• Title/Summary/Keyword: Business efficiency

Search Result 2,529, Processing Time 0.033 seconds

Counter-terrorism Safety Measures in Public Facilities (다중이용시설의 대테러 안전대책)

  • Kim, Du-Hyun;Ahn, Kwang-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.37-64
    • /
    • 2010
  • Since the September 11, 2001, the motives and objectives of terrorism that have been targeted at hard targets such as key national facilities have now shifted towards soft targets such as subways, department stores, and tourist hotels; the attacks on these soft targets are steadily increasing. Simultaneous, unconventional, and indiscriminate terrorist attacks on civilians has also increased. In November, 2010, nearly forty states of the G20 and B20 (Business 20) will join in international summits to be hosted in Seoul. This coming July, an additional 350 troops will be deployed to Afghanistan for the sustainment of public security. Such events are sensitive topics, and there is the possibility of terrorist movement. Korea has successfully hosted various international events such as the APEC and ASEM Summits, and the 2002 Korea-Japan World Cup. The experiences from these events must be applied to ensure the safety of public facilities against the dangers of terrorism. First, counter-terrorism center must be established for the long-term, above the General Officer level to ensure the safety and efficiency of multilateral, international summits, as well as promoting policies and legislation aimed at preventing terrorism. Second, a terrorist threat management system must be secured and safety measures must be emphasized. Third, a fundamental structure must be established for the prevention of terrorism on public facilities, as well as legal and government action against the new threat of IED. Fourth, the police and fire fighting networks' must have a firm rapid response posture on the scene of an attack. Fifth, the state of mentality on the recognition of terrorist threats must be changed and restructured by promoting to and educating the population. Sixth, prevention measures must be established via research and academia. Seventh, for the guarantee of security in public facilities, safety management should employ cutting edge technology such as the 3D SICS and further develop and apply such technology. All methods and resources must be fully utilized for the establishment and strengthening terrorism prevention measures.

  • PDF

An Empirical Study on How the Moderating Effects of Individual Cultural Characteristics towards a Specific Target Affects User Experience: Based on the Survey Results of Four Types of Digital Device Users in the US, Germany, and Russia (특정 대상에 대한 개인 수준의 문화적 성향이 사용자 경험에 미치는 조절효과에 대한 실증적 연구: 미국, 독일, 러시아의 4개 디지털 기기 사용자를 대상으로)

