• 제목/요약/키워드: Key sharing

Search Result 611, Processing Time 0.023 seconds

A Study on the Strategic Adoption of Internet based Customer Relationship Management (인터넷 기반 고객관계관리의 전략적 도입에 관한 연구)

  • Roh Kyung-Ho
    • Management & Information Systems Review
    • /
    • v.5
    • /
    • pp.61-79
    • /
    • 2000
  • This research suggests the strategic adoption methodology of Customer Relationship Management. The backgrounds of CRM is the business environment changing that Market power is shifting to the customer who has unprecedented powers of choice today. The strategic adoption of Customer Relationship Management determines the value, needs and preferences of each customer or customer segment. Customer Relationship Strategy is an explicitly defined plan for how a company has decided to connect with, relate to, and focus on its chosen customers to create value. Deliberate decisions must be made, often involving trade-offs, so that investments are aligned with customer needs and value. Plan defined in terms of target customers value proposition, role in value delivery, and risk/reward sharing. All customers are not created equal; specific customers and/or customers segments are more desirable/valuable to pursue. Key premise of CRM is that value can be created by changing company's business model to better connect with customers. Area of service of Customer Relationship Management are as follows. Portfolio strategy, Market Opportunity Assessment, Brand Equity, Market Positioning, Pricing, Channel Strategy, Market Segmentation. Target Market Identification, Customer LifeTime Value Analysis, Customer Profitability, Customer Connections Economics Analysis. The objects of CRM are maximizing customer service effectiveness, improving customer loyalty, increasing customer service efficiency, optimizing intelligence about customer behaviors and preferences.

  • PDF

The Efficacy of Moxibustion for Female Stress Urinary Incontinence: a Systematic Review (여성 복압성 요실금에 대한 뜸 치료의 효과 : 체계적 문헌 고찰)

  • Park, Hye-Rin;Jo, Hee-Geun
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.33 no.4
    • /
    • pp.1-22
    • /
    • 2020
  • Objectives: The purpose of this review is to evaluate the efficacy of moxibustion for stress urinary incontinence (SUI) in women. Methods: For relevant randomized controlled trials (RCTs), we searched the following databases from their inception to September 1, 2020: The Cochrane Library, PubMed, EMBASE, Chinese National Knowledge Infrastructure Database (CNKI), Koreanstudies Information Service System (KISS), Research Information Sharing Service (RISS), and National Digital Science Library (NDSL). The key search terms were 'stress urinary incontinence' and 'moxibustion'. Data extraction and assessment of risk of bias were conducted by two authors independently. Results: A total of 11 RCTs were finally included in this systematic review. In all studies, moxibustion treatment was applied as an adjuvant therapy to the conventional treatment, and the most common conventional treatment was pelvic floor muscle training (PFMT). The treatment group (conventional treatment plus moxibustion) showed statistically more significant effect than the control group (conventional treatment only) in various evaluation indicators including urinary incontinence frequency, 1 hour urine pad test, quality of life, the clinical efficacy rate, and pelvic muscle strength. Conclusions: In this study, we investigated the efficacy of moxibustion as an adjuvant therapy for female SUI patients. Further studies are needed to supplement the safety of moxibustion and the evaluation of moxibustion dose.

The Antecedent Factors Affecting Knowledge Transfer of ITO Organizational Members : Triandis Model and Social Capital Theory Perspective (정보시스템 아웃소싱 조직구성원의 지식이전 선행요인 ; Triandis 모델 및 사회적 자본 이론 관점)

  • Kim, Chang Sik;Kwahk, Kee Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.157-167
    • /
    • 2014
  • Increasing productivity of knowledge workers is a significant issue in the 21st century referred as knowledge-based society. The core key word is behavior of knowledge transfer among members of an organization. The objective of this study is to investigate a model based on Triandis theory and Social Capital theory. This explored the antecedent factors of knowledge Transfer in ITO(Information Technology Outsourcing) Organization. Data were derived from 42 respondents working IT Cooperation in Seoul, Korea. In this paper, we introduce the research model for the knowledge transfer. In order to validate the proposed research model, social network analysis tool, UCINET, a structural equation modeling tool, SmartPLS, was utilized. The empirical result showed that, all antecedent factors (intention of knowledge sharing, anticipated reciprocal relationships, subjective norm, closeness network centrality) of knowledge transfer behavior were significant. In conclusion, findings and implications were discussed and limitations of the study and future research directions were suggested.

Improved Single Packet Authentication and Network Access Control Security Management in Software Defined Perimeter (소프트웨어 정의 경계의 단일 패킷 인증 및 네트워크 접근통제 보안관리 개선)

  • Jung, Jin-kyo;Lee, Sang-ku;Kim, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.407-415
    • /
    • 2019
  • As the IT environment changes with cloud computing and smart work, the existing perimeter security model is showing its limitations and Software Defined Perimeter is being discussed as an alternative. However, SDP Spec 1.0 does not specify the device registration procedure, policy distribution process and authentication key generation and sharing process.In this paper, we propose a method to solve the problem of SDP access control by improving the operation procedure of Single Packet Authentication. This paper suggests that the proposed method can implement a consistent and automated integrated access control policy compared to the existing access control methods.

