• Title/Summary/Keyword: software market

Search Result 701, Processing Time 0.029 seconds

A study of the economic effects of weather and climate information on marine logistics (해상운송업의 기상기후정보 경제적 효과에 관한 연구)

  • Lho, Sangwhan;Lim, Dongsoon
    • Environmental and Resource Economics Review
    • /
    • v.23 no.1
    • /
    • pp.1-19
    • /
    • 2014
  • Weather seems to influence industries in a variety of ways. On a day-to-day basis, it is the most volatile external factor influencing consumer and market behavior. And, because weather is constantly changing, industries must deal with a continuously shifting array of opportunities and risks. This study aims to examine how climate and weather changes and information, as external environmental factors, have affected the Korean industries, particularly marine shipping and logistics. To find out the economic value of marine weather information, we use measurable results of VVOS(Vessel and Voyage Optimization Services) in the ocean shipping, which the marine weather software tool can save fuel costs up to 4%. When the fuel saving is same as VVOS's performance, the saving of Korean flag ship is estimated about 62 billion won and the saving of total flag ship is estimated about 519 billion won. However, coastal shipping companies have been struggling with the heavy weather factors, such as wave height, wave period and wind. Major findings are that wind and wave height have a significant negative effect on cargo transport, while wave period has a significant positive effect on cargo transport. And to conclude, when we use efficiently the marine weather information, we can increase cargo transport and save fuel costs etc.

A Study on the Relationship between Donation Intention and Cognitive Age in an Aging Society (고령화사회의 인지연령과 기부의도에 관한 연구)

  • Oh, Min-Jung;Hwang, Yoon-Yong
    • Journal of Distribution Science
    • /
    • v.13 no.5
    • /
    • pp.83-90
    • /
    • 2015
  • Purpose - This research aims to understand the different behaviors of consumers according to cognitive age. Specifically, this research is focused on pro-social behavior. Pro-social behavior is defined as behavior benefiting others, rather than behavior benefiting one's self. It often entails individual risk or cost, such as when giving resources to others, waiting in line, asking for or paying a fair price, or risking one's life in battle. Therefore, we sought to understand consumer psychology and cognitive age as a reflection of inner psychology. People frequently perceive themselves as younger or older than their chronological ages. This self-perceived or cognitive age is a subjective age perception independent of actual chronological age. The discrepancy degree between chronological and cognitive age represents how much individuals perceive themselves as younger than they are. This study examines the gap in donation intention based on cognitive age. In order to investigate cognitive age, composed of four sub-categories (feel-age, look-age, do-age, and interest-age), this study explores the differential donation intention based on cognitive age, which determines the relationship between the young age and old age. Research design, data, and methodology - Data research was conducted by gathering 216 survey samples, excluding those with unreliable answers. Data coding and cleaning were used and SPSS 19.0 software for the data analysis. The respondents were categorized into two types, younger cognitive ages and older cognitive ages. Additionally, we analyzed the moderating variables. In particular, we used cognitive age degree and congruency level (cognitive age low vs. cognitive age high) × (congruency close vs. congruency distant) between - subjects design. First, regression was done to verify the difference between chronological age and cognitive age. Second, a t-test was done to verify the difference of cognitive age level in donations. Third, ANOVA (analysis of variance) was done to verify the difference between cognitive age and congruency in donations. Last, ANOVA was done to verify the difference between cognitive age and moral judgments in donations. Result - The results show most respondents perceive themselves as younger than their chronological ages. In particular, older respondents feel they are younger than their actual age. Moreover, the result of the comparison between low degree and high degree groups of cognitive age, show high donations at the higher degree of cognitive age groups. In addition, the closer the distance to the beneficiaries, the higher the donation in high degree cognitive age groups. The higher moral judgment groups also show relatively high contributions in lower degree cognitive age groups. Conclusions - Donations belong to the category of pro-social behavior reflecting an individual's psychological state. Therefore, it is important in understanding cognitive age. This study implies that it is necessary to take into account both cognitive age and chronological age when segmenting donors. Moreover, this study confirmed that there are different factors affecting the motives behind donations. Thus, it may be utilized to create differential donation strategies.

