• Title/Summary/Keyword: IS(Information Systems) Success

Search Result 874, Processing Time 0.029 seconds

The Effects of Information System Quality on Public Information Project Performance: With a Focus on the Mediating Effects by the Users (정보시스템 품질이 공공정보화사업 성과에 미치는 영향: 사용자의 매개효과를 중심으로)

  • Kim, Won-Ki;Park, So-Hyun;Kim, Seung-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.8
    • /
    • pp.181-190
    • /
    • 2019
  • The purpose of this study is to verify the effects of information system quality on business performance (net benefit) in the Korean public informatization business and to verify whether the user has mediating role in the relationship between information system quality and net benefit. In order to prepare empirical tests, factor analyses was conducted and the validity and reliability of the variables were confirmed to be acceptable. The research hypotheses were tested by regression analyses. The mediating effects as well as the main effects were analyzed by SPSS statistical program. The results show that the higher the quality of the information system becomes, the higher the usability by the users of the system increases. Also, it was found that the users had more positive effect on the net benefit of the public informatization project. In addition, it was confirmed that there was a partial mediating effect by the users on the relationship between information system quality and the benefits. The results of the research suggests that we establish a management system to improve the business performance efficiently according to the priorities of detailed success factors from the viewpoint of the public information business, and the users who use the information system quality and system.

Optimal deployment of sonobuoy for unmanned aerial vehicles using reinforcement learning considering the target movement (표적의 이동을 고려한 강화학습 기반 무인항공기의 소노부이 최적 배치)

  • Geunyoung Bae;Juhwan Kang;Jungpyo Hong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.2
    • /
    • pp.214-224
    • /
    • 2024
  • Sonobuoys are disposable devices that utilize sound waves for information gathering, detecting engine noises, and capturing various acoustic characteristics. They play a crucial role in accurately detecting underwater targets, making them effective detection systems in anti-submarine warfare. Existing sonobuoy deployment methods in multistatic systems often rely on fixed patterns or heuristic-based rules, lacking efficiency in terms of the number of sonobuoys deployed and operational time due to the unpredictable mobility of the underwater targets. Thus, this paper proposes an optimal sonobuoy placement strategy for Unmanned Aerial Vehicles (UAVs) to overcome the limitations of conventional sonobuoy deployment methods. The proposed approach utilizes reinforcement learning in a simulation-based experimental environment that considers the movements of the underwater targets. The Unity ML-Agents framework is employed, and the Proximal Policy Optimization (PPO) algorithm is utilized for UAV learning in a virtual operational environment with real-time interactions. The reward function is designed to consider the number of sonobuoys deployed and the cost associated with sound sources and receivers, enabling effective learning. The proposed reinforcement learning-based deployment strategy compared to the conventional sonobuoy deployment methods in the same experimental environment demonstrates superior performance in terms of detection success rate, deployed sonobuoy count, and operational time.

Analysis of Success Cases of InsurTech and Digital Insurance Platform Based on Artificial Intelligence Technologies: Focused on Ping An Insurance Group Ltd. in China (인공지능 기술 기반 인슈어테크와 디지털보험플랫폼 성공사례 분석: 중국 평안보험그룹을 중심으로)