Design and Implementation of $160\times192$ pixel array capacitive type fingerprint sensor

  • Nam Jin-Moon;Jung Seung-Min;Lee Moon-Key
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.82-85
    • /
    • 2004
  • This paper proposes an advanced circuit for the capacitive type fingerprint sensor signal processing and an effective isolation structure for minimizing an electrostatic discharge(ESD) influence and for removing a signal coupling noise of each sensor pixel. The proposed detection circuit increases the voltage difference between a ridge and valley about $80\%$ more than old circuit. The test chip is composed of $160\;\times\;192$ array sensing cells $(9,913\times11,666\;um^2).$ The sensor plate area is $58\;\times\;58\;um^2$ and the pitch is 60um. The image resolution is 423 dpi. The chip was fabricated on a 0.35um standard CMOS process. It successfully captured a high-quality fingerprint image and performed the registration and identification processing. The sensing and authentication time is 1 sec(.) with the average power consumption of 10 mW at 3.0V. The reveal ESD tolerance is obtained at the value of 4.5 kV.

  • PDF

Fuzzy Logic Based Buffer Management Algorithm to Improve Performance of Internet Traffic over ATM Networks (ATM 네트워크에서 인터넷 트래픽 성능 향상을 위한 퍼지기반 버퍼 관리 알고리즘)

  • 김희수;김관웅;박준성;배성환;전병실
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.9
    • /
    • pp.358-365
    • /
    • 2003
  • To support Internet traffic efficiently over ATM networks, Guaranteed Frame Rate(GFR) has been proposed in the ATM Forum. GFR provides minimum rate guarantees to VCs and allows any excess bandwidth in the network to be shared among the contending VCs in a fair manner. In this paper, we proposed a new fuzzy logic based buffer management algorithm that provides MCR guarantee and fair sharing to GFR VCs. A key feature of proposed algorithm is its ability to accept or drop a new incoming packet dynamically based on buffer condition and load ratio of VCs. This is achieved by using fuzzy logic controller for the production of a drop factor. Simulation results show that proposed scheme significantly improves fairness and TCP throughput compared with previous schemes.

Strategies for Establishing of the Systemic Collecting and Sharing of Food Risk Information (체계적인 식품 위해 정보 수집.공유 체계 구축 방안)

  • Choi, Sung-Rak
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.17 no.3
    • /
    • pp.456-462
    • /
    • 2007
  • Food safety has been a growing consumer concern over the last few decades, and remains a priority for consumers, the food industry, and regulatory agencies alike. Although consumer concern for food safety has increased, consumer confidence has decreased. The emphasis on food safety is related to that of preliminary risk management. The ability to collect and provide food risk information is a key element in enhancing the way food safety authorities protect consumers from risk. This review aims to investigate the current situations of international organizations, as well as several countries' systems for collecting and providing food risk information. Through the comparison and analysis of each system, this review proposes strategies to establish a systematic collecting of information and provision of infrastructure in Korea. To develop an information collection system suited to Korea's situation, it is necessary for Korea to strengthen interactions and cooperation with other trade partners through the enlargement of international networks. Such efforts on food risk communication should be made by providing high quality and clear information.

  • PDF

Data Exchange between Cadastre and Physical Planning by Database Coupling

  • Kim, Kam-Rae;Choi, Won-Jun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.1
    • /
    • pp.69-75
    • /
    • 2007
  • The information in physical planning field shows the socio-economic potentials of land resources while cadastral data does the physical and legal realities of the land. The two domains commonly deal with land information but have different views. Cadastre has to evolved to the multi-purpose ones which provide value-added information and support a wide spectrum of decision makers by mixing their own information with other spatial/non-spatial databases. In this context, the demands of data exchange between the two domains is growing up but this cannot be done without resolving the heterogeneity between the two information applications. Both of either discipline sees the reality within its own scope, which means each has a unique way to abstract real world phenomena to the database. The heterogeneity problem emerges when an GIS is autonomously and independently established. It causes considerable communication difficulties since heterogeneity of representations forms unique data semantics for each database. The semantic heterogeneity obviously creates an obstacle to data exchange but, at the same time, it can be a key to solve the problems too. Therefore, the study focuses on facilitating data sharing between the fields of cadastre and physical planning by resolving the semantic heterogeneity. The core job is developing a conversion mechanism of cadastral data into the information for the physical planning by DB coupling techniques.

Distributed Secure Mail System For Roaming User (이동 사용자를 위한 분산 보안 메일 시스템)

  • Yang, Jong-Phil;Sur, Chul;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.825-834
    • /
    • 2003
  • In this paper, we propose a new certified e-mail system which reduces user's computational overhead and distributes confidentiality of TTP(Trusted Third Partty). Based on the traditional cryptographic schemes and server-supported signiture for fairness and confidentiality of message, we intend to minimize to computation overhead of mobile device on public key algorithm. Therefore, our proposal becomes to be suitable for mail user sho uses mobile devices such as cellular phone and PDA. Moreover, the proposed system is fault-tolerant, secure against mobile adversary and conspiracy attack, since it is based on the threshold cryptography on server-side.

An Improved HORS for Stream Authentication (스트림 인증에 적합한 개선된 HORS기법)

  • 박용수;조유근
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.417-425
    • /
    • 2003
  • We propose an efficient one-time signature scheme for stream authentication by improving HORS. When one-time signatures are used for authenticating live streams, one of the most serious drawbacks is that its large signature size yields high communication overhead. Compared with the previous one-time signature schemes, proposed scheme has the smallest signature size. Moreover, verification overhead is very low. Compared with the previous schemes for stream authentication, signing overhead of our scheme is larger than that of HORS but much lower than those of BiBa or Powerball. Moreover, signing operation can be trivially parallelized without any additional risk because it does not require sharing of the secret key between distributed servers.