Service Identification of Component-Based System for Service-Oriented Architecture (서비스 지향 아키텍처를 위한 컴포넌트기반 시스템의 서비스 식별)

  • Lee, Hyeon-Joo;Choi, Byoung-Ju;Lee, Jung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.70-80
    • /
    • 2008
  • Today, businesses have to respond with flexibility and speed to ever-changing customer demand and market opportunities. Service-oriented architecture (SOA) is the best methodology for minimizing the complexity and the cost of enterprise-level infrastructure and for maximizing the productivity and the flexibility of an enterprise. Most of the enterprise-level SOA delivery strategies deal with the top-down approach, which organization has to define the business processes, to model business services, and to find the required services or to develop new services. However, a lot of peoples want to maximally reuse legacy component-based systems as well as to deliver SOA into their organizations. In this paper, we propose a bottom-up approach for identifying business services with proper granularity. It can improve the reusability and maintenance of services by considering not data I/O of components of legacy applications but GUI event patterns. Our proposed method is applied to MIS with 129 GUIs and 13 components. As a result, the valiance of the coupling value of components is increased five times and three business services are distinctly exposed. It also provides a 49% improvement in reducing the relationship problems between services over a service identification method using only partitioning information of components.

Effects of Smart-Work IT-Resources on the Work Efficiency and Corporate Performance in Service Industry (서비스 산업에서 스마트워크 IT자원이 업무효율성과 기업성과에 미치는 영향)

  • Lee, Min-Woo;Kim, Seung-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.89-97
    • /
    • 2015
  • With advances in IT Smart-Work is emerging as a new way of conducting business and several companies are considering to introduce the Smart-Work digital convergence technology. In this paper, we examined the effects of the Smart-Work IT resources on the work efficiency and the corporate performances in service industry by applying the Resource-Based View. The results of the structural equation modelling analysis showed that Smart-Work IT infrastructure and individual IT skills had positive influence on individual work efficiency while business application software and IT skills affected team work efficiency. Also, we confirmed that individual and team work efficiency positively affect financial and market performance of business firms. With the findings of the study, we expect that the introduction of Smart-Work would have positive effect, at least in service industry, on work efficiency and corporate performance, which will in turn lead to gaining competitive advantage for those firms adopting Smart-Work.

Framework for Technology Valuation of Early Stage Technologies (초기단계 기술의 가치평가 방법론 적용 프레임워크)

  • Park, Hyun-Woo;Lee, Jong-Taik
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.242-261
    • /
    • 2012
  • Early stages of technology valuation have been often overlooked or under-represented. The early stage technologies are even riskier due to their inadequacy of commercial development and market applicability. More than 95% of patents fail to earn any revenues so that the majority of patents were valueless. Technology transfers from laboratories at universities and research institutes to industrial firms have increased to acquire value from invented technologies. Technology transfer, a process of transferring discoveries and innovations resulted from research to commercial sectors, typically comprises several steps: disclosing the discoveries and innovations, i.e., intellectual property (IP), evaluating the IP's economic prospects, securing a patent, copyright or trademark for the IP, commercializing the technology through licensing, forming a joint venture, or selling. At each of those stages in the research and development of technology, the value of technology would play a very important role of making decision on the movement toward the next step, however, the financial value of technology is not easy to determine due to a great amount of uncertainty in the course of research and development, and commercialization. This paper refers to technology embodied as devices, equipment, software or processes primarily developed at public research institutions such as universities. Sometimes it is also as the result of externally financed projects contracted with industry. Nearly always technology developed at public research entities results in laboratory prototypes. When it is required to define the technology transfer contract terms for the license of the university patrimonial rights to external funding companies or other interested parties, a question arises: what is the monetary value? In this paper, we present a method for technology valuation based on the identification of specific value points related to its development. The final technology value must be within previously defined value limits. This paper consists of the review of issues related to technology transfer and commercialization, the identification of characteristics of technologies in the early stage of technology development, the formulation of framework of methods to value the early stage technologies, and the conclusion and implication of the previous review.

  • PDF

Cyclostorm : The Cloud Computing Service for Uplifting Javascript Processing Efficiency of Mobile Applications based on WAC (Cyclostorm : WAC 기반 모바일 앱의 자바스크립트 처리 효율 향상을 위한 클라우드 컴퓨팅 서비스)

  • Bang, Jiwoong;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.150-164
    • /
    • 2013
  • Currently it is being gradually focused on the mobile application's processing performance implemented by Javascript and HTML (Hyper Text Markup Language) due to the dissemination of mobile web application supply based on the WAC (Wholesale Application Community). If the application software has a simple functional processing structure, then the problem is benign, however, the load of a browser is getting heavier as the amount of Javascript processing is being increased. There is a limitation on the processing time and capacity of the Javascript in the ordinary mobile browsers which are on the market now. In order to solve those problems, the Web Worker that is not supported from the existing Javascript technology is now provided by the HTML 5 to implement the multi thread. The Web Worker provides a mechanism that process a part from the single thread through a separate one. However, it can not guarantee the computing ability as a native application on the mobile and is not enough as a solution for improving the fundamental processing speed. The Cyclostorm overcomes the limitation of resources as a mobile client and guarantees the performance as a native application by providing high computing service and ascripting the Javascript process on the mobile to the computer server on the cloud. From the performance evaluation experiment, the Cyclostorm shows a maximally 6 times faster computing speed than in the existing mobile browser's Javascript and 3 to 6 times faster than in Web Worker of the HTML 5. In addition, the usage of memory is measured less than the existing method since the server's memory has been used. In this paper, the Cyclostorm is introduced as one of the mobile cloud computing services to conquer the limitation of the WAC based mobile browsers and to improve the existing web application's performances.

