• Title/Summary/Keyword: IT Vendor

Search Result 209, Processing Time 0.023 seconds

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

The effect of Big-data investment on the Market value of Firm (기업의 빅데이터 투자가 기업가치에 미치는 영향 연구)

  • Kwon, Young jin;Jung, Woo-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.99-122
    • /
    • 2019
  • According to the recent IDC (International Data Corporation) report, as from 2025, the total volume of data is estimated to reach ten times higher than that of 2016, corresponding to 163 zettabytes. then the main body of generating information is moving more toward corporations than consumers. So-called "the wave of Big-data" is arriving, and the following aftermath affects entire industries and firms, respectively and collectively. Therefore, effective management of vast amounts of data is more important than ever in terms of the firm. However, there have been no previous studies that measure the effects of big data investment, even though there are number of previous studies that quantitatively the effects of IT investment. Therefore, we quantitatively analyze the Big-data investment effects, which assists firm's investment decision making. This study applied the Event Study Methodology, which is based on the efficient market hypothesis as the theoretical basis, to measure the effect of the big data investment of firms on the response of market investors. In addition, five sub-variables were set to analyze this effect in more depth: the contents are firm size classification, industry classification (finance and ICT), investment completion classification, and vendor existence classification. To measure the impact of Big data investment announcements, Data from 91 announcements from 2010 to 2017 were used as data, and the effect of investment was more empirically observed by observing changes in corporate value immediately after the disclosure. This study collected data on Big Data Investment related to Naver 's' News' category, the largest portal site in Korea. In addition, when selecting the target companies, we extracted the disclosures of listed companies in the KOSPI and KOSDAQ market. During the collection process, the search keywords were searched through the keywords 'Big data construction', 'Big data introduction', 'Big data investment', 'Big data order', and 'Big data development'. The results of the empirically proved analysis are as follows. First, we found that the market value of 91 publicly listed firms, who announced Big-data investment, increased by 0.92%. In particular, we can see that the market value of finance firms, non-ICT firms, small-cap firms are significantly increased. This result can be interpreted as the market investors perceive positively the big data investment of the enterprise, allowing market investors to better understand the company's big data investment. Second, statistical demonstration that the market value of financial firms and non - ICT firms increases after Big data investment announcement is proved statistically. Third, this study measured the effect of big data investment by dividing by company size and classified it into the top 30% and the bottom 30% of company size standard (market capitalization) without measuring the median value. To maximize the difference. The analysis showed that the investment effect of small sample companies was greater, and the difference between the two groups was also clear. Fourth, one of the most significant features of this study is that the Big Data Investment announcements are classified and structured according to vendor status. We have shown that the investment effect of a group with vendor involvement (with or without a vendor) is very large, indicating that market investors are very positive about the involvement of big data specialist vendors. Lastly but not least, it is also interesting that market investors are evaluating investment more positively at the time of the Big data Investment announcement, which is scheduled to be built rather than completed. Applying this to the industry, it would be effective for a company to make a disclosure when it decided to invest in big data in terms of increasing the market value. Our study has an academic implication, as prior research looked for the impact of Big-data investment has been nonexistent. This study also has a practical implication in that it can be a practical reference material for business decision makers considering big data investment.

A Study on CA-VPN Design using Authentication Mechanism (인증 메커니즘을 이용한 CA-VPN 설계에 관한 연구)

  • 김도문;전정훈;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.60-68
    • /
    • 2003
  • Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.

  • PDF

End User Online Searching (최종이용자 온라인 탐색)

  • 장우권
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1995.08a
    • /
    • pp.45-48
    • /
    • 1995
  • Since the early 1970s online searching has provided end-users with commercial and governmental bibliographic databases by trained intermediaries through the developed Vendor/Agency Systems. Recently, the situation has begun to change. The era of end-user searching is coming. End Users are the “information consumers” as the final user of an IT product or set of information. This study on end-user online searching is presented with the following aspects: development, characterization, training, end user online search services in university libraries, role of the intermediaries and librarians, the future.

  • PDF

Design and Implementation of IP-based Network Management System Supporting WLAN Integrated Management System (IP 네트워크를 기반으로 하는 무선망 통합 관리 시스템 설계 및 구현)

  • Shin, Myung-Sik;Yang, Hae-Sool;Lee, Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.33-40
    • /
    • 2010
  • The hand over between different radio access networks, especially where their coverage overlaps, suffers various complications since the different access networks provide different service characteristics. In this paper, it is about the system which can control the wireless LAN network management system and the wireless LAN access point of variety vendor which is in different areas. Successful development of mobile sink wireless LAN network management system which supports multi-vendor devices and have center-local interoperability structure. In proposed system, speed of the mobile station give about 10% improvement when the map domain size is 5 than the existing system. Through a data plane and management system of message way, it give a stability system and consistency network.

