• Title/Summary/Keyword: Information Provider

Search Result 1,238, Processing Time 0.033 seconds

A study on the current status and ways of activating 3PL (제3자물류의 실태분석 및 활성화 방안에 관한 연구)

  • 이충규;김준석
    • Journal of Korea Port Economic Association
    • /
    • v.18 no.2
    • /
    • pp.65-90
    • /
    • 2002
  • Despite the importance and necessity, the 3PL has not been activated to date. Among many views, customers claim that logistics service provider(LSP) are not prepared or capable of offering satisfactory 3PL services, while LSP emphasize the lack of mutual trust, closed corporate culture of the customer and excessive demand for reducing the costs. With this keeping in mind, it surveyed difference of perception between users and providers of 3PL services in terms of the actual status of using 3PL services, the degree of satisfaction and key factors for selecting 3PL provider through the questionnaire. As shown in this study, 43.3% of the respondents outsourced logistics services. However, Most company outsourced only inland transportation (49.5%) which is a simple and limited scope of 3PL services, but it also indicated that the percentage of users have ranged was less then 10% in outsourcing their whole logistics sector to 3PL provider and employing other logistics functions. Among respondents, a majority of the service provider stated that they offered satisfactory cost-saving to the customers, while users felt that the degree of satisfaction for using 3PL services was evaluated as at an average level and they more highly regarded the strong partnership of their 3PL provider rather than the saving of cost and improvement of customer's services. Moreover, in contrast to the 3PL providers which regard the most important factor for selecting 3PL service provider is the logistics cost quoted, users of 3PL services felt that the quality of services was more significant than the reduction of cost, and this tendency for selecting 3PL providers was shown in more advanced countries. While users of 3PL services indicated that the main reason for not using 3PL services was to avoid disclosing information of their business and it costs much for employing 3PL providers than doing themselves, 3PL providers thought it was due to reluctancy of opening information and resistance from the logistics division engaged in logistics activities concerned. Accordingly, providers and users of 3PL services should trust each other and prepare plan to activate 3PL services under the collaborative relationships as soon as possible.

  • PDF

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Target Market Determination for Information Distribution and Student Recruitment Using an Extended RFM Model with Spatial Analysis

  • ERNAWATI, ERNAWATI;BAHARIN, Safiza Suhana Kamal;KASMIN, Fauziah
    • Journal of Distribution Science
    • /
    • v.20 no.6
    • /
    • pp.1-10
    • /
    • 2022
  • Purpose: This research proposes a new modified Recency-Frequency-Monetary (RFM) model by extending the model with spatial analysis for supporting decision-makers in discovering the promotional target market. Research design, data and methodology: This quantitative research utilizes data-mining techniques and the RFM model to cluster a university's provider schools. The RFM model was modified by adapting its variables to the university's marketing context and adding a district's potential (D) variable based on heatmap analysis using Geographic Information System (GIS) and K-means clustering. The K-prototype algorithm and the Elbow method were applied to find provider school clusters using the proposed RFM-D model. After profiling the clusters, the target segment was assigned. The model was validated using empirical data from an Indonesian university, and its performance was compared to the Customer Lifetime Value (CLV)-based RFM utilizing accuracy, precision, recall, and F1-score metrics. Results: This research identified five clusters. The target segment was chosen from the highest-value and high-value clusters that comprised 17.80% of provider schools but can contribute 75.77% of students. Conclusions: The proposed model recommended more targeted schools in higher-potential districts and predicted the target segment with 0.99 accuracies, outperforming the CLV-based model. The empirical findings help university management determine the promotion location and allocate resources for promotional information distribution and student recruitment.

A Study of QoS Mapping based on SLA in B3G Networks (B3G 네트워크에서 SLA 기반 QoS 매핑을 위한 연구)

  • Moon, Hyun-Joo;Lee, Jin-Kwan;Jung, Kyu-Chul;Lee, Jong-Chan;Park, Sang-Joon;Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.157-165
    • /
    • 2011
  • The QoS management is an agreement of service user and service provider in B3G networks, and service provider must support proper the network service to service users by the agreement facts. The service provider must provide the QoS method to maintain the agreed service, which manages the detail method of system level from policy level. By the agreement of service policy, the service provider can give the QoS to the service customer with the service agreement. Hence, in this paper we propose a QoS mapping method of heterogeneous networks to provide the customer service through the service agreement based on the SLA of B3G networks.

콘텐트 제공업

  • Korea Database Promotion Center
    • Digital Contents
    • /
    • no.12 s.67
    • /
    • pp.24-34
    • /
    • 1998
  • 인터넷의 거센 물결에 국내 PC통신 환경이 변화하고 있다. 텍스트 위주의 정보 제공에서 멀티미디어 요소를 겸비한 콘텐트 중심으로 형태가 바뀌고 있는 것이다. 이런 변화의 물결 속에 정보제공업자의 명칭도 IP(Information Provider)에서 CP(Content Provider)로 바뀌고 있으며, 넷츠고와 채널아이 등 CP를 중심으로 한 통신사들이 기존 통신사를 위협하고 있다.

  • PDF

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server (델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구)

  • Jung, Myoung-Gyu;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

Design and Implementation of a 3-dimensional GIS Data Provider System (3차원 GIS 데이터제공자 시스템의 설계 및 구현)

  • 남광우;이성호;박종현
    • Spatial Information Research
    • /
    • v.12 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • The 3-dimensional GIS data provider system manages and retrieves 2, 3-dimensional spatial and time data. This system provides the standard interfaces which help developers to omit additional works to do modify or convert a format of 2 or 3-dimensional spatial data, which has been already accumulated, into that dependent on a specified system. This system consists of a data provider and data access component. The former deals with the connections with some databases and manages the meta data, so that the various GIS or software can access to 3-dimensional spatial and time data via the same method, and the latter takes charge of index management and spatial operations on GIS data for consumers. The system offers the diverse spatial operations and analysis functions for 3-dimensional GIS.

  • PDF

The Proposals of Identity Escrow Scheme to Control User's Anonymity (사용자의 익명성을 제어하는 신원 위탁 방식 제안)

  • 황보성;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.617-624
    • /
    • 2000
  • We introduce the concept of a Identity Escrow Scheme, an application of key escrow ideas to solve the problem of authentication. In the Identity Escrow Scheme, the User escrows a own real identity to the Issuer and receives a Authentication Information. In authentication step, between the User to the Service Provider, the User only gives a Authentication Information to the Service Provider. Therefore, the Service Provider don't know a real identity of user's. However, when the User does unlawful actions, the Lawful Agent is called by the Service Provider, and his anonymity is revoked by cooperation of the Issuer and the Lawful Agent. We propose new Identity Escrow Schemes and analyze these.

  • PDF

A Study on Pricing Policy for Consolidata Competition on the Telephone Service Market in Korea (우리나라 전화서비스 시장의 경쟁확립을 위한 요금정책 연구)

  • 조용환;옥주영;최승묵
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1627-1638
    • /
    • 1998
  • In this paper, we made reaserch into an effective pricing policy for competitive structure on telephone market in Korea by using that of foreign examples and what level of price gap between esisting service provider and new service provider is adequate by using a stochastical analysis. Simulation result shows to remove the existing service provider under current telecommunication structure in Korea, rapid increase of telephone service is needed. And to consolidata competition, the existing service provider, Korea Telecom, shall be run by private management. Futhermore, local call service and long-distance call service shall be separated.

  • PDF