  • Lee, JaeWon;Oh, SangJin
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.71-90
    • /
    • 2020
  • Recently, the global insurance industry is rapidly developing digital transformation through the use of artificial intelligence technologies such as machine learning, natural language processing, and deep learning. As a result, more and more foreign insurers have achieved the success of artificial intelligence technology-based InsurTech and platform business, and Ping An Insurance Group Ltd., China's largest private company, is leading China's global fourth industrial revolution with remarkable achievements in InsurTech and Digital Platform as a result of its constant innovation, using 'finance and technology' and 'finance and ecosystem' as keywords for companies. In response, this study analyzed the InsurTech and platform business activities of Ping An Insurance Group Ltd. through the ser-M analysis model to provide strategic implications for revitalizing AI technology-based businesses of domestic insurers. The ser-M analysis model has been studied so that the vision and leadership of the CEO, the historical environment of the enterprise, the utilization of various resources, and the unique mechanism relationships can be interpreted in an integrated manner as a frame that can be interpreted in terms of the subject, environment, resource and mechanism. As a result of the case analysis, Ping An Insurance Group Ltd. has achieved cost reduction and customer service development by digitally innovating its entire business area such as sales, underwriting, claims, and loan service by utilizing core artificial intelligence technologies such as facial, voice, and facial expression recognition. In addition, "online data in China" and "the vast offline data and insights accumulated by the company" were combined with new technologies such as artificial intelligence and big data analysis to build a digital platform that integrates financial services and digital service businesses. Ping An Insurance Group Ltd. challenged constant innovation, and as of 2019, sales reached $155 billion, ranking seventh among all companies in the Global 2000 rankings selected by Forbes Magazine. Analyzing the background of the success of Ping An Insurance Group Ltd. from the perspective of ser-M, founder Mammingz quickly captured the development of digital technology, market competition and changes in population structure in the era of the fourth industrial revolution, and established a new vision and displayed an agile leadership of digital technology-focused. Based on the strong leadership led by the founder in response to environmental changes, the company has successfully led InsurTech and Platform Business through innovation of internal resources such as investment in artificial intelligence technology, securing excellent professionals, and strengthening big data capabilities, combining external absorption capabilities, and strategic alliances among various industries. Through this success story analysis of Ping An Insurance Group Ltd., the following implications can be given to domestic insurance companies that are preparing for digital transformation. First, CEOs of domestic companies also need to recognize the paradigm shift in industry due to the change in digital technology and quickly arm themselves with digital technology-oriented leadership to spearhead the digital transformation of enterprises. Second, the Korean government should urgently overhaul related laws and systems to further promote the use of data between different industries and provide drastic support such as deregulation, tax benefits and platform provision to help the domestic insurance industry secure global competitiveness. Third, Korean companies also need to make bolder investments in the development of artificial intelligence technology so that systematic securing of internal and external data, training of technical personnel, and patent applications can be expanded, and digital platforms should be quickly established so that diverse customer experiences can be integrated through learned artificial intelligence technology. Finally, since there may be limitations to generalization through a single case of an overseas insurance company, I hope that in the future, more extensive research will be conducted on various management strategies related to artificial intelligence technology by analyzing cases of multiple industries or multiple companies or conducting empirical research.

Resolving the 'Gray sheep' Problem Using Social Network Analysis (SNA) in Collaborative Filtering (CF) Recommender Systems (소셜 네트워크 분석 기법을 활용한 협업필터링의 특이취향 사용자(Gray Sheep) 문제 해결)

  • Kim, Minsung;Im, Il
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.137-148
    • /
    • 2014
  • Recommender system has become one of the most important technologies in e-commerce in these days. The ultimate reason to shop online, for many consumers, is to reduce the efforts for information search and purchase. Recommender system is a key technology to serve these needs. Many of the past studies about recommender systems have been devoted to developing and improving recommendation algorithms and collaborative filtering (CF) is known to be the most successful one. Despite its success, however, CF has several shortcomings such as cold-start, sparsity, gray sheep problems. In order to be able to generate recommendations, ordinary CF algorithms require evaluations or preference information directly from users. For new users who do not have any evaluations or preference information, therefore, CF cannot come up with recommendations (Cold-star problem). As the numbers of products and customers increase, the scale of the data increases exponentially and most of the data cells are empty. This sparse dataset makes computation for recommendation extremely hard (Sparsity problem). Since CF is based on the assumption that there are groups of users sharing common preferences or tastes, CF becomes inaccurate if there are many users with rare and unique tastes (Gray sheep problem). This study proposes a new algorithm that utilizes Social Network Analysis (SNA) techniques to resolve the gray sheep problem. We utilize 'degree centrality' in SNA to identify users with unique preferences (gray sheep). Degree centrality in SNA refers to the number of direct links to and from a node. In a network of users who are connected through common preferences or tastes, those with unique tastes have fewer links to other users (nodes) and they are isolated from other users. Therefore, gray sheep can be identified by calculating degree centrality of each node. We divide the dataset into two, gray sheep and others, based on the degree centrality of the users. Then, different similarity measures and recommendation methods are applied to these two datasets. More detail algorithm is as follows: Step 1: Convert the initial data which is a two-mode network (user to item) into an one-mode network (user to user). Step 2: Calculate degree centrality of each node and separate those nodes having degree centrality values lower than the pre-set threshold. The threshold value is determined by simulations such that the accuracy of CF for the remaining dataset is maximized. Step 3: Ordinary CF algorithm is applied to the remaining dataset. Step 4: Since the separated dataset consist of users with unique tastes, an ordinary CF algorithm cannot generate recommendations for them. A 'popular item' method is used to generate recommendations for these users. The F measures of the two datasets are weighted by the numbers of nodes and summed to be used as the final performance metric. In order to test performance improvement by this new algorithm, an empirical study was conducted using a publically available dataset - the MovieLens data by GroupLens research team. We used 100,000 evaluations by 943 users on 1,682 movies. The proposed algorithm was compared with an ordinary CF algorithm utilizing 'Best-N-neighbors' and 'Cosine' similarity method. The empirical results show that F measure was improved about 11% on average when the proposed algorithm was used

