• Title/Summary/Keyword: information provider

Search Result 1,246, Processing Time 0.03 seconds

An Empirical on The Customs Loyalty in Trust Dimension of Clearance EDI Service (통관 EDI 서비스에서 신뢰차원이 신고인의 세관 충성도에 미치는 실증분석)

  • Lee, Je-Hong
    • International Commerce and Information Review
    • /
    • v.8 no.3
    • /
    • pp.143-164
    • /
    • 2006
  • EDI is fast becoming the standard way of exchanging business documents, not only in this country but throughout the world. The purpose of EDI is currently being used for all the most common business transactions such as purchase orders, invoice, quotes, bill of lading, status reports, receiving advices; and also for some very specific transaction. Thus, the purpose of this study, by way of literature survey and survey research are to find the effectiveness in EDI Service of Clearance Physical. The model of the Trust Dimension and EDI Provider Loyalty in EDI Service of Clearance Physical is tested here using data from 163 samples. Based on the research model, a comprehensive set of hypotheses is formulated and a methodology for testing them is outlined. some of the hypotheses are tested empirically to demonstrate the applicability of the theoretical model. In examining the relationships of the Clearance EDI determinants factors, Trust and e-loyalty show in significantly by customs practice trust, clearance EDI, EDI provider trust and clearance EDI loyalty. but that show in not significantly by a list of names, EDI benevolence.

  • PDF

A Study on the Promotion of e-Trade Metamediary for the Small Companies (중소기업의 전자무역 활성화를 위한 가상기업 중개기관 연구)

  • Lee, Eui-Young
    • International Commerce and Information Review
    • /
    • v.7 no.2
    • /
    • pp.97-113
    • /
    • 2005
  • Korea has actively promoted the Comprehensive Plan for the e-Hub. The policies of Korean government could promote the e-business environment and market conditions in legal and infrastructure terms, but not much of business itself. The reason for this limited success in the e-Trade may result from the broken linkage between government policies and business strategies as well as the business and technical innovation. In this paper, we analyzes the more effective and economic solution for this recovery of broken link in terms of Metamediary. The most successful role of metamediary should compose of three functions - facilitator, collaborator and web service provider. Each of these function is clarified in more detail with the emphasis on the collaboration between the Universities and the government-supported corporations.

  • PDF

Design and Implementation of Super-peer P2P Overlay Network Protocol and System for mobile IPTV

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.295-300
    • /
    • 2010
  • Recent researches of network structure are moving to high-level networks because there are already many research results of low-level network. Especially, current network services has been changed to the multimedia service using multicast routing such as IPTV(Internet Protocol Television) service. And then previous multicast services were provider oriented. So previous multicast structures were organized server/client model. But future multicast services will make user oriented services. Therefore there will be many service providers in the future. At this point, we study P2P network for supporting multi provider. So we research load balancing and contents lookup protocols in P2P network. In this paper, we propose network protocol and system based on super peer P2P for load balancing and efficiently service search. And we considered mobile environment for mobile IPTV.

An Inter-provider Roaming Authentication and Key Establishment Protocol Providing Anonymity in IEEE 802.16e Networks (IEEE 802.16e 네트워크에서 익명성을 제공하는 사업자간 로밍 인증 및 키 설정 프로토콜)

  • Park, Young-Man;Park, Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11C
    • /
    • pp.1023-1029
    • /
    • 2006
  • In this Paper, we present a novel authentication and key exchange(AKE) protocol for inter-NSP(provider) roaming in IEEE 802.16e networks. The proposed protocol allows performing both user and device authentication jointly by using two different authentication credentials and Provides user anonymity and session key establishment. Also, this protocol requires only two round number message exchange between foreign network and home network.

A Broker for Cloud Resource Management and Its Experimental Performance Analysis

  • Ren, Ye;Kim, Seonghwan;Kang, Dongki;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.239-240
    • /
    • 2012
  • When users access to use the computing resources in the cloud, they expect specific quality of service (QoS) which should be guaranteed by the service provider. Meanwhile, the service provider should adopt proper schemes to enhance the resource utilization. In this thesis, we propose the MapChem-Broker which aims to satisfy users' QoS requirements as well as enhance the resource utilization by controlling the provision of VM resources in the cloud. On the experimental cloud testbed, we compare the proposed scheme with an existing one for VM resource provisioning. Results show that the proposed scheme outperforms the existing one.