  • Lee, In-Seong;Choi, Gi-Woong;Kim, So-Lyung;Lee, Ki-Ho;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.113-145
    • /
    • 2009
  • Recently, due to the globalization of the IT(Information Technology) market, devices and systems designed in one country are used in other countries as well. This phenomenon is becoming the key factor for increased interest on cross-cultural, or cross-national, research within the IT area. However, as the IT market is becoming bigger and more globalized, a great number of IT practitioners are having difficulty in designing and developing devices or systems which can provide optimal experience. This is because not only tangible factors such as language and a country's economic or industrial power affect the user experience of a certain device or system but also invisible and intangible factors as well. Among such invisible and intangible factors, the cultural characteristics of users from different countries may affect the user experience of certain devices or systems because cultural characteristics affect how they understand and interpret the devices or systems. In other words, when users evaluate the quality of overall user experience, the cultural characteristics of each user act as a perceptual lens that leads the user to focus on a certain elements of experience. Therefore, there is a need within the IT field to consider cultural characteristics when designing or developing certain devices or systems and plan a strategy for localization. In such an environment, existing IS studies identify the culture with the country, emphasize the importance of culture in a national level perspective, and hypothesize that users within the same country have same cultural characteristics. Under such assumptions, these studies focus on the moderating effects of cultural characteristics on a national level within a certain theoretical framework. This has already been suggested by cross-cultural studies conducted by scholars such as Hofstede(1980) in providing numerical research results and measurement items for cultural characteristics and using such results or items as they increase the efficiency of studies. However, such national level culture has its limitations in forecasting and explaining individual-level behaviors such as voluntary device or system usage. This is because individual cultural characteristics are the outcome of not only the national culture but also the culture of a race, company, local area, family, and other groups that are formulated through interaction within the group. Therefore, national or nationally dominant cultural characteristics may have its limitations in forecasting and explaining the cultural characteristics of an individual. Moreover, past studies in psychology suggest a possibility that there exist different cultural characteristics within a single individual depending on the subject being measured or its context. For example, in relation to individual vs. collective characteristics, which is one of the major cultural characteristics, an individual may show collectivistic characteristics when he or she is with family or friends but show individualistic characteristics in his or her workplace. Therefore, this study acknowledged such limitations of past studies and conducted a research within the framework of 'theoretically integrated model of user satisfaction and emotional attachment', which was developed through a former study, on how the effects of different experience elements on emotional attachment or user satisfaction are differentiated depending on the individual cultural characteristics related to a system or device usage. In order to do this, this study hypothesized the moderating effects of four cultural dimensions (uncertainty avoidance, individualism vs, collectivism, masculinity vs. femininity, and power distance) as suggested by Hofstede(1980) within the theoretically integrated model of emotional attachment and user satisfaction. Statistical tests were then implemented on these moderating effects through conducting surveys with users of four digital devices (mobile phone, MP3 player, LCD TV, and refrigerator) in three countries (US, Germany, and Russia). In order to explain and forecast the behavior of personal device or system users, individual cultural characteristics must be measured, and depending on the target device or system, measurements must be measured independently. Through this suggestion, this study hopes to provide new and useful perspectives for future IS research.

Critical Pathway Development for the Hysterectomy Patients and its applied Effect (자궁적출술 환자를 위한 critical pathway 개발과 적용효과)

