• Title/Summary/Keyword: 기업보험

Search Result 267, Processing Time 0.026 seconds

온라인과 오프라인 유통경로에서 소비자 구매행동에 대한 비교연구

  • Park, Cheol
    • Distribution Business Review
    • /
    • no.2
    • /
    • pp.49-63
    • /
    • 2002
  • 최근 인터넷 상거래가 급속히 확산되면서 기업의 경쟁이 실물세계와 가상세계에서 발생하는 현상이 전개되고 있다. 즉, 유통경로의 측면에서 볼 때 기존의 물리적 세계에 존재하는 전통적인 유통경로와 사이버공간에 존재하는 가상 유통경로가 서로 경쟁하는 형국이 벌어지고 있는 것이다. 온라인 유통경로가 활성화 되면서 두 유통경로간의 갈등양상도 나타나고 있다. 예를 들어, 자동차, 보험, 증권 등의 업종에서 온라인 경로를 통한 판매는 즉각적으로 오프라인 영업사원들의 반발을 불렀다. 컴팩의 경우는 자기 웹사이트나 대리점보다 더 싸게 자사제품을 판매하는 온라인 쇼핑몰에는 제품공급중단을 선언하기도 했다.(중략)

  • PDF

동물약계

  • Korea Animal Health Products Association
    • 동물약계
    • /
    • no.108
    • /
    • pp.3-5
    • /
    • 2006
  • 동물약사감시 행정처분 결과 홍보/무허가 동물용의약품 판매 단속 건의/가축전염병 예방약류 단가계약 서양서 제출/제5차 수출촉진협의회 개최/기업 법무강좌 참석/축산인 골프대회 및 KAHPA컵 골프대회 개최/해외전시회 단체참가 지원 신청/2007년 병역지정업체 선정 및 인원배정/동물용의약품등 취급규칙 하위규정 제정 관련 검토 협의회 개최/농업연수원 동물약품 관련 교육 수요조사/제5차 항생제 사용절감 연구모임 회의 참석/2007년 동물약품 PL 단체보험 가입 안내/협회 직원 인사

  • PDF

A Case Study of a Acquisition & Appraisal Policy of Business Archives - With a focus on Meritz - (기업사료의 수집·평가방안 연구 - 메리츠화재의 사례를 중심으로 -)

  • Kim, Hwa Kyoung
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.219-262
    • /
    • 2007
  • Business organization have developed in close association with the society afterward. Moreover, under capitalism business archives, though they are created in private sector, have started to have public characteristics and be used in public domain beyond internal use in business organization. Records and Archives management at a corporate level increasingly become indispensible. Business organization can use archive management to improve job efficiency and customer service and to facilitate legal matters, marketing, advertising, property management, personnel management and publicity. Additionally, They can secure corporate identity and social reliability as well as transparency in management. This is turn helps secure corporate competitiveness to play as a medium for creating new profit, which will enhance corporate brands. The records and Archives management, which recently kicks off among business organization, are to collect scattered archives and seek systemic management through archives management systems. This study present ways to collect archives scattered before archives management systems were adopted according to archives management. As a prior investigation, the scope and characteristics of business archives are defined. Visit to business organization to collect data and interview with officials responsible were carried out as a preliminary investigation to conduce acquisition policy. Based on the results of the investigation, acquisition policy of Meritz was conducted. into internal and external collection activities, event collection activities. Value appraisal and display appraisal of archives were established as a appraisal policy for efficient management and utilization of collected business archives. This study takes the case of Metitz Fire & Marine Insurance Co, Ltd (Meritz) as a example to present ways to manage business archives specifically.

A Study of ESP and Computer Security Risk Management (ESP와 컴퓨터 보안 위험 관리에 대한 연구)

  • 안태희;김영렬
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.408-416
    • /
    • 2002
  • 네트워크의 발달과 인터넷의 생활화로 컴퓨터 보안이 시대적인 중요문제로 부각하고 있다. 요즘 해킹으로 발생하는 재정적 손실은 특별하게 큰 사건이 아닌 경우에 언론에 보도되지 않을 정도로 만성적인 현상으로 인식되고 있으며 컴퓨터 범죄는 어느정도 사회현상의 하나로 여겨질 정도다. 그러나 컴퓨터 범죄를 퇴치하고 컴퓨터보안의 완벽성을 유지하고자 하는 기술적인 노력은 지속적으로 전개되고 있으나 컴퓨터 범죄는 오히려 늘어가고 있는 추세다. 이에따라 컴퓨터 범죄등 컴퓨터보안관리가 기술적인 수준에 머물지 않는 성격을 갖추고 있다는 인식이 최근들어 확산하고 있다고 할 수 있다. 이 논문은 이런 인식에서부터 출발해 새로운 개념으로 등장한 전사적 보안관리 (Enterprise Security Planning)와 컴퓨터 보안 위험 관리(Computer Security Risk Management)의 개념에 대한 이해를 중점적으로 제기했다. 또 컴퓨터 보안위험관리의 과정을 단계별로 검토해 컴퓨터 보안위험관리를 체계적으로 이해할수 있도록 제시했다. 마지막으로 본 논문은 전사적 보안관리와 컴퓨터 보안위험 관리차원에서 기업이 보안관리를 위해 갖춰야 할 새로운 흐름들, 예를 들어 보안관리자(Chief Security Officer) 제도와 보안보험 가입등 보안정책을 제시함으로써 컴퓨터범죄로부터 기업이 최대한의 안전성을 확보할 수 있는 경영전략의 틀을 제시했다.

