• Title/Summary/Keyword: Electronic Business

Search Result 1,706, Processing Time 0.026 seconds

A Study on the Application of the LMS and LCMS Based E-Learning in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서LMS와 LCMS기반의 이러닝 적용 방안)

  • Jeong, Hwa-Young;Kim, Eun-Won;Hong, Bong-Hwa
    • 전자공학회논문지 IE
    • /
    • v.47 no.1
    • /
    • pp.56-60
    • /
    • 2010
  • The widespread development of IT, growth of Web 2.0 application, the proliferation of personal hand held devices with access to the internet, and the availability of wireless networks, each have played an important role in creating the cloud computing model. Cloud computing is a business model and new trend of web application technology. The term is often used in the same context as grid computing or utility computing. In the cloud computing environment, we are able to use the same all of hardware resources in the server and share information easily. In this paper, we aimed a study to apply e-learning part to cloud computing environment. For this purpose, we proposed an application of LMS and LCMS based e-learning in the cloud computing environment. So LMS including LCMS connected to data center of cloud computing.

Factors that Influence the Sharing Intention of Vehicle and Sharing Behavior in China (중국에서의 자동차 공유의도 요인과 공유 행동에 관한 연구)

  • Zhang, Ji-Yun;Lee, Sang-Joon;Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.195-203
    • /
    • 2017
  • Sharing economy which is sharing and borrowing goods, space, and services as a social and economic activity based on the Internet and smart phones is a new research topic in convergence area. The most representative areas of shared economy are space sharing and vehicle sharing. This paper aims to explore the factors affecting sharing intention of vehicle. We have identified the independent variables which include economic benefit, social benefit, social influence, psychological benefit and perceived risk. We also have done how these variables affect on sharing intention. Unlike Korea, in China vehicle sharing is legally allowed and has a large scale economy. To prove the hypothesis, we performed questionnaire investigation in China and analyzed with SPSS program. The result of hypothesis is the followings: The economic benefit, psychological benefit, social influence and perceived risk are affects sharing intention, and social benefit is not affect sharing intention and sharing intention is affect sharing behavior.

Management Skills for Academic Libraries in the Digital Age (디지털시대 대학도서관의 경영기법에 관한 연구)

  • Lee, Yong-Jae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.4
    • /
    • pp.293-309
    • /
    • 2002
  • This study explores what kinds of strategies are appropriate or needed for the academic librarians to upgrade their skills in the digital age. Printed and electronic sources related to this topic are gathered and examined, and communication with some academic librarians in USA is used for this study. The skills suggested in this paper mostly come from business-oriented concepts ike Learning Organization, Knowledge Management, Team Management, Customer-Oriented Services, and Change Management. As a result of this study, it is found that these skills can be used without much difficulties in academic libraries to improve their services. However academic librarians need to keep in mind the core values of academic libraries as an academic forum and non-profit organization when they endeavor to provide better services for customers in the digital age.

Friendship Influence on Mobile Behavior of Location Based Social Network Users

  • Song, Yang;Hu, Zheng;Leng, Xiaoming;Tian, Hui;Yang, Kun;Ke, Xin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.126-132
    • /
    • 2015
  • In mobile computing research area, it is highly desirable to understand the characteristics of user movement so that the user friendly location aware services could be rendered effectively. Location based social networks (LBSNs) have flourished recently and are of great potential for movement behavior exploration and datadriven application design. While there have been some efforts on user check-in movement behavior in LBSNs, they lack comprehensive analysis of social influence on them. To this end, the social-spatial influence and social-temporal influence are analyzed synthetically in this paper based on the related information exposed in LBSNs. The check-in movement behaviors of users are found to be affected by their social friendships both from spatial and temporal dimensions. Furthermore, a probabilistic model of user mobile behavior is proposed, incorporating the comprehensive social influence model with extent personal preference model. The experimental results validate that our proposed model can improve prediction accuracy compared to the state-of-the-art social historical model considering temporal information (SHM+T), which mainly studies the temporal cyclic patterns and uses them to model user mobility, while being with affordable complexity.