  • Noh, Gi-Ok;Park, Kyung-Sook
    • Women's Health Nursing
    • /
    • v.6 no.2
    • /
    • pp.234-257
    • /
    • 2000
  • At present in the medical care, the study and effort for producing health service to consider efficiency, effectiveness, and quality are urgently called for because of the difficulty in the keen competition according to the inter- nationalization and opening, the operation in the medical institution service testing system, the change in the medical policy of KDRGs, and the lack of the health care cost increasing rate. As an alternative, the case management for the new management system is introduced in the U.S., and the Critical Pathway that is the method designing the contents of activity and its result has been developed and applied in order to anticipate and manage the patient-outcome for the realization of the cost-effective case-management. Thus, this study intended to analyze the effectiveness to obtain by developing the Critical Pathway presented as the method to improve the quality-betterment and cost effectiveness through the continuous and consistent patient management for the hysterectomy patient and applying it to the real practice. As a study method, this author formed a conceptual framework through considering five Critical Pathway used in the current U.S. and three Critical Pathway presented in the literature to develop the Critical Pathway for the hysterectomy patient, and made out the preliminary Critical Pathway through reviewing the old chart. This author made the verified the validity of the expert group about the developed Critical Pathway, and to confirm the possibility of practice application, completed and settled the final Critical Pathway after using the Critical Pathway to the hysterectomy patient from March 1st to 15th, 1997. Finally, to analyze the application-effect of the developed Critical Pathway, this author offered health care service applying the Critical Pathway to the hysterectomy patient from April 15th to August 31th, 1997. The guide for the Critical Pathway was carried out in advance by outpatient setting nurse for outpatient setting visit before the operation, and after hospitalization the primary nurse monitored the execution degree on the every duty. After discharge this author surveyed the complication through phone visiting, and one month after discharge surveyed the patient's reaction about the offered service when outpatient setting visit and analyzed the result. The source for health care cost was obtained by the statistics about the hospital charge which was offered by the General Business Department. The results were as follows. 1. It was decided that the vertical line of the Critical Pathway was made up of eight items such as monitoring/assessment, treatment, line/drains, activity, medication, lab test, diet, patient teaching, and the horizontal line of the Critical Pathway was made up of from hospitalization to discharge. 2. After the analysis of service contents through reviewing the old chart, it was decided that the horizontal line of the preliminary Critical Pathway was made up of from hopitalization to fourth postoperative day, and the vertical line of it was divided into eight items which were the contents to occur with the time frame of the horizontal line. 3. After the verifying the validity of the expert group about the preliminary Critical Pathway, the horizontal line was amended from hopitalization to third postoperative day, and taking their consensus, some contents of the horizontal line was amended and deleted. 4. From March 1st to 15th, 1997, to confirm the clinical suitability, this author offered eight hysterectomy patients the medical service through the Critical Pathway. The result was that three of them could be discharged at the expected discharge day, and the others later than that day. Supplementing the preliminary Critical Pathway through analyzing the cause of that delay- case, this author developed the final Critical Pathway. 5. There were no significant differences between the experimental and the control group in the incidence of complication(P > 0.05). 6. The 92.4% of experimental group was satisfied with the Critical Pathway service. 7. The length of hospital stay of the experimental group offered with the Critical Pathway service was 4.6 days and there was a significant difference that it was 1.3 days shorter than that of the control group(t=-29.514, P=0.000). 8. There wsa a significant difference that the mean medical charge per one patient of the experimental group offered the Critical Pathway service was cheaper \124,150 than that of the control group(t=-9.826, P=0.000). 9. The result that the author assumed and analyzed hospital income with the rate of turning bed was assumed that the increase of hospital income was \63,245,072 for that study, and the income increase was expected with \68,704,864 for a year. The result that this author applied the Critical Pathway to the hysterectomy patient have no differences in the incidence of complication, high satisfaction with that service, and the length of hospital stay decreased in the experimental group, and the mean hospital charge per one patient decreased, but hospital income increased. Suggestions for further study and nursing practice are as follows. 1. The study to apply the Critical Pathway for a year, verify the validity, and measure the effect repeatedly is needed. 2. To apply and manage the Critical Pathway effectively, the study to computerize it is needed. 3. The study to develop hospital-based Critical Pathway about other diseases or procedure, and measure the effect is needed.

  • PDF

GIS-based Market Analysis and Sales Management System : The Case of a Telecommunication Company (시장분석 및 영업관리 역량 강화를 위한 통신사의 GIS 적용 사례)

  • Chang, Nam-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.61-75
    • /
    • 2011
  • A Geographic Information System(GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the later 1990s and earlier 2000s it was limitedly used in government sectors such as public utility management, urban planning, landscape architecture, and environmental contamination control. However, a growing number of open-source packages running on a range of operating systems enabled many private enterprises to explore the concept of viewing GIS-based sales and customer data over their own computer monitors. K telecommunication company has dominated the Korean telecommunication market by providing diverse services, such as high-speed internet, PSTN(Public Switched Telephone Network), VOLP (Voice Over Internet Protocol), and IPTV(Internet Protocol Television). Even though the telecommunication market in Korea is huge, the competition between major services providers is growing more fierce than ever before. Service providers struggled to acquire as many new customers as possible, attempted to cross sell more products to their regular customers, and made more efforts on retaining the best customers by offering unprecedented benefits. Most service providers including K telecommunication company tried to adopt the concept of customer relationship management(CRM), and analyze customer's demographic and transactional data statistically in order to understand their customer's behavior. However, managing customer information has still remained at the basic level, and the quality and the quantity of customer data were not enough not only to understand the customers but also to design a strategy for marketing and sales. For example, the currently used 3,074 legal regional divisions, which are originally defined by the government, were too broad to calculate sub-regional customer's service subscription and cancellation ratio. Additional external data such as house size, house price, and household demographics are also needed to measure sales potential. Furthermore, making tables and reports were time consuming and they were insufficient to make a clear judgment about the market situation. In 2009, this company needed a dramatic shift in the way marketing and sales activities, and finally developed a dedicated GIS_based market analysis and sales management system. This system made huge improvement in the efficiency with which the company was able to manage and organize all customer and sales related information, and access to those information easily and visually. After the GIS information system was developed, and applied to marketing and sales activities at the corporate level, the company was reported to increase sales and market share substantially. This was due to the fact that by analyzing past market and sales initiatives, creating sales potential, and targeting key markets, the system could make suggestions and enable the company to focus its resources on the demographics most likely to respond to the promotion. This paper reviews subjective and unclear marketing and sales activities that K telecommunication company operated, and introduces the whole process of developing the GIS information system. The process consists of the following 5 modules : (1) Customer profile cleansing and standardization, (2) Internal/External DB enrichment, (3) Segmentation of 3,074 legal regions into 46,590 sub_regions called blocks, (4) GIS data mart design, and (5) GIS system construction. The objective of this case study is to emphasize the need of GIS system and how it works in the private enterprises by reviewing the development process of the K company's market analysis and sales management system. We hope that this paper suggest valuable guideline to companies that consider introducing or constructing a GIS information system.

