• Title/Summary/Keyword: 개념 정보 모델

Search Result 1,650, Processing Time 0.032 seconds

A Study on the Product Design Process in I-Business Environment Focusing on Development of the Internet-based Design Process - (e-비지니스환경에서의 제품디자인 프로세스에 관한 기초연구-인터넷기반의 디자인 프로세스 개발을 중심으로-)

  • 이수봉;이돈희
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.181-198
    • /
    • 2003
  • The purpose of this study is to develop a on-line design tool for effectively coping with e-Business environment, or product design process into a Cyber model for traditional manufacturers which attempts new product development under such environment. It was finally developed as a model named $\ulcorner$Design Vortal Site; e-BVDS) that was based on the structure and style of internet web site. Results of the study can be described as follows ; \circled1 e-Business is based on the Internet. All processes in the context of e-Business require models whose structure and method of use are on-line styles. \circled2 In case that a traditional manufacturing business is converted into e-Business, it is better to first consider Hybrid Model that combines resources and advantages of both such traditional and digital businesses. \circled3 The product design process appropriate for e-Business environment has to have a structure and style that ensure utilization of the process as an Internet web site, active participation by product developers and interactive communication between participants in designing and designers. \circled4 $\ulcorner$e-BDVS) makes possible the use of designers around the wend like in-house designers, overcoming lack in creativity, ideas and human resources traditional business organizations face. However, the operation of $\ulcorner$e-BDVS$\lrcorner$ requires time and budget investments in securing related elements and conditions. \circled5 Cyber designers under $\ulcorner$e-BDVS$\lrcorner$ can easily perform all design projects in cyber space. But they have some limits in playing a role as designers and they have difficulty in getting rewards if such projects completed by them are not finally accepted. \circled6 $\ulcorner$e-BDVS) ensures the rapid use of a wide range of design information and data, reception of a variety of solutions and ideas and effective design development, all of which are not possible through traditional processes. However, this process may not be suitable to be used routine process or tool. \circled7 $\ulcorner$e-BDVS$\lrcorner$ makes it possible for out-sourcing or partners businesses to overcome restrictions in time and space and improve productivity and effectiveness. But such they may have to continue off-line works that can not be treated on-line.

  • PDF

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

Reforming Business Classification Systems of Merchants: A Case of S-Card's Customer Segmentation Strategy (S카드사의 가맹점 분류체계 정비를 통한 고객세분화 전략)

  • Park, Jin-Soo;Chang, Nam-Sik;Hwang, You-Sub
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.89-109
    • /
    • 2008
  • Korean card firms suffered harsh setbacks due to high credit defaults in 2002 and 2003, after issuing cards recklessly. Their key principle is changed to grow without damaging profitability and financial soundness. However, competition in the credit card market is heating up rapidly. Bank-affiliated card firms, having stronger sales networks and more capital than independent issuers, have increased their investments in card affiliates in a bid to develop new cash cows. Moreover, newly emerging independent card firms have waged fiercer campaigns to raise their credit card market share. In order to overcome these business conditions, S-card has settled on a strategy that focuses on stepping up marketing aimed at increasing charge card spending rather than credit card loans or cash lending services. Accordingly, S-card reformed the current business classification system of merchants, which was out-of-dated and originally built for the purpose of deciding merchant service fees only. They also drove customer segmentation planning to deliver the right customers to the right merchants. In this paper, we emphasize the problems of business classification systems of merchants with which most credit card firms have faced, and the need for reforming them not only to provide customer-tailored services but also to raise their business promotion excellence by reviewing S-card's process of customer segmentation.

A Software Architecture for Supporting Dynamic Collaboration Environment on the Internet (인터넷 상에서의 동적인 협업 환경의 지원을 위한 소프트웨어 구조)

  • 이장호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.146-157
    • /
    • 2003
  • Our experience with Internet-based scientific collaboratories indicates that they need to be user-extensible, allow users to add tools and objects dynamically to workspaces, per mit users to move work dynamically between private and shared workspaces, and be easily accessible on the Internet. We present the software architecture of a development environment, called Collaboratory Builder's Environment(CBE), for building collaboratories to meet such needs. CBE provides user extensibility by allowing a collaboratory to be constructed as a collection of collaborative applets. To support dynamic reconfiguration of shared workspaces, CBE uses the metaphor of room that can contain applets, users, and arbitrary data objects. Rooms can be used not only for synchronous collaboration but also for asynchronous collaboration by supporting persistence. For the access over the Internet room participants are given different roles with appropriate access rights. A prototype of the model has been implemented in Java and can be run from a Java-enabled Web browser. The implemented system had been used by 95 users including 79 space scientists around the world in a scientific campaign that ran for 4 days. The usage evaluation of the campaign is also presented.