Location-based Selection of Services in Web Service Composition (웹 서비스 조합에서 서비스의 위치기반 선택)

  • Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.674-675
    • /
    • 2010
  • Since in web service composition, the same service may be offered by different providers with different Quality of Services (QoS) attributes, selection criteria are needed to select which Web Services will be considered for composition. Location of provider can be one of these criteria and intends to decrease the number of remote interactions between providers as well as reducing waiting time of service consumer. Therefore in this paper, we present technique for composing web services according to their location by semantically describing customer's goals and provider's web service capability by means of carefully designed ontology and logical expression.

Design and Implementation of Web-based Hierarchical Network Management System using SSL (SSL을 이용한 웹기반 계층적 네트워크 관리 시스템의 설계 및 구현)

  • 황일선;이명선;유기성;김종근;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.1-15
    • /
    • 2002
  • Network management system exchanges information between management servers to manage other network as well as local network for MSP(Management Service Provider) business. Because communication line that is used here is communication line that several users use, other user can steal a important information that are passed through communication line. For these information include important information of administrator or equipments, These information should be protected. Usually it is use much SSL to security of communication and it wish to protect information using SSL in communication between management servers' or communication between server and client at network management system to use much SSL for security of communication.

  • PDF

The effects of OTTservice information system quality on reuse intention (OTT 서비스 정보시스템 품질이 재사용의도에 미치는 영향)

  • Eom, Ji Yeon;Lim, Yeong Woo;Kwahk, Kee-Young
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.63-83
    • /
    • 2023
  • Purpose With the continuous growth of the OTT services market, trust issues are becoming increasingly important, but research on this topic is still in its infancy. The purpose of this study is to identify the structural relationship between information system quality and reuse intention of OTT services and to analyze the impact of trust and user satisfaction. Design/methodology/approach This study proposed a research model based on the information system success model. In this study, a survey was conducted among 236 Korean users who have used OTT services within the last six months. Findings The results of the analysis showed that text quality and visual quality had a significant impact on trust in OTT services, with text quality having the largest impact. System quality and text quality also had a significant impact on trust in OTT service providers. However, visual quality did not have a statistically significant effect on trust in the service provider. Trust in the OTT service and the service provider was analyzed to have a significant impact on user satisfaction. However, it did not have a statistically significant impact on reuse intention. These findings have important implications for improving trust in OTT services to increase users' reuse intentions. It is also expected to contribute to further expanding the field of OTT service research.

예비 IP창업자 선호도

  • Korea Database Promotion Center
    • Digital Contents
    • /
    • no.10 s.77
    • /
    • pp.37-37
    • /
    • 1999
  • 한국사업능력개발원 부설기관인 I&CP 소호지원센터는 최근 200여명의 IP 사업 희망자들을 대상으로 'IP창업계획'에 대한 설문을 실시했다. 이 설문에 따르면 소호창업을 꿈꾸는 예비 IP(Information Provider)들이 가장 선호하는 창업 분야는 '생활/여성'인 것으로 나타났다.

  • PDF

The Automatic Collection and Analysis System of Cloud Artifact (클라우드 아티팩트 자동 수집 및 분석 시스템)

  • Kim, Mingyu;Jeong, Doowon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1377-1383
    • /
    • 2015
  • As the cloud services users' increase, there are important files created by individual in cloud storage. Thus, investigation of cloud artifact should be conducted. There are two methods of analyzing cloud service, one is that investigates cloud server provider (CSP), and another is that investigates client. In this paper, we presents an automated framework to detect the altered artifact and developes a tool that detects the cloud artifact. We also developed Cloud Artifact Tool that can investigate client computer. Cloud Artifact Tool provides feature of collection and analysis for the services such as Google Drive, Dropbox, Evernote, NDrive, DaumCloud, Ucloud, LG Cloud, T Cloud and iCloud.