• Title/Summary/Keyword: supplementary information

Search Result 347, Processing Time 0.028 seconds

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

Development of SIP based Call Processing Language Server System (SIP기반 호 처리 언어(CPL) 서버 시스템의 설계 및 구현)

  • Yi Jong-Hwa;Min Kyung-Joo;Kang Shin-Gak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.101-108
    • /
    • 2004
  • SIP(Session Initiation Protocol) is a suitable protocol for supporting Internet telephony services and currently market requirements fur developing supplementary telephony services such as unconditional call forwarding, call forwarding on busy or no answer, call filtering services have recently grown. CPL(Call Processing Language) is a standard technology that can be used to describe and control internet telephony services. In this paper, we describe the CPL system for supplementary Internet telephony services using SIP as an application level call signaling protocol. Those supplementary services are composed of CPL client which is a SIP UA, SIP Proxy server, Registrar and CPL server In this paper, we describe the design and implementation of the CPL server system in detail which is developed in Linux 7.2 using C and C++ programming languages.

The Effectiveness of Learning Performance on Supplementary Learning Tool based on Blog using Learner-Centric UI/UX Design in Higher Education (대학교육에서 학습자 중심형 UI/UX 디자인이 적용된 블로그 기반의 보조학습도구가 학습성과에 미치는 영향)

  • Bae, Ji-Hye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5531-5540
    • /
    • 2011
  • The Learning Models including the design principle about web 2.0 use in education has been recently presented. In types of web 2.0 tools, blogs are the best tool that reflected the trends of web 2.0 and these are able to share a lot of information and contents. To invent new learning methods involving web 2.0, this study aims to get the results about effectiveness of learning performance on a supplementary learning tool based on blog using learner-centric UI/UX design in higher education. As a study tool, installation-type blog that can be designed as user-centric system is applied to experimental environment. This study presents the conclusion that supplementary learning tool based on blog using learner-centric UI/UX design influences on learning achievement and learning flow through the analysis of questionnaire results of learners, learning evaluation score of learners and assignments evaluation score of learners.

Development of the Home Location Register/Authentication Center in the CDMA Mobile System

  • Lim, Sun-Bae;Shin, Kyeong-Suk;Kim, Hyun-Gon
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.186-201
    • /
    • 1997
  • In this paper, a home location register (HLR) for CDMA mobile communication system (CMS) is introduced. It stores the mobile station (MS) subscribers locations and supplementary service information. Call processing procedures for HLR are developed to receive and store subscriber's location coming from mobile exchange (MX) during the location registration, and to transfer subscriber's location and supplementary service information to the MX during the mobile-terminated call setup. For fast call processing by increasing database access speed, a memory-resident database management system is devised. For Easy and secure HLR operation, administration and maintenance functions and overload control mechanisms are implemented. Designed HLR hardware platform is expandable and flexible enough to reallocated software blocks to any subsystems within the platform. It is configurable according to the size of subscribers. An authentication center (AC) is developed on the same platform. It screens the qualified MS from the unqualified. The calls to and from the unqualified MS are rejected in CMS. To authenticate the MS, the AC generates a new authentication parameter called "AUTHR" using shared secret data (SSD) and compared it with the other AUTHR received from the MS. The MC also generates and stores seed keys called "A-keys" which are used to generate SSDs. The HLR requirements, the AC requirements, software architecture, hardware platform, and test results are discussed.

  • PDF

Supplementary Event-Listener Injection Attack in Smart Phones

  • Hidhaya, S. Fouzul;Geetha, Angelina;Kumar, B. Nandha;Sravanth, Loganathan Venkat;Habeeb, A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4191-4203
    • /
    • 2015
  • WebView is a vital component in smartphone platforms like Android, Windows and iOS that enables smartphone applications (apps) to embed a simple yet powerful web browser inside them. WebView not only provides the same functionalities as web browser, it, more importantly, enables a rich interaction between apps and webpages loaded inside the WebView. However, the design and the features of WebView lays path to tamper the sandbox protection mechanism implemented by browsers. As a consequence, malicious attacks can be launched either against the apps or by the apps through the exploitation of WebView APIs. This paper presents a critical attack called Supplementary Event-Listener Injection (SEI) attack which adds auxiliary event listeners, for executing malicious activities, on the HTML elements in the webpage loaded by the WebView via JavaScript Injection. This paper also proposes an automated static analysis system for analyzing WebView embedded apps to classify the kind of vulnerability possessed by them and a solution for the mitigation of the attack.

vlda: An R package for statistical visualization of multidimensional longitudinal data

  • Lee, Bo-Hui;Ryu, Seongwon;Choi, Yong-Seok
    • Communications for Statistical Applications and Methods
    • /
    • v.28 no.4
    • /
    • pp.369-391
    • /
    • 2021
  • The vlda is an R (R Development Core team et al., 2011) package which provides functions for visualization of multidimensional longitudinal data. In particular, the R package vlda was developed to assist in producing a plot that more effectively expresses changes over time for two different types (long format and wide format) and uses a consistent calling scheme for longitudinal data. The main features of this package allow us to identify the relationship between categories and objects using an indicator matrix with object information, as well as to cluster objects. The R package vlda can be used to understand trends in observations over time in addition to identifying relative relationships at a simple visualization level. It also offers a new interactive implementation to perform additional interpretation, therefore it is useful for longitudinal data visual analysis. Due to the synergistic relationship between the existing VLDA plot and interactive features, the user is empowered by a refined observe the visual aspects of the VLDA plot layout. Furthermore, it allows the projection of supplementary information (supplementary objects and variables) that often occurs in longitudinal data of graphs. In this study, practical examples are provided to highlight the implemented methods of real applications.