Analysis and Design of Smart-phone App. for O2O Restaurant Service (O2O 음식점 서비스 개발을 위한 스마트폰 앱의 분석/설계)

  • Cho, Byung-Ho
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.2
    • /
    • pp.125-132
    • /
    • 2017
  • O2O service contribute to sales increment by marketing of offline store using online. In particular, O2O business allowed various services by smart-phone due to rapid increase of mobile device use and various services depend on customer's location. This O2O service play major roll in real purchase making of offline store. In smart-phone apps. development for O2O service, recent an Object-oriented Analysis and Design Method, that is, UML is more useful method than Structured Analysis and Design Method. Therefore in this paper, Software analysis and design method which is smart-pone app. for O2O restaurant service is presented. Also it shows that this analysis/design method is very useful for the Restaurant O2O Commercial System production.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

Development of Real-time Service Primitive in Message Handling System Supporting Desk-top Conferencing System (데스크탑 회의시스템 지원을 위한 메시지 처리 시스템의 실시간 서비스 프리미티브 개발)

  • 강승찬;김영준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.2
    • /
    • pp.169-180
    • /
    • 1998
  • This research presents development of real-time service primitive in MHS(Message Hanling system) supporting desk-top conferencing system. Desk-top conferencing system is one of the real-time GC(Group Communication) services. The complexity of modem society has led to the consequent need for real-time GC between a number of people in order to jointly handle tasks in business, government and other forms of organization. Despite the many different form of desk-top conferencing systems developed to date, there are still few systems in widespred no. One of the biggest hurdle preventing the widespred adoption of real-time GC is the lack of agreement on user-friendly interchange environments. In distributed office environments, the MHS is one of the most widely used service for information interchange. It is a standard of electronic mail system which is concerned mostly with asynchronous exchange of short notes. It is clear that additional functions on MHS are necessary in order to allow users to properly process their real-time group messages and provide them with important facilities as a communication infrastructure for real-time GC.

  • PDF

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

A Study on Developing A Design of Cash Dispenser - With a Focus on LG Co. Cash Dispenser - (현금 인출기 디자인 개발 사례 연구 - (주) LG 전자 현금 인출기를 중심으로 -)

  • 오성진
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.5-16
    • /
    • 1999
  • Nowadays the banks, with a wide spread of credit transaction practice in every business, offer better services to their customers, while the automation of banking is being made more rapid progress in th light of efficient banking service. For example, it is true that the automation of cash payment for customers goes on its progress and the competition between companies is getting more serious. Lately the banks that pursue "Banking Automation System" expand distribution of cash dispenser for the better electronic computer service and for the better service for their customers in quality. Therefore the makers producing "CD" accelerate their development of CD in various ways in order to secure MIS as the leading group of th field. CD, a kind of an automatic paying, is being used generally, and has various functions and its design is getting more compact than ever. Under this situation, I studied more trustworthy and convenient CD design suggestions in the way of case study on the basis of the process of developing CD and I suggest the better way of developing the design of CD in the future.of CD in the future.

  • PDF

A Study on the CMOS Camera robust to radiation environments (방사선 환경에 강인한 CMOS카메라에 관한 연구)

  • Baek, Dong-Hyun;Kim, Bae-Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.27-34
    • /
    • 2020
  • Human access is restricted to environment where radiation sources are used, however observation equipment should be radiation-resistant as it is exposed. Therefore, if tungsten with the highest specific gravity and melting point and the lowest lead were selected to reduce the dose to the Cobalt 60 radiation source to 1/8, Tu had a volume of 432.6cm3, a thickness of 2.4cm, and Pb had a volume of 961cm3,, a thickness of 3.6cm. By applying this method, produced a radiation resistant CMOS camera with a camera module using a CMOS Image sensor and a radiation shielding structured housing. As a result of applying the head detachable 2M AHD camera (No. ①) that survived the experiment to select the optimal shielding thickness, when shielding the associated equipment such as cameras, adapters, etc. is achieved, it was confirmed that the design of the structure is appropriate by operating well at doses higher than 1.88×106rad. Therefore, it is expected to secure the camera technology and business feasibility that can be applied to high radiation environments.