Optimization of Data Placement using Principal Component Analysis based Pareto-optimal method for Multi-Cloud Storage Environment

  • Latha, V.L. Padma;Reddy, N. Sudhakar;Babu, A. Suresh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.248-256
    • /
    • 2021
  • Now that we're in the big data era, data has taken on a new significance as the storage capacity has exploded from trillion bytes to petabytes at breakneck pace. As the use of cloud computing expands and becomes more commonly accepted, several businesses and institutions are opting to store their requests and data there. Cloud storage's concept of a nearly infinite storage resource pool makes data storage and access scalable and readily available. The majority of them, on the other hand, favour a single cloud because of the simplicity and inexpensive storage costs it offers in the near run. Cloud-based data storage, on the other hand, has concerns such as vendor lock-in, privacy leakage and unavailability. With geographically dispersed cloud storage providers, multicloud storage can alleviate these dangers. One of the key challenges in this storage system is to arrange user data in a cost-effective and high-availability manner. A multicloud storage architecture is given in this study. Next, a multi-objective optimization problem is defined to minimise total costs and maximise data availability at the same time, which can be solved using a technique based on the non-dominated sorting genetic algorithm II (NSGA-II) and obtain a set of non-dominated solutions known as the Pareto-optimal set.. When consumers can't pick from the Pareto-optimal set directly, a method based on Principal Component Analysis (PCA) is presented to find the best answer. To sum it all up, thorough tests based on a variety of real-world cloud storage scenarios have proven that the proposed method performs as expected.

A Resource-Based Perspective on Three IT Resources and Their Relationships in IT Outsourcing (IT 아웃소싱 성공에 영향을 미치는 3가지 IT 자원들과 그 관계: 자원기반 관점에서)

  • Kim, Chy Heon;Kim, Joon S.;Im, Kun Shin
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.53-74
    • /
    • 2012
  • IT outsourcing (ITO) is an integration of two firms-external vendor(s) and a client firm-IT resources by contract. According to resource-based view(RBV), three different resources-ITO vendor's resource, client firm's resource, and the relationship resource between two firms- may have an impact on ITO performance. However, there have been few previous studies considering all three IT resources simultaneously. There have been also few empirical studies in ITO context, which test Bharadwaj (2000)'s findings: 1) IT resources can be divided into tangible IT asset and intangible IT capability, and 2) only IT capability has an impact on the IT performance. Therefore we examined whether, in ITO context, all three different resources have a significant impact on ITO performance. Adopting the findings of previous IT studies, we also divided IT resource into IT asset and IT capability. To achieve this research objective, we analyzed 62 ITO cases of 45 companies being listed in Korean top 100 companies for recent 3 years. Also, we analyzed the data with the Partial Least Squares method. The results of this research lead to the following conclusions: First, only when partnership is high, ITO vendors' resource can have an influence on ITO performance. Second, only client firm's IT capability, not IT asset, is directly related to the ITO success. Third, a firm's IT capability can increase the partnership. Therefore, we concluded that 1) RBV is also an useful theory in ITO context, 2) Bharadwaj(2000)'s suggestion is valid in ITO context as well, and 3) the relationship resource is also important in ITO.

  • PDF

The Effects of IT Human Capability on Knowledge Transfer in Information Systems Outsourcing (정보기술 인적 역량이 지식 이전에 미치는 영향에 관한 연구: 정보시스템 아웃소싱 상황을 중심으로)

  • Park, Joo-Yeon;Kim, Joon-S.;Im, Kun-Shin
    • Asia pacific journal of information systems
    • /
    • v.16 no.2
    • /
    • pp.85-110
    • /
    • 2006
  • The objective of this research is to identify the process of knowledge transfer and to examine the effect of IT human capability on knowledge transfer in information systems outsourcing. Through a field survey, it is found that clients' IT human capability significantly affects on cooperative learning with vendors and knowledge transfer from vendors to clients. The survey also shows that clients' trust with vendors indirectly enhances the knowledge transfer by increasing the cooperative learning. This study provides a solution of knowledge transfer problem in information systems outsourcing. Also it brings out issues that can be accrued in the outsourcing situation, such as clients' dependency on vendors and knowledge asymmetries developed in favor of the vendors. These issues should be topics for future research on information systems outsourcing.

Workflow Design on Product Data Management System Using Object-Oriented Modeling Technique (객체지향 방법론을 이용한 제품정보관리(PDM) 시스템에서의 워크플로우 설계)

  • 최종윤;최경희;안병하
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.145-157
    • /
    • 1999
  • The challenge is to maximize the time-to-market benefits of concurrent engineering while maintaining control of data and distributing it automatically to the people who need it when they need it. The way PDM systems cope with this challenge is that master data is held only once in a secure vault where its integrity can be assured and all changes to it monitored, controlled and recorded. The structure of PDM is various from vendor, but they have common module. That is PDM and it is most important. The goal is to design the workflow in PDM using object-oriented modeling method. The past methods have concentrated on the flow between workflow engine and agent, but this paper will focus on task. We will model task as individual object. This paper uses OMT(Object Modeling Technique) by James Rumbaugh for base modeling tool and uses DCOM(Distributed Component Object Model) for base ORB(Object Request Broker). Research object is to design the static object model, to design state change by dynamic model and to design data transition by functional model.

  • PDF

Study on Implementation of Hardware Simulation System for Verification of Digital Circuit (디지털 회로 검증을 위한 하드웨어 시뮬레이션 시스템 구현에 관한 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.11a
    • /
    • pp.78-80
    • /
    • 2007
  • According to the development of VLSI integration technology and getting bigger the circuit size, it is a significant problem to verify systemized circuit. The faster and more accurate verification has very significant meaning in the field of electronic industry because it can yield the product comparably faster and reduce the trial and errors. In spite of the presence of various kind of Integrated Circuits it's not always easy to get the right part. Besides, it is hard to find a vendor for a small quantity consumers like who develop prototype applications. In this study, we've tried to get the logical signals from the PC based device we've developed that correspondents with the real ICs. It can emulate decoder ICs, multiplexers, demultiplexers and basic logic gates.

  • PDF