A Study on the Effect of On-Dock System in Container Terminals - Focusing on GwangYang Port - (컨테이너터미널에서 On-Dock 시스템 효과분석에 관한 연구 - 광양항을 중심으로 -)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.39 no.1
    • /
    • pp.45-53
    • /
    • 2015
  • These days Container Terminals are focusing on increasing the quantity of containers and shipping lines choose Terminals by referring to the key elements of a terminal to perform the overall operation the fastest such as the location of the terminal, discharging ability, keeping environment, and other elements related to shipping in general. Container terminal is able to offer On-Dock service has become an important factor for shipping lines to choose that terminal. In this paper, we propose an algorithm for On-Dock system work algorithm, the algorithm Empty container exports, Full Container algorithm and The aim of our study focus on both container's gate out time and search for the effective terminal operation which is using the general On-Dock system through several algorithm like container batch priority, gate in and out job priority and empty container yard equipment allocation rule based on the automatic allocation method and manual allocation scheme for container. Gathering these information, it gives the priority and yard location of gate-out containers to control. That is, by selecting an optimum algorithm container, container terminals Empty reduces the container taken out time, it is possible to minimize unnecessary re-handling of the yard container can be enhanced with respect to the efficiency of the equipment. Operations and operating results of the Non On-Dock and On-Dock system is operated by the out work operations (scenarios) forms that are operating in the real Gwangyang Container Terminal derived results. Gwangyang Container terminal and apply the On-Dock system, Non On-Dock can be taken out this time, about 5 minutes more quickly when applying the system. when managing export orders for berths where On-Dock service is needed, ball containers are allocated and for import cargoes, D/O is managed and after carryout, return management, container damage, cleaning, fixing and controlling services are supported hence the berth service can be strengthened and container terminal business can grow.

Rollover Effects on KOSPI 200 Index Option Prices (KOSPI 200 지수 옵션 만기시 Rollover 효과에 관한 연구)

  • Kim, Tae-Yong;Lee, Jung-Ho;Cho, Jin-Wan
    • The Korean Journal of Financial Management
    • /
    • v.22 no.1
    • /
    • pp.71-91
    • /
    • 2005
  • The object or this paper is to analyze the rollover effect on KOSPI 200 index option prices. Especially we analyze the implied volatilities of the options that became the near maturity options as the old one expired. For this analysis, a panel data of KOSPI 200 Index Option Prices from year 1999 to year 2001 were used, and following results were obtained. First, after controlling for the underlying index returns, strike prices and other pricing factors, the call option prices tend to decrease while the put option prices tend to increase during the week of expiry. Second, if one concentrates on the daily price changes, call option prices tend to go up on Thursday (as the old options expire), and then experience a price decrease on the following day, while the reverse is true for the put options. These results imply that the option prices are affected by some of the market micro-structure effects such as whether the option is the near maturity option. We conjecture that the reason for this is related to the undervaluation of KOSPI 200 futures. The results from this paper have implications on the timing of option trades. If one wants to buy put options, and/or sell call options, he has better off by executing his intended trades before the old options expire. On the other hand, if one wants to buy call options, and/or sell put options, hi has better off by executing his intended trades after the expiry.