Design and Analysis of Ubiquitous Customer Relationship Management System Based on Near Field Communication (근거리 무선 통신 기반 유비쿼터스 고객 관계 관리 시스템의 설계 및 분석)

  • Jun, Jung-Ho;Park, Hyun-Soo;Lee, Kyoung-Jun
    • Information Systems Review
    • /
    • v.14 no.1
    • /
    • pp.37-65
    • /
    • 2012
  • This research aims to design and analyze a ubiquitous customer relationship management system based on near field communication which can be applied to stores in off-line environment. The existing customer relationship management system has been used mainly for stores in off-line environment to issue a royalty card, to stamp a seal on the purchase goods, and to manage the history of customers' visits and purchases. But, the existing system has two weaknesses; it makes difficult for a store manger not only to acquire a wealth of customer data but also to systematically manage the acquired data. In particular, the effectiveness and efficiency of the royalty card are questioned when a customer makes purchases in the store in that the customer frequently does not carry it or loses it. So, this research suggests a ubiquitous customer relationship management system where a tag for near field communications is attached to a store in off-line environment; a store manager can collect and manage easily customer's dada and customers can seamlessly acquire store's information. To do this, this research conducts the followings. First, we review the previous researches of customer relationship management to examine the concept of ubiquitous customer relationship management. Second, from the examination, we draw the factors to be considered in ubiquitous customer relationship management system based on near field communication. Third, we propose a scenario where the suggested system is used. Fourth, we analyze the participants' values and the process that will be used for the suggested system. Finally, we discuss the possibility of the application of this system to real business environment from various viewpoints.

  • PDF

Measuring CSV Performance: An Explorative Study on Strategic Activities in Converged Home Appliance Industry (공유가치창출을 위한 가전산업의 전략적 활동 및 성과 측정에 관한 연구)

  • Lee, Hye Sun;Park, Soo Kyung;Cho, Ji Yeon;Kim, Taisiya;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.117-126
    • /
    • 2015
  • The concept of Creating Shared Value (CSV) has emerged as a solution for companies' sustainable growth and social problems through collaboration of business activities and social demand. Therefore, studies on shared value creativity and measurement of companies' performances are required. However, most recent studies have applied the CSV concept to existing business models or measure shared value considering only economic value. Few studies have considered the appropriateness of applying the CSV or discussed performance measurement with respect to industry characteristics. This study selects the industry expected to have the greatest created value with applying the CSV, and then suggests measurement of performance in this industry. First, through the expert interview, the study selects one from among South Korea's 10 main industries, which is expected to solve social demand through convergence with the IT industry, and to create new value for a traditional industry. The Home Appliance industry was selected as appropriate, because it has industrial growth stagnation under the smart environment. Moreover, it is facing problems such as energy savings and environmental issues. The study goes on to suggest, based on Michael Porter's three strategic levels, measurement variables of the value creation process and performance. This study has limitations from an empirical perspective. However, as the interest of applying CSV to business is growing, it is meaningful to explore the CSV strategies activities and measurement performance based on industry-specific characteristics.

A Study on the Relationship between Patenting Activity Factors and Company Performance of Korean IT Industry (국내 IT기업의 특허활동요인이 경영성과에 미치는 영향 연구)

  • Kim, Chang Bong;Park, Jeong Ho
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.249-273
    • /
    • 2016
  • Recently companies consider the patent activity as one of the critical factor for success in global economy even though one of the enterprise's competitiveness factor was productivity in past industry economy. Since there are so many patent dispute globally in IT industry, it is very important for companies to register and manage patents strategically. Therefore, this research analyze relationship between Financial result and 3 patent activity factors like productivity, effectiveness, and high-quality by investigating patent and financial data of 217 Korean IT enterprises. This paper get the following results after building research model and hypothesis based on resource-based theory and analysing the data sets using multiple regression model. First, effectiveness and high-quality of patents showed positive(+) effect on growth of total assets of IT enterprises. Second, three factors of patent activities do not have significant results with average increase rate of sales. Third, only high-quality of patents have positive(+) effect on average increase rate of net income. The differentiation factor of this research is that this paper categorized patent activity factors as quantitative and qualitative factors, and practically suggested strategic direction of patent activities of IT companies which face serious patent distribute globally.