  • PDF

Accessing a Database through Mobile Devices (모바일 단말기를 통한 데이터베이스 접근)

  • Lee, Choong-H.;Lee, Hyeon-S.;Cho, Seung-H.;Cho, Beom-J.;Shim, Jae-H.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1639-1642
    • /
    • 2003
  • 본 연구는 사용자들이 이동시에도 유무선 인터넷을 통해 모바일 단말기를 통해 데이터베이스에 접근할 수 있도록 제공한다. 이를 위해 별도의 노력 없이 유선 인터넷과 무선 인터넷간에 일관된 정보들이 제공되므로 이동시에도 관련 업무 정보들을 즉시 접근할 수 있다. 본 시스템은 XML 생성기, ML 생성기와 출판기 세 가지 부시스템으로 구성된다. 본 연구의 견과는 기업간 m-커머스로부터 보험, 영업, 판매, 택배 등 다양한 서비스 분야에서 기업이나 기관들의 생산성을 높이는데 중요한 역할을 담당할 것으로 기대된다.

  • PDF

A Study on Information Security Consulting Method according to Type of Company (기업 업종에 따른 정보보안컨설팅 방법 연구)

  • Lee, Su-youn
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.121-126
    • /
    • 2015
  • Exposure of personal information that is held by hacking accident near the company has led to severe water level. And, it has changed security threat elements generated according to businessenterprise. Therefore, in this paper, I looked at security threat elements and proposed the way of appropriate information security consulting according type of company. First, In the financial and insurance industries, and should not have been compromised by a worm virus infection due to lack of awareness inside of members, by collectively apply in the same way the internal security standards of the organization to members, the risk of customer information. It shall be provided in advance that the security accident occurs due to a higher job group. Therefore, information security consulting method based on people and information is applied. Secondly, in industry of company, to perform consulting information security based on the attributes of the case industry groups.

Impacts of Digital and Human Knowledge Resources on Customer Response Capability of Customer Service Representatives (비대면 서비스 조직에서 디지털 및 인적 지식자원이 상담사의 고객대응역량에 미치는 영향)

  • Choi, Sujeong
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.123-140
    • /
    • 2020
  • In call centers where customers contact a firm's customer service without face-to-face interaction, customer service representatives (CSRs) determine its service competitiveness. In other words, a firm's service excellence relies on its CSRs. Drawing on the concept of agility from service and information technologies studies, this study conceptualizes customer response capability as a variable consisting of customer response expertise and customer response agility, and further verifies its effects on customer service performance. Moreover, this study examines whether a firm's digital and human knowledge resources are related to CSRs' customer response capability. To empirically test the proposed hypotheses, the partial least squares analysis is conducted with a total of 371 responses collected on CSRs from two insurance call centers. The findings indicate that a firm's digital and human knowledge resources enhance CSRs' customer response expertise and customer response agility, thereby increasing customer service performance. The results draw the conclusion that CSRs' customer response capability is a key antecedent of superior customer service.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

Training Incentives in the Korean Levy-Grant System and the Performance: Evidences from the KLIPS Data (재직자 직업훈련 관련 공적재정의 구조와 성과: 효과 분석)

  • Lee, Chul-In;YOO, Gyeongjoon
    • KDI Journal of Economic Policy
    • /
    • v.33 no.3
    • /
    • pp.87-120
    • /
    • 2011
  • This paper examines how the levy-grant system for on-the-job training affects individual workers' training level and the subsequent wage growth. Some notable results include: (i) the workers at the firms facing high net benefits (i.e., grant minus levy) receive more firm training indeed, and (ii) training provision raises post-training earnings substantially. All these results are found to be robust to changes in firm size and estimation method.

  • PDF

Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities (보안책임과 규제가 기업의 보안활동에 미치는 영향 분석)

  • Shim, Woo-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.53-73
    • /
    • 2011
  • Many governments have tried to develop a liability and compliance law that can improve cyber security in a sustainable way. This paper explores whether a liability and compliance law is effective in motivating firms' information security activities. In particular, I empirically investigate the impact of the 2007 Electronic Financial Transaction Act (EFTA), a liability and compliance law in Korea, on the information security activities of financial institutions and services providers. In spite of various criticisms of the effectiveness of EFTA, the empirical findings of this study clearly show that EFTA is having a positive impact on information security activities. From these findings, this article concludes that a liability and compliance law is likely to contribute to a certain degree to the achievement of sustainable development of cyber security.