  • PDF

Development of Intelligent ATP System Using Genetic Algorithm (유전 알고리듬을 적용한 지능형 ATP 시스템 개발)

  • Kim, Tai-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.131-145
    • /
    • 2010
  • The framework for making a coordinated decision for large-scale facilities has become an important issue in supply chain(SC) management research. The competitive business environment requires companies to continuously search for the ways to achieve high efficiency and lower operational costs. In the areas of production/distribution planning, many researchers and practitioners have developedand evaluated the deterministic models to coordinate important and interrelated logistic decisions such as capacity management, inventory allocation, and vehicle routing. They initially have investigated the various process of SC separately and later become more interested in such problems encompassing the whole SC system. The accurate quotation of ATP(Available-To-Promise) plays a very important role in enhancing customer satisfaction and fill rate maximization. The complexity for intelligent manufacturing system, which includes all the linkages among procurement, production, and distribution, makes the accurate quotation of ATP be a quite difficult job. In addition to, many researchers assumed ATP model with integer time. However, in industry practices, integer times are very rare and the model developed using integer times is therefore approximating the real system. Various alternative models for an ATP system with time lags have been developed and evaluated. In most cases, these models have assumed that the time lags are integer multiples of a unit time grid. However, integer time lags are very rare in practices, and therefore models developed using integer time lags only approximate real systems. The differences occurring by this approximation frequently result in significant accuracy degradations. To introduce the ATP model with time lags, we first introduce the dynamic production function. Hackman and Leachman's dynamic production function in initiated research directly related to the topic of this paper. They propose a modeling framework for a system with non-integer time lags and show how to apply the framework to a variety of systems including continues time series, manufacturing resource planning and critical path method. Their formulation requires no additional variables or constraints and is capable of representing real world systems more accurately. Previously, to cope with non-integer time lags, they usually model a concerned system either by rounding lags to the nearest integers or by subdividing the time grid to make the lags become integer multiples of the grid. But each approach has a critical weakness: the first approach underestimates, potentially leading to infeasibilities or overestimates lead times, potentially resulting in excessive work-inprocesses. The second approach drastically inflates the problem size. We consider an optimized ATP system with non-integer time lag in supply chain management. We focus on a worldwide headquarter, distribution centers, and manufacturing facilities are globally networked. We develop a mixed integer programming(MIP) model for ATP process, which has the definition of required data flow. The illustrative ATP module shows the proposed system is largely affected inSCM. The system we are concerned is composed of a multiple production facility with multiple products, multiple distribution centers and multiple customers. For the system, we consider an ATP scheduling and capacity allocationproblem. In this study, we proposed the model for the ATP system in SCM using the dynamic production function considering the non-integer time lags. The model is developed under the framework suitable for the non-integer lags and, therefore, is more accurate than the models we usually encounter. We developed intelligent ATP System for this model using genetic algorithm. We focus on a capacitated production planning and capacity allocation problem, develop a mixed integer programming model, and propose an efficient heuristic procedure using an evolutionary system to solve it efficiently. This method makes it possible for the population to reach the approximate solution easily. Moreover, we designed and utilized a representation scheme that allows the proposed models to represent real variables. The proposed regeneration procedures, which evaluate each infeasible chromosome, makes the solutions converge to the optimum quickly.