    . Past studies to improve CF performance typically used additional information other than users' evaluations such as demographic data. Some studies applied SNA techniques as a new similarity metric. This study is novel in that it used SNA to separate dataset. This study shows that performance of CF can be improved, without any additional information, when SNA techniques are used as proposed. This study has several theoretical and practical implications. This study empirically shows that the characteristics of dataset can affect the performance of CF recommender systems. This helps researchers understand factors affecting performance of CF. This study also opens a door for future studies in the area of applying SNA to CF to analyze characteristics of dataset. In practice, this study provides guidelines to improve performance of CF recommender systems with a simple modification.

  • A Resource-Based Perspective on Three IT Resources and Their Relationships in IT Outsourcing (IT 아웃소싱 성공에 영향을 미치는 3가지 IT 자원들과 그 관계: 자원기반 관점에서)

    • Kim, Chy Heon;Kim, Joon S.;Im, Kun Shin
      • Information Systems Review
      • /
      • v.14 no.3
      • /
      • pp.53-74
      • /
      • 2012
    • IT outsourcing (ITO) is an integration of two firms-external vendor(s) and a client firm-IT resources by contract. According to resource-based view(RBV), three different resources-ITO vendor's resource, client firm's resource, and the relationship resource between two firms- may have an impact on ITO performance. However, there have been few previous studies considering all three IT resources simultaneously. There have been also few empirical studies in ITO context, which test Bharadwaj (2000)'s findings: 1) IT resources can be divided into tangible IT asset and intangible IT capability, and 2) only IT capability has an impact on the IT performance. Therefore we examined whether, in ITO context, all three different resources have a significant impact on ITO performance. Adopting the findings of previous IT studies, we also divided IT resource into IT asset and IT capability. To achieve this research objective, we analyzed 62 ITO cases of 45 companies being listed in Korean top 100 companies for recent 3 years. Also, we analyzed the data with the Partial Least Squares method. The results of this research lead to the following conclusions: First, only when partnership is high, ITO vendors' resource can have an influence on ITO performance. Second, only client firm's IT capability, not IT asset, is directly related to the ITO success. Third, a firm's IT capability can increase the partnership. Therefore, we concluded that 1) RBV is also an useful theory in ITO context, 2) Bharadwaj(2000)'s suggestion is valid in ITO context as well, and 3) the relationship resource is also important in ITO.

    • PDF

    Supporting Measures for Mobile Application Development Activation (모바일 애플리케이션 개발 활성화 지원에 관한 연구)

    • Sim, Myungsik;Bae, Junseong;Lee, Sangjoon
      • Information Systems Review
      • /
      • v.15 no.1
      • /
      • pp.91-104
      • /
      • 2013
    • As coming smart computing era, the government and leading telecommunication companies have actively supported the development of mobile applications. However, since it is processed apart from the characteristics of small businesses, policy problems and support ways have continuously been pointed out. In this study, we selected priority of support project for the activation of the mobile application development, then proposed support ways for the success of small development business. Firstly, we researched the mobile business literatures, support projects and policy trends of the Korean government, academia and private sector. Next, we developed the activation model for small development business by synthesizing of support projects, literatures and expert group interviews. Based on this model, we selected priority of support projects according to AHP (Analytic Hierarchy Process) analysis results. In conclusion, we categorize the five support ways for the activation of mobile application development. We are expecting that these support ways will be useful to the development of effective policies and selection of detail tasks for the support of small business or developers.

