • 2014
  • A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.

The Conceptual Model for a Co-creation Platform (공동가치창출을 위한 플랫폼 개념모델)

  • Hong, Soon-Goo;Han, Se-Eok;Lee, Hyun-Mi;Kim, Jong-Weon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.127-136
    • /
    • 2014
  • As a new management paradigm, co-creation for creating new value through collaboration with stakeholders, including customers, distributers, suppliers, and partner organizations has been issued in the private and public organizations. To collectively create new value, effective communication tools among the interest groups should be provided. In fact, most of organizations have utilized information technology such as home pages and SNS for distributing information and respecting customer opinions. However, they are seriously experiencing in difficulty of systematic management and overlapped investment on information technology for co-creation. Thus, this study proposes the conceptual model for co-creation platform through case studies and it is verified by scenario analysis and experts. The study contributes to accumulate knowledge in the area of co-creation platform. It also defines the requirements and the functions for the design of co-creation platform for practitioners.