The Efficiency of Bank Underwriting of Corporate Securities in Korea (국내 자본시장 증권인수기능의 효율성에 관한 연구 : 은행계열과 비은행계열 금융기관 비교 분석)

  • Baek, Jae-Seung;Lim, Chan-Woo
    • The Korean Journal of Financial Management
    • /
    • v.27 no.1
    • /
    • pp.181-208
    • /
    • 2010
  • In July 2007, Korean government has passed "The Capital Market and Financial Investment Services Act" to further develop the capital markets and the Act was to become effective in February 2009. Using a large sample of Korean firms, we have examined (i) the effect of underwriting activities on the firm value (bond spread) comparing commercial bank and investment bank, and (ii) the determinants of the firm value changes following underwriting activities of bank. To test our goal, we collected a wide range of samples of data for bond issuing activities executed by Korean firms listed on the Korea Stock Exchange (KSE) between 2000 and 2003. Our paper is distinguished from previous studies on this subject in a way that we analyzed the effect of corporate bond underwriting activities with regard to commercial banking and investment banking. Initially, we set up a hypothesis that "Certification View" and "Conflict-of-interest View" are major driving forces behind cross-firm differences in performance following bond issuance. We find that, in general, underwriting by investment bank (securities company) brings a positive effect on the firm value (spread between bench mark rate and bond issuing rate). This result indicates that firm value has been negatively affected by the bank underwriting and provides the evidence for "Conflict-of-interest View" in Korea. Our studies have also revealed that any change in firm value following bond issuance is positively related with the firm size (total asset), operating performance, liquidity (cashflow), and equity ownership by foreign investors. Overall, our results support the view that bank underwriting activities can play an important role in determining firm value and financial strategies under "The Capital Market and Financial Investment Services Act" of 2007.

  • PDF

A Protection Management Characteristic and Preservation Plan of World Heritage Mt. Huangshan (세계유산 황산의 보호관리 특성 및 보전방안)

  • Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.1
    • /
    • pp.120-128
    • /
    • 2018
  • The purpose of this study is to establish basic data for the continuous protection management policy of domestic natural world heritage and mixed world heritage, and to examine the present situation and characteristics of the protection management according to the World Heritage Convention on the World Heritage listed Huangshan. The results of this study are as follows. First, Huangshan began to be protected by the establishment of the Huangshan Construction Committee in 1933, and after the designation of national park in 1982, laws and regulations were established in the central ministries, And various projects related to utilization have been implemented. Secondly, the establishment of the boundary for protection was actively intervened by the central government, such as the reorganization of the boundary of Huangshan through the administrative district plan. In order to protect the ecological and landscape value as well as the cultural factor, And designated a heritage designated area. Third, the protection management of Huangshan was divided into four major stages. The first phase was divided into the period when administrative measures were taken to manage the protection of Huangshan. The second phase was designated as a national park in Huangshan. The third period was the time of the protection-oriented project according to the recommendation of the international organizations after the World Heritage listed. The fourth period was the expansion of the tourism industry for the continuous use of protection of Huangshan city, My preservation business was being implemented. Fourth, Huangshan is managed by the central government and the city government. Huangshan, which is a mixed heritage, is managed jointly by the Ministry of Cultural Heritage Administration and the Ministry of Natural Heritage Administration. The protection and management of Huangshan promoted the efficiency and expertise of the heritage-related work through the establishment of the administrative unit-specific management system, and the local governments were entrusted with the authority to implement the protection management policies that meet local characteristics. Fifth, the preservation area of Huangshan has been destroyed by the development policy centered on the mountain. In addition, according to the operation of accommodation facilities, there are problems such as sewage, garbage disposal, and environmental pollution caused by tourists, and the damage caused by pests and diseases in planted plantations around the area and changes in ecosystem due to the composition of cable cars. Sixth, for the continuous protection of Huangshan, strict regulations on new construction, extension and management of accommodation are required, and it is necessary to install facilities to limit and control the number of visitors.

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.