A Study on the Work of Dental Hygienists by Service Area (치과위생사의 근무지별 업무실태에 관한 조사 연구)

  • Moon, Kyung-Sook;Hwang, Yoon-Sook;Kim, Young-Kyung;Jung, Jae-Yeon
    • Journal of Korean society of Dental Hygiene
    • /
    • v.2 no.1
    • /
    • pp.63-83
    • /
    • 2002
  • The purpose of this study was to serve as a basis for more efficient dental hygienist human resources utilization and for determining some of the right directions for supplementary education for dental hygienists, by examining how they actually worked and what they thought of job-related things. The subjects in this study were 537 dental hygienists who participated in a seminar by the Korea Dental Hygienist Association. After a survey was conducted, the following findings were given: 1. 50.2% of the dental hygienists investigated completed legally required eight-class education. Those who worked in clinics took less supplementary education classes than the others in the other types of dental institutions. The main reason they didn't receive supplementary education was financial burden and uncooperative employers. 73.2% took supplementary education at the association or its branches. The association was most favored by those in clinical sector as a place that provides supplementary education, followed by its branch and university in the order named. And the dental hygienists in public health sector preferred university most, and the next best favored one was the association and its branch in the order named. Those in clinical sector hoped to acquire clinical information on patient management, implant or aesthetics, and the dental hygienists in public health sector wanted to learn about health administration, public oral health operations and oral health education, which were different from what those in clinical sector wanted. 2. Regarding the period of service, 492% had worked for three years or more. This fact suggested that their service term and average age continued to grow. And they thought they would decide the retirement time on their own. 3. The most common yearly income ranged from 12 million won to 16 million won(40.7%). For-those in clinics, yearly income was 14.36 million won, and that of the dental hygienists who had worked for less than 3 years was 12.90 million won. 4. The Korea Dental Hygienist Association was most required to protect the rights and interests of the members and offer new knowledge and technology. 5. The largest group of them were engaged in patient management, and this type of job also was the most favored one for them to do. The greatest number of the dental hygienists in public health sector were in charge of dental treatment. 6. Concerning their turnover rate, 492% had never changed their occupation. Specifically, 70.0% of the respondents who had worked for less than 3 years had have no experience to do that. The time constraints for self-development and conflicts with other workers were the cause of their turnover. Those in dental hospital and general hospital changed their occupation chiefly due to the lack of time for self-development, and for the dental hygienists in clinics, the conflicts with other workers were the main reason. The above-mentioned findings suggested that the way the dental hygienists looked at things was undergoing change. The service area made a difference to their preference for the type of supplementary education and institution in charge of it, as those in public health and clinical sectors had a different opinion. And the dental hygienists in clinical sector had a different opinion as well, according to service area, about salaries, reason of not taking supplementary education, preferred type of supplementary education, cause of turnover, and type of occupation to which they hoped to change employment. To utilize and supply human resources in a more stabilized manner, job description should be more segmented, standardized and classified clearly, and dental hygienists should be motivated to perform their substantial jobs, including oral disease prevention, oral prophylaxis and oral health education. To make it happen, it seems that dentists are required to have a clear understanding of dental hygienist job and to change the way they look at it.

  • PDF

The Intergrated O&M System for SMOT(Synchronous Multiplexing and Optical Transmission) System level-1/4/16 (동기식광전송장치(SMOT-1/4/16)의 통합 운용관리시스템 구현)

  • 배광용;이동원김정수
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.195-198
    • /
    • 1998
  • In Korea Telecom, many synchronous optical transmission equipments and its operating terminal (PC) have been operated. However, many equipment operators have requested various supplementary functions such as self-monitoring and taking statistical information. This system has tried to solve the above problems, and therefore to establish centralized monitoring system on synchronous transmission equipments based on telephone office unit.

  • PDF

User attribute verification method using user mobile dynamic information

  • Kim, Seok-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.145-149
    • /
    • 2019
  • Various supplementary authentication methods are used to supplement user authentication and authorization provided by existing password verification online1. In recent years, authentication and authorization methods using user attribute information have been studied and utilized in various services. User attribute information can be divided into static information and dynamic information. The existing methods focus on research to identify users using dynamic information or to generate challenge questions for user reauthentication. Static information such as a user's home address, school, company, etc. is associated with dynamic information such as location information. We propose a method to verify user attribute information by using the association between two attribute information. For this purpose, the static information of the user is verified by using the user's location record which is dynamic information. The experiment of this paper collects the dynamic information of the actual user and extracts the static information to verify the user attributes. And we implemented the user attribute information authentication system using the proposal verification method and evaluated the utility based on applicability, convenience, and security.

Legal liability of the management firm on hacked Robo-Advisor's stock price manipulation (해킹에 따른 로보어드바이저의 시세조종 행위와 운용사의 법적 책임)

  • Kim, Dong Ju;Kwon, Hun Yeong;Lim, Jong In
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.41-47
    • /
    • 2017
  • This study is a preceding research designed to deduct an institutional supplementary measure that minimizes any inevitable side effects from the improvement of artificial intelligence (AI) technology, which is the core element of the Fourth Industrial Revolution. In this specific case in which the Robo-Advisor, the representative type of AI-applied technology, was hacked by a third party and ended up manipulating prices, the study was intended to examine the responsibility relationship of the current legal framework. Although the current legal framework strictly prohibits acts such as hacking and manipulation, it was confirmed that if the Robo-Advisor management firm acts in compliance with protection measures regarding hacking, the firm is free from any legal liabilities and there is insufficient legal protection available for ordinary investors with grand-scale damage from price manipulation Based on this study, further studies are needed to derive more institutional supplementary measures on overcoming these problems.