    • PDF

    A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

    • Lee, Hyoung-Yong;Ahn, Hyun-Chul
      • Asia pacific journal of information systems
      • /
      • v.19 no.1
      • /
      • pp.147-165
      • /
      • 2009
    • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.

    A novel page replacement policy associated with ACT-R inspired by human memory retrieval process (인간 기억 인출 과정을 응용하여 설계된 ACT-R 기반 페이지 교체 정책)

    • Roh, Hong-Chan;Park, Sang-Hyun
      • The KIPS Transactions:PartD
      • /
      • v.18D no.1
      • /
      • pp.1-8
      • /
      • 2011
    • The cache structure, which is designed for assuring fast accesses to frequently accessed data, resides on the various levels of computer system hierarchies. Many studies on this cache structure have been conducted and thus many page-replacement algorithms have been proposed. Most of page-replacement algorithms are designed on the basis of heuristic methods by using their own criteria such as how recently pages are accessed and how often they are accessed. This data-retrieval process in computer systems is analogous to human memory retrieval process since the retrieval process of human memory depends on frequency and recency of the retrieval events as well. A recent study regarding human memory cognition revealed that the possibility of the retrieval success and the retrieval latency have a strong correlation with the frequency and recency of the previous retrieval events. In this paper, we propose a novel page-replacement algorithm by utilizing the knowledge from the recent research regarding human memory cognition. Through a set of experiments, we demonstrated that our new method presents better hit-ratio than the LRFU algorithm which has been known as the best performing page-replacement algorithm for DBMS caches.

    Study on the Illocutionary Effect-Based FIPA-ACL Semantics (언표내적 효과 기반의 FIPA-ACL 의미론 연구)

    • Koo, Ja Rok
      • KIPS Transactions on Software and Data Engineering
      • /
      • v.5 no.1
      • /
      • pp.29-34
      • /
      • 2016
    • One of the most important aspects of the research on multi-agent systems is the definition of agent communication languages(ACLs) and the specification of a proper formal semantics of ACLs. In this paper, we propose an illocutionary effect-based FIPA-ACL semantics which overcomes the two traditional semantic approaches. The key idea of this new semantics is based on the semantic concepts of success and satisfaction conditions of illocutionary acts in speech act theory, and the common ground theory-based framework. As case studies using this new semantics, we define the primitive speech acts of FIPA-ACL such as inform and request. For the strengths of the proposed approach we illustrate our new semantics on an e-commerce agent purchase negotiation. Also, we compare this approach with two traditional semantic approaches for ACLs.

    Technique for PIN Entry Using an Accelerometer Sensor and a Vibration Sensor on Smartphone (스마트폰에서 가속도 센서와 진동 센서를 이용한 PIN 입력 기법)

    • Jung, Changhun;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
      • KIPS Transactions on Computer and Communication Systems
      • /
      • v.6 no.12
      • /
      • pp.497-506
      • /
      • 2017
    • There have been previous researches about user authentication by analyzing the user's gait or behavior or action using the accelerometer sensor of smartphone, but there was a lack of user convenience to apply PIN entry. In this paper, we propose the technique for PIN entry without a touch on smartphone, the technique uses an accelerometer sensor and a vibration sensor built in the smartphone to enter the PIN. We conducted a usability experiment using the proposed technique and confirmed that the usability can be increased according to users become accustomed to this technique and that the users can enter PIN with 12.9 seconds and a probability of 100% on average. Also we conducted a security experiment and confirmed that an attack success rate is 0% when an attacker attacked the user using the recording attack and that it is more secure than the previous PIN entry technique. As a result, we was able to confirm that this technique can be used sufficiently.


    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.