  • PDF

The Study on the Directions of KCR4 under the New ICP 2009 (국제목록원칙 2009 제정에 따른 한국목록규칙의 방향성에 관한 연구)

  • Lee, Mi-Hwa
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.261-280
    • /
    • 2012
  • This study seeks to replace PaRIS Principles and find directions of revising KCR4 by analyzing the international Cataloging Principles 2009(ICP 2009) established in the environment of Machine Readable Cataloging. ICP 2009 was reflected in cataloging rules such as RDA and ISBD 2010 as the minimal principles for uniformity in establishing each nation's cataloging rules. In contrary, KCR4 needs to be revised because it has never been changed after 2003, and has only description rules without any rules for the choice and forms of access points. Therefore, this study aims to grasp requirements that should be reflected in KCR4 through analyzing ICP 2009. In first step, it is to grasp the features of ICP 2009 by comparing PaRIS Principle and ICP 2009 and to compare KCR4 in aspects of ICP 2009. The detailed elements for comparison between ICP 2009 and KCR4 are scope, general principles, entitles, attributes, and relationships, objectives and functions of the catalogue, bibliographic description, access points, foundations for search capabilities as the contents of ICP 2009. As a result, this study could give some directions of KCR4 in the future. First, ISBD 2010 and conceptual models should be reflected in KCR4 in description. Second, it should regulate the authority access points in KCR4 based on ICP 2009. Third, it will describe essential access points of work and expression attributes in bibliographic records and authority records to find works and expression. This study will contribute to guide the national cataloging rules.

Business Architecture Design of a Highway Asset Management System (도로자산관리시스템의 업무아키텍처 설계)

  • Nah, Hei-Suk;Lim, Jong-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.931-942
    • /
    • 2011
  • As the social infrastructure becomes deteriorated, its maintenance cost has been increased rapidly. There are growing needs to manage facilities systematically to reduce this kind of maintenance budget, and furthermore to avoid safety accidents in Korea. Asset management is widely used in New Zealand, the United States, Great Britain to manage their social facilities. In these countries, standardized information model and its system are developed and in service for asset management. There are several researches on asset management of social infrastructure in Korea, and the KTAM-40 work procedure is one of the main results for these researches. In this paper, the IIMM of New Zealand and the KTAM-40 of Korea, were surveyed to develop a business architecture of the highway asset management system. A new business architecture for the highway asset management system is proposed based on the KTAM-40 work procedure: First, the organization and its role for the highway asset management are defined. Second, business functions of the highway asset management are classified. Third, the highway asset management functions and the flow of information are defined. In the last section, differences between the newly designed architecture and the other systems' architecture is reviewed.

Wireless u-PC: Personal workspace on an Wireless Network Storage (Wireless u-PC : 무선 네트워크 스토리지를 이용한 개인 컴퓨팅 환경의 이동성을 지원하는 서비스)

  • Sung, Baek-Jae;Hwang, Min-Kyung;Kim, In-Jung;Lee, Woo-Joong;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.916-920
    • /
    • 2008
  • The personal workspace consists of user- specified computing environment such as user profile, applications and their configurations, and user data. Mobile computing devices (i.e., cellular phones, PDAs, laptop computers, and Ultra Mobile PC) are getting smaller and lighter to provide personal work-space ubiquitously. However, various personal work-space mobility solutions (c.f. VMWare Pocket ACE[1], Mojopac[2], u-PC[3], etc.) are appeared with the advance of virtualization technology and portable storage technology. The personal workspace can be loaded at public PC using above solutions. Especially, we proposed a framework called ubiquitous personal computing environment (u-PC) that supports mobility of personal workspace based on wireless iSCSI network storage in our previous work. However, previous u-PC could support limited applications, because it uses IRP (I/O Request Packet) forwarding technique at filter driver level on Windows operating system. In this paper, we implement OS-level virtualization technology using system call hooking on Windows operating system. It supports personal workspace mobility and covers previous u-PC limitation. Also, it overcomes personal workspace loading overhead that is limitation of other solutions (i.e., VMWare Pocket ACE, Mojopac, etc). We implement a prototype consisting of Windows XP-based host PC and Linux-based mobile device connected via WiNET protocol of UWB. We leverage several use~case models of our framework for proving its usability.