Development of a Moving Monitor System for Growing Crops and Environmental Information in Green House (시설하우스 이동형 환경 및 생장 모니터링 시스템 개발)

  • Kim, Ho-Joon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.3
    • /
    • pp.285-290
    • /
    • 2016
  • In rural area, our farmers confront decreasing benefits owing to imported crops and increased cost. Recently, the government encourage the 6th Industry that merges farming, rural resources, and information and communication technology. Therefor the government makes an investment in supplying 'smart greenhouse' in which a farmer monitor growing crops and environment information to control growing condition. The objective of this study is developing an Moving Monitor and Control System for crops in green House. This system includes a movable sensing unit, a controlling unit, and a server PC unit. The movable sensing unit contains high resolution IP camera, temperature and humidity sensor and WiFi repeater. It rolls on a rail hanging beneath the ceiling of a green house. The controlling unit contains embedded PC, PLC module, WiFi router, and BLDC motor to drive the movable sensing unit. And the server PC unit contains a integrated farm management software and home pages and databases in which the images of crops and environment informations. The movable sensing unit moves widely in a green house and gathers lots of information. The server saves these informations and provides them to customers with the direct commercing web page. This system will help farmers to control house environment and sales their crops in online market. Eventually It will be helpful for farmers to increase their benefits.

A Study on Success Factors for Entrepreneurs in IT Ventures (IT 창업 기업의 창업 성공 요인에 대한 연구)

  • Shin, Yu-Sub;Choi, Myeong-Gil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2371-2385
    • /
    • 2010
  • What are the success factors of IT venture entrepreneur that through initial phase and enter to the growth phase ? Both the duration of jobless growth and the economic recession are worsening employment market. Entrepreneurship is be proposed to a method for creating jobs and reducing the economic gap. Research on Entrepreneurship and the support of government policy has already been operated for a long time ago. Research on growth and duration of the entrepreneur in initial phase, compared with growth phase are insignificant in quantity or quality. Therefore, this study researches essential factors about growth and duration of the entrepreneur in the initial phase through cases related them. entrepreneur of this subject are classified the hardware development group and the software development group associated with manufacturing characteristic funded existence. There is a research on evaluation factors about selection and result evaluation of selecting Entrepreneur. And this can be investigated by studying to Entrepreneur's growth and duration in initial phase. There are affecting factors about growth and duration of first step. And they are divided by internal, external, synthetic, and characteristic factors of growth phase. The result of this study is be used to develop pre-established educational program, consulting guidelines and establish support policy.

The Ethical Regime and Technological Citizenship in Software Oriented Society (SW(소프트웨어)중심사회의 윤리적 체제와 기술 시티즌십)

  • Kim, Seungeun;Kim, Hyomin
    • Journal of Science and Technology Studies
    • /
    • v.15 no.2
    • /
    • pp.263-301
    • /
    • 2015
  • Digital inclusion is the ability or opportunities of individuals and groups to access and use information technology (IT). Digital inclusion strategies aims to ensure that all citizens regardless of their gender, race and class benefit from IT. Discourse of digital inclusion is notable in that it proposes a desirable relationship between the state, individuals, and the market within the shifting topology of technoscience. Throughout broad discourse analysis of media coverages, in-depth interviews and reports on Korean IT industry, this research argues that dialogues on digital inclusion have substantially influenced the formation of a specific ethical regime. In this regime, individuals should become subjects embodying IT expertise and acceptable codes of conducts. We further discuss that such government-driven ethical regime conflicts with technological citizenship practiced by IT experts and semi-experts. We make theoretical contribution to STS by expanding the concept of technological citizenship to include the rights and obligations of heterogeneous expert and semi-expert groups to form, propose and socially demand alternative developmental pathways of technoscience. We also note that, amid the conflict between ethical regime and technological citizenship, alternative interpretations of gender gap can be forged, providing competing perspectives on women's under-representation and labor conditions in the IT industry. Further research is required to capture the emergence of multiple identities--differentiated by gender, race, class, and more--within the clashing interface between the ethical regime